Statistical Recognition Method of Binary BCH Code
|
|
- Arnold Green
- 7 years ago
- Views:
Transcription
1 Commucatos ad etwork, 20, 3, 7-22 do:0.4236/c Pubshed Oe February 20 ( Statstca Recogto Method of Bary BCH Code Abstract Jafeg Wag, Yag Yue, Ju Yao Isttute of Eectroc Egeerg Cha Academy of Egeerg Physcs, Mayag, Cha E-ma: Receved October 30, 200; revsed Jauary 5, 200; accepted Jauary 6, 20 I ths paper, a statstca recogto method of the bary BCH code s proposed. The method s apped to both prmtve ad o-prmtve bary BCH code. The bock egth s frst recogzed based o the cycc feature uder the codto of the frame egth kow. Ad the caddate poyomas are acheved whch meet the restrctos. Amog the caddate poyomas, the most optma poyoma s seected based o the mmum rue of the weghts sum of the sydromes. Fay, the best poyoma was factorzed to get the geerator poyoma recogzed. Smuato resuts show that the method has strog capabty of at-radom bt error. Besdes, the agorthm proposed s very smpe, so t s very practca for hardware mpemetato. Keywords: Bary BCH Code, Bd Recogto, Code Legth, Geerator Poyoma. Itroducto Wth the deveopmet of the Commucato Coutermeasures, the methods of the commucato coutermeasures have trasferred from the sga eve to the formato eve. The bd recogto of chae codg s the foudato of gettg the message, therefore has become the key techoogy the area of the Commucato Coutermeasures ad gets more ad more atteto. Besdes, the bd recogto of chae codg aso has mportat appcatos cooperatve areas such as the teget commucato. The ear chae codg has two categores: bock code ad covoutoa code. We ca see that most researches focus o the bd recogto of covoutoa code [-2], whe terature about the bd recogto of bock code s rare. Lterature [3] gves a bd recogto method of the bock code wth ow ecodg rate, ts esseta prcpe s to resove equatos to recogze the sydrome matrx, ad the get the geerator matrx. Lterature [4] dscusses a method of bd recogto of prmtve RS code, ts esseta prcpe s usg reduced row echeo form of the matrx (RREF), faut-toerat matrx decomposg (FTMD) ad Gaos fed Fourer trasform (GFFT) to recogze ecodg parameters ad sydrome matrxes. Both methods eed matrx computatos o the fte fed, whe code egth s og, the EMS memory eeded w be very arge, so t s ot appcabe to hardware mpemetato. At the same tme, the error code capabty s ot dea too. I ths paper we study the bary BCH code whch s a mportat subcass of cycc codes. Accordg to the crcuar feature, we proposed a smpe statstca recogto method uder the codto that the frame egth s kow. The method has strog at-error capabty. Besdes, there s o eed for matrx computato; therefore t s sutabe for hardware mpemetato. The reset of ths paper s orgazed as foows: Secto troduces the basc feature of bary BCH code; Secto 2 dscusses the recogto method of the bock egth; Secto 3 dscusses the method of recogto of the geerator poyoma; Secto 4 observes the recogto performace of ths agorthm through smuato; fay, the paper s brefy summarzed. 2. Bary BCH Code Here we smpy troduce the features of bary BCH code. The defto of bary BCH code ad the detas of ecodg ad decodg are dscussed terature [5]. Cosder (,k) BCH code defed o GF(2), s the bock egth ad k s the message egth. Let m m0, m,, mk be the message word before ecodg, c c 0, c,, c be the code word after ecodg, because t s the cycc code, the message word Copyrght 20 ScRes.
