Understanding the physical and economic consequences of attacks on control systems

Size: px
Start display at page:

Download "Understanding the physical and economic consequences of attacks on control systems"

Transcription

1 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) avalable at journal homepage: Understandng the physcal and economc consequences of attacks on control systems Yu-Lun Huang c,, Alvaro A. Cárdenas a, Saurabh Amn b, Zong-Syun Ln c, Hsn-Y Tsa c, Shankar Sastry a a Department of Electrcal Engneerng and Computer Scences, Unversty of Calforna, Berkeley, Calforna 94720, USA b Department of Cvl and Envronmental Engneerng, Unversty of Calforna, Berkeley, Calforna 94720, USA c Department of Electrcal and Control Engneerng, Natonal Chao Tung Unversty, Hsnchu, 30010, Tawan A R T I C L E I N F O A B S T R A C T Artcle hstory: Receved 11 June 2009 Accepted 11 June 2009 Keywords: Control systems Integrty attacks Denal-of-servce attacks Consequences Ths paper descrbes an approach for developng threat models for attacks on control systems. These models are useful for analyzng the actons taken by an attacker who gans access to control system assets and for evaluatng the effects of the attacker s actons on the physcal process beng controlled. The paper proposes models for ntegrty attacks and denal-of-servce (DoS) attacks, and evaluates the physcal and economc consequences of the attacks on a chemcal reactor system. The analyss reveals two mportant ponts. Frst, a DoS attack does not have a sgnfcant effect when the reactor s n the steady state; however, combnng the DoS attack wth a relatvely nnocuous ntegrty attack rapdly causes the reactor to move to an unsafe state. Second, an attack that seeks to ncrease the operatonal cost of the chemcal reactor nvolves a radcally dfferent strategy than an attack on plant safety (.e., one that seeks to shut down the reactor or cause an exploson). c 2009 Elsever B.V. All rghts reserved. 1. Introducton Control systems are computer-based systems used to montor and control physcal processes. They are usually composed of a set of networked devces such as sensors, actuators, controllers, and communcaton devces. Control systems and networks are essental to montorng and controllng many crtcal nfrastructure assets (e.g., electrc power dstrbuton, water treatment, and transportaton management) and ndustral plants (e.g., those used for manufacturng chemcals, pharmaceutcals, and food products). Most of these nfrastructures are safety-crtcal an attack can mpact publc health, the envronment, the economy, and even lead to the loss of human lfe. Control systems are becomng more complex and nterdependent and, therefore, more vulnerable. The ncreased rsk of computer attacks has led to numerous nvestgatons of control system securty (see, e.g., [1 11]). Most of the techncal solutons nvolve extensons and mprovements to tradtonal nformaton technology (IT) mechansms. However, very few solutons consder the nteractons between securty and the physcal processes beng controlled. In partcular, researchers have not consdered how attacks affect the estmaton and control algorthms that regulate physcal systems, and, ultmately, how the attacks affect the physcal envronment. The goal of ths paper s to ntate the development of new threat models for control systems. We argue that a threat assessment must nclude an analyss of how attacks on control systems can affect the physcal envronment n order to: () understand the consequences of attacks, () estmate the possble losses, () estmate the response tme requred by defenders, and (v) dentfy the most cost-effectve defenses. Correspondng author. Tel.: E-mal address: ylhuang@cn.nctu.edu.tw (Y.-L. Huang) /$ - see front matter c 2009 Elsever B.V. All rghts reserved. do: /j.jcp

