An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
|
|
- Jasper Rich
- 8 years ago
- Views:
Transcription
1 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author Ceter for Educato Techology, Zheag Iteratoal Studes Uversty, Hagzhou, 300, Cha, E-mal: dogf977@gmal.com Abstract The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer etwork securty wth hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. Keywords: Multple Attrbute Decso Makg (MADM), Hestat Fuzzy Iformato, Hestat Fuzzy Geometrc Boferro Mea (HFGBM) Operator, Computer Network Securty. Itroducto The tradtoal etwork securty techques have show ther drawbacks the creasgly complex ad severe etwork securty evromet. The truso detecto tools ca oly delver alerts o lmted kowledge of attacks, whle the alert stream s always poor qualty ad ca easly be overwhelmg, whch makes t very hard to kow how much threat the detected attacks pose to the etwork ad whch securty states the hosts are. Meawhle, the tradtoal securty assessmet approaches ca ot assess the real tme securty stuato. These problems make the securty operators very dffcult to kow the curret securty threat ad stuato by the tradtoal securty tools. Network securty threat ad stuato assessmet ams to extract kowledge of curret securty threat ad stuato from raw securty data reported by tradtoal securty tools, through the techques of data fuso, ad predct the future securty stuato based o hstorcal securty formato ad the preset attacks. Ths paper studed the approaches of threat assessmet, stuato assessmet ad stuato predcto. The threat of a etwork attack s determed by sx aspects of factor: attack severty, attack evromet, probablty to succeed, statstcal factors, correlato factors ad attack effect. Based o ths cocluso, a framework to threat assessmet s proposed, whch comprses of sx steps. The approaches of every step are troduced the paper ad mplemeted SATA (Securty Alert ad Threat Aalyss) system. The approach of qualtatve attack hazard gradato ad the CVSS mechasm are used severty assessmet. The values of assets ad securty polces are set to evaluate the evrometal factors[-5]. The Bayesa Network s used to calculate the relablty of the alerts. I statstcal assessmet, a ovel approach s proposed to fd the perodcty of alerts based o tme seres aalyss techques. A laguage of alert correlato s mplemeted the system. Ad a expermet of qualtatve attack effect assessmet s troduced. HMM (Hdde Markov Model) s used to assess the etwork securty stuato. The problems of observato evet classfcato ad parameter cofgurato lyg the approach are solved. To the frst problem, the result of threat assessmet s used to classfy the alerts based o ther threat scores, whch ca lmt the scale of the observato matrx of HMM ad mprove the accuracy of observato classfcato. To the latter, the geetc programmg algorthm s used. A mechasm of quattatvely evaluatg the ftess of stuato assessmet result s proposed. A set of rsk descrpto rules are defed ad the matchg degree betwee the result of stuato assessmet ad rules s calculated, whch determes the ftess of the result. The hoey et alerts are used to costruct rsk descrpto rule set. The comparatve tests valdated the effectveess of the approach. Fve characterstcs of the etwork stuato predcto problem are defed: ) there s relatoshp of causalty betwee the future attacks ad the past attacks; ) the possblty of dfferet attack types to have followg attacks are dfferet; 3)the evdece of Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos(JDCTA) Volume6,Number0,November 0 do:0.456/dcta.vol6.ssue
2 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog future attacks ca reflect mportat formato of future attacks by tself; 4) the attack pla ca be recogzed based o the accumulato of evdece; 5)there s relatoshp betwee the evdece of future attacks ad the tred of etwork stuato. Based o the characterstcs, a approach to stuato predcto s proposed. Frst, the evdece of future attacks s extracted from IDS alerts accordg to the attack sequece patters ad the predctablty of attack types. The predctablty of attack types represets the possblty of the attacks to be the evdece of future attacks. The attack sequece patters are geerated by a data mg algorthm. The the future securty stuato ca be predcted based o the evdece. D-S evdece theory s used for pla recogto, ad the HMM model betwee the evdece ad the tred of securty stuato s costructed to predct the probablty dstrbuto of future securty states. The expermet wth DARPA data sets shows the effectveess of the approach[5-]. The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems.the am of ths paper s to vestgate the MADM problems for evaluatg the computer etwork securty wth hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. The remader of ths paper s set out as follows. I the ext secto, we troduce some basc cocepts related to hestat fuzzy sets. I Secto 3 