2 8 J. F. WAG ET AL. ad code word each has a correspodg message poyoma ad code poyoma defed o GF(2), as foows k k2 m x m x m x m xm () 0 k2 k2 c x c x c x c xc (2) 0 k2 From terature [5], we kow that the (,k) bary BCH code has foowg features, ) Bock egth equas 2 m or s a factor of 2 m, where m 3. If equas 2 m, the t s prmtve bary BCH code; otherwse, t s o- prmtve oe. 2) The code word c satsfes the crcuar feature, that s, after crcuar shftg the code word c for j tmes, get the code word j, j,, k, 0,, j3, j2 c c c c c c c ad c aso beogs to (, k) bary BCH code set. 3) m x ad c x satsfy foowg reatoshp, where (2), mxgx c x k (3) g x s the geerator poyoma defed o GF k k g x x g x g x (4) k 4) There exsts sydrome poyoma h x defed o GF(2), k k h x x h x h x k whch satsfes foowg reatoshps, (5) h x c x 0mod x (6) hxgx x 5) g x s rreducbe. 3. Recogto of Bock Legth (7) The recogto of the bary (, k) BCH code s to recogze three parameters: the bock egth, the sydrome word egth k, ad the geerator poyoma g x. But we ca see from formua (4) that the order of g x s -k, the as og as the bock egth ad the geerator poyoma g x are recogzed, the vaue of k ca be ascertaed. The oy the bock egth ad the geerator poyoma g x eed to be recogzed. I ths secto we troduce the recogto of bock egth, ad ext secto we troduce the recogto of geerator poyoma g x. The recogto s based o the assumpto that frame egth f s kow. Ths assumpto s ratoa, because usuay practce, frame head s ot ecoded, so t s easy to get. Because f s kow, ad there exsts at east two code words oe frame, so we coud get foowg cocusos: f ) 3, 2, where meas foor fucto. 2) f s dvsbe by, that s, s a factor of f. f The factor umbers of f the rag 3, 2 may ot be oy oe, assume s a factor of f ad the there are two stuatos, ) Uder ths stuato, f we take as the bock egth, we coud get code words. Assume cp x s the code poyoma of the p th code word, the through eft crcuar shftg for j tmes we get j code poyomas cp x, cp2 x,, cpj x, where j. Because the bary BCH code satsfy the crcuar feature, f there s o error code c p, the the code words correspodg to cp x, cp 2 x,, cpj x ad the code word correspodg to c p x beog to the same (, k) bary BCH set, so ther geerator poyomas are the same. Accordg to formua (3) whch s the reatoshp betwee the code poyoma ad the geerator poyoma, we kow there s a commo factor for cp x, cp x, cp2 x,, cpj x. Let c x c x, the the foowg reatoshp exsts, p0 p gcd cp0 x, cp x,, cpj x j (8) We ca the code word that satsfes fomua (8) as a vad code word. Assume there are c vad code words amog the code words. Obvousy, whe there s o error code, c, that s, the percetage of the vad code words of a the code words f c s, c fc (9) 2) Uder ths stuato, f we take as the bock egth, the bockg s wrog. Assume we get code words, there exst code words that do ot satsfy formua (8) evtaby, so c, that s c fc (0) Above a, uder the codto that o error code exsts, f take formua (8) as the rue to judge f the code word s vad or ot, the for a the possbe bock egths, whe, the percetage of vad code words s fc ; whe, the percetage of vad code words s fc. Of course, whe there are error codes Copyrght 20 ScRes.
3 J. F. WAG ET AL. 9 exst, eve f, f c coud be ess tha. But we ca predct that f c shoud get the maxmum whe. I addto, accordg to feature (), s odd, so we coud get the recogto formua of the bock egth, arg max f () 3, f 2 rem,2 rem f, 0 where meas the maxmum operato; rem f, meas the remader of f dvded by. The rue to judge the vadty of the code word s formua (8). The we ca get the recogto process of bary BCH code bock egth : ) Let 3 ad taze the vaue of j; 2) If ca ot dvde f, the tur to (6); 3) Let be the bock egth ad get code words; 4) Accordg to formua (8), cacuate the umber of vad code words c ; c 5) Compute fc ad save; c max 6) 2 ; 7) If f 2, tur to (2); 8) Compare a the saved f c, the estmato of s that made f c has maxmum vaue; 9) The recogto process s over. We ca see from step () ad step (8), the recogto capabty of bock egth s reevat to ad, j the more the vaue of ad j, the better the recogto capabty at the frst gace; but arge vaues mea that the egth of the receved code stream seres s aso arge, ad the computato compexty w crease, so we must cosder ths tradeoff accordg to the practca stuatos. 4. Recogto of Geerator Poyoma I ths secto, we dscuss how to recogze the geerator poyoma g x uder the codto of the bock egth s rghty recogzed. Assume we receve code words, cp x s the code poyoma for the p th code word, ad assume that there s o error code. Accordg to secto II, eft crcuar shft cp x to get code poyomas cp x, cp 2 x,, cp x, ad the geerator poyomas of these code poyomas ad cp x are the same. I other words, the geerator poyoma g x s a commo factor of p x, cp x, c p 2 x,, x. Aso et c x c x, ad cp p c p0 p gcd,,, f x c x c x c p0 p pj x (2) f p x s the mutpe of The g x. From the receved code words, we ca get M ( M ) dfferet poyomas accordg to formua (2), cosder there are error codes, these M poyomas beog to oe of the four stuatos beow: ) Equa ; 2) ot equas, but ot equas g x ; 3) Equa g x ; 4) Equa the mutpe formua of g x. mutpe formua of g x, aso ot the Stuatos () ad (2) ustrate there are error codes exst. Stuatos (3) ad (4) ustrate there are o error codes exst code words, or the error codes costtute aother code words the same sub code set. We ca get the geerator poyoma from the M caddate poyomas foowg three steps beow. Step. Accordg to the costrat codtos of g x satsfed, remove the poyomas that do ot satsfy the codtos Accordg to the feature of the bary crcuar code, g x eeds to satsfy the foowg restrctos [5], ) q 2) g x x, where q s the postve teger ad q 3) g x ca dvde x Accordg to these three restrctos to remove the poyomas uder stuatos () ad (2). Step 2. Accordg to the mmum rue of the weghts sum of the sydromes choose the most optma poyoma Assume after the step there are L caddate poyo- mas rema, ad g x (, 2,, L ) s the th poyoma, ad ts correspodg sydrome poyoma s, h x x g x (3) The jth sydrome of the code word s, rj h xcj xmod x (4) The code weght s, w j j weght r (5) For a the receved code word compute the sydrome code weght, w wj, 2,, L (6) j The caddate poyoma made most optma poyoma, deotes as g b x arg m g ( x),,2,, L mmum s the g x, w b w (7) Step 3. From the most optma poyoma g get the estmated geerator poyoma g x. 0 b x to Copyrght 20 ScRes.
4 20 J. F. WAG ET AL. Whe the reorgazato s correct, the most optma poyoma gb x s ot ecessary equas g x, but t s deftey the mutpe of g x, so further steps are eeded usg gb x to estmate the geerator poyoma. Frsty accordg to the rues [6], judge whether g x s reducbe or ot; f t s rreducbe, the b 0 b g x g x (8) If t s reducbe, get a the rreducbe factor of v gb x that satsfy step, the foow step 2 to get the most optma poyoma as the estmated geerator poyoma g0 x. The method of factorzato ca drecty get from the rues [6], we do ot commet o ths because the mtato of space. From the above recogto process, theoretcay, as og as there s a code word wthout error code, t s of very hgh possbty to correcty recogze the geerator poyoma, the ths recogto method has strog at-error capabty. Fgure. (5,) code bock egth recogto capabty. 5. Smuato The smuato has three steps: frst, we smuate for the recogto capabty of the bock egth; secod, we smuate for the recogto capabty of the geerator poyoma; thrd, accordg to the frst two steps we get the tota recogto capabty. I the smuato of the recogto capabty, we ru the smuato 000 tmes for (5,) prmtve bary BCH code ad (2,2) o-prmtve bary BCH code respectvey to get the statstca correct recogto rate. The geerator poyoma of (5,) prmtve bary 4 BCH code s g x x x; the geerator poyoma of (2,2) o-prmtve bary BCH code s g x x words oe frame, ad we choose the crcuar shftg tme as for recogzg the bock egth. 9 3 x ;assume that there are fve code 5.. Smuato Resuts Fgure 2. (5,) code geerator poyoma recogto capabty. Fgure 3. (2,2) code bock egth recogto capabty. The recogto smuatos are doe accordg to the method descrbed Sectos 2 ad 3. The resuts are show Fgures -6. The tota recogto capabty s computed accordg to the bock egth recogto capabty ad geerator egth recogto capabty, the computato formua s as foows, p p p2 (9) where p s the tota correct recogto rate, p s the correct recogto rate of bock egth, p2 s the correct recogto rate of geerator poyoma. Fgure 4. (2,2) code geerator poyoma recogto capabty. Copyrght 20 ScRes.