2 74 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Modelng Attacks Ths secton defnes the control system abstracton and formally models ntegrty and denal of servce (DoS) attacks Notaton Fg. 1 Control system abstracton. Fg. 2 Attacks on control systems. The paper s organzed as follows. The next secton, Secton 2, focuses on formal models of cyber attacks n control systems. Secton 3 descrbes the expermental setup and analyzes the expermental results. The fnal secton, Secton 4, summarzes our conclusons and hghlghts areas for future research. A control system s composed of sensors, controllers, actuators, and the physcal system (plant). Sensors montor the physcal system and send measurements to a controller. The controller sends control sgnals to actuators. Upon recevng a control sgnal, an actuator performs a physcal acton (e.g., openng a valve). Fg. 1 clarfes the relatonshps between the physcal system, sensor sgnals (y), the controller, and control sgnals (u). The followng notaton s used to formally model attacks on control systems. Tme (t): The term t denotes an nstant of tme. A process runs from t = 0 to t = T. Sensor Measurement (y (t)): The term y (t) denotes the value measured by sensor at tme t. Note that,, t, y (t) Y, where Y = [y mn, y max ] (y mn and y max ) are the reasonable mnmum and maxmum values representng the plant state, respectvely. Also, Y = [y 1, y 2,..., y n ] T, where n s the number of sensors. Manpulated Varable (u (t)): The term u (t) denotes the output of controller at tme t. Note that,, t, u (t) U, where U = [u mn, u max ] s the allowable range of controller output values. Attack Duraton (T a ): The term T a denotes the duraton of an attack. An attack starts at t = t s and ends at t = t e. Note that T a = [t s, t e ]. Fg. 3 Chemcal plant.

3 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 4 Plant outputs wthout nose. Fg. 2 dentfes several attacks on control systems. A1 and A3 correspond to ntegrty attacks, where the adversary sends false nformaton ŷ y or û u from (one or more) sensors or controllers. The false nformaton may be an ncorrect measurement, an ncorrect tme when the measurement was observed, or an ncorrect sender dentfer. The adversary can launch these attacks by obtanng the secret keys used by the devces or by compromsng sensors (A1) or controllers (A3). We assume that each devce s unquely authentcated. Therefore, an attacker who compromses the secret key of a devce s able to mpersonate only that devce. A2 and A4 correspond to DoS attacks, where the adversary prevents the controller from recevng sensor measurements or prevents actuators from recevng control commands. The adversary can launch a DoS attack by jammng communcaton channels, compromsng devces and preventng them from sendng data, attackng routng protocols, or floodng the network. A5 corresponds to a drect attack aganst actuators or an external physcal attack on the plant. From an algorthmc perspectve, t s not possble to defend aganst such attacks (asde from detectng them). Therefore, sgnfcant efforts must be mplemented to deter and/or prevent attacks aganst physcal systems (e.g., by mplementng physcal securty controls) Modelng ntegrty attacks A successful ntegrty attack on sensor modfes the real sensor sgnal, causng the nput to the control functon u to be changed from y to ŷ. In an ntegrty attack, the adversary sends a value ŷ or û to a sensor or actuator based on the nformaton avalable to the adversary. In an effort to develop a systematc and trackable treatment of attack strateges, we propose the nvestgaton of max attacks, mn attacks, scalng attacks, and addtve attacks. We assume that all these attacks le wthn U and Y. Note that sgnals outsde ths range are easly detected by fault-tolerant algorthms. The followng attacks can be launched aganst sensors: Mn and Max Attacks: ŷ mn y (t) (t) = y mn for t T a, and ŷ max (t) = y (t) y max for t T a.

4 76 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 5 Plant outputs wth Gaussan nose. Fg. 6 Integrty attack y max 7 from t = 0 to t = 30.

5 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 7 Integrty attack y mn 5 from t = 0 to t = 30. Fg. 8 Integrty attack u mn 3 from t = 0 to t = 30.