we troduce the MADM problem to evaluate the computer etwork securty wth hestat fuzzy formato, whch the formato about attrbute weghts s correlatve, ad the attrbute values take the form of hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. I Secto 4, a llustratve example s poted out. I Secto 5 we coclude the paper ad gve some remarks.. Prelmares Boferro [] orgally troduced a mea type aggregato operator, called Boferro mea, whch ca provde for aggregato lyg betwee the max, m operators ad the logcal or ad ad operators, whch was defed as follows: Defto 4[]. Let, 0 The the aggregato fuctos: pq ad a,,, be a collecto of o-egatve real umbers. p q BM a, a,, a a a (3), are called the Boferro mea (BM) operator. Zhu et al. [3] further troduced a mea type aggregato operator, called geometrc Boferro mea, whch ca provde for aggregato lyg betwee the max, m operators ad the logcal or ad ad operators, whch was defed as follows: Defto 4[3]. Let, 0 The the aggregato fucto: pq ad a,,, pq be a collecto of o-egatve real umbers. 634
3 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog GBM a a a pa qa p q,,, (3) s called the geometrc Boferro mea (GBM) operator. Recetly, Torra [4] orgally developed the hestat fuzzy set whch covers argumets wth a set of possble values: Defto []. Gve a fxed set X, the a hestat fuzzy set (HFS) o X s terms of a fucto that whe appled to X returs a suset of 0,. To be easly uderstood, Xu ad Xa[5] express the HFS by mathematcal symbol: where elemet x, E, E xh x x X, (4) he x s a set of some values X to the set E. For coveece, Xu ad Xa[5,6] call h h x 0,, deotg the possble membershp degree of the E a hestat fuzzy elemet(hfe) ad H the set of all HFEs. I mult-crtera decso makg, the performace of a alteratve uder a crtero may be represeted by several possble values. To aggregate all the possble values of a alteratve uder the crtera, Zhu et al.[3] gve a exteso of the GBM, whch s defed as follows: h,,, be a collecto of HFEs, ad let 0. If Defto 8. Let HFGBM h, h,, h, ph qh ph qh p q (8) the HFGBM s called the hestat fuzzy geometrc Boferro mea (HFGBM) operator. Based o the operatos laws of the hestat fuzzy values descrbed, we ca drve the Theorem [3]. Theorem. Let h,,, be a collecto of HFEs, the ther aggregated value by usg the HFGBM operator s also a HFE, ad,,, ph qh ph qh HFGBM h h h p q,,, pq (9) 635
4 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog ca be cosdered as the bodg satsfacto factor where, ph qhph qh used as a calculato ut, capturg the coecto betwee h ad h,,,,, ;, the HFGBM s called the hestat fuzzy geometrc Boferro mea (HFGBM) operator. It ca be easly proved that the HFGBM operator has the followg propertes[3]. Theorem. (Idempotecy) If all h,,, are equal,.e. h h for all, the HFGBM h, h,, h h Theorem 3. (Boudedess) Let h,,, (0) be a collecto of HFEs, ad let The h m h, max h h h HFGBM h, h,, h h () Theorem 4. (Mootocty) Let h,,, ad h,,, be two set of HFEs, f h h, for all, the pq HFGBM h,, h,, h HFGBM h, h,, h () Theorem 5. (Commutatvty) Let h,,, ad h,,, the be two set of HFEs,,,, pq,,, pq HFGBM, h h h HFGBM, h h h where h,,, s ay permutato of h,,, (8). 3. A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems. The followg assumptos or otatos are used to represet the MADM problems for evaluatg the computer etwork securty wth hestat fuzzy formato. Let A A, A,, Am be a dscrete set of alteratves, ad G G, G,, G be the state of ature. If the decso makers provde several values for the alteratve A uder the state of ature G wth aoymty, these values ca be cosdered as a hestat fuzzy elemet h. I the case where two decso makers provde the same value, the the value h. Suppose that the decso matrx H h emerges oly oce s the hestat fuzzy decso m matrx, where h,,, m,,,, are the form of HFEs. I the followg, we apply the HFGBM operator to MADM for evaluatg the computer etwork securty wth hestat fuzzy formato. 636
5 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog Step. Utlze the decso formato gve matrx R, ad the HFGBM operator ( geeral, we ca take p q ) r HFGBM r, r,, r pr k qrk prk qrk pq,,, to derve the overall values r,,, mof the alteratve A. Step. Calculate the scores Sr,,, m values r,,, mto rak all the alteratves A,,, m oe(s). Step 3. Rak all the alteratves A,,, m Sr,,, m. Step 4. Ed. 4. Numercal example pq, k,,, m. () of the collectve overall hestat fuzzy preferece ad the to select the best ad select the best oe(s) accordace wth Ths secto presets a umercal example to evaluate the computer etwork securty wth hestat fuzzy formato to llustrate the method proposed ths paper. There are fve possble computer etwork systems A,, 3, 4,5 for four attrbutes,, 3, 4 attrbutes clude the tactcs G, techology ad ecoomy G, logstcs 3 G 4 evaluate the fve possble computer etwork systems,,, 5 G. The four G ad strategy, respectvely. I order to avod fluece each other, the decso makers are requred to H h h,,3, 4,,,3, 4 are the form of HFEs. aoymty ad the decso matrx 44 where A uder the above four attrbutes s preseted Table, Table. Hestat fuzzy decso matrx G G G 3 G 4 A (0.4,0.3) (0.,0.,0.3) (0.5,0.6) (0.,0.5) A (0.5,0.7) (0.5,0.7) (0.4,0.5) (0.7,0.8,0.9) A 3 (0.8,0.9) (0.8,0.9) (0.3, 0.4,0.5) (0.3, 0.4,0.5) A 4 (0.7,0.8) (0.4,0.5) (0.5, 0.7) (0.6, 0.7,0.8) A 5 (0.4,0.7) (0.6,0.9) (0.3, 0.5) (0.5, 0.7) 637
