Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor

Size: px
Start display at page:

Download "Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor"

Transcription

1 Deecion of DDoS Aac in SIP Environmen wih Non-parameric CUSUM Sensor Luigi Alcuri Universiy of Palermo Deparmen of Elecrical, Elecronic and Telecommunicaion Engineering Piero Cassarà Universiy of Palermo Deparmen of Elecrical, Elecronic and Telecommunicaion Engineering Absrac Modern all-ip newors, which ransfer elephony, mulimedia and daa use mainly as signalling proocol he Session Iniiaion Proocol (SIP. These newors are exposed o various ypes of aacs, and among hem, a DDoS aac can resul paricularly dangerous, because i can be direced agains he SIP signalling sysem. This siuaion arises from he circumsance ha a SIP sysem canno be enirely proeced agains an aac of his ype, bu a shield can be implemened only afer he deecion of an aac. Hence, i is imporan o implemen a fas and reliable mehod for he deecion of an aac. In his paper, we propose a new mehod o resolve he problem of deecion of flood-based DDoS aacs during a SIP session. The mehod we propose is based on non-parameric CUSUM heory and uses a sensor o analyze iner-arrival imes of incoming flows joinly o a pace analyzer. This las is used o exrac sensible daa from he received SIP messages. Paricularly, we assume ha he flow of SIP requess is Poisson disribued.. Inroducion Every ime elecommunicaion newors have been exposed o various ypes of aacs bu nowadays, due o he IP-based open archiecure of modern newors, hese aacs have became more frequen and dangerous. Disribued Denial of Service (DDoS aacs [7, 9], which are an evoluion of Denial of Service (DoS aacs, are a paricular ype of aac which hamper he regular operaion of a service of a hos or a newor. Differenly from DoS aacs, which use a single machine as source of fae messages, which can be really dangerous because he amoun of raffic produced by a single hos is naurally limied, and are easily deeced from heir source address, DDoS aacs involve a large number of hoss, organized in a so-called bone, which are used o srie a arge. These aacs may be direced a he applicaion layer, ranspor layer and/or newor layer of a arge service. In his paper, we will deal wih aacs aimed a he applicaion/session layer, paricularly a he SIP signalling srucure. These aacs are he mos dangerous because a bloc of signalling srucure inhibis he regular operaion. The SIP signalling sysem [] includes, in addiion o he proocol ha defines he messages necessary for he managemen of he session, some newor componens [3] as User Agens, Proxy Servers and Regisrar Servers. These componens are submied o various exernal aacs, which in some cases, due o heir behaviour, are difficul o preven. For his reason, he hrea of DDoS aacs is sill presen oday. Moreover, almos all presen newors are conneced ogeher and his condiion permis malicious users o srie a arge from any locaion. As resul, despie he evoluion of Inrusion Deecion Sysems, Newor Address Translaors, Firewalls and so on, acual elecommunicaion newors are subjec o various ypes of malicious aacs and i is necessary o implemen efficien defence mechanisms. This paper, following an analysis of SIP archiecure and messages o highligh is weaness and elaborae an appropriae defence sraegy, will presen a mehodology, based on a non-parameric cumulaive sum (CUSUM echnique ha permis he deecion of DDoS aacs which is seen as change of he raffic sochasic process. Subsequenly o he use of such a deecor, he sysem can conrol and bloc, in an almos selecive manner, he SIP flows, which are responsible of he aac. 2. The SIP proocol The SIP (Session Iniiaion Proocol is a signalling proocol ha allows achieving he connecion among wo or more users. SIP is able: o open a session, o adminisrae he session and o close i. The main componens of SIP archiecure are he SIP User Agens (UAs, SIP Proxies and SIP Redirec Servers. UAs, which open, accep and close a connecion, can be sofware or boh hardware and sofware, and are composed of wo pars: Clien and Server. When a UserAgen sends a message, i acs as a Clien (UAC, whereas when i receives a message i acs as a Server (UAS. SIP Proxies are he componens ha forward he SIP messages o he final desinaion, and Redirec Servers are he componens ha provide he address of a remoe user.

2 All he operaions are managed by SIP signalling sysem hrough he messages, which are of wo ypes: requess and responses. In he reques we find a field, named reques line, in which i is indicaed he mehod (he purpose of he reques: INVITE, ACK, OPTION, BYE, CANCEL, REGISTER, and so on. In he response here is a field named saus line, in which i is indicaed is ype: Informaional, Success, Redirecion, Clien error, Server error, Global failure. Boh, reques and response include wo ypes of lines: header lines and bodylines. The various header lines provide informaion abou he reques or response and abou he body ha hey conain. The body is an opional field and i can conain he session informaion, for example: ype of session, audio codec, video codec and ohers. All hese informaion are encoded by SDP (Session Descripion Proocol [2]. The following figures. and.2 show examples of SIP messages. he communicaion is closed. When he User Agen Server sends a 200/OK, i sars up a ime couner (Server TIME-OUT and before his ime couner goes down he User Agen Clien mus send an ACK bac, oherwise he 200/OK is sen again and he imer is resared or he communicaion is closed [,3]. If he ACK has been sen wih success, he communicaion session can sar; oherwise, he newor resources are released. 2.2 SIP headers Roue, Record-Roue and Via For he problem ha we discuss in his paper, i is ineresing o see he funcion of he headers Roue, Record-Roue and Via [,3]. When a user requires o send a message along a prearranged pah, i mus inser he SIP addresses of he server proxies ha he requires o cross, wihin of he header Roue. The addresses have o be insered in he same order as he one he message will cross he proxies. Fig.. SIP reques message Fig..2 SIP response message SIP is a ex-based ransacional proocol, which uses a Clien-Server paradigm, similar o ha of HTTP, herefore, when he caller User Agen sends an Invie o he callee, his one sends a response of confirmaion (200/OK bacwards. Subsequenly he caller User Agen sends bac a message conaining he mehod ACK. The figure.3 shows he ransacion diagram of SIP messages described above. 2. Time characerizaion When a UserAgen Clien sends an INVITE, which is always he firs leg of a communicaion session, i sars up a ime couner (Clien TIME-OUT, and before his ime couner goes down, he User Agen Server mus send a response 200/OK, oherwise he INVITE is sen again and he imer is resared or Fig..3 Example of SIP ransacion When a proxy server receives a SIP message, i reads he header Roue and forwards he message o he nex address in he roue lis. The header Record-Roue is used when a proxy wans o say in he pah crossed by he messages of a SIP session. When a User Agen Clien sends a reques, he proxy ha receives i, wries is address ino he header Record-Roue so, when he reques arrives o he User Agen Server, i can copy he lis of proxies wihin he header Roue, and he responses sen by User Agen Server cross he same proxies crossed by he reques. The header Via is used for soring he addresses of SIP proxies ha handles he SIP messages. When a SIP reques is sen from User Agen Clien o a User Agen Server, all proxies, ha handle he reques, wrie heir own addresses ino he header Via. The User Agen Server when receives he reques, uses hese informaion o send a response in he opposie direcion. The following figures 2., 2.2 and 2.3 show he uilizaion of header Via, Roue and Record-Roue.