6 78 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 9 Integrty attack u max 1 from t = 0 to t = 30. Scalng Attacks: y (t) ŷ s (t) = α (t)y (t) y mn y max Addtve Attacks: y (t) ŷ a (t) = y (t) + α (t) y mn y max for t T a and α y (t) Y for t T a and α y (t) < y mn for t T a and α y (t) > y max. for t T a and y (t) + α (t) Y for t T a and y (t) + α (t) < y mn for t T a and y (t) + α (t) > y max. Smlar attacks can be launched aganst controllers: Mn and Max Attacks: û mn u (t) (t) = u mn for t T a. and û max (t) = u (t) u max Scalng Attacks: u (t) û s (t) = α (t)u (t) u mn u max for t T a. for t T a and α u (t) U for t T a and α u (t) < u mn for t T a and α u (t) > u max. Addtve Attacks: u (t) û a (t) = u (t) + α (t) u mn u max 2.3. Modelng DoS attacks for t T a and u (t) + α (t) U for t T a and u (t) + α (t) < u mn for t T a and u (t) + α (t) > u max. In a DoS attack, we assume that a sensor sgnal does not reach the controller or that a control sgnal does not reach an actuator. Because the controller or actuator wll notce the mssng sgnal, t s necessary to mplement functonalty that enables the devce to respond to ths event. Let û and ŷ denote the response strateges for handlng DoS attacks. A conservatve response strategy uses the last sgnal receved as the current command. In other words, the controller assumes that the mssng sensor measurement s the same as the measurement t last receved: ŷ past (t) = y (t) y (t s ) for t T a. A smlar assumpton can be made for a DoS attack on a control sgnal. In partcular, we assume that an actuator contnues operatng based on the control sgnal correspondng to the manpulated varable value that t last receved: û past (t) = u (t) u (t s ) for t T a.

7 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 10 DoS attack on y Expermental results Ths secton descrbes the expermental setup and analyzes the expermental results Chemcal reactor system A chemcal reactor system wth a proportonal ntegral (PI) control algorthm [12] s nvestgated n ths paper. The dynamcal model was coded n FORTRAN and the control algorthm n Matlab. The attacks were mplemented usng Matlab. Fg. 3 shows the model of the chemcal reactor system. Four chemcal components are nvolved (A, B, C, and D). The goal of the control system s to mantan the rreversble reacton A + C B D at a specfed rate whle keepng the pressure nsde the tank below 3000 kpa. Note that B s an nert component. The chemcal reactor system has three actuators. The frst actuator, whch s controlled by u 1 (t), operates a valve that controls feed F 1 contanng the chemcal components A, B, and C. The second actuator, controlled by u 2 (t), s a valve that controls feed F 2 contanng A. The thrd actuator, controlled by u 3 (t), s a valve that purges the gas created by the chemcal reacton. Each control sgnal u (t) has a range between 0% (the valve s completely closed) and 100% (the valve s completely open). The control algorthm [12] uses data from three sensors that montor the product flow (y 4 ), pressure nsde the tank (y 5 ), and amount of component A n the purge (y 7 ). Note that u 1 s a functon of y 5 and y 4, u 2 s a functon of y 7, and u 3 s a functon of y 5. Fg. 4 shows the chemcal plant outputs wthout any nose nputs. Fg. 5 shows the plant outputs wth Gaussan nose nputs. Specfcally, Gaussan process nose (dsturbance) wth a mean of 0 and a varance of 0.05 s ntroduced at each valve. Note that the dsturbances cause the system not to return to the steady state. The chemcal reactor system s smulated from t = 0 to t = 40 (h). Note that all the attacks n the experments are executed from t = 10 to t = 30 (h) Integrty attacks We assume that the goal of the attacker s to rase the pressure nsde the reactor vessel to an unsafe value (greater than 3000 kpa), causng equpment damage and possbly an exploson. The ntegrty attacks (scalng, addtve, and constant attacks) descrbed n Secton 2.2 were mplemented. Only one sensor or controller was attacked at a tme. The max and mn attacks were the most effectve; however, not all the attacks were able to drve the pressure to an unsafe level. We summarze the results below.

