Smart Home Security System Based on ANFIS

Size: px
Start display at page:

Download "Smart Home Security System Based on ANFIS"

Transcription

1 Smart Home Securty System Based on ANFIS LeeJeong-G 1,Lee Sang-Hyun 2, Moon Kyung-Il 2 1 Korea Electroncs Technology Insttute, Korea 2 Dept. o Computer Engneerng, Honam Unversty, Korea 2 Dept. o Computer Engneerng, Honam Unversty, Korea {leesang64, kmoon}honam.ac.kr, jklee@ket.re.kr Abstract.A smart home or buldng s a home or buldng, usually a new one that s equpped wthspecal structured wrng to enable occupants to remotely control or program an array oautomated home electronc devces by enterng a sngle command. Conventonal securtysystems keep homeowners, and ther property, sae rom ntruders. Smart home securty has two aspects, nsde and outsde. Insde securty covers the concept o securng home rom threats lke re etc. whereas, outsde securty s meant to secure home aganst any burglar/ntruder etc. In ths paper, we suggest an adaptve network uzzy nerence system or home securty.to deal wth nonlnear outputs, the system s modeled by multple ANFIS, and the optmzaton o multple outputs s ormulated as a multple objectve decson makng. Keywords: Fuzzy logc, Multple ANFIS, Smart Home Securty 1 Introducton A smart homecare system usng smart phones, wreless sensors, web servers and IP webcams s proposed by Lejdekkers et al [5]. It provdes aclty to elderly people to check ther health and status and provdes an easy way to contact to hosptal n an emergency. Ghorbel et al have proposed the ntegraton o networkng and communcaton technologes n the smart homes concept dedcated to people wth dsabltes. It s based on the UPnP protocol to dscover and control devces ndoor and uses wreless technologes to enhance moblty [2]. Popescu et al have proposed a securty archtecture allowng dgtal rghts management n home networks consstng o consumer electronc devces [2]. In the proposed model, devces are allowed to establsh dynamc groups n an envronment where legally acqured copyrghted content are seamlessly transmtted between devces. They have clamed that connectvty between devces has a mnmal relance on publc key cryptographc operatons. Gao et al have suggested the concept o a sel-programmng thermostat that wthout any human nterventon creates a best possble setback schedule by sensng the possesson statstcs o a home [1]. The system montors possesson usng smple sensors n the home and the user denes the desred balance between energy and comort usng a sngle knob. It s observed that ths approach has an advantage ISA 2013, ASTL Vol. 21, pp , 2013 SERSC

2 Proceedngs, The 7th Internatonal Conerence on Inormaton Securty and Assurance over EnergyStar setback schedule approach by reducng the heatng and coolng demand by up to 15%. The purpose o ths paper s to portray as to how Adaptve Network Fuzzy Inerence System (ANFIS) encounters the challenges posed to the sensor based classcal smart home systems and propose a methodology or mplementaton o these networks to buld an adaptve and ntellgent system. Home securty has two aspects, nsde and outsde. Insde securty covers the concept o securng home rom threats lke re etc. whereas, outsde securty s meant to secure home aganst any burglar/ntruder etc. Ths work s amed to provde a multple ANFIS soluton or home securty that takes decson dynamcally usng the pervasve devces. Also ths soluton has the eature to ntmate securty analyss results anywhere n the world usng nternet. In secton 2, we revew brely the tools related to the smart home securty, and represent a structure o ntellgent nerence module at nsde/outsde home securty server. In secton 3, a multple ANFIS model s proposed to provde optmal home securty soluton. In ths proposed model, sensors are used to detect abnormaltes wthn the house or outsde the house. In secton 4, smulaton results by the suggested model are demonstrated, and compared wth smple uzzy logc based method. Also, concludng remarks are gven n the last secton. 2 Smart Home securty Structure From some tools related to the smart home securty, t s observed that the home securty models have consdered some lmted securty concerns. Thereore one securty model may be good n one stuaton but cannot provde the requred results n other stuatons. To provde optmal home securty soluton, a new model s requred. In ths model, sensors are used to detect abnormaltes wthn the house or outsde the house. There s a dedcated server or the sensors used to collect data nsde the house. Ths server s responsble to collect normaton transmtted by the sensors and then analyze to detect any abnormalty. Smlarly, a separate server s used to process the normaton transmtted by sensors located outsde the house. Both these servers are connected to a man server whch process the normaton provded by these servers. ANFIS tool s used to detect any abnormalty. In case a threat s detected then man server report about the threat to concern people usng nternet besdes settng the alarms on. Sx nput types are provded to the system. Multple sensors o each type are used to collect data. All nputs o same sensor type are provded to an ntal ANFIS nerence module, whch s responsble to calculate the threshold value. These calculated threshold value o each nput type s then provded to respectve server responsble or nsde or outsde securty. An overall threshold value o these sx ntal threshold values s separately calculated usng ANFIS module on nsde/outsde securty servers respectvely. Both nsde/outsde securty threshold values are provde to man server or analyss. Fnal decson s made based on these values. I any o the value s above the crtcal value then alarm sgnal s generated to respectve person/department. Usng ths method, t s possble to generate derent output alarms consderng the ntensty and relevance o threshold value to that specc 122

3 Smart Home Securty System Based on ANFIS person/department. Threshold values calculated at the nsde/outsde servers are collated at man server or decson makng process. Ater collaton process, threshold value s calculated and alarm sgnal type or each desred destnaton (polce, rescue staton, owner, et al) s calculated. Multple ANFIS s an extenson o the sngle output neuro-uzzy system ANFIS [4], or producng multple outputs. Smart home securty problem s a process wth multple outputs. Thereore, modelng and optmzaton o a process wth multple outputs s requred. A neuro-uzzy system can serve as a nonparametrc regresson tool, whch model the regresson relatonshp non-parametrcally wthout reerence to any pre-speced unctonal orm. Every sngle ANFIS n an multple ANFIS smulatesthe unctonal relatons, =1,,m. ANFIS can be consdered as anetwork presentaton o a TSK uzzy nerencesystem, and the -then rules n TSKare comprsed n the network structure. Tollustrate the archtecture o ANFIS, an examplewth a two-dmensonal nput s vsualzedn Fg.1. Fg. 1.ANFIS archtecture 3 An ANFIS desgn By means o the learnng process, multple ANFISobtans an estmaton o desred outputswth gven nputs. Let, =1,...,m, be the-th output o multple ANFIS, and they are estmateso multple responses y 1,...,y m, respectvely.to ndcate these estmates are unctonso the nput varables x, they wll bedenoted as (x), =1,...,m.Snce the system under dscusson has multpleresponses, the optmzaton o the systemn act nvolves the optmzaton o severalndvdual responses at the same tme.for all the system responses, they can be dvdednto three sets: (a) thelargerthebetter, denoted by L; (b) thesmallerthebetter, denotedby S; and 3) thenomnalthebest, denotedby N. We have ormulated ths optmzatonproblem as a multple objectve decsonmakng problem wth the ollowng orm: (1) mn max ( x), l L mn ( x), s S ( x) T, t N t l s t s. t. x B 123

4 Proceedngs, The 7th Internatonal Conerence on Inormaton Securty and Assurance HereT t s the nomnal target o the t-th response;and B s a easble regon o x. We ollow the dea ozmmermann's maxmn approach. Accordngto the maxmn approach, the above solutoncan be obtaned by maxmzng anoverall satsactory degree among all ndvdualobjectves. That s, or each objectve,t has ts own satsactory degree, andthe overall satsacton s an ntersecton o allndvdual satsactory degrees, where the ntersectons dened through a mn operator.the satsactory degree or each objectve sevaluated by userdened membershpuncton.each response's membershp unctonμ should be well chosen so as torelect ts characterstc. For the response belongedto the set o thelargerthebetter, tsdegree o satsacton reaches 1 when t s at = max x B{ ( x) } and then decreases monotoncally to 0 at = max x B{ ( x) }. Atypcal membershp uncton or, L, could be stated as (2) µ = ( ) /( 1, > 0, < ), For the response belonged to the set o thesmallerthebetter, we set the satsactorydegree to 1 when a response s at - andthen t decreases monotoncally to 0 at. Such type o membershp unctons canbe expressed as (3) µ = ( ) /( 1, 0, < ), > Smlarly, or the response o the set thenomnalthebest, the degree o satsactons maxmzed when t s at ts target T,and decreases as t s away rom T. The maxmum o λ cannot bedrectly solved by the use o dervatve-basedmethods due to unknown unctonal orms o. Dervatve-ree methods aredeally suted or solvng problems where dervatvenormaton s unavalable. Alternatvely,we can approxmate the dervatveswth numercal methods. 4 Smulaton results Home securty system s congured by sensor nodes connected to server. These sensor nodes nclude rado requency, ultrasonc, temperature, lght, sound and vdeo sensors. Threshold value or each nput s above 90% and or a vdeo sensor, used n outsde securty, dstance threshold s taken as 1 eet. I value s ncreased rom any threshold value then alarm s on, and noted to speced locaton through nternet. For a sample scenaro, where only three types o sensors are used namely vdeo, re and voce. Fve layers o neural networksresultng rom the ANFIS have been provded n gure 2.Eect othreshold values o nput sensors and ANFIS output Polce s somewhat lower than smple uzzy logc based one, and eect o 124

5 Smart Home Securty System Based on ANFIS threshold values o nput sensors and ANFIS output Rescue staton s somewhat hgher than smple uzzy method. Also, eect o threshold values o nput sensors and ANFIS output Owner s somewhat hgher than smple uzzy method. For example, n case o vdeo Sensor=88.2, Fre Sensor=89.5, and Voce Sensor=86.4, eect o threshold values o nput sensors and respectve ANFIS output s 78.8, 84.0 and Eect o threshold values o nput sensors and respectve uzzy logc based output s 81.9, 81.5 and Snce the outputs Owner and Rescue belongs to the set o thelargerthebetter, ts membershp uncton should takethe orm o (2); and the output Polce has anomnal target, so t wll take the membershpuncton (3). In order to determne thesemembershp unctons, the maxmum andmnmum or ndvdual output must be obtaned.maxmum and mnmum o outputs can be obtaned by ormulatng sngle objectveprogrammng problems or ndvdualresponses, and solvng the problems wth anydervatve-ree algorthm. Alternatvely, theycan also be subjectvely determned accordngto users' judgment or ther expectaton. In our scenaro, t s desred that the outputs o Owner and Rescue to be held between 92 and 98,thereore, t s reasonable to set 92 and 98 asthe mnmum and maxmum o ths output,respectvely. Smlarly, the mnmum and maxmum o Polce are set as 70 and 91, respectvely.in gure 3, 3D graph show the relatonshp betweenvoce sensors, re sensors and output threshold orrescue. Eect o threshold values s represented very well than smple uzzy logc based output. In gure 4, 3D graph show the relatonshp betweenvoce sensors, re sensors and output threshold orpolce. It s more reasonable than the relatonshp by smple uzzy logc. Fg. 2.ANFIS structure or sample scenaro 125

6 Proceedngs, The 7th Internatonal Conerence on Inormaton Securty and Assurance Fg. 3. Rescue surace or re and voce sensorfg. 4. Polce surace or re and voce sensor 5 Concludng Remarks Ths study used an adaptve network uzzy nerence system orsmart home securty. Ths system provdes the advantage omodelng a nonlnear and complcated systemwthout the need o ndng sutable unctonalorms or the system, and ts neural networklearnng ablty also equps multple ANFIS wthhgh ecency n smart home securty system modelng.proposed systemnherts the propertes o ANFIS and thus provdesntermedary values as compare to Boolean logc bvalueoutputs.however,snce we use the nonparametrc regressontool or multple ANFIS to model outputs, exactunctonal orms o outputs are not knownand hence dervatve-based optmzaton cannot be drectly appled to obtanthe optmal soluton. Reerences 1. Gao,G.,Whtehouse,K.: The Sel-ProgrammngThermostat: Optmzng Setback Schedules based on HomeOccupancy Patterns, Proceedngs o BuldSys 09, November 3,Berkeley, CA, USA (2009) 2. Ghorbel,M., Segarra,M., Kerdreux,J., Keryell,R., A.,Thepaut,and M. Mokhtar.: Networkng and Communcaton n SmartHome or People wth Dsabltes, Computers Helpng Peoplewth Specal Needs, Sprnger Berln / Hedelberg, 624, (2004) 3. Hou,J.,O Bren, D. C.: Vertcal handover-decson-makng algorthm usng uzzy logc or the ntegrated radoand OW system, IEEE Transactons on Wreless Communcatons,5(1), , (2006) 4. Jang,J. S. R.: ANFIS: Adaptve network based uzzy nerence system,ieee Transactons on Systems, Man andcybernetcs, 23(3), , (1993) 5.Lejdekkers,P., Gay,V., Lawrence,E.: Smart HomecareSystem or Health Tele-montorng, Proceedngs o the FrstInternatonal Conerence on the Dgtal Socety, IEEEComputer Socety(2007) 6. Popescu,B. C., Crspo,B., Tanenbaum,A. S.,Kamperman, F. L. A. J.: A DRM Securty Archtecture or HomeNetworks, Proceedngs o the 4th ACM workshop ondgtal rghts management, October 25, Washngton, DC,USA.(2004) 7. Reyhan,S. Z.,Mahdav,M.: User Authentcaton Usng Neural Network n Smart HomeNetworks, Internatonal Journal o Smart Home, 1(2), July (2007) 126

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem

Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem Internatonal Journal o Computer pplcatons (975 8887) Volume 62 No.6, January 23 Implementaton o Boolean Functons through Multplexers wth the Help o Shannon Expanson Theorem Saurabh Rawat Graphc Era Unversty.

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Sorting Online Reviews by Usefulness Based on the VIKOR Method

Sorting Online Reviews by Usefulness Based on the VIKOR Method Assocaton or Inormaton Systems AIS Electronc Lbrary (AISeL) Eleventh Wuhan Internatonal Conerence on e- Busness Wuhan Internatonal Conerence on e-busness 5-26-2012 Sortng Onlne Revews by Useulness Based

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account Amercan J. of Engneerng and Appled Scences (): 8-6, 009 ISSN 94-700 009 Scence Publcatons Optmal Bddng Strateges for Generaton Companes n a Day-Ahead Electrcty Market wth Rsk Management Taken nto Account

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

OPT Online Person Tracking System for Context-awareness in Wireless Personal Network

OPT Online Person Tracking System for Context-awareness in Wireless Personal Network OPT Onlne Person Trackng System for Context-awareness n Wreless Personal Network Xuel An R. Venkatesha Prasad Jng Wang I.G.M.M. Nemegeers EEMCS, Delft Unversty of Technology, The Netherlands {x.an, j.wang3,vprasad,gnas.n}@ew.tudelft.nl

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Fragility Based Rehabilitation Decision Analysis

Fragility Based Rehabilitation Decision Analysis .171. Fraglty Based Rehabltaton Decson Analyss Cagdas Kafal Graduate Student, School of Cvl and Envronmental Engneerng, Cornell Unversty Research Supervsor: rcea Grgoru, Professor Summary A method s presented

More information

Sliding mode Control of Chopper Connecting Wind Turbine with Grid based on synchronous generator

Sliding mode Control of Chopper Connecting Wind Turbine with Grid based on synchronous generator Proceedngs o the 4 Internatonal onerence on Power Systems, Energy, Envronment Sldng mode ontrol o hopper onnectng Wnd Turbne wth Grd based on synchronous generator Ahmed TAHOUR, Abdel Ghan AISSAOUI, Mohamed

More information

2. RELATED WORKS AND PROBLEM STATEMENT

2. RELATED WORKS AND PROBLEM STATEMENT JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1245-1260 (2014) Short Paper Traffc Congeston Evaluaton and Sgnal Tmng Optmzaton Based on Wreless Sensor Networks: Issues, Approaches and Smulaton * School

More information

Blind Estimation of Transmit Power in Wireless Networks

Blind Estimation of Transmit Power in Wireless Networks Bln Estmaton of Transmt Power n Wreless Networks Murtaza Zafer (IBM Research), Bongjun Ko (IBM Research), Chatschk Bskan (IBM Research) an Ivan Ho (Imperal College, UK) Transmt-power Estmaton: Problem

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

Fuzzy Control of HVAC Systems Optimized by Genetic Algorithms

Fuzzy Control of HVAC Systems Optimized by Genetic Algorithms Appled Intellgence 18, 155 177, 2003 c 2003 Kluwer Academc Publshers. Manufactured n The Netherlands. Fuzzy Control of HVAC Systems Optmzed by Genetc Algorthms RAFAEL ALCALÁ Department of Computer Scence,

More information

New Solutions for Substation Sensing, Signal Processing and Decision Making

New Solutions for Substation Sensing, Signal Processing and Decision Making Proceedngs of the 37th Hawa Internatonal Conference on System Scences - 2004 New Solutons for Substaton Sensng, Sgnal Processng and Decson Makng M. Kezunovc, Fellow IEEE Texas A&M Unversty Department of

More information

A Hybrid Model for Forecasting Sales in Turkish Paint Industry

A Hybrid Model for Forecasting Sales in Turkish Paint Industry Internatonal Journal of Computatonal Intellgence Systems, Vol.2, No. 3 (October, 2009), 277-287 A Hybrd Model for Forecastng Sales n Turksh Pant Industry Alp Ustundag * Department of Industral Engneerng,

More information

Dimming Cellular Networks

Dimming Cellular Networks Dmmng Cellular Networks Davd Tpper, Abdelmounaam Rezgu, Prashant Krshnamurthy, and Peera Pacharntanakul Graduate Telecommuncatons and Networkng Program, Unversty of Pttsburgh, Pttsburgh, PA 1526, Unted

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

Fuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks

Fuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks , July 6-8, 2011, London, U.K. Fuzzy TOPSIS Method n the Selecton of Investment Boards by Incorporatng Operatonal Rsks Elssa Nada Mad, and Abu Osman Md Tap Abstract Mult Crtera Decson Makng (MCDM) nvolves

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

THe recent development of wireless technologies has

THe recent development of wireless technologies has IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION 1 Mathematcal Modelng for Network Selecton n Heterogeneous Wreless Networks A Tutoral Lusheng Wang and Geng-Sheng (G.S.) Kuo Abstract In

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Multi-Period Resource Allocation for Estimating Project Costs in Competitive Bidding

Multi-Period Resource Allocation for Estimating Project Costs in Competitive Bidding Department of Industral Engneerng and Management Techncall Report No. 2014-6 Mult-Perod Resource Allocaton for Estmatng Project Costs n Compettve dng Yuch Takano, Nobuak Ish, and Masaak Murak September,

More information

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service Sangam - Effcent Cellular-WF CDN-P2P Group Framework for Fle Sharng Servce Anjal Srdhar Unversty of Illnos, Urbana-Champagn Urbana, USA srdhar3@llnos.edu Klara Nahrstedt Unversty of Illnos, Urbana-Champagn

More information

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble 1 ECE544NA Fnal Project: Robust Machne Learnng Hardware va Classfer Ensemble Sa Zhang, szhang12@llnos.edu Dept. of Electr. & Comput. Eng., Unv. of Illnos at Urbana-Champagn, Urbana, IL, USA Abstract In

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed

More information

Safety and Reliability of Distributed Embedded Systems

Safety and Reliability of Distributed Embedded Systems Saety and Relablty o Dstrbuted Embedded Systems Techncal Report ESL 04-01 Smulaton o Vehcle Longtudnal Dynamcs Mchael Short Mchael J. Pont and Qang Huang Embedded Systems Laboratory Unversty o Lecester

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Allocating Time and Resources in Project Management Under Uncertainty

Allocating Time and Resources in Project Management Under Uncertainty Proceedngs of the 36th Hawa Internatonal Conference on System Scences - 23 Allocatng Tme and Resources n Project Management Under Uncertanty Mark A. Turnqust School of Cvl and Envronmental Eng. Cornell

More information

GENETIC ALGORITHM FOR PROJECT SCHEDULING AND RESOURCE ALLOCATION UNDER UNCERTAINTY

GENETIC ALGORITHM FOR PROJECT SCHEDULING AND RESOURCE ALLOCATION UNDER UNCERTAINTY Int. J. Mech. Eng. & Rob. Res. 03 Fady Safwat et al., 03 Research Paper ISS 78 049 www.jmerr.com Vol., o. 3, July 03 03 IJMERR. All Rghts Reserved GEETIC ALGORITHM FOR PROJECT SCHEDULIG AD RESOURCE ALLOCATIO

More information

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

A powerful tool designed to enhance innovation and business performance

A powerful tool designed to enhance innovation and business performance A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

A Proactive Risk-Aware Robotic Sensor Network for Critical Infrastructure Protection

A Proactive Risk-Aware Robotic Sensor Network for Critical Infrastructure Protection A Proactve Rsk-Aware Robotc Sensor etwork for Crtcal Infrastructure Protecton Jameson McCausland, George D ardo 2, Rafael Falcon,2, Ram Abelmona,2, Vocu Groza, and Eml Petru School of Electrcal Engneerng

More information

Support vector domain description

Support vector domain description Pattern Recognton Letters 20 (1999) 1191±1199 www.elsever.nl/locate/patrec Support vector doman descrpton Davd M.J. Tax *,1, Robert P.W. Dun Pattern Recognton Group, Faculty of Appled Scence, Delft Unversty

More information

Oservce Vs. Sannet - Which One is Better?

Oservce Vs. Sannet - Which One is Better? o rcng n Compettve Telephony Markets Yung-Mng L nsttute of nformaton Management Natonal Chao Tung Unversty, Tawan 886-3-57111 Ext 57414 yml@mal.nctu.edu.tw Shh-Wen Chu nsttute of nformaton Management Natonal

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information