An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

Size: px
Start display at page:

Download "An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information"

Transcription

1 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author Ceter for Educato Techology, Zheag Iteratoal Studes Uversty, Hagzhou, 300, Cha, E-mal: dogf977@gmal.com Abstract The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer etwork securty wth hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. Keywords: Multple Attrbute Decso Makg (MADM), Hestat Fuzzy Iformato, Hestat Fuzzy Geometrc Boferro Mea (HFGBM) Operator, Computer Network Securty. Itroducto The tradtoal etwork securty techques have show ther drawbacks the creasgly complex ad severe etwork securty evromet. The truso detecto tools ca oly delver alerts o lmted kowledge of attacks, whle the alert stream s always poor qualty ad ca easly be overwhelmg, whch makes t very hard to kow how much threat the detected attacks pose to the etwork ad whch securty states the hosts are. Meawhle, the tradtoal securty assessmet approaches ca ot assess the real tme securty stuato. These problems make the securty operators very dffcult to kow the curret securty threat ad stuato by the tradtoal securty tools. Network securty threat ad stuato assessmet ams to extract kowledge of curret securty threat ad stuato from raw securty data reported by tradtoal securty tools, through the techques of data fuso, ad predct the future securty stuato based o hstorcal securty formato ad the preset attacks. Ths paper studed the approaches of threat assessmet, stuato assessmet ad stuato predcto. The threat of a etwork attack s determed by sx aspects of factor: attack severty, attack evromet, probablty to succeed, statstcal factors, correlato factors ad attack effect. Based o ths cocluso, a framework to threat assessmet s proposed, whch comprses of sx steps. The approaches of every step are troduced the paper ad mplemeted SATA (Securty Alert ad Threat Aalyss) system. The approach of qualtatve attack hazard gradato ad the CVSS mechasm are used severty assessmet. The values of assets ad securty polces are set to evaluate the evrometal factors[-5]. The Bayesa Network s used to calculate the relablty of the alerts. I statstcal assessmet, a ovel approach s proposed to fd the perodcty of alerts based o tme seres aalyss techques. A laguage of alert correlato s mplemeted the system. Ad a expermet of qualtatve attack effect assessmet s troduced. HMM (Hdde Markov Model) s used to assess the etwork securty stuato. The problems of observato evet classfcato ad parameter cofgurato lyg the approach are solved. To the frst problem, the result of threat assessmet s used to classfy the alerts based o ther threat scores, whch ca lmt the scale of the observato matrx of HMM ad mprove the accuracy of observato classfcato. To the latter, the geetc programmg algorthm s used. A mechasm of quattatvely evaluatg the ftess of stuato assessmet result s proposed. A set of rsk descrpto rules are defed ad the matchg degree betwee the result of stuato assessmet ad rules s calculated, whch determes the ftess of the result. The hoey et alerts are used to costruct rsk descrpto rule set. The comparatve tests valdated the effectveess of the approach. Fve characterstcs of the etwork stuato predcto problem are defed: ) there s relatoshp of causalty betwee the future attacks ad the past attacks; ) the possblty of dfferet attack types to have followg attacks are dfferet; 3)the evdece of Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos(JDCTA) Volume6,Number0,November 0 do:0.456/dcta.vol6.ssue

2 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog future attacks ca reflect mportat formato of future attacks by tself; 4) the attack pla ca be recogzed based o the accumulato of evdece; 5)there s relatoshp betwee the evdece of future attacks ad the tred of etwork stuato. Based o the characterstcs, a approach to stuato predcto s proposed. Frst, the evdece of future attacks s extracted from IDS alerts accordg to the attack sequece patters ad the predctablty of attack types. The predctablty of attack types represets the possblty of the attacks to be the evdece of future attacks. The attack sequece patters are geerated by a data mg algorthm. The the future securty stuato ca be predcted based o the evdece. D-S evdece theory s used for pla recogto, ad the HMM model betwee the evdece ad the tred of securty stuato s costructed to predct the probablty dstrbuto of future securty states. The expermet wth DARPA data sets shows the effectveess of the approach[5-]. The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems.the am of ths paper s to vestgate the MADM problems for evaluatg the computer etwork securty wth hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. The remader of ths paper s set out as follows. I the ext secto, we troduce some basc cocepts related to hestat fuzzy sets. I Secto 3 we troduce the MADM problem to evaluate the computer etwork securty wth hestat fuzzy formato, whch the formato about attrbute weghts s correlatve, ad the attrbute values take the form of hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. I Secto 4, a llustratve example s poted out. I Secto 5 we coclude the paper ad gve some remarks.. Prelmares Boferro [] orgally troduced a mea type aggregato operator, called Boferro mea, whch ca provde for aggregato lyg betwee the max, m operators ad the logcal or ad ad operators, whch was defed as follows: Defto 4[]. Let, 0 The the aggregato fuctos: pq ad a,,, be a collecto of o-egatve real umbers. p q BM a, a,, a a a (3), are called the Boferro mea (BM) operator. Zhu et al. [3] further troduced a mea type aggregato operator, called geometrc Boferro mea, whch ca provde for aggregato lyg betwee the max, m operators ad the logcal or ad ad operators, whch was defed as follows: Defto 4[3]. Let, 0 The the aggregato fucto: pq ad a,,, pq be a collecto of o-egatve real umbers. 634

3 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog GBM a a a pa qa p q,,, (3) s called the geometrc Boferro mea (GBM) operator. Recetly, Torra [4] orgally developed the hestat fuzzy set whch covers argumets wth a set of possble values: Defto []. Gve a fxed set X, the a hestat fuzzy set (HFS) o X s terms of a fucto that whe appled to X returs a suset of 0,. To be easly uderstood, Xu ad Xa[5] express the HFS by mathematcal symbol: where elemet x, E, E xh x x X, (4) he x s a set of some values X to the set E. For coveece, Xu ad Xa[5,6] call h h x 0,, deotg the possble membershp degree of the E a hestat fuzzy elemet(hfe) ad H the set of all HFEs. I mult-crtera decso makg, the performace of a alteratve uder a crtero may be represeted by several possble values. To aggregate all the possble values of a alteratve uder the crtera, Zhu et al.[3] gve a exteso of the GBM, whch s defed as follows: h,,, be a collecto of HFEs, ad let 0. If Defto 8. Let HFGBM h, h,, h, ph qh ph qh p q (8) the HFGBM s called the hestat fuzzy geometrc Boferro mea (HFGBM) operator. Based o the operatos laws of the hestat fuzzy values descrbed, we ca drve the Theorem [3]. Theorem. Let h,,, be a collecto of HFEs, the ther aggregated value by usg the HFGBM operator s also a HFE, ad,,, ph qh ph qh HFGBM h h h p q,,, pq (9) 635

4 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog ca be cosdered as the bodg satsfacto factor where, ph qhph qh used as a calculato ut, capturg the coecto betwee h ad h,,,,, ;, the HFGBM s called the hestat fuzzy geometrc Boferro mea (HFGBM) operator. It ca be easly proved that the HFGBM operator has the followg propertes[3]. Theorem. (Idempotecy) If all h,,, are equal,.e. h h for all, the HFGBM h, h,, h h Theorem 3. (Boudedess) Let h,,, (0) be a collecto of HFEs, ad let The h m h, max h h h HFGBM h, h,, h h () Theorem 4. (Mootocty) Let h,,, ad h,,, be two set of HFEs, f h h, for all, the pq HFGBM h,, h,, h HFGBM h, h,, h () Theorem 5. (Commutatvty) Let h,,, ad h,,, the be two set of HFEs,,,, pq,,, pq HFGBM, h h h HFGBM, h h h where h,,, s ay permutato of h,,, (8). 3. A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems. The followg assumptos or otatos are used to represet the MADM problems for evaluatg the computer etwork securty wth hestat fuzzy formato. Let A A, A,, Am be a dscrete set of alteratves, ad G G, G,, G be the state of ature. If the decso makers provde several values for the alteratve A uder the state of ature G wth aoymty, these values ca be cosdered as a hestat fuzzy elemet h. I the case where two decso makers provde the same value, the the value h. Suppose that the decso matrx H h emerges oly oce s the hestat fuzzy decso m matrx, where h,,, m,,,, are the form of HFEs. I the followg, we apply the HFGBM operator to MADM for evaluatg the computer etwork securty wth hestat fuzzy formato. 636

5 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog Step. Utlze the decso formato gve matrx R, ad the HFGBM operator ( geeral, we ca take p q ) r HFGBM r, r,, r pr k qrk prk qrk pq,,, to derve the overall values r,,, mof the alteratve A. Step. Calculate the scores Sr,,, m values r,,, mto rak all the alteratves A,,, m oe(s). Step 3. Rak all the alteratves A,,, m Sr,,, m. Step 4. Ed. 4. Numercal example pq, k,,, m. () of the collectve overall hestat fuzzy preferece ad the to select the best ad select the best oe(s) accordace wth Ths secto presets a umercal example to evaluate the computer etwork securty wth hestat fuzzy formato to llustrate the method proposed ths paper. There are fve possble computer etwork systems A,, 3, 4,5 for four attrbutes,, 3, 4 attrbutes clude the tactcs G, techology ad ecoomy G, logstcs 3 G 4 evaluate the fve possble computer etwork systems,,, 5 G. The four G ad strategy, respectvely. I order to avod fluece each other, the decso makers are requred to H h h,,3, 4,,,3, 4 are the form of HFEs. aoymty ad the decso matrx 44 where A uder the above four attrbutes s preseted Table, Table. Hestat fuzzy decso matrx G G G 3 G 4 A (0.4,0.3) (0.,0.,0.3) (0.5,0.6) (0.,0.5) A (0.5,0.7) (0.5,0.7) (0.4,0.5) (0.7,0.8,0.9) A 3 (0.8,0.9) (0.8,0.9) (0.3, 0.4,0.5) (0.3, 0.4,0.5) A 4 (0.7,0.8) (0.4,0.5) (0.5, 0.7) (0.6, 0.7,0.8) A 5 (0.4,0.7) (0.6,0.9) (0.3, 0.5) (0.5, 0.7) 637

6 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog The, we utlze the approach developed to get the most desrable computer etwork systems. Step. We utlze the decso formato gve matrx H, ad the HFGBM operator to obta the overall preferece values h of the alteratves A,, 3, 4. Take computer etwork systems A for a example, we have h HFGBM r, r,, r 4 HFGBM 0.4,0.3, 0.,0.,0.3, 0.5,0.6, 0.,0.5 4 pr k qrk prk qrk p q, pq 4,, 0.55,0.5457,0.5845,0.6036,0.645,0.676,0.6376,0.6498,0.6499,0.6543,0.6658,0.6787, 0.695,0.7043,0.74,0.736,0.7345,0.7497,0.7567,0.7587,0.7598,0.7647,0.7897, Step. Calculate the scores,,3, 4,5 h,,3, 4,5 : s h of the overall hestat fuzzy values , sh s h 0.76, s h , s h s h 4 5 Step 3. Rak all the computer etwork systems,, 3, 4,, 3, 4 A accordace wth the scores s h of the overall hestat fuzzy values: A3 A5 A A A4, ad thus the most desrable computer etwork system s A Cocluso The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer etwork securty wth hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. 6. Refereces [] Duol Lu, "E-commerce System Securty Assessmet Based o Grey Relatoal Aalyss Comprehesve Evaluato", JDCTA: Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 5, No. 0, pp ,

7 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog [] Yua Jag, Dogmg Jag, "The Securty Assessmet Method of Wreless Sesor Network wth Iterval Grey Lgustc Varables", JDCTA: Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 5, No. 0, pp , 0 [3] Wag Jbo, Lu Xuefeg, Deg Mg, "A Framework of Kowledge Maagemet System for Support Decso Makg o Web-eabled Evromet", JCIT, Vol. 6, No. 7, pp , 0. [4] Kahog Guo, Wel L, "A C-OWA Operator-based Method for Aggregatg Itutostc Fuzzy Iformato ad Its Applcato to Decso Makg uder Ucertaty", JDCTA, Vol. 4, No. 7, pp , 00. [5] Guwu We, GRA method for multple attrbute decso makg wth complete weght formato tutostc fuzzy settg, Kowledge-Based Systems, Vol.3, No.3, pp.43-47, 00. [6] G. W. We, Gray relatoal aalyss method for tutostc fuzzy multple attrbute decso makg, Expert Systems wth Applcatos, vol. 38, o. 9, pp , Sep, 0. [7] Guwu We, Hestat Fuzzy prortzed operators ad ther applcato to multple attrbute group decso makg, Kowledge-Based Systems, vol.3, pp. 76-8, 0. [8] D. K. Iakovds, ad E. Papageorgou, Itutostc Fuzzy Cogtve Maps for Medcal Decso Makg, Ieee Trasactos o Iformato Techology Bomedce, vol. 5, o., pp , Ja, 0. [9] D. F. L, A rato rakg method of tragular tutostc fuzzy umbers ad ts applcato to MADM problems, Computers & Mathematcs wth Applcatos, vol. 60, o. 6, pp , Sep, 00. [0] H. W. Lu, ad G. J. Wag, Mult-crtera decso-makg methods based o tutostc fuzzy sets, Europea Joural of Operatoal Research, vol. 79, o., pp. 0-33, May, 007. [] J. H. Park, I. Y. Park, Y. C. Kwu et al., Exteso of the TOPSIS method for decso makg problems uder terval-valued tutostc fuzzy evromet, Appled Mathematcal Modellg, vol. 35, o. 5, pp , May, 0. [] C. Boferro, Sulle mede multple d poteze, Bolleto Matematca Italaa, vol.5, pp , 950. [3] B.Zhu, Z. Xu, M. Xa, Hestat fuzzy geometrc Boferro meas, Iformato Sceces, vol. 05, pp. 7-85, 0. [4] V. Torra, Hestat fuzzy sets, Iteratoal Joural of Itellget Systems, vol.5.o.5, pp , 00. [5] M. Xa, Z. Xu, Hestat fuzzy formato aggregato decso makg, Iteratoal Joural of Approxmate Reasog, vol. 5, o.3, pp , 0. [6] Z. Xu, M. Xa, Dstace ad smlarty measures for hestat fuzzy sets, Iformato Sceces, vol. 8, pp. 8 38,

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems wth Applcatos 38 (2011) 7270 7276 Cotets lsts avalable at SceceDrect Expert Systems wth Applcatos joural homepage: www.elsever.com/locate/eswa Aget-based dffuso model for a automoble market

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6) Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Fuzzy Risk Evaluation Method for Information Technology Service

Fuzzy Risk Evaluation Method for Information Technology Service Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg Qasheg Zhag Yrog Huag Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg 1 Qasheg Zhag 2 Yrog Huag 1 Shool of Iformats Guagdog

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Regression Analysis. 1. Introduction

Regression Analysis. 1. Introduction . Itroducto Regresso aalyss s a statstcal methodology that utlzes the relato betwee two or more quattatve varables so that oe varable ca be predcted from the other, or others. Ths methodology s wdely used

More information

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components BALKAN JOURNAL OF ELECTRICAL & COMPUTER ENGINEERING, 05, Vol.3, No. 4 Developg toursm demad forecastg models usg mache learg techques wth tred, seasoal, ad cyclc compoets S. Cakurt ad A. Subas Abstract

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

An Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin

An Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin A Automated Selectg Subcotractor Model I E-Commerce by Pao-Hug L Asst. Prof., Dept. of Cvl Egeerg, Feg-Cha Uversty, Tachug, Tawa E-mal: paol@fcu.edu.tw Abstract: From the observato of orgazato chages dgtal

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function World Evrometal ad Water Resources Cogress 7: Restorg Our Natural Habtat 7 ASCE Usg the Geographcally Weghted Regresso to Modfy the Resdetal Flood Damage Fucto L.F Chag, ad M.D. Su Room, Water Maagemet

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability Proceedgs of the Iteratoal MultCoferece of Egeers ad Computer Scetsts 009 Vol I The Relable Itegrated Decso for Stock Prce by Multlayer Itegrato Tme-seres of Coverage Reasoablty Chu-M Hug ad Chu-Wu Yeh*

More information

Trend Projection using Predictive Analytics

Trend Projection using Predictive Analytics Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of

More information

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment , pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

MULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION

MULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION MULTI-CRITERIA OPTIMIZATION OFTWARE LEVI-.0 A TOOL TO UPPORT DEIGN AND MANAGEMENT IN CONTRUCTION Edmudas Kazmeras Zavadskas Vlus Gedmas Techcal Uversty, auleteko av., Vlus, LT-0, Lthuaa, Emal: edmudas.zavadskas@adm.vtu.lt

More information

A Bayesian Networks in Intrusion Detection Systems

A Bayesian Networks in Intrusion Detection Systems Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

Aggregation Functions and Personal Utility Functions in General Insurance

Aggregation Functions and Personal Utility Functions in General Insurance Acta Polytechca Huarca Vol. 7, No. 4, 00 Areato Fuctos ad Persoal Utlty Fuctos Geeral Isurace Jaa Šprková Departmet of Quattatve Methods ad Iformato Systems, Faculty of Ecoomcs, Matej Bel Uversty Tajovského

More information

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Analysis of Multi-product Break-even with Uncertain Information*

Analysis of Multi-product Break-even with Uncertain Information* Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

A system to extract social networks based on the processing of information obtained from Internet

A system to extract social networks based on the processing of information obtained from Internet A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

STOCHASTIC approximation algorithms have several

STOCHASTIC approximation algorithms have several IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George

More information

MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT

MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT Tred v podkáí vědecký časops Fakult ekoomcké ZČU v Plz Tred v podkáí, 5() 73-88 Publsher: UWB Plse MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

A two-stage stochastic mixed-integer program modelling and hybrid solution approach to portfolio selection problems

A two-stage stochastic mixed-integer program modelling and hybrid solution approach to portfolio selection problems A two-stage stochastc mxed-teger program modellg ad hybrd soluto approach to portfolo selecto problems Fag He, Rog Qu The Automated Schedulg, Optmsato ad Plag (ASAP) Group, School of Computer Scece The

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

A Comparative Study for Email Classification

A Comparative Study for Email Classification A Coparatve Study for Eal Classfcato Seogwook You ad Des McLeod Uversty of Souther Calfora, Los Ageles, CA 90089 USA Abstract - Eal has becoe oe of the fastest ad ost ecoocal fors of coucato. However,

More information

Fuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options

Fuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options Proceedgs of the World Cogress o Egeerg 11 Vol II WCE 11, July 6-8, 11, Lodo, U.K. Fuzzy Mult-crtera Method for Revaluato of ERP System Choces Usg Real Optos A.Cagr Tolga Abstract May corporate had mplemeted

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

Response surface methodology

Response surface methodology CHAPTER 3 Respose surface methodology 3. Itroducto Respose surface methodology (RSM) s a collecto of mathematcal ad statstcal techques for emprcal model buldg. By careful desg of epermets, the objectve

More information

Statistical Decision Theory: Concepts, Methods and Applications. (Special topics in Probabilistic Graphical Models)

Statistical Decision Theory: Concepts, Methods and Applications. (Special topics in Probabilistic Graphical Models) Statstcal Decso Theory: Cocepts, Methods ad Applcatos (Specal topcs Probablstc Graphcal Models) FIRST COMPLETE DRAFT November 30, 003 Supervsor: Professor J. Rosethal STA4000Y Aal Mazumder 9506380 Part

More information