8 80 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 11 DoS attack on y 5 and ntegrty attack on y 4. When a sensor s attacked, the controller can be expected to output an ncorrect control sgnal because t operates on ncorrect sensor nformaton. If an attacker does not know the plant dynamcs or the control algorthm, he/she may compromse a sensor at random. We assume the attacked sensor s y 7. Fg. 6 shows the effect of a y max attack, whch nforms the 7 controller that there s a large amount of component A n the reactor vessel. The smulatons demonstrate that the plant returns to the steady (safe) state after the attack. Furthermore, the pressure n the reactor vessel s always below 3000 kpa. Our experments demonstrate that the chemcal reactor system s very reslent to attacks on y 7, y 4, and u 2. Constant attacks are the most damagng, but they do not move the system to an unsafe state. An attacker wth knowledge about the system dynamcs and control system operaton would recognze that control sgnals u 1 and u 3 drectly nfluence the pressure n the reactor vessel. Furthermore, the sensor that montors the pressure n the reactor vessel tank y 5 would be an attractve target. Fg. 7 shows the results of launchng attack y mn. Durng 5 the attack, the controller beleves the pressure n the tank to be very low (0 kpa). Therefore, t shuts the purge valve wth the goal of ncreasng the pressure. Because the sensor keeps sendng the false pressure readng of 0 kpa, the controller keeps the purge valve shut for the duraton of the attack. In our experments, t took about 20 hours for the attack to ncrease the pressure above 3000 kpa (the unsafe state). Ths tme perod s long enough for plant operators to observe the unusual phenomenon and take the approprate mtgaton steps. In the followng, we dscuss the effects of attackng control sgnals u 1 and u 3, whch appear to be promsng from an attacker s pont of vew. Intutvely, t appears that shuttng down the purge valve would ncrease the pressure. Therefore, we decded to launch attack u mn (t). The results are shown n Fg. 8. The orgnal 3 sgnal computed by the controller s dscarded and the attack forces the purge valve to close. Ths causes the chemcal components to accumulate n the reactor vessel. However, although the accumulaton rases the pressure from 2700 kpa to 2900 kpa (y 5 curve), t does not force the chemcal reactor system to an unsafe state. The reason s that the control sgnal u 1 s also dependent on y 5 ; thus, when the pressure rses, the feed rate s correspondngly reduced. Fnally, we dscuss the effects of launchng attack u max (t) 1 (Fg. 9). The orgnal sgnal computed by the controller s dscarded and the valve for Feed 1 s opened completely. In ths case, large amounts of nput flow to the reactor, causng the pressure to rse above 3000 kpa (y 5 curve). Note that ths attack forces the system to an unsafe state n the shortest tme. We conclude that n order for a plant operator to prevent an attack from movng the system to an unsafe state, he/she should prortze the protecton of the control sgnal u 1. The sensor y 5 s also a prorty. However, because elevatng the

9 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 12 Integrty attack on the Loop 2 controller. pressure by attackng y 5 takes a long tme, the problem may be allevated by montorng the system and mplementng the approprate response when an anomaly s detected DoS attacks Our experments demonstrate that launchng a DoS attack on a sngle devce and mplementng û past or ŷ past does not have a major mpact when the plant reaches a steady state. For example, note that the DoS attack on sensor y 5 n Fg. 10 does not cause the curve for y 5 to change sgnfcantly. Smlar responses are obtaned for all the other sensors and actuators. We conclude that the effects of DoS attacks on ndvdual devces are lmted and that protectng aganst ntegrty attacks should be a prorty. DoS attacks, however, can be launched n combnaton wth nnocuous ntegrty attacks to cause sgnfcant damage. Consder, for example, a DoS attack on y 5 coupled wth an ntegrty attack on the producton rate y 4 (whch ntroduces a small varaton of y s (t) wth α = 0.5). After the attacks 4 are launched, the Loop 1 controller opens the Feed 1 valve to ncrease the producton rate. Ths ncreases the flow of reactants to the reactor vessel, but the pressure sensor y 5, whch s targeted by the DoS attack, fals to observe that the pressure n the vessel s rsng. The resultng accumulaton of reactants causes the pressure to exceed 3000 kpa n a farly short tme. Note that the changes to y 4 and y 5 n Fg. 11 start at tme t = 10 when the attacks are launched Operatng cost attack Apart from forcng the chemcal reactor system to an unsafe state, the attacker may wsh to have a negatve economc mpact by ncreasng ts operatng cost. Such an attack s not easly detected and can produce large economc losses n the long term. Estmatng the cost of an attack n a typcal nformaton technology envronment s often dffcult because t s necessary to produce valuatons for nformaton loss (e.g., stolen data) and opportunty cost (e.g., DoS attack aganst an e- commerce webste). However, estmatng the cost of an attack on a control system s easer because the operatng cost of a plant can be computed based on the reactants consumed and the producton rate. In our plant model, the nstantaneous operatng cost depends on the quanttes of reactants A (y A3 ) and C (y C3 ) and Flow F 3 and Flow F 4. Accordng to Rcker [12], the operatng cost of the chemcal plant s gven by cost = F 3 F 4 (2.206y A y C3 ). (1)