3 3. DDoS in SIP environmen The DDoS aac is a developmen of he DoS aac. In a DDoS aac, many compuers (so called zombies are organized in a hierarchical srucure (a so called bone, in which he aacer do no direcly inerac wih hem, bu operaes managing a group of zombies hrough an inermediae hos called handler. This way, he aacer manages he zombies o generae an aac flow which is direced owards he arge, wihou exposing iself. If he number of zombies is sufficienly grea, and he arge employs a cerain quaniy of ime for each one, i can resul congesed and will go down. The figure 3. shows he archiecure of a DDoS aac. he header Roue of messages, which compose he flow, so all messages of he flow, will reach he arge. If he aacer uses he header Record-Roue [], he insers he arge address, ino his header; so he flow goes hrough he arge in he opposie direcion o ha followed by he flow generaed by using he header Roue. If he aacer uses he header Via [], he insers he arge address ino his header, so all SIP requess involved in he SIP session will go hrough he arge. A very imporan opic o undersand is ha, by design, he SIP proxies have o accep he incomining inviaions wihou any prior session seup. For his reason SIP proxies canno refuse he inviaions which have o be bloced by anoher elemen. In any case, he aacer sends o he arge, in a minor ime a very grea number of INVITEs ha i has o elaborae because, wihou an inspecion o hem he arge can idenify he malicious paces. Therefore, he arge goes down because is resources have run ou in he aemp o accep all he requess of connecion. Fig. 2. Example of Via header uilizaion Fig. 2.2 Example of Roue header uilizaion Fig. 3. Archiecure of a DDoS aac The ime inerval beween wo successive INVITEs mus be less han he TIME-OUT, because afer he proxy receives an INVITE, i replays wih a response 200/OK, and wais a ime inerval equal o TIME-OUT for an ACK. If he proxy does no receive any response by his ime, i releases he resources and is ready o accep a new reques of connecion. Fig. 2.3 Example of Record-Roue header uilizaion Typically o execue an assaul, he aacer, sends in a minor inerval a grea number of INVITEs o he arge. These INVITEs have o have an apposie conen of one of he hree headers, Roue, Record- Roue, or Via. If he aacer uses he header Roue [], he generaes a very grea flow profiing of he compuers ha he governs, and he insers he arge address ino 4. Conrol of INVITE flow as prevenion of an aac According o he previous reasoning, we can design a mehod for prevenion of DDoS aacs, based on monioring he INVITE flow. Acually, he mehod we are going o presen uses he header Via of he INVITE, which is always presen in a SIP message, o race a hos ha sends a malicious INVITE flow. The various seps of mehod are: a. The sysem creaes a able of addresses o conrol, whose enries conain he IP-address and he series of ime inervals beween wo successive arrivals.

4 b. For all INVITEs which arrive, we exrac he las bu one address ino he header Via. This manner, we can monior he INVITE flow ha arrives from he access proxy of one hos. If we exrac he las address ino header Via, we can monior he INVITE flow ha arrives from he final hos. Which address o choose o monior depends on he amoun of memory we can use. Acually, he number of addresses o be moniored is greaer in he firs case han in he second one, because he number of final hoss is greaer han ha of access proxies. We can monior he INVITE flow coming from one domain, bu in fac, we can exrac he header From which is also always presen. c. If an enry wih he new address isn presen ino he able of he addresses o conrol, i is creaed a he momen of a firs arrival. Oherwise if he address is already presen, he new ime beween wo arrivals for his address is added. To obain his ime inerval i is possible o conrol he sysem cloc and o calculae he difference beween wo insans of ime. The following figure shows an example of he able o sore he iner-arrival imes. Table 4. Iner-arrival imer able d. When we have sored an adequae number of iner-arrival imes, we can calculae, for all he addresses ha we conrol, he mean ime beween wo arrivals. e. The mean ime beween wo arrivals is used o conrol if i is larger han he TIME-OUT value of sysem. This operaion is execued by a hreshold sensor for all sored addresses. If one of he addresses has he mean ime greaer han he TIME-OUT, he even is signalled. We remember ha all hese operaions have o be execued in a ime shorer han he TIME-OUT; oherwise, an aacer has he opporuniy o noc down he sysem. 5. Calculaion of he mean ime In secion 4, a he poin d of he lis, we wroe ha, when an adequae number of ime inervals beween wo arrivals have been sored, i is possible o calculae he mean ime beween wo arrivals. In his secion, we will explain how o calculae his mean value and is confidence inerval, as funcion of he number of measures. 5. Inerval predicion of a random variable We suppose ha x is a RV (random variable and ha we now is disribuion. If we wan o esimae x [4, 6] we can use he Mean Square Error mehod (MSE, and we have o minimize he quaniy: E x c 2 ( {( } where c is he esimaion. The esimaion c will fall wihin of a value inerval, which can be calculaed his way: { } P c < x< c = = (2 2 where is a given consan called confidence coefficien. This manner, he esimaion will be correc in 00 percenage of he cases. Typical values of I are 0.9, 0.95, or 0.99, anyway when I he inerval (c, c 2 increases and he esimaion worsens. When we esimae x we have o calculae he inerval predicion o ge an idea of he error over he esimae. If densiy of x has a single maximum, c 2 -c is minimum for densiy if densiy in c is equal o densiy in c 2. This is he case for a variable of Poisson, in fac, if x is Poisson disribued, is densiy is: because e (3 P ( = e! (4 is he probabiliy ha in L here are arrivals. If he number of arrivals for seconds is +, he probabiliy ha here are zero arrivals in L is: ( P0 e = Then he probabiliy of one arrival in L is: e (5 (6 If he probabiliy densiy funcion is symmerical abou is mean value a soluion for (2 is: P{ x< c} = ; P{ x> c2} = 2 2 (7 (in oher cases i is a soluion subopimal and c=x M 2 and c 2 =x where x u is u percenile of u. M - 2 On he heory of esimaion, we can wrie: O O P P-z M < x <P+z M = - n - n 2 2 = -M = I = 2u- (8 where P is he mean value, O is he variance, n is he number of measures o esimae x, and x is he esimae. The values of I u and z u are represened in he Table 5.

5 u 0,90 0,925 0,95 0,975 0,999 z u,282,440,645,967 3,090 Table Esimae of he mean value From he lieraure i is well nown, ha in he presen case he arrival process is of Poisson ype [, 2, 3]. Therefore, we can apply he resuls presened in secion 5.. In our case, we wan o esimae he mean value of iner-arrival ime [4, 6]. On he Poisson hypohesis, =. = +, and he p.d.f. is an exponenial funcion. If all aen samples are uniformely disribued and independen among hem, for he law of grea numbers, we can sae ha he average of samples enses o he mean value of he disribuion of he process. Then mean value is so calculaed: - x= n ( T -T i+ i (9 n where T i is he i-mo insan of arrival, is predicion inerval is: x x P <U< zu z u + - n n (0 From (9 (0 and TIME-OUT of sysem we can choose n. 6. The hreshold sensor The hreshold sensor here presened, has been achieved using he CUSUM heory. In his paragraph we will briefly presen his heory. The heory of Change Deecion [5] is based over he concep namely he logarihm of he lielihood raio: ( si y i =log p y pv ( yi V0 ( i ( where p V (y and p V0 (y are he densiies probabiliy, for he parameer, afer and before he change, respecively, and yi is an i.i.d random sequence. If we denoe respeciively wih E V0 (s and E V (s he expecaions values of he random sequence, wih he condiion ha E V0 (s < 0 and E V (s > 0, so a change in he parameer of he random sequence y, is equal o he change in he sign of he mean value of loglielihood raio. Sill wih j S = s i=j (2 we indicae he log-lielihood raio for he observaions from y j o y. A ypical decision rule is g =S-m i h (3 where h is he hreshold and j m =mins j (4 The behavior of g is showed in he figure 6.. If we consider CUSUM algorihm as Repeaed Sequenial Probabiliy Raio Tes (SPRT, he decision rule assume he shape pv ( y pv ( y g -+ln if g -+ln >0 p V0 ( y p V0 ( y g = pv ( y 0 if g -+ln <0 pv0 ( y (5 (5, where g 0 =0. Above equaion can be wrien so g ( + = g -+s (6 where (x+ is sup(0,x, his equaion provide a recursive form for he equaion (3. Fig. 6. Behaviour of funcion g We have supposed ha he ime inerval beween wo arrivals is exponenial disribued, so he equaion (6 can be wrien as: U g =! g -+y ( U0-U +ln "!# U 0 " $ (7 In he equaion (7 U0 and U are he mean value of he arrival process before and afer he change respecively. The value U can be now beforehand so we approximae i whi U =XUn (8 where X is he ampliude percenage, which corresponds o he mos probable percenage of increase of he mean rae afer a change and Un is he average, ha is updaed using he Exponenial Weighed Moving Average (EWMA mehod [8]. As i is nown, wih his mehod he mean is expressed as: x = x n i hen i=-n+ (9

6 x = x = + + i n+ i=-n+! + i " i=-n+ = x + x (20 n+ # $ If we combine equaion (20 wih equaion (9 and shif bac of one he index we obain: n ( ( ( x = x + x =Xx + -X x - - n+ n+ (2 his equaion is now as EWMA Filer. Also, for assessmen of performance we consider he following parameers: False Alarm Probabiliy, Mean Time beween False Alarms and Mean Delay Deecion. The parameers False Alarm Probabiliy and Mean Time beween False Alarms give informaion abou he alarm process. If we consider he Wald s approximaion we can wrie: -h Pr{ x=false alarm} = e (22 % Mean Time Beween False Alarm = = E ( T (23 0 e where h is he hreshold and E ([5] is he mean value for he densiy probabiliy before he change. The Mean Delay Deecion gives informaion abou he performance of he sensor, because i shows how much ime is necessary for he deecion of an alarm. From Change Deecion Theory we can wrie: h Mean Deecion Delay = = E (T (24 K (, 0 considering he Wald s approximaion, ha K (, 0 -h 0 is Kullbac funcion [5] and ha E ( is he mean value for he densiy probabiliy afer he change. 7. Final consideraions To choose he parameers, we mus now he TIME-OUT of he sysem, because, as saed above, all operaions mus be made wihin i. The number n of measures ha we ge, o compue he average ime, mus be sufficien o achieve a good approximaion of average ime and, a he same ime, i doesn have o be oo much large because he compuaion ime can be oo much long. Therefore he choice of n mus be done wih care. Also he number of measures is imporan o calculae he esimaion error of mean value as we discussed above. Anoher imporan parameer is he hreshold of he sensor, because i enables o deec he possible aacs. The hreshold of he sensor mus be near o TIME-OUT because we wan o conrol when he ime, beween wo arrivals, is oo much shor. Pracically, if i is oo much shor respec he TIME-OUT, he sysem can compue all he reques and i will drop under he load of calculaions. I is imporan o now he raffic level afer an aac, because we mus choose he percenage of increase of he mean rae afer an aac. This parameer is imporan because, if i s oo much small, we will have false alarms whereas, if i s oo much wide we could no deec he aacs. To invesigae he performance of he sysem, i is necessary o sudy how he Mean Delay Deecion changes wih he percenage of increase of he mean rae. From he simulaions we made, we obained he diagram of Fig. 7. ha shows he ypical behaviour of Mean Delay Deecion. Fig. 7. Mean Delay Deecion To conclude we can observe ha he CUSUM algorihm [8] shows a good performance wih high flow raffic aac. Acually, in his condiion he probabiliy o deec an aac enses o 00%, he probabiliy of a false alarms enses o 0% and he delay deecion ime is very shor. This behaviour is showed by he diagrams of Fig. 7.2 and Fig. 7.3, obained hrough our simulaions. Fig. 7.2 Probabiliy of False Alarm The diagram presened in Fig. 7.2 shows ha, if he hreshold value grows, he False Alarm Probabiliy decrease because if he raffic grows we mus choose a deparure hreshold greaer. Therefore we can say ha if he raffic grows he False Alarms Probabiliy decreases. This diagram shows also how he Mean Delay Deecion changes in he ime varying of he raio beween Mean Time Arrival of messages SIP, before he change and afer he change. In Fig. 7.3 i is showed he ypical rend of Mean Delay Deeecion versus he Mean Time Raio.

7 Fig. 7.3 Mean Delay Deecion [] A. Johnson, S. Donovan, R. Spars, C. Cunningham, D. Willis, J. Rosenberg, K. Summers, H. Schulzrinne, Inerne draf: SIP call flow examples, Apr Wor in Progress. [2] Telecos, Enerprise call duraions disribuions, hp:// pages/oncallduraions.hm, [3] K. Thompson, G. J. Miller, R. Wilder, Widearea inerne raffic paerns and characerisics, IEEE Newor,(6, Dec In he case of low-flow raffic aac he performance of CUSUM algorihm falls down. Really, if he raffic inensiy of aac decreases, he probabiliy of aac deecion decreases (very slowly, he probabiliy of false alarms grows, and delay deecion ime grows, (fasly. I is imporan o pu in evidence ha in he condiion of low-flow raffic aac, he danger of a SIP sysem is a quie low level or inexisen, so we mehod we propose is good and useful in all cases of danderous aacs. 8. References [] H. Rosenberg, H. Schulzrinne e al., RFC326 SIP:Session Iniiaion Proocol, IETF, June [2] M. Handley, V. Jacobson, RFC2327 SDP: Session Descripion Proocol, IETF, April 998. [3] G. Camarillo, SIP demysified, McGraw-Hill, [4] A. Papoulis, Probabiliy, Random Variables and Sochasic Processes 3rd ediion McGraw-Hill, 99. [5] M. Basseville, I. V. Niiforov, Deecion of Abrup Changes: Theory and Applicaion, Prenice-Hall, 993. [6] J.Y. Le Boudec, Performance Evaluaion of Compuer and Communicaion Sysems, hp://icawww.epfl.ch/perfeval/prinme/perf.pdf. [7] H. Wang, D. Zhang, K. G. Shin, Deecing SYN Flooding Aacs, IEEE INFOCOM [8] V. A. Siris, F. Papagalou, Applicaion of anomaly deecion algorihms for deecing SYN flooding aacs, ICS-FORTH, Tech. Rep. No.330, December [9] C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, D. Zamboni, Analysis of a denial of service aac on TCP, Proceedings of he 997 IEEE Symposium on Securiy and Privacy, May 997. [0] D. Dirich, Disribued Denial of Service (DDoS Aacs/Tools Page, hp://saf f.wwashingon.edu/dirich/misc/ddos/.

DDoS Attacks Detection Model and its Application

DDoS Attacks Detection Model and its Application DDoS Aacks Deecion Model and is Applicaion 1, MUHAI LI, 1 MING LI, XIUYING JIANG 1 School of Informaion Science & Technology Eas China Normal Universiy No. 500, Dong-Chuan Road, Shanghai 0041, PR. China

More information

The Application of Multi Shifts and Break Windows in Employees Scheduling

The Application of Multi Shifts and Break Windows in Employees Scheduling The Applicaion of Muli Shifs and Brea Windows in Employees Scheduling Evy Herowai Indusrial Engineering Deparmen, Universiy of Surabaya, Indonesia Absrac. One mehod for increasing company s performance

More information

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Profi Tes Modelling in Life Assurance Using Spreadshees PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Erik Alm Peer Millingon 2004 Profi Tes Modelling in Life Assurance Using Spreadshees

More information

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand 36 Invesmen Managemen and Financial Innovaions, 4/4 Marke Liquidiy and he Impacs of he Compuerized Trading Sysem: Evidence from he Sock Exchange of Thailand Sorasar Sukcharoensin 1, Pariyada Srisopisawa,

More information

Distributing Human Resources among Software Development Projects 1

Distributing Human Resources among Software Development Projects 1 Disribuing Human Resources among Sofware Developmen Proecs Macario Polo, María Dolores Maeos, Mario Piaini and rancisco Ruiz Summary This paper presens a mehod for esimaing he disribuion of human resources

More information

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999 TSG-RAN Working Group 1 (Radio Layer 1) meeing #3 Nynashamn, Sweden 22 nd 26 h March 1999 RAN TSGW1#3(99)196 Agenda Iem: 9.1 Source: Tile: Documen for: Moorola Macro-diversiy for he PRACH Discussion/Decision

More information

Journal Of Business & Economics Research September 2005 Volume 3, Number 9

Journal Of Business & Economics Research September 2005 Volume 3, Number 9 Opion Pricing And Mone Carlo Simulaions George M. Jabbour, (Email: jabbour@gwu.edu), George Washingon Universiy Yi-Kang Liu, (yikang@gwu.edu), George Washingon Universiy ABSTRACT The advanage of Mone Carlo

More information

Trends in TCP/IP Retransmissions and Resets

Trends in TCP/IP Retransmissions and Resets Trends in TCP/IP Reransmissions and Reses Absrac Concordia Chen, Mrunal Mangrulkar, Naomi Ramos, and Mahaswea Sarkar {cychen, mkulkarn, msarkar,naramos}@cs.ucsd.edu As he Inerne grows larger, measuring

More information

A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches

A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches A Scalable and Lighweigh QoS Monioring Technique Combining Passive and Acive Approaches On he Mahemaical Formulaion of CoMPACT Monior Masai Aida, Naoo Miyoshi and Keisue Ishibashi NTT Informaion Sharing

More information

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005 FONDATION POUR LES ETUDES ET RERS LE DEVELOPPEMENT INTERNATIONAL Measuring macroeconomic volailiy Applicaions o expor revenue daa, 1970-005 by Joël Cariolle Policy brief no. 47 March 01 The FERDI is a

More information

Research on Inventory Sharing and Pricing Strategy of Multichannel Retailer with Channel Preference in Internet Environment

Research on Inventory Sharing and Pricing Strategy of Multichannel Retailer with Channel Preference in Internet Environment Vol. 7, No. 6 (04), pp. 365-374 hp://dx.doi.org/0.457/ijhi.04.7.6.3 Research on Invenory Sharing and Pricing Sraegy of Mulichannel Reailer wih Channel Preference in Inerne Environmen Hanzong Li College

More information

Model-Based Monitoring in Large-Scale Distributed Systems

Model-Based Monitoring in Large-Scale Distributed Systems Model-Based Monioring in Large-Scale Disribued Sysems Diploma Thesis Carsen Reimann Chemniz Universiy of Technology Faculy of Compuer Science Operaing Sysem Group Advisors: Prof. Dr. Winfried Kalfa Dr.

More information

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer Recen Advances in Business Managemen and Markeing Analysis of Pricing and Efficiency Conrol Sraegy beween Inerne Reailer and Convenional Reailer HYUG RAE CHO 1, SUG MOO BAE and JOG HU PARK 3 Deparmen of

More information

Chapter 7. Response of First-Order RL and RC Circuits

Chapter 7. Response of First-Order RL and RC Circuits Chaper 7. esponse of Firs-Order L and C Circuis 7.1. The Naural esponse of an L Circui 7.2. The Naural esponse of an C Circui 7.3. The ep esponse of L and C Circuis 7.4. A General oluion for ep and Naural

More information

Chapter 8: Regression with Lagged Explanatory Variables

Chapter 8: Regression with Lagged Explanatory Variables Chaper 8: Regression wih Lagged Explanaory Variables Time series daa: Y for =1,..,T End goal: Regression model relaing a dependen variable o explanaory variables. Wih ime series new issues arise: 1. One

More information

Multiprocessor Systems-on-Chips

Multiprocessor Systems-on-Chips Par of: Muliprocessor Sysems-on-Chips Edied by: Ahmed Amine Jerraya and Wayne Wolf Morgan Kaufmann Publishers, 2005 2 Modeling Shared Resources Conex swiching implies overhead. On a processing elemen,

More information

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR The firs experimenal publicaion, which summarised pas and expeced fuure developmen of basic economic indicaors, was published by he Minisry

More information

Morningstar Investor Return

Morningstar Investor Return Morningsar Invesor Reurn Morningsar Mehodology Paper Augus 31, 2010 2010 Morningsar, Inc. All righs reserved. The informaion in his documen is he propery of Morningsar, Inc. Reproducion or ranscripion

More information

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS Shuzhen Xu Research Risk and Reliabiliy Area FM Global Norwood, Massachuses 262, USA David Fuller Engineering Sandards FM Global Norwood, Massachuses 262,

More information

SPEC model selection algorithm for ARCH models: an options pricing evaluation framework

SPEC model selection algorithm for ARCH models: an options pricing evaluation framework Applied Financial Economics Leers, 2008, 4, 419 423 SEC model selecion algorihm for ARCH models: an opions pricing evaluaion framework Savros Degiannakis a, * and Evdokia Xekalaki a,b a Deparmen of Saisics,

More information

Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613.

Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613. Graduae School of Business Adminisraion Universiy of Virginia UVA-F-38 Duraion and Convexiy he price of a bond is a funcion of he promised paymens and he marke required rae of reurn. Since he promised

More information

Towards Intrusion Detection in Wireless Sensor Networks

Towards Intrusion Detection in Wireless Sensor Networks Towards Inrusion Deecion in Wireless Sensor Neworks Kroniris Ioannis, Tassos Dimiriou and Felix C. Freiling Ahens Informaion Technology, 19002 Peania, Ahens, Greece Email: {ikro,dim}@ai.edu.gr Deparmen

More information

Performance Center Overview. Performance Center Overview 1

Performance Center Overview. Performance Center Overview 1 Performance Cener Overview Performance Cener Overview 1 ODJFS Performance Cener ce Cener New Performance Cener Model Performance Cener Projec Meeings Performance Cener Execuive Meeings Performance Cener

More information

Automatic measurement and detection of GSM interferences

Automatic measurement and detection of GSM interferences Auomaic measuremen and deecion of GSM inerferences Poor speech qualiy and dropped calls in GSM neworks may be caused by inerferences as a resul of high raffic load. The radio nework analyzers from Rohde

More information

Improvement of a TCP Incast Avoidance Method for Data Center Networks

Improvement of a TCP Incast Avoidance Method for Data Center Networks Improvemen of a Incas Avoidance Mehod for Daa Cener Neworks Kazuoshi Kajia, Shigeyuki Osada, Yukinobu Fukushima and Tokumi Yokohira The Graduae School of Naural Science and Technology, Okayama Universiy

More information

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt Saisical Analysis wih Lile s Law Supplemenary Maerial: More on he Call Cener Daa by Song-Hee Kim and Ward Whi Deparmen of Indusrial Engineering and Operaions Research Columbia Universiy, New York, NY 17-99

More information

A Probability Density Function for Google s stocks

A Probability Density Function for Google s stocks A Probabiliy Densiy Funcion for Google s socks V.Dorobanu Physics Deparmen, Poliehnica Universiy of Timisoara, Romania Absrac. I is an approach o inroduce he Fokker Planck equaion as an ineresing naural

More information

Individual Health Insurance April 30, 2008 Pages 167-170

Individual Health Insurance April 30, 2008 Pages 167-170 Individual Healh Insurance April 30, 2008 Pages 167-170 We have received feedback ha his secion of he e is confusing because some of he defined noaion is inconsisen wih comparable life insurance reserve

More information

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS Hong Mao, Shanghai Second Polyechnic Universiy Krzyszof M. Osaszewski, Illinois Sae Universiy Youyu Zhang, Fudan Universiy ABSTRACT Liigaion, exper

More information

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS RICHARD J. POVINELLI AND XIN FENG Deparmen of Elecrical and Compuer Engineering Marquee Universiy, P.O.

More information

Chapter 1.6 Financial Management

Chapter 1.6 Financial Management Chaper 1.6 Financial Managemen Par I: Objecive ype quesions and answers 1. Simple pay back period is equal o: a) Raio of Firs cos/ne yearly savings b) Raio of Annual gross cash flow/capial cos n c) = (1

More information

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1 Absrac number: 05-0407 Single-machine Scheduling wih Periodic Mainenance and boh Preempive and Non-preempive jobs in Remanufacuring Sysem Liu Biyu hen Weida (School of Economics and Managemen Souheas Universiy

More information

cooking trajectory boiling water B (t) microwave 0 2 4 6 8 101214161820 time t (mins)

cooking trajectory boiling water B (t) microwave 0 2 4 6 8 101214161820 time t (mins) Alligaor egg wih calculus We have a large alligaor egg jus ou of he fridge (1 ) which we need o hea o 9. Now here are wo accepable mehods for heaing alligaor eggs, one is o immerse hem in boiling waer

More information

Mathematics in Pharmacokinetics What and Why (A second attempt to make it clearer)

Mathematics in Pharmacokinetics What and Why (A second attempt to make it clearer) Mahemaics in Pharmacokineics Wha and Why (A second aemp o make i clearer) We have used equaions for concenraion () as a funcion of ime (). We will coninue o use hese equaions since he plasma concenraions

More information

Network Discovery: An Estimation Based Approach

Network Discovery: An Estimation Based Approach Nework Discovery: An Esimaion Based Approach Girish Chowdhary, Magnus Egersed, and Eric N. Johnson Absrac We consider he unaddressed problem of nework discovery, in which, an agen aemps o formulae an esimae

More information

INTEREST RATE FUTURES AND THEIR OPTIONS: SOME PRICING APPROACHES

INTEREST RATE FUTURES AND THEIR OPTIONS: SOME PRICING APPROACHES INTEREST RATE FUTURES AND THEIR OPTIONS: SOME PRICING APPROACHES OPENGAMMA QUANTITATIVE RESEARCH Absrac. Exchange-raded ineres rae fuures and heir opions are described. The fuure opions include hose paying

More information

DETERMINISTIC INVENTORY MODEL FOR ITEMS WITH TIME VARYING DEMAND, WEIBULL DISTRIBUTION DETERIORATION AND SHORTAGES KUN-SHAN WU

DETERMINISTIC INVENTORY MODEL FOR ITEMS WITH TIME VARYING DEMAND, WEIBULL DISTRIBUTION DETERIORATION AND SHORTAGES KUN-SHAN WU Yugoslav Journal of Operaions Research 2 (22), Number, 6-7 DEERMINISIC INVENORY MODEL FOR IEMS WIH IME VARYING DEMAND, WEIBULL DISRIBUION DEERIORAION AND SHORAGES KUN-SHAN WU Deparmen of Bussines Adminisraion

More information

OPERATION MANUAL. Indoor unit for air to water heat pump system and options EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1

OPERATION MANUAL. Indoor unit for air to water heat pump system and options EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1 OPERAION MANUAL Indoor uni for air o waer hea pump sysem and opions EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1 EKHBRD011ABY1 EKHBRD014ABY1 EKHBRD016ABY1 EKHBRD011ACV1 EKHBRD014ACV1 EKHBRD016ACV1 EKHBRD011ACY1

More information

System Performance Improvement By Server Virtualization

System Performance Improvement By Server Virtualization Sysem Performance Improvemen By Server Virualizaion Hioshi Ueno, Tomohide Hasegawa, and Keiichi Yoshihama Absrac Wih he advance of semiconducor echnology, microprocessors become highly inegraed and herefore

More information

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS Hao Wu and Qinfen Zheng Cenre for Auomaion Research Dep. of Elecrical and Compuer Engineering Universiy of Maryland, College Park, MD-20742 {wh2003, qinfen}@cfar.umd.edu

More information

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary Random Walk in -D Random walks appear in many cones: diffusion is a random walk process undersanding buffering, waiing imes, queuing more generally he heory of sochasic processes gambling choosing he bes

More information

Distributed Echo Cancellation in Multimedia Conferencing System

Distributed Echo Cancellation in Multimedia Conferencing System Disribued Echo Cancellaion in Mulimedia Conferencing Sysem Balan Sinniah 1, Sureswaran Ramadass 2 1 KDU College Sdn.Bhd, A Paramoun Corporaion Company, 32, Jalan Anson, 10400 Penang, Malaysia. sbalan@kdupg.edu.my

More information

Term Structure of Prices of Asian Options

Term Structure of Prices of Asian Options Term Srucure of Prices of Asian Opions Jirô Akahori, Tsuomu Mikami, Kenji Yasuomi and Teruo Yokoa Dep. of Mahemaical Sciences, Risumeikan Universiy 1-1-1 Nojihigashi, Kusasu, Shiga 525-8577, Japan E-mail:

More information

Real-time Particle Filters

Real-time Particle Filters Real-ime Paricle Filers Cody Kwok Dieer Fox Marina Meilă Dep. of Compuer Science & Engineering, Dep. of Saisics Universiy of Washingon Seale, WA 9895 ckwok,fox @cs.washingon.edu, mmp@sa.washingon.edu Absrac

More information

An Agent-based Bayesian Forecasting Model for Enhanced Network Security

An Agent-based Bayesian Forecasting Model for Enhanced Network Security An Agen-based Forecasing Model for Enhanced Nework Securiy J. PIKOULAS, W.J. BUCHANAN, Napier Universiy, Edinburgh, UK. M. MANNION, Glasgow Caledonian Universiy, Glasgow, UK. K. TRIANTAFYLLOPOULOS, Universiy

More information

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar Analogue and Digial Signal Processing Firs Term Third Year CS Engineering By Dr Mukhiar Ali Unar Recommended Books Haykin S. and Van Veen B.; Signals and Sysems, John Wiley& Sons Inc. ISBN: 0-7-380-7 Ifeachor

More information

Option Put-Call Parity Relations When the Underlying Security Pays Dividends

Option Put-Call Parity Relations When the Underlying Security Pays Dividends Inernaional Journal of Business and conomics, 26, Vol. 5, No. 3, 225-23 Opion Pu-all Pariy Relaions When he Underlying Securiy Pays Dividends Weiyu Guo Deparmen of Finance, Universiy of Nebraska Omaha,

More information

LIFE INSURANCE WITH STOCHASTIC INTEREST RATE. L. Noviyanti a, M. Syamsuddin b

LIFE INSURANCE WITH STOCHASTIC INTEREST RATE. L. Noviyanti a, M. Syamsuddin b LIFE ISURACE WITH STOCHASTIC ITEREST RATE L. oviyani a, M. Syamsuddin b a Deparmen of Saisics, Universias Padjadjaran, Bandung, Indonesia b Deparmen of Mahemaics, Insiu Teknologi Bandung, Indonesia Absrac.

More information

Information Theoretic Evaluation of Change Prediction Models for Large-Scale Software

Information Theoretic Evaluation of Change Prediction Models for Large-Scale Software Informaion Theoreic Evaluaion of Change Predicion Models for Large-Scale Sofware Mina Askari School of Compuer Science Universiy of Waerloo Waerloo, Canada maskari@uwaerloo.ca Ric Hol School of Compuer

More information

A Distributed Multiple-Target Identity Management Algorithm in Sensor Networks

A Distributed Multiple-Target Identity Management Algorithm in Sensor Networks A Disribued Muliple-Targe Ideniy Managemen Algorihm in Sensor Neworks Inseok Hwang, Kaushik Roy, Hamsa Balakrishnan, and Claire Tomlin Dep. of Aeronauics and Asronauics, Sanford Universiy, CA 94305 Elecrical

More information

COMPARISON OF AIR TRAVEL DEMAND FORECASTING METHODS

COMPARISON OF AIR TRAVEL DEMAND FORECASTING METHODS COMPARISON OF AIR RAVE DEMAND FORECASING MEHODS Ružica Škurla Babić, M.Sc. Ivan Grgurević, B.Eng. Universiy of Zagreb Faculy of ranspor and raffic Sciences Vukelićeva 4, HR- Zagreb, Croaia skurla@fpz.hr,

More information

AP Calculus AB 2010 Scoring Guidelines

AP Calculus AB 2010 Scoring Guidelines AP Calculus AB 1 Scoring Guidelines The College Board The College Board is a no-for-profi membership associaion whose mission is o connec sudens o college success and opporuniy. Founded in 1, he College

More information

Constant Data Length Retrieval for Video Servers with Variable Bit Rate Streams

Constant Data Length Retrieval for Video Servers with Variable Bit Rate Streams IEEE Inernaional Conference on Mulimedia Compuing & Sysems, June 17-3, 1996, in Hiroshima, Japan, p. 151-155 Consan Lengh Rerieval for Video Servers wih Variable Bi Rae Sreams Erns Biersack, Frédéric Thiesse,

More information

How To Calculate Price Elasiciy Per Capia Per Capi

How To Calculate Price Elasiciy Per Capia Per Capi Price elasiciy of demand for crude oil: esimaes for 23 counries John C.B. Cooper Absrac This paper uses a muliple regression model derived from an adapaion of Nerlove s parial adjusmen model o esimae boh

More information

Botnet Detection by Monitoring Group Activities in DNS Traffic

Botnet Detection by Monitoring Group Activities in DNS Traffic Bone Deecion by Monioring Group Aciviies in DNS Traffic Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim Korea Universiy {realchs, hanwoo, heejo, hyogon}@orea.ac.r Absrac Recen malicious aemps are inended

More information

Efficient One-time Signature Schemes for Stream Authentication *

Efficient One-time Signature Schemes for Stream Authentication * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 611-64 (006) Efficien One-ime Signaure Schemes for Sream Auhenicaion * YONGSU PARK AND YOOKUN CHO + College of Informaion and Communicaions Hanyang Universiy

More information

Mining Web User Behaviors to Detect Application Layer DDoS Attacks

Mining Web User Behaviors to Detect Application Layer DDoS Attacks JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL 24 985 Mining Web User Behaviors o Deec Applicaion Layer DDoS Aacks Chuibi Huang Deparmen of Auomaion, USC Key laboraory of nework communicaion sysem and conrol

More information

Inductance and Transient Circuits

Inductance and Transient Circuits Chaper H Inducance and Transien Circuis Blinn College - Physics 2426 - Terry Honan As a consequence of Faraday's law a changing curren hrough one coil induces an EMF in anoher coil; his is known as muual

More information

1 HALF-LIFE EQUATIONS

1 HALF-LIFE EQUATIONS R.L. Hanna Page HALF-LIFE EQUATIONS The basic equaion ; he saring poin ; : wrien for ime: x / where fracion of original maerial and / number of half-lives, and / log / o calculae he age (# ears): age (half-life)

More information

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783 Sock raing wih Recurren Reinforcemen Learning (RRL) CS9 Applicaion Projec Gabriel Molina, SUID 555783 I. INRODUCION One relaively new approach o financial raing is o use machine learning algorihms o preic

More information

Evolutionary building of stock trading experts in real-time systems

Evolutionary building of stock trading experts in real-time systems Evoluionary building of sock rading expers in real-ime sysems Jerzy J. Korczak Universié Louis Paseur Srasbourg, France Email: jjk@dp-info.u-srasbg.fr Absrac: This paper addresses he problem of consrucing

More information

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m Chaper 2 Problems 2.1 During a hard sneeze, your eyes migh shu for 0.5s. If you are driving a car a 90km/h during such a sneeze, how far does he car move during ha ime s = 90km 1000m h 1km 1h 3600s = 25m

More information

CHARGE AND DISCHARGE OF A CAPACITOR

CHARGE AND DISCHARGE OF A CAPACITOR REFERENCES RC Circuis: Elecrical Insrumens: Mos Inroducory Physics exs (e.g. A. Halliday and Resnick, Physics ; M. Sernheim and J. Kane, General Physics.) This Laboraory Manual: Commonly Used Insrumens:

More information

Spectrum-Aware Data Replication in Intermittently Connected Cognitive Radio Networks

Spectrum-Aware Data Replication in Intermittently Connected Cognitive Radio Networks Specrum-Aware Daa Replicaion in Inermienly Conneced Cogniive Radio Neworks Absrac The opening of under-uilized specrum creaes an opporuniy for unlicensed users o achieve subsanial performance improvemen

More information

The Transport Equation

The Transport Equation The Transpor Equaion Consider a fluid, flowing wih velociy, V, in a hin sraigh ube whose cross secion will be denoed by A. Suppose he fluid conains a conaminan whose concenraion a posiion a ime will be

More information

Making a Faster Cryptanalytic Time-Memory Trade-Off

Making a Faster Cryptanalytic Time-Memory Trade-Off Making a Faser Crypanalyic Time-Memory Trade-Off Philippe Oechslin Laboraoire de Securié e de Crypographie (LASEC) Ecole Polyechnique Fédérale de Lausanne Faculé I&C, 1015 Lausanne, Swizerland philippe.oechslin@epfl.ch

More information

Time Series Analysis Using SAS R Part I The Augmented Dickey-Fuller (ADF) Test

Time Series Analysis Using SAS R Part I The Augmented Dickey-Fuller (ADF) Test ABSTRACT Time Series Analysis Using SAS R Par I The Augmened Dickey-Fuller (ADF) Tes By Ismail E. Mohamed The purpose of his series of aricles is o discuss SAS programming echniques specifically designed

More information

The option pricing framework

The option pricing framework Chaper 2 The opion pricing framework The opion markes based on swap raes or he LIBOR have become he larges fixed income markes, and caps (floors) and swapions are he mos imporan derivaives wihin hese markes.

More information

Strategic Optimization of a Transportation Distribution Network

Strategic Optimization of a Transportation Distribution Network Sraegic Opimizaion of a Transporaion Disribuion Nework K. John Sophabmixay, Sco J. Mason, Manuel D. Rossei Deparmen of Indusrial Engineering Universiy of Arkansas 4207 Bell Engineering Cener Fayeeville,

More information

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS R. Caballero, E. Cerdá, M. M. Muñoz and L. Rey () Deparmen of Applied Economics (Mahemaics), Universiy of Málaga,

More information

Exploring Imputation Techniques for Missing Data in Transportation Management Systems

Exploring Imputation Techniques for Missing Data in Transportation Management Systems Exploring Impuaion Techniques for Missing Daa in Transporaion Managemen Sysems Brian L. Smih Assisan Professor Universiy of Virginia Deparmen of Civil Engineering P. O. Box 400742 Charloesville, VA 22904-4742

More information

The Real Business Cycle paradigm. The RBC model emphasizes supply (technology) disturbances as the main source of

The Real Business Cycle paradigm. The RBC model emphasizes supply (technology) disturbances as the main source of Prof. Harris Dellas Advanced Macroeconomics Winer 2001/01 The Real Business Cycle paradigm The RBC model emphasizes supply (echnology) disurbances as he main source of macroeconomic flucuaions in a world

More information

Impact of scripless trading on business practices of Sub-brokers.

Impact of scripless trading on business practices of Sub-brokers. Impac of scripless rading on business pracices of Sub-brokers. For furher deails, please conac: Mr. T. Koshy Vice Presiden Naional Securiies Deposiory Ld. Tradeworld, 5 h Floor, Kamala Mills Compound,

More information

Task is a schedulable entity, i.e., a thread

Task is a schedulable entity, i.e., a thread Real-Time Scheduling Sysem Model Task is a schedulable eniy, i.e., a hread Time consrains of periodic ask T: - s: saring poin - e: processing ime of T - d: deadline of T - p: period of T Periodic ask T

More information

MTH6121 Introduction to Mathematical Finance Lesson 5

MTH6121 Introduction to Mathematical Finance Lesson 5 26 MTH6121 Inroducion o Mahemaical Finance Lesson 5 Conens 2.3 Brownian moion wih drif........................... 27 2.4 Geomeric Brownian moion........................... 28 2.5 Convergence of random

More information

Chapter 6: Business Valuation (Income Approach)

Chapter 6: Business Valuation (Income Approach) Chaper 6: Business Valuaion (Income Approach) Cash flow deerminaion is one of he mos criical elemens o a business valuaion. Everyhing may be secondary. If cash flow is high, hen he value is high; if he

More information

µ r of the ferrite amounts to 1000...4000. It should be noted that the magnetic length of the + δ

µ r of the ferrite amounts to 1000...4000. It should be noted that the magnetic length of the + δ Page 9 Design of Inducors and High Frequency Transformers Inducors sore energy, ransformers ransfer energy. This is he prime difference. The magneic cores are significanly differen for inducors and high

More information

Channel Holding Time Distribution in Public Cellular Telephony *

Channel Holding Time Distribution in Public Cellular Telephony * ITC6 / P. Kelly and D. Smih (Ediors) 999 Elsevier Science B.V. Channel Holding Time Disribuion in Public Cellular Telephony * Francisco Barceló a and Javier Jordán b a Deparameno de Maemáica Aplicada y

More information

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES Mehme Nuri GÖMLEKSİZ Absrac Using educaion echnology in classes helps eachers realize a beer and more effecive learning. In his sudy 150 English eachers were

More information

Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software

Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software BIJIT - BVICAM s Inernaional Journal of Informaion Technology Bharai Vidyapeeh s Insiue of Compuer Applicaions and Managemen (BVICAM, ew Delhi Geneic Algorihm Based Opimal Tesing Effor Allocaion Problem

More information

Hotel Room Demand Forecasting via Observed Reservation Information

Hotel Room Demand Forecasting via Observed Reservation Information Proceedings of he Asia Pacific Indusrial Engineering & Managemen Sysems Conference 0 V. Kachivichyanuul, H.T. Luong, and R. Piaaso Eds. Hoel Room Demand Forecasing via Observed Reservaion Informaion aragain

More information

Working Paper No. 482. Net Intergenerational Transfers from an Increase in Social Security Benefits

Working Paper No. 482. Net Intergenerational Transfers from an Increase in Social Security Benefits Working Paper No. 482 Ne Inergeneraional Transfers from an Increase in Social Securiy Benefis By Li Gan Texas A&M and NBER Guan Gong Shanghai Universiy of Finance and Economics Michael Hurd RAND Corporaion

More information

Task-Execution Scheduling Schemes for Network Measurement and Monitoring

Task-Execution Scheduling Schemes for Network Measurement and Monitoring Task-Execuion Scheduling Schemes for Nework Measuremen and Monioring Zhen Qin, Robero Rojas-Cessa, and Nirwan Ansari Deparmen of Elecrical and Compuer Engineering New Jersey Insiue of Technology Universiy

More information

Hedging with Forwards and Futures

Hedging with Forwards and Futures Hedging wih orwards and uures Hedging in mos cases is sraighforward. You plan o buy 10,000 barrels of oil in six monhs and you wish o eliminae he price risk. If you ake he buy-side of a forward/fuures

More information

CPU Provisioning Algorithms for Service Differentiation in Cloud-based Environments

CPU Provisioning Algorithms for Service Differentiation in Cloud-based Environments CPU Provisioning Algorihms for Service Differeniaion in Cloud-based Environmens Kosas Kasalis, Georgios S. Paschos, Yannis Viniois, Leandros Tassiulas Absrac This work focuses on he design, analysis and

More information

1. BACKGROUND 1-1 Traffic Flow Surveillance

1. BACKGROUND 1-1 Traffic Flow Surveillance Auo-Recogniion of Vehicle Maneuvers Based on Spaio-Temporal Clusering. BACKGROUND - Traffic Flow Surveillance Conduced wih kinds of beacons mouned a limied roadside poins wih Images from High Aliude Plaforms

More information

A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT

A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT by Hui Zhang B.Sc., Insiuion of Informaion and Communicaion, Dong Hua Universiy, P. R. China, 1 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE

More information

ARCH 2013.1 Proceedings

ARCH 2013.1 Proceedings Aricle from: ARCH 213.1 Proceedings Augus 1-4, 212 Ghislain Leveille, Emmanuel Hamel A renewal model for medical malpracice Ghislain Léveillé École d acuaria Universié Laval, Québec, Canada 47h ARC Conference

More information

A Resource Management Strategy to Support VoIP across Ad hoc IEEE 802.11 Networks

A Resource Management Strategy to Support VoIP across Ad hoc IEEE 802.11 Networks A Resource Managemen Sraegy o Suppor VoIP across Ad hoc IEEE 8.11 Neworks Janusz Romanik Radiocommunicaions Deparmen Miliary Communicaions Insiue Zegrze, Poland j.romanik@wil.waw.pl Pior Gajewski, Jacek

More information

AP Calculus BC 2010 Scoring Guidelines

AP Calculus BC 2010 Scoring Guidelines AP Calculus BC Scoring Guidelines The College Board The College Board is a no-for-profi membership associaion whose mission is o connec sudens o college success and opporuniy. Founded in, he College Board

More information

Predicting Stock Market Index Trading Signals Using Neural Networks

Predicting Stock Market Index Trading Signals Using Neural Networks Predicing Sock Marke Index Trading Using Neural Neworks C. D. Tilakarane, S. A. Morris, M. A. Mammadov, C. P. Hurs Cenre for Informaics and Applied Opimizaion School of Informaion Technology and Mahemaical

More information

GUIDE GOVERNING SMI RISK CONTROL INDICES

GUIDE GOVERNING SMI RISK CONTROL INDICES GUIDE GOVERNING SMI RISK CONTROL IND ICES SIX Swiss Exchange Ld 04/2012 i C O N T E N T S 1. Index srucure... 1 1.1 Concep... 1 1.2 General principles... 1 1.3 Index Commission... 1 1.4 Review of index

More information

Making Use of Gate Charge Information in MOSFET and IGBT Data Sheets

Making Use of Gate Charge Information in MOSFET and IGBT Data Sheets Making Use of ae Charge Informaion in MOSFET and IBT Daa Shees Ralph McArhur Senior Applicaions Engineer Advanced Power Technology 405 S.W. Columbia Sree Bend, Oregon 97702 Power MOSFETs and IBTs have

More information

DC-DC Boost Converter with Constant Output Voltage for Grid Connected Photovoltaic Application System

DC-DC Boost Converter with Constant Output Voltage for Grid Connected Photovoltaic Application System DC-DC Boos Converer wih Consan Oupu Volage for Grid Conneced Phoovolaic Applicaion Sysem Pui-Weng Chan, Syafrudin Masri Universii Sains Malaysia E-mail: edmond_chan85@homail.com, syaf@eng.usm.my Absrac

More information

Secure Election Infrastructures Based on IPv6 Clouds

Secure Election Infrastructures Based on IPv6 Clouds Secure Elecion Infrasrucures Based on IPv6 Clouds Firs IPv6-only OpenSack Cloud used o deliver producion services is de-ployed by Nephos6, Cikomm and SnT-Universiy of Luxembourg. Laif Ladid, Presiden,

More information

AP Calculus AB 2013 Scoring Guidelines

AP Calculus AB 2013 Scoring Guidelines AP Calculus AB 1 Scoring Guidelines The College Board The College Board is a mission-driven no-for-profi organizaion ha connecs sudens o college success and opporuniy. Founded in 19, he College Board was

More information

A Natural Feature-Based 3D Object Tracking Method for Wearable Augmented Reality

A Natural Feature-Based 3D Object Tracking Method for Wearable Augmented Reality A Naural Feaure-Based 3D Objec Tracking Mehod for Wearable Augmened Realiy Takashi Okuma Columbia Universiy / AIST Email: okuma@cs.columbia.edu Takeshi Kuraa Universiy of Washingon / AIST Email: kuraa@ieee.org

More information

Child Protective Services. A Guide To Investigative Procedures

Child Protective Services. A Guide To Investigative Procedures Child Proecive Services A Guide To Invesigaive Procedures The purpose of his brochure is o help you undersand he Child Proecive Services (CPS) reporing and response process. Please conac your CPS worker

More information

Signal Rectification

Signal Rectification 9/3/25 Signal Recificaion.doc / Signal Recificaion n imporan applicaion of juncion diodes is signal recificaion. here are wo ypes of signal recifiers, half-wae and fullwae. Le s firs consider he ideal

More information

How To Optimize Time For A Service In 4G Nework

How To Optimize Time For A Service In 4G Nework Process Opimizaion Time for a Service in 4G Nework by SNMP Monioring and IAAS Cloud Compuing Yassine El Mahoi Laboraory of Compuer Science, Operaions Research and Applied Saisics. Téouan, Morocco Souad

More information