5 J. F. WAG ET AL. 2 Fgure 5. (5,) code tota recogto capabty. (5,) code, the whe the code words s the same, through a crcuar shft, the percetage of satsfyg crcuar feature woud be hgher tha (5,) code, eve f ot rght bockg. 2) The frame egth of (2,2) code s 05, t has 6 odd factor: 3, 5, 7, 5,, 35; whe the frame egth of (5,) code s 75, t has 4 odd factor: 3, 5, 5, 25. Obvousy, whe the code word umber s the same, the more the factor, the worse the recogto capabty. Of course, the recogto capabty s aso reevat to the structure of the code, (5,) code s prmtve bary BCH code ad (2,2) code s o-prmtve bary BCH code. But we ca see from the smuato resut, athough whe the umber of code words s the same, the recogto capabty of (2,2) code s worse tha (5,) code, but we ca crease code words to reach the same recogto capabty. 6. Cocusos Fgure 6. (2,2) code tota recogto capabty. ote: I pctures, BER represets Bt Error Rate, CRR represets Correct Recogto Rate, ad Code repesets Code-words umber Aayss of Smuato Resuts From the resuts of the smuato, we kow that o matter the recogto capabty of the bock egth, the recogto capabty of the geerator poyoma, or the tota recogto capabty, w crease wth the umber of code words that are used for the recogto process. The recogto capabty w aso crease wth the crcuar shftg tme. Because of the mtato of space, the smuato resuts are ot gve here. Otherwse, we ca see that uder the codto of the umber of code words s the same, the dfferece betwee the recogto capabty of these two kds of code words s reatvey arge. For (5,) code, whe the error code rate s 0%, 00 code words are used, ts tota recogto capabty coud reach above 90%. Whe for (2,2) code, whe the error code rate s the same, to reach the same recogto capabty, we eed 000 code words. The reaso for ths dfferece s varous, ) The code egth of (2,2) code s oger tha The bd recogto method of the bary BCH code proposed ths paper s a statstca recogto method. So the recogto capabty s drecty reated to statstca bt umber, the more the statstca bts, the better the recogto capabty ad the bgger the computato compexty, especay uder the codto of og code, whch s a drawback of the agorthm proposed ths paper. But whe compared to ts recogto capabty, the bg computato compexty s acceptabe. Besdes, the agorthms ths paper do ot vove compcated computatos, ad t coud be ready apped to the hardware processor because of ts bary characterstcs. So the hardware mpemetato s easy ad the computato ca be acceerated. 7. Ackowedgmet The work ths paper s supported by the Fud of Scece ad Techoogy Deveopmet of CAEP. The umber s 2009B Refereces [] F. H. Wag, Z. T. Huag ad Y. Y. Zhou, A Method for Bd Recogto of Covouto Code Based o Eucdea Agorthm, IEEE Iteratoa Coferece o Wreess Commucato etworkg ad Mobe Computg, Shagha, 2007, pp do:0.09/ WICOM [2] P. Z. Lu, L. She, Y. Zou ad X. Y. Luo, Bd Recogto of Puctured Covoutoa Codes, Scece Cha, Vo. 48, o. 4, 2005, pp do: 0.360/ 03yf0480 Copyrght 20 ScRes.
6 22 J. F. WAG ET AL. [3] J. J. Za ad Y. B. L, Bd Recogto of Low Code-Rate Bary Lear Bock Code, Rado Egeerg of Cha, Vo. 39, o., 2009, pp [4] J. Lu,. Xe ad X. Y. Zhou, Bd Recogto Method of RS Codg, Joura of Eectroc Scece ad Techoogy, Vo. 38, o. 3, March 2009, pp [5] S. L ad D. J. Costeo, Error Cotro Codg, 2d Edto, Pearso Pretce Ha, Upper Sadde Rver, 2004, pp [6] X. Wag, X. M. Wag ad B. D. We, A Effcet ad Determstc Agorthm to Determe Irreducbe ad Prmtve Poyomas over Fte Feds, Acta Scetrarum aturaum Uverstats Suyatse, Vo. 48, o., 2009, pp Copyrght 20 ScRes.
Lecture 7. Norms and Condition Numbers
Lecture 7 Norms ad Codto Numbers To dscuss the errors umerca probems vovg vectors, t s usefu to empo orms. Vector Norm O a vector space V, a orm s a fucto from V to the set of o-egatve reas that obes three
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationOn Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationApplication of GA with SVM for Stock Price Prediction in Financial Market
Iteratoa Joura of Scece ad Research (IJSR) ISSN (Oe): 39-7064 Impact Factor (0): 3.358 Appcato of GA wth SVM for Stock Prce Predcto Faca Market Om Prakash Jea, Dr. Sudarsa Padhy Departmet of Computer Scece
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationChapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationThe Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationAn SVR-Based Data Farming Technique for Web Application
A SVR-Based Data Farmg Techque for Web Appcato Ja L 1 ad Mjg Peg 2 1 Schoo of Ecoomcs ad Maagemet, Behag Uversty 100083 Bejg, P.R. Cha Ja@wyu.c 2 Isttute of Systems Scece ad Techoogy, Wuy Uversty, Jagme
More informationTHE McELIECE CRYPTOSYSTEM WITH ARRAY CODES. MATRİS KODLAR İLE McELIECE ŞİFRELEME SİSTEMİ
SAÜ e Blmler Dergs, 5 Clt, 2 Sayı, THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES Vedat ŞİAP* *Departmet of Mathematcs, aculty of Scece ad Art, Sakarya Uversty, 5487, Serdva, Sakarya-TURKEY vedatsap@gmalcom
More informationA Covariance Analysis Model for DDoS Attack Detection*
A Covarace Aayss Mode or DDoS Attac Detecto* Shuyua J Deartmet o Comutg HogKog Poytechc Uversty HogKog Cha cssy@com.oyu.edu.h Dae S. Yeug Deartmet o Comutg HogKog Poytechc Uversty HogKog Cha csdae@et.oyu.edu.h
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationThe simple linear Regression Model
The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationSHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationAutomated Alignment and Extraction of Bilingual Ontology for Cross-Language Domain-Specific Applications
Automated Agmet ad Extracto of gua Otoogy for Cross-Laguage Doma-Specfc Appcatos Ju-Feg Yeh, Chug-Hse Wu, Mg-Ju Che ad Lag-Chh Yu Departmet of Computer Scece ad Iformato Egeerg Natoa Cheg Kug Uversty,
More informationT = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
More informationM. Salahi, F. Mehrdoust, F. Piri. CVaR Robust Mean-CVaR Portfolio Optimization
M. Salah, F. Mehrdoust, F. Pr Uversty of Gula, Rasht, Ira CVaR Robust Mea-CVaR Portfolo Optmzato Abstract: Oe of the most mportat problems faced by every vestor s asset allocato. A vestor durg makg vestmet
More informationSTOCK INVESTMENT MANAGEMENT UNDER UNCERTAINTY. Madalina Ecaterina ANDREICA 1 Marin ANDREICA 2
"AROACHES IN ORGANISATIONA MANAGEMENT" 15-16 Noveber 01, BCHAREST, ROMANIA STOCK INVESTMENT MANAGEMENT NDER NCERTAINTY Madaa Ecatera ANDREICA 1 Mar ANDREICA ABSTRACT Ths paper presets a stock vestet aageet
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationPreprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.
Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E
More informationIP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationConstrained Cubic Spline Interpolation for Chemical Engineering Applications
Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel
More informationCredibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationEfficient Traceback of DoS Attacks using Small Worlds in MANET
Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble
More informationProjection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationCompressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
More informationANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationSimple Linear Regression
Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8
More informationBased on PSO cloud computing server points location searching
Iteratoa Worshop o Coud Coput ad Iforato Securty (CCIS 13) Based o PSO coud coput server pots ocato search Che Hua-sha Iforato Techooy Ceter Shaha Iteratoa Studes Uversty Shaha, cha, 1391641563 E-a: huasha@shsu.edu.c
More informationStatistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
More informationThe analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
More informationBayesian Network Representation
Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationCurve Fitting and Solution of Equation
UNIT V Curve Fttg ad Soluto of Equato 5. CURVE FITTING I ma braches of appled mathematcs ad egeerg sceces we come across epermets ad problems, whch volve two varables. For eample, t s kow that the speed
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationApproximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines
(ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationOnline Appendix: Measured Aggregate Gains from International Trade
Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,
More informationClassic Problems at a Glance using the TVM Solver
C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the
More informationSettlement Prediction by Spatial-temporal Random Process
Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha
More informationResearch on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment
Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,
More informationSoftware Reliability Index Reasonable Allocation Based on UML
Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author
More informationThe impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationFault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
More informationECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
More informationRESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS
Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL
More informationOn formula to compute primes and the n th prime
Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal
More informationModeling of Router-based Request Redirection for Content Distribution Network
Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationAn Application of Graph Theory in the Process of Mutual Debt Compensation
Acta Poltechca Hugarca ol. 12 No. 3 2015 A Applcato of Graph Theor the Process of Mutual Debt Compesato ladmír Gazda Des Horváth Marcel Rešovský Techcal Uverst of Košce Facult of Ecoomcs; Němcove 32 040
More informationBanking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
More informationSoftware Aging Prediction based on Extreme Learning Machine
TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,
More informationLoad Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks
0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg
More informationSTOCHASTIC approximation algorithms have several
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George
More informationAnalysis of Multi-product Break-even with Uncertain Information*
Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar
More informationNumerical Comparisons of Quality Control Charts for Variables
Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa
More informationAnalysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid
Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal
More informationAn Efficient Job Scheduling for MapReduce Clusters
Internatona Journa of Future Generaton ommuncaton and Networkng, pp. 391-398 http://dx.do.org/10.14257/jfgcn.2015.8.2.32 An Effcent Job Schedung for MapReduce usters Jun Lu 1, Tanshu Wu 1, and Mng We Ln
More informationHow To Balance Load On A Weght-Based Metadata Server Cluster
WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationISyE 512 Chapter 7. Control Charts for Attributes. Instructor: Prof. Kaibo Liu. Department of Industrial and Systems Engineering UW-Madison
ISyE 512 Chapter 7 Cotrol Charts for Attrbutes Istructor: Prof. Kabo Lu Departmet of Idustral ad Systems Egeerg UW-Madso Emal: klu8@wsc.edu Offce: Room 3017 (Mechacal Egeerg Buldg) 1 Lst of Topcs Chapter
More informationFinite Difference Method
Fte Dfferece Method MEL 87 Computatoa Heat rasfer --4) Dr. Praba audar Assstat Professor Departmet of Mechaca Egeerg II Deh Dscretzato Methods Requred to covert the geera trasport equato to set of agebrac
More informationof the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
More informationLoad Balancing Control for Parallel Systems
Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal
More informationReal-Time Scheduling Models: an Experimental Approach
Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -
More informationProceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
More informationSpeeding up k-means Clustering by Bootstrap Averaging
Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg
More informationA Key-Policy Attribute-Based Broadcast Encryption
444 The Iteratoa rab Joura of Iformato Techooy Vo. 0 o. 5 September 0 Key-Pocy ttrbute-base Broacast Ecrypto J Su Yupu Hu a Leyou ha Departmet of ppcato Mathematcs X a Uversty of Techooy Cha Key Lab of
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationTowards Network-Aware Composition of Big Data Services in the Cloud
(IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, Towards Network-Aware Composto of Bg Data Servces the Cloud Umar SHEHU Departmet of Computer Scece ad Techology Uversty of Bedfordshre
More informationRQM: A new rate-based active queue management algorithm
: A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew
More informationRUSSIAN ROULETTE AND PARTICLE SPLITTING
RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate
More information10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
More informationNear Neighbor Distribution in Sets of Fractal Nature
Iteratoal Joural of Computer Iformato Systems ad Idustral Maagemet Applcatos. ISS 250-7988 Volume 5 (202) 3 pp. 59-66 MIR Labs, www.mrlabs.et/jcsm/dex.html ear eghbor Dstrbuto Sets of Fractal ature Marcel
More informationA particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
More informationManaging Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Maagg Iterdepedet Iformato Securty Rsks: Cybersurace, Maaged Securty Servces, ad Rsk Poolg Arragemets Xa Zhao Assstat Professor Departmet of Iformato Systems ad Supply Cha Maagemet Brya School of Busess
More informationExpert Systems with Applications
Expert Systems wth Applcatos 38 (2011) 7270 7276 Cotets lsts avalable at SceceDrect Expert Systems wth Applcatos joural homepage: www.elsever.com/locate/eswa Aget-based dffuso model for a automoble market
More informationDECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
More informationn. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.
UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationA DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
More informationANNEX 77 FINANCE MANAGEMENT. (Working material) Chief Actuary Prof. Gaida Pettere BTA INSURANCE COMPANY SE
ANNEX 77 FINANCE MANAGEMENT (Workg materal) Chef Actuary Prof. Gada Pettere BTA INSURANCE COMPANY SE 1 FUNDAMENTALS of INVESTMENT I THEORY OF INTEREST RATES 1.1 ACCUMULATION Iterest may be regarded as
More information