10 82 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) Fg. 13 Integrty attack on y 4. The operatng cost s proportonal to the purge flow (F 3 ) and the quanttes of reactants A (y A3 ) and C (y C3 ) n the purge. Thus, an attacker may ether target a controller to maxmze the purge flow or target a sensor to confuse the controller and ncrease the quanttes of the reactants A and C. Now consder an attack on the Loop 2 controller. In ths case, the purge valve s opened to ncrease the purge flow (larger F 3 value). Fg. 12 shows how the attack ncreases the operatng cost of the plant (from t = 10 to t = 30). Next, consder an ntegrty attack on sensor y 4 that sends an ncorrect (zero) sgnal to the Loop 1 controller ndcatng that there s an nsuffcent quantty of reactants n the tank. In attemptng to the mantan the producton rate, the controller ssues an ncorrect control sgnal u 1 to ncrease the feed rate of A, B, and C by openng the Feed 1 valve. The ncreased quantty of reactants results n hgher producton flow (F 4 ) and hgher reactor pressure (curve y 5 n Fg. 13). However, upon detectng the change n pressure, the Loop 2 controller turns on the purge valve to regulate the pressure. Ths ncreases the purge flow F 3, whch leads to a hgher operatng cost, as shown n Fg. 13. Based on the experment results, we can conclude that targetng the purge flow valve s the most effectve strategy for ncreasng the operatng cost of the chemcal reactor system. 4. Conclusons Formal models of process systems, control systems, and attacks provde a powerful mechansm for reasonng about attacks and ther consequences. The nvestgaton of ntegrty and DoS attacks on a chemcal reactor system reveals several mportant ponts. A DoS attack has relatvely lttle mpact on the system n steady state; however, a DoS attack launched n combnaton wth an nnocuous ntegrty attack can produce serous consequences. An attacker needs to dentfy and attack the key sensors n order to drve a system to an unsafe state; n the case of the chemcal reactor, targetng the reactor pressure sensor s most effectve as t rapdly causes the system to cross the safety threshold. In general, attacks on control sgnals are more serous than attacks on sensor sgnals. Fnally, an attack on plant economy nvolves a radcally dfferent strategy that an attack on plant safety. Our future research wll attempt to develop systematc technques for evaluatng the mpact of smultaneous attacks. Another area of focus s the desgn of automatc attack

11 I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( ) detecton and response mechansms that can enhance the reslence of control systems. Acknowledgements We wsh to thank Adran Perrg, Bruno Snopol, Gabor Karsa, and Jon Wley for useful dscussons related to control systems securty. Ths effort was partally supported by the Internatonal Collaboraton for Advancng Securty Technology (CAST) and the Tawan Informaton Securty Center (TWISC) Projects under Grants NSC P , NSC I and NSC E , respectvely. R E F E R E N C E S [1] E. Byres, Desgnng secure networks for process control, IEEE Industry Applcatons 6 (5) (2000) [2] E. Byres, J. Lowe, The myths and facts behnd cyber securty rsks for ndustral control systems, n: VDE Congress, [3] E. Goetz, S. Sheno (Eds.), Crtcal Infrastructure Protecton, Sprnger, Boston, Massachusetts, [4] V. Igure, S. Laughter, R. Wllams, Securty ssues n SCADA networks, Computers and Securty 25 (7) (2006) [5] T. Klpatrck, J. Gonzalez, R. Chanda, M. Papa, S. Sheno, Forensc analyss of SCADA systems and networks, Internatonal Journal of Securty and Networks 3 (2) (2008) [6] P. Oman, E. Schwetