Mobile Robots Based Intelligent Fire Detection and Escaping System

Size: px
Start display at page:

Download "Mobile Robots Based Intelligent Fire Detection and Escaping System"

Transcription

1 98 JOURNAL OF COMPUTERS, VOL. 8, NO. 5, MAY 03 Moble Robots Based Itellget Fre Detecto ad Escapg System Su Hsu-Sha Natoal Yul Uversty of Scece & Techology/Graduate school Egeerg Scece ad techology, Yul Cha Sog-Hag WuFeg Uversty/Departmet of Fre Scece, Cha-Y, Tawa Lou Jhe-We ad Su Kuo-La Natoal Yul Uversty of Scece & Techology/Graduate school of Electrcal Egeerg, Yul, Tawa Abstract The paper researches the fre sources ad programs escapg path usg moble robots for tellget buldg, ad presets the movemet scearo the expermetal platform. The moble robot has the shape of cylder ad ts dameter, heght ad weght s 0cm, 8cm ad.5kg. The cotroller of the moble robot s MCS-5 mcrochp, ad acqures the detecto sgals from flame sesor ad reflectg IR sesors, ad receves the cotrol commad from the supervsed compute va wreless RF terface. The moble robot searches fre sources ad obstacles movg the expermetal platform autoomously, ad trasmts the locatos of the detected fre sources ad obstacles to the supervsed computer, too. The supervsed computer uses Gauss probablty dstrbuto fucto to compute the rsk values aroud the fre locato, ad uses Bayesa estmato algorthm to calculate the total rsk values of each locato of the expermetal platform. We proposed A* searchg algorthm to program escapg paths accordg to the rsk dstrbuto of each cross pot the platform. We develop user terface o the supervsed computer for the fre detecto ad escapg system. The supervsed computer dsplays the escapg path o the user terface, ad gudes peoples movg to the safety area usg moble robots. I the expermetal results, we use two moble robots searchg the fre sources autoomously ad locatg the postos of the fre sources. The supervsed computer programs the escapg paths usg Bayesa estmato algorthm ad A* searchg algorthm o the user terface. The moble robot gudes people movg to the safety area accordg to the programmed escapg path. Idex Terms tellget buldg system, wreless RF terface, Gauss probablty dstrbuto fucto, A* searchg algorthm, Bayesa estmato algorthm I. INTRODUCTION Fre evet s oe of the great scourges o the huma lfe. Thousads of people are jured each year by accdetal fre evet explosos. There are approxmately may thousad mllo dollars bured each year. Fre Mauscrpt receved Jauary, 0; revsed Jue, 0; accepted July, 0. Correspodg author: Su Kuo-La, sukl@yurech.edu.tw evet s may rsks to huma lfe ad property of socetes whch must be maaged. How to develop a safety processg to search fre sources ad gude people leavg the dagerous evromet s a mportat ssue. I the past lteratures of the fre detecto, may experts research moble robots. Wag [] developed the multsesor fre detecto algorthm usg eural etwork. Oe temperature ad oe smoke desty sesory sgal are fused for shp fre alarm system. Healey [] preseted a real-tme fre detecto system usg color vdeo put. The spectral, spatal, ad temporal propertes of fre were used to derve the fre-detecto algorthm. Neubauer [3] appled geetc algorthms to a automatc fre detecto system. The o-le detfcato of stochastc sgal models for measured fre sgals was preseted. Ruser ad Magor [4] descrbed the fre detecto wth a combato of ultrasoc ad mcrowave Doppler sesor. Luo ad Su [5] used oe smoke sesor, oe temperature sesor ad oe flame sesor to detect fre evet usg adaptve fuso method. Cheog [6] descrbed a ZgBeebased sesor etwork ode for the ultravolet (UV) detecto of flame. Zou [7] used mult-chael mage ose flter to detect ose pxels the mage by utlzg PCCN s specfc feature of the fre source. Tjokorda [8] focused o vdeo processg method temporal aalyss phase order to buld a more resposve fre alarm system. Ha [9] proposed block-based fre detecto algorthm cosst s of three basc steps, ad dstgush the fre rego. Lu [0] used three dfferet sesors to collect temperature, smoke cocetrato ad CO cocetrato feature, ad decdes the fre usg the decso tree. The paper cosders the problem of the fre sources, ad tegrates the multple robot system wth passve detecto modules workg together. Moble robots are actve detecto modules to be more merts tha passve detecto modules, ad are appled fre detecto ad escapg system. The multple moble robot system has more advatages tha oe sgle robot system []. Frst, the multple moble robots have the potetal to fsh some tasks faster tha a sgle robot []. Furthermore, usg several robots troduces redudacy. Multple 03 ACADEMY PUBLISHER do:0.4304/jcp

2 JOURNAL OF COMPUTERS, VOL. 8, NO. 5, MAY moble robots therefore ca be expected to be more fault tolerat tha oly oe robot. Aother advatage of multple moble robots s due to mergg of overlappg formato, whch ca help compesato for sesor ucertaty [3]. u [4] desged ad mplemeted the moble robot remote fre alarm system usg flame detecto module. These papers focused o the fre detecto usg mage recogto system or fre sesors, ad were weakess of the escapg moto plag for fre rego. The paper ot oly detects fre sources, but also programs the escapg moto path usg moble robots. II. SYSTEM ARCHITECTURE The system archtecture of the fre detecto ad escapg system s show Fg., ad cotas a supervsed computer, a expermetal platform, some wreless RF modules, ad some moble robots. The supervsed computer receves detecto sgal (locato, oretato ad ID code) of each moble robot va wreless RF terface. Moble robots search fre sources usg flame sesors movg alog the expermetal platform autoomously, ad decde the posto of the fre source the expermetal platform. Moble robots search the horzotal ad vertcal drecto of the fre source. The the supervsed computer defes the locato of the fre source. The moble robot has the shape of cylder, ad s equpped wth a mcrochp (MCS-5) as the ma cotroller. Two DC servomotors trasmt the pulse sgals to the cotroller, ad program oretato ad dsplacemet accordg to pulse umbers. The reflectve IR sesors detect obstacles ad cross pots of the expermetal platform, ad decde the locato of the moble robot. The flame sesor s R686 to detect fre sources o the frot sde of the moble robot, ad detecto rage s about 6m. The moble robot ca cotrol two DC servomotors ad voce module through I/O ps, ad commucate wth the supervsed computer usg wreless RF module. The core of the RF module s mcroprocessor (AT89C05), ad commucates wth the cotroller va wre seres terface (RS3). expermetal platform, ad detects obstacles usg the three reflectve IR sesors. The power of the moble robot s three L batteres to be coected wth parallel arragemet. The user terface of the fre detecto ad escapg system s Fg. 3. The rght sde of the user terface cotas searchg mode, commucato port settg ad startg, commucato speed settg, trasmsso ad receved data (startg ad clearg). The bottom of the user terface calculates the pulse umbers of the two moble robots (A ad B). The locato of ext door s settled at (,), ad peoples are arraged by users. The locato of fre source s searched by moble robots. The locato of the fre source s detected by oe moble robot. The user terface must kow the other drecto of the fre source from moble robots, ad plots the locato of the fre source o the user terface. The supervsed computer dsplays the rsk probablty dstrbuto usg Gauss fucto for the fre source. Fgure. The block dagram of the moble robot Fgure 3. The user terface Fgure. The system archtecture ad the moble robot The block dagram of the moble robot s show Fg.. The three reflectve IR sesors are embedded o the rght sde, left sde ad frot sde of the moble robot. I geeral, the moble robot moves o the asle of the III. ALGORITHM ANALSIS We compute the rsk values of each cross pot usg Bayesa estmato algorthm for each fre source the expermetal platform. Bayesa estmato provdes formalsm for multsesor fuso that allows sesory formato to be combed accordg to the rules of probablty theory. The Gauss dstrbuto fucto of each fre source s defed as: 03 ACADEMY PUBLISHER

3 300 JOURNAL OF COMPUTERS, VOL. 8, NO. 5, MAY 03 ( x) x μ σ p = e () σ π The parameter x s the dstace far from the fre source P Y for each cross pot. The codtoal probablty ( ) takes a value betwee 0 ad. Bayesa estmato s based o the well-kow Bayes rule: Where P ( Y ) Y) Y) P ( Y ) = () ), the posteror probablty, represet the belef accorded to the hypothess Y, gve the formato represet by. The redudat formato from a fleet of fre sources to be fused usg the lkelhood rato formulato of Bayes rule. L ( ( ( P = (3) P We ca defed the pror odds o Y as = (4) Y ) Ad assume that the operato of each sesor s depedet the tellget buldg system. The posteror odds o Y gve the formato,,..., from the flame sesors are gve by the product Y,,..., ) = (5) = The posteror odds are related to the posteror probablty by Y,,..., Y,,..., ) ) = (6) +,,..., ) We make a example to calculate the rsk value of each cross pot for fre evety. The fre evet s happe by two sources that are defed,,. We compute the rsk probablty values of the cross pot from two fre sources to be P ( = 0. 8 ad P ( = 0.. We ca calculate the posteror odds ad posteror probablty of the pot, O ( Y, ) = = (7) P ( Y, ) = = 0. 5 (8) + The posteror probablty value s 0.5 for the cross pot. The we ca compute posteror probablty values of all cross pots the expermetal platform. I the moto plag, we use A* searchg algorthm to program the safety escapg path, ad coect the low probablty values from the people to the ext door. The formula of A * searchg algorthm s followg: ( ) g( ) h( ) f = + (9) The core part of a tellget searchg algorthm s the defto of a proper heurstc fucto f ( ). g ( ) s the exact cost at sample tme from start pot to the target pot. The cost s dsplacemet to be computed by ecoder of the DC servomotor. h ( ) s a estmate fucto of the mmum cost from the start locato to the target locato. A good h ( ) fucto s the most mportat factor to obta a good searchg result. I ths study, s reschedules as to geerate a approxmate mmum cost schedule for the ext pot. The Eq. (9) ca be rewrtte as follows: ( ) g( ) + h( ) f = (0) IV. EPERIMENTAL RESULTS I the fre source searchg, we use two moble robots (A ad B) to detect fre source the expermetal platform to be show the left sde of the Fg. 4 (a). We use cadle to preset fre source. The two moble robots use the symbols A ad B to be show the rght sde of the Fg. 4 (a). We use the symbol C to defe the people. The moble robot B moves the expermetal platform, ad detects the obstacle usg the reflectg IR sesors. The the robot trasmts the locatos of the obstacle to the supervsed computer. The expermetal scearo s show Fg. 4 (b). I the Fg. 4 (c), the moble robot A detects the other obstacle, ad trasmts the locato to the supervsed computer, too. The moble robot A searches the fre source o the horzotal drecto smultaeously. The moble robots move the expermetal platform, ad search the fre source o the horzotal drecto ad vertcal drecto, ad trasmt the locato of fre source to the supervsed computer. The fre source s detected by moble robot to be recoded horzotal ad vertcal drecto o the user terface. The user terface appears the fre symbol, ad dsplays the rsk probablty values aroud the fre source to be show the ceter of the Fg. 4 (d). The fre source s detected by moble robots A ad B, ad dsplays the fre symbol the user terface. The supervsed computer calculates the posteror probablty values of each cross pot the expermetal platform. The the supervsed computer ca programs the escapg path usg A* searchg algorthm, ad coects all low rsk probablty values to be show Fg. 5 (a). The locato of the moble robot B s approach to the people, ad gudes the people (robot C) movg to the ext door (,). The the two moble robots (A ad B) program the escapg paths to be show Fg. 5 (b). We ca see the moble robot A programmg the escapg path from (,4) to (,). The robot A programs the other escapg path from (4,7) to the ext door (,). The people follow the moble robot B movg to the ext door accordg to the escapg path far from the fre source. The moble robot B moves to the posto (4,4) to detect the ew obstacle, ad trasmts the locato of the 03 ACADEMY PUBLISHER

4 JOURNAL OF COMPUTERS, VOL. 8, NO. 5, MAY detected obstacle to the supervsed computer. The robot programs the ew escapg path, ad gudes the people leavg the fre feld. The expermetal scearo s show Fg. 5 (c). Fally, the two moble robots ad the people leave the fre feld. The user terface dsplays the escapg paths of the two moble robots, ad dsplays the posto of the fre source ad the detected obstacles. The expermetal results are show Fg. 5 (d). (c) (a) (b) (c) (d) Fgure 6. Program the escapg path V. CONCLUSION We have developed the fre source searchg ad escapg path programmg system to gude peoples leavg the dagerous area. The system cotas a supervsed computer, some wreless RF modules, a expermetal platform ad some moble robots. Moble robots search fre sources movg the expermetal platform autoomously, ad trasmt the posto of the fre source to the supervsed computer va wreless RF terface. The user terface calculates the rsk probablty values of each cross pot usg Bayesa estmato algorthm, ad program the more safety escapg path usg A* searchg algorthm. The supervsed computer selects the moble robot that s more approach to the peoples. The moble robot gudes people leavg the fre feld usg the programmed escapg path. ACKNOWLEDGMENT Ths work was supported by the project Itellget power maagemet ad automated chargg system, uder Natoal Scece Coucl of Tawa, (NSC 00- -E-4-08). (d) Fgure 4. Fre source searchg (b) (a) REFERENCES [] W. hua,. Jame ad B. Mzhog, A shp fre alarm system based o fuzzy eural etwork, The 3rd World Cogress o Itellget Cotrol ad Automato, Vol. 3, pp , 000. [] G. Healey, D. Slater, T. L, B. Drda ad A. D. Goedeke, A system for real-tme fre detecto, IEEE Computer Socety Coferece o Computer Vso ad Patter Recogto, pp , 993. [3] A. Neubauer, Geetc algorthms automatc fre detecto techology, The Secod Iteratoal Coferece o Geetc Algorthms Egeerg Systems: Iovatos ad Applcatos, pp , 997. [4] H. Ruser ad V. Magor, Fre detecto wth a combed ultrasoc-mcrowave Doppler sesor, The IEEE Ultrasocs Symposum, Vol., pp , 998. [5] R. C. Luo, K. L. Su ad K. H. Tsa, Itellget Securty Robot Fre Detecto System Usg Adaptve Sesory Fuso Method, The IEEE Iteratoal Coferece o Idustral Electrocs Socety, pp , ACADEMY PUBLISHER

5 30 JOURNAL OF COMPUTERS, VOL. 8, NO. 5, MAY 03 [6] P. Cgeog, K. F. Chag, Y. H. La, I. K. Sou ad K. W. Tam, A ZgBee-based wreless sesor etwork ode for ultravolet detecto of flame, IEEE Trasactos o Idustral Electrocs, Vol. 58, No., pp , 0. [7] B. Zou, H. Zhou, H. Che ad C. Sh, Mult-chael mage ose flter based o PCCN, Joural of Computers, Vol. 7, No., pp , 0. [8] A. B. W. Tjokorda ad S. S. Ipg, Fre alarm system based-o vdeo processg, Iteratoal Coferece o Electrcal Egeerg ad Iformato, pp.j-4, 0. [9] C. Ha, U. Hwag, G. Jeo, J. Cho ad J. Jeog, Vsobased fre detecto algorthm usg optcal flow, Iteratoal Coferece o Complex, Itellget, ad Software Itesve System, pp , 0. [0] W. Lu, F. Wag,. Hu ad Y. Yag, Detecto of fre based o mult-sesor fuso, Iteratoal Coferece o Computer Scece ad Network Techology, pp.3-7, 0. [] Y. Cao, Cooperatve moble robotcs: atecedets ad drectos, Autoomous Robots, Vol.4, No., pp.7-7, 997. [] D. Guzzo, May Robots make short work, AI Mag., Vol. 8, No., pp 55-64, 006. [3] W. Burgard ad M. Moors, Coordated Mult-Robot Explorato, IEEE Trasacto o Robotcs, Vol., No. 3, pp , 005. [4] H. Hu, H. Che, C. Ca,. Guo, J. Fag ad Z. Su, Desg ad mplemet of moble robot remote fre alarm system, Iteratoal Coferece o Itellget Scece ad Iformato Egeerg, pp.3-36,0. to musc. I thk readg could elarge my Kowledge. I have a great advsor workg Natoal Yul Uversty of Scece & Techology, ad he provdes a good learg evromet ad resources. Kuo La Su receved the B. S. ad M. S. degrees automatc cotrol egeerg from Feg-Cha Uversty, Seatwe, Tawa, R. O. C., ad receved the PH. D. degree electrcal egeerg at Natoal Chug-Cheg Uversty, Cha- Y,Tawa, R. O. C., He s curretly a teacher the Departmet of Electrcal Egeerg, Natoal Yul Uversty of Scece & Techology. Hs research terests clude multsesor fuso ad robotcs. Su Hsu-Sha My ame s Su Hsu- Sha. I study Graduate school Egeerg Scece ad techology, Natoal Yul Uversty of Scece & Techology, Doulou, Yul 640, Tawa, ad receved M. S. degrees I-SHOU Uversty. My research terests clude securty systems ad robotcs. I lke to read phlosophy ad Buddhsm. Cha Sog-Hag receved the B. Sc. Degree Electrcal Egeerg from the Natoal Cheg Kug Uversty, Taa, Tawa, R.O.C. 98, ad receved the Ph.D. electrcal egeerg at Natoal Yul Uversty of Scece & Techology, Tawa, R.O.C. Sce 98, he has bee at Wu-Feg uversty (Tawa), where he s teachg the subjects of Istrumet Electroc, Electrc Crcuts, Sesor ad Trasformer. Curretly, he s a assocate professor of fre scece at Wu-Feg Uversty. Hs curret research terests are the areas of Cotrol System ad Module-Based Itellget Moble Robot Applcatos. My ame s Lou Jhe-We. I study Graduate school Electrcal Egeerg, Natoal Yul Uversty of Scece & Techology Doulou, Yul 640,Tawa, ad I Bachelor studet at LUNGHWA Uversty of Scece & Techology. My research terests clude MCU software desg ad applcato ad robotcs. I my spare tme, I lke outg ad lsteg 03 ACADEMY PUBLISHER

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

A Real-time Visual Tracking System in the Robot Soccer Domain

A Real-time Visual Tracking System in the Robot Soccer Domain Proceedgs of EUEL obotcs-, Salford, Eglad, th - th Aprl A eal-tme Vsual Trackg System the obot Soccer Doma Bo L, Edward Smth, Huosheg Hu, Lbor Spacek Departmet of Computer Scece, Uversty of Essex, Wvehoe

More information

A Smart Machine Vision System for PCB Inspection

A Smart Machine Vision System for PCB Inspection A Smart Mache Vso System for PCB Ispecto Te Q Che, JaX Zhag, YouNg Zhou ad Y Lu Murphey Please address all correspodece to Departmet of Electrcal ad Computer Egeerg Uversty of Mchga - Dearbor, Dearbor,

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

Design and Research on Automotive Controller Area Network Bus Analyzer

Design and Research on Automotive Controller Area Network Bus Analyzer Sesors & Trasducers, Vol. 66, Issue 3, March 04, pp. 9-95 Sesors & Trasducers 04 by IFSA Publshg, S. L. http://www.sesorsportal.com Desg ad Research o Automotve Cotroller Area Network Bus Aalyzer Hogwe

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Construction of a system scanning the movement of human upper limbs

Construction of a system scanning the movement of human upper limbs Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 1, 3(14) z. 1 pp. 75 8 1, 3(14) z. 1 s. 75 8 Costructo of a system scag the movemet of huma upper lmbs Kaml Stateczy West

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:asa85@hotmal.com Abstract here s some very mportat meag the study of realtme

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Evaluating the Network and Information System Security Based on SVM Model

Evaluating the Network and Information System Security Based on SVM Model JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 Evaluatg the Network ad formato System Securty Based o SVM Model Shaome Yag Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Near Neighbor Distribution in Sets of Fractal Nature

Near Neighbor Distribution in Sets of Fractal Nature Iteratoal Joural of Computer Iformato Systems ad Idustral Maagemet Applcatos. ISS 250-7988 Volume 5 (202) 3 pp. 59-66 MIR Labs, www.mrlabs.et/jcsm/dex.html ear eghbor Dstrbuto Sets of Fractal ature Marcel

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

In-Network Management. Rolf Stadler. Stockholm, Sweden

In-Network Management. Rolf Stadler. Stockholm, Sweden To help protect your prvacy, owerot preveted ths exteral pcture from beg automatcally dowloaded. To dowload ad dsplay ths pcture, clck Optos the Message Bar, ad the clck Eable exteral cotet. I-Network

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

A Bayesian Networks in Intrusion Detection Systems

A Bayesian Networks in Intrusion Detection Systems Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

ISyE 512 Chapter 7. Control Charts for Attributes. Instructor: Prof. Kaibo Liu. Department of Industrial and Systems Engineering UW-Madison

ISyE 512 Chapter 7. Control Charts for Attributes. Instructor: Prof. Kaibo Liu. Department of Industrial and Systems Engineering UW-Madison ISyE 512 Chapter 7 Cotrol Charts for Attrbutes Istructor: Prof. Kabo Lu Departmet of Idustral ad Systems Egeerg UW-Madso Emal: klu8@wsc.edu Offce: Room 3017 (Mechacal Egeerg Buldg) 1 Lst of Topcs Chapter

More information

Vibration and Speedy Transportation

Vibration and Speedy Transportation Research Paper EAEF (3) : 8-5, 9 Path Plag of Tomato Cluster Harvestg Robot for Realzg Low Vbrato ad Speedy Trasportato Naosh KONDO *, Koch TANIHARA *, Tomowo SHIIGI *, Hrosh SHIMIZU *, Mtsutaka KURITA

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability Proceedgs of the Iteratoal MultCoferece of Egeers ad Computer Scetsts 009 Vol I The Relable Itegrated Decso for Stock Prce by Multlayer Itegrato Tme-seres of Coverage Reasoablty Chu-M Hug ad Chu-Wu Yeh*

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

where p is the centroid of the neighbors of p. Consider the eigenvector problem

where p is the centroid of the neighbors of p. Consider the eigenvector problem Vrtual avgato of teror structures by ldar Yogja X a, Xaolg L a, Ye Dua a, Norbert Maerz b a Uversty of Mssour at Columba b Mssour Uversty of Scece ad Techology ABSTRACT I ths project, we propose to develop

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

CH. V ME256 STATICS Center of Gravity, Centroid, and Moment of Inertia CENTER OF GRAVITY AND CENTROID

CH. V ME256 STATICS Center of Gravity, Centroid, and Moment of Inertia CENTER OF GRAVITY AND CENTROID CH. ME56 STTICS Ceter of Gravt, Cetrod, ad Momet of Ierta CENTE OF GITY ND CENTOID 5. CENTE OF GITY ND CENTE OF MSS FO SYSTEM OF PTICES Ceter of Gravt. The ceter of gravt G s a pot whch locates the resultat

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6) Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Three Dimensional Interpolation of Video Signals

Three Dimensional Interpolation of Video Signals Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Use our free Wifi! Network: Masteravond Password: tilburg2016. Program flyer. Master s information evening

Use our free Wifi! Network: Masteravond Password: tilburg2016. Program flyer. Master s information evening Use our free Wf! Network: Masteravod Password: tlburg2016 Program flyer formato eveg Aprl 7, 2016 Welcome to Tlburg Uversty Welcome! We are very happy to welcome you to our campus o ths formato eveg! We

More information

IT & C Projects Duration Assessment Based on Audit and Software Reengineering

IT & C Projects Duration Assessment Based on Audit and Software Reengineering Iformatca Ecoomcă, vol. 13, o. 1/2009 117 IT & C Projects Durato Assessmet Based o Audt ad Software Reegeerg Cosm TOMOZEI, Uversty of Bacău Marus VETRICI, Crsta AMANCEI, Academy of Ecoomc Studes Bucharest

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

A Comparative Study for Email Classification

A Comparative Study for Email Classification A Coparatve Study for Eal Classfcato Seogwook You ad Des McLeod Uversty of Souther Calfora, Los Ageles, CA 90089 USA Abstract - Eal has becoe oe of the fastest ad ost ecoocal fors of coucato. However,

More information

M. Salahi, F. Mehrdoust, F. Piri. CVaR Robust Mean-CVaR Portfolio Optimization

M. Salahi, F. Mehrdoust, F. Piri. CVaR Robust Mean-CVaR Portfolio Optimization M. Salah, F. Mehrdoust, F. Pr Uversty of Gula, Rasht, Ira CVaR Robust Mea-CVaR Portfolo Optmzato Abstract: Oe of the most mportat problems faced by every vestor s asset allocato. A vestor durg makg vestmet

More information

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function World Evrometal ad Water Resources Cogress 7: Restorg Our Natural Habtat 7 ASCE Usg the Geographcally Weghted Regresso to Modfy the Resdetal Flood Damage Fucto L.F Chag, ad M.D. Su Room, Water Maagemet

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

A Novel Method in Scam Detection and Prevention using Data Mining Approaches

A Novel Method in Scam Detection and Prevention using Data Mining Approaches A Novel Method Scam Detecto ad Preveto usg Data Mg Approaches Maryam Mokhtar, Mohammad Saraee, Alreza Haghsheas Departmet of Electrcal ad Computer Egeerg Isfaha Uversty of Techology, Isfaha, Ira Mokhtar@ec.ut.ac.r,

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

DIGITAL AUDIO WATERMARKING: SURVEY

DIGITAL AUDIO WATERMARKING: SURVEY DIGITAL AUDIO WATERMARKING: SURVEY MIKDAM A. T. ALSALAMI * MARWAN M. AL-AKAIDI ** * Computer Scece Dept. Zara Prvate Uversty / Jorda ** School of Egeerg ad Techology - De Motfort Uversty / UK Abstract:

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components BALKAN JOURNAL OF ELECTRICAL & COMPUTER ENGINEERING, 05, Vol.3, No. 4 Developg toursm demad forecastg models usg mache learg techques wth tred, seasoal, ad cyclc compoets S. Cakurt ad A. Subas Abstract

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

Experimental Comparison of Genetic Algorithm and Ant Colony Optimization to Minimize Energy in Ad-hoc Wireless Networks

Experimental Comparison of Genetic Algorithm and Ant Colony Optimization to Minimize Energy in Ad-hoc Wireless Networks Proceedgs of e World Cogress o Egeerg ad Computer Scece 013 Vol II, 3-5 October, 013, Sa Fracsco, USA Expermetal Comparso of Geetc Algorm ad At Coloy Optmato to Mme Eergy Ad-hoc Wreless Networs Ibuuola

More information