6 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog The, we utlze the approach developed to get the most desrable computer etwork systems. Step. We utlze the decso formato gve matrx H, ad the HFGBM operator to obta the overall preferece values h of the alteratves A,, 3, 4. Take computer etwork systems A for a example, we have h HFGBM r, r,, r 4 HFGBM 0.4,0.3, 0.,0.,0.3, 0.5,0.6, 0.,0.5 4 pr k qrk prk qrk p q, pq 4,, 0.55,0.5457,0.5845,0.6036,0.645,0.676,0.6376,0.6498,0.6499,0.6543,0.6658,0.6787, 0.695,0.7043,0.74,0.736,0.7345,0.7497,0.7567,0.7587,0.7598,0.7647,0.7897, Step. Calculate the scores,,3, 4,5 h,,3, 4,5 : s h of the overall hestat fuzzy values , sh s h 0.76, s h , s h s h 4 5 Step 3. Rak all the computer etwork systems,, 3, 4,, 3, 4 A accordace wth the scores s h of the overall hestat fuzzy values: A3 A5 A A A4, ad thus the most desrable computer etwork system s A Cocluso The problem of evaluatg the computer etwork securty wth hestat fuzzy formato s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer etwork securty wth hestat fuzzy formato. The, we utlze the hestat fuzzy geometrc Boferro mea (HFGBM) operator to aggregate the hestat fuzzy formato, the rak the alteratves ad select the most desrable oe(s) accordg to the score fucto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. 6. Refereces [] Duol Lu, "E-commerce System Securty Assessmet Based o Grey Relatoal Aalyss Comprehesve Evaluato", JDCTA: Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 5, No. 0, pp ,
7 A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog [] Yua Jag, Dogmg Jag, "The Securty Assessmet Method of Wreless Sesor Network wth Iterval Grey Lgustc Varables", JDCTA: Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 5, No. 0, pp , 0 [3] Wag Jbo, Lu Xuefeg, Deg Mg, "A Framework of Kowledge Maagemet System for Support Decso Makg o Web-eabled Evromet", JCIT, Vol. 6, No. 7, pp , 0. [4] Kahog Guo, Wel L, "A C-OWA Operator-based Method for Aggregatg Itutostc Fuzzy Iformato ad Its Applcato to Decso Makg uder Ucertaty", JDCTA, Vol. 4, No. 7, pp , 00. [5] Guwu We, GRA method for multple attrbute decso makg wth complete weght formato tutostc fuzzy settg, Kowledge-Based Systems, Vol.3, No.3, pp.43-47, 00. [6] G. W. We, Gray relatoal aalyss method for tutostc fuzzy multple attrbute decso makg, Expert Systems wth Applcatos, vol. 38, o. 9, pp , Sep, 0. [7] Guwu We, Hestat Fuzzy prortzed operators ad ther applcato to multple attrbute group decso makg, Kowledge-Based Systems, vol.3, pp. 76-8, 0. [8] D. K. Iakovds, ad E. Papageorgou, Itutostc Fuzzy Cogtve Maps for Medcal Decso Makg, Ieee Trasactos o Iformato Techology Bomedce, vol. 5, o., pp , Ja, 0. [9] D. F. L, A rato rakg method of tragular tutostc fuzzy umbers ad ts applcato to MADM problems, Computers & Mathematcs wth Applcatos, vol. 60, o. 6, pp , Sep, 00. [0] H. W. Lu, ad G. J. Wag, Mult-crtera decso-makg methods based o tutostc fuzzy sets, Europea Joural of Operatoal Research, vol. 79, o., pp. 0-33, May, 007. [] J. H. Park, I. Y. Park, Y. C. Kwu et al., Exteso of the TOPSIS method for decso makg problems uder terval-valued tutostc fuzzy evromet, Appled Mathematcal Modellg, vol. 35, o. 5, pp , May, 0. [] C. Boferro, Sulle mede multple d poteze, Bolleto Matematca Italaa, vol.5, pp , 950. [3] B.Zhu, Z. Xu, M. Xa, Hestat fuzzy geometrc Boferro meas, Iformato Sceces, vol. 05, pp. 7-85, 0. [4] V. Torra, Hestat fuzzy sets, Iteratoal Joural of Itellget Systems, vol.5.o.5, pp , 00. [5] M. Xa, Z. Xu, Hestat fuzzy formato aggregato decso makg, Iteratoal Joural of Approxmate Reasog, vol. 5, o.3, pp , 0. [6] Z. Xu, M. Xa, Dstace ad smlarty measures for hestat fuzzy sets, Iformato Sceces, vol. 8, pp. 8 38,
Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationProjection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationApplication of Grey Relational Analysis in Computer Communication
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author
More informationResearch on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment
Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More informationSHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
More informationA particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationCredibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
More informationThe Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal
Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag
More informationIP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
More informationSoftware Reliability Index Reasonable Allocation Based on UML
Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationThe Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationExpert Systems with Applications
Expert Systems wth Applcatos 38 (2011) 7270 7276 Cotets lsts avalable at SceceDrect Expert Systems wth Applcatos joural homepage: www.elsever.com/locate/eswa Aget-based dffuso model for a automoble market
More informationStatistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
More informationThe impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationAutomated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
More informationSettlement Prediction by Spatial-temporal Random Process
Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha
More informationDECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationOn Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.
ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs
More informationCompressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
More informationLocation Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)
Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationOptimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl
More informationModeling of Router-based Request Redirection for Content Distribution Network
Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationWeb Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm
JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com
More informationStatistical Intrusion Detector with Instance-Based Learning
Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:
More informationAnalysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011
Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway
More informationSoftware Aging Prediction based on Extreme Learning Machine
TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
More informationT = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationFuzzy Risk Evaluation Method for Information Technology Service
Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg Qasheg Zhag Yrog Huag Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg 1 Qasheg Zhag 2 Yrog Huag 1 Shool of Iformats Guagdog
More informationVIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN
Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE
More informationRESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS
Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL
More informationRegression Analysis. 1. Introduction
. Itroducto Regresso aalyss s a statstcal methodology that utlzes the relato betwee two or more quattatve varables so that oe varable ca be predcted from the other, or others. Ths methodology s wdely used
More informationDeveloping tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components
BALKAN JOURNAL OF ELECTRICAL & COMPUTER ENGINEERING, 05, Vol.3, No. 4 Developg toursm demad forecastg models usg mache learg techques wth tred, seasoal, ad cyclc compoets S. Cakurt ad A. Subas Abstract
More informationResearch on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of
More informationAn Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin
A Automated Selectg Subcotractor Model I E-Commerce by Pao-Hug L Asst. Prof., Dept. of Cvl Egeerg, Feg-Cha Uversty, Tachug, Tawa E-mal: paol@fcu.edu.tw Abstract: From the observato of orgazato chages dgtal
More informationThe analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
More informationCommercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives
Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School
More informationReport 52 Fixed Maturity EUR Industrial Bond Funds
Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:
More informationUsing the Geographically Weighted Regression to. Modify the Residential Flood Damage Function
World Evrometal ad Water Resources Cogress 7: Restorg Our Natural Habtat 7 ASCE Usg the Geographcally Weghted Regresso to Modfy the Resdetal Flood Damage Fucto L.F Chag, ad M.D. Su Room, Water Maagemet
More informationOptimization Model in Human Resource Management for Job Allocation in ICT Project
Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research
More informationFault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
More informationPerformance Attribution. Methodology Overview
erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace
More informationForecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion
2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of
More informationBayesian Network Representation
Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory
More informationThe Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability
Proceedgs of the Iteratoal MultCoferece of Egeers ad Computer Scetsts 009 Vol I The Relable Itegrated Decso for Stock Prce by Multlayer Itegrato Tme-seres of Coverage Reasoablty Chu-M Hug ad Chu-Wu Yeh*
More informationTrend Projection using Predictive Analytics
Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of
More informationFuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment
, pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College
More informationUSEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT
USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk
More informationMULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION
MULTI-CRITERIA OPTIMIZATION OFTWARE LEVI-.0 A TOOL TO UPPORT DEIGN AND MANAGEMENT IN CONTRUCTION Edmudas Kazmeras Zavadskas Vlus Gedmas Techcal Uversty, auleteko av., Vlus, LT-0, Lthuaa, Emal: edmudas.zavadskas@adm.vtu.lt
More informationA Bayesian Networks in Intrusion Detection Systems
Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationHow To Balance Load On A Weght-Based Metadata Server Cluster
WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c
More informationResearch on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance
Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal
More informationAggregation Functions and Personal Utility Functions in General Insurance
Acta Polytechca Huarca Vol. 7, No. 4, 00 Areato Fuctos ad Persoal Utlty Fuctos Geeral Isurace Jaa Šprková Departmet of Quattatve Methods ad Iformato Systems, Faculty of Ecoomcs, Matej Bel Uversty Tajovského
More informationERP System Flexibility Measurement Based on Fuzzy Analytic Network Process
JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology
More informationBanking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
More informationAnalysis of Multi-product Break-even with Uncertain Information*
Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar
More informationImpact of Interference on the GPRS Multislot Link Level Performance
Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8
More informationof the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
More informationA system to extract social networks based on the processing of information obtained from Internet
A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts
More informationAgent-based modeling and simulation of multiproject
Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es
More informationSuspicious Transaction Detection for Anti-Money Laundering
Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg
More informationApproximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines
(ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005
More informationSTOCHASTIC approximation algorithms have several
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George
More informationMULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT
Tred v podkáí vědecký časops Fakult ekoomcké ZČU v Plz Tred v podkáí, 5() 73-88 Publsher: UWB Plse MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH
More informationANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationA two-stage stochastic mixed-integer program modelling and hybrid solution approach to portfolio selection problems
A two-stage stochastc mxed-teger program modellg ad hybrd soluto approach to portfolo selecto problems Fag He, Rog Qu The Automated Schedulg, Optmsato ad Plag (ASAP) Group, School of Computer Scece The
More informationCHAPTER 2. Time Value of Money 6-1
CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show
More informationA Comparative Study for Email Classification
A Coparatve Study for Eal Classfcato Seogwook You ad Des McLeod Uversty of Souther Calfora, Los Ageles, CA 90089 USA Abstract - Eal has becoe oe of the fastest ad ost ecoocal fors of coucato. However,
More informationFuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options
Proceedgs of the World Cogress o Egeerg 11 Vol II WCE 11, July 6-8, 11, Lodo, U.K. Fuzzy Mult-crtera Method for Revaluato of ERP System Choces Usg Real Optos A.Cagr Tolga Abstract May corporate had mplemeted
More informationOn formula to compute primes and the n th prime
Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal
More informationOptimizing Software Effort Estimation Models Using Firefly Algorithm
Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly
More informationResponse surface methodology
CHAPTER 3 Respose surface methodology 3. Itroducto Respose surface methodology (RSM) s a collecto of mathematcal ad statstcal techques for emprcal model buldg. By careful desg of epermets, the objectve
More informationStatistical Decision Theory: Concepts, Methods and Applications. (Special topics in Probabilistic Graphical Models)
Statstcal Decso Theory: Cocepts, Methods ad Applcatos (Specal topcs Probablstc Graphcal Models) FIRST COMPLETE DRAFT November 30, 003 Supervsor: Professor J. Rosethal STA4000Y Aal Mazumder 9506380 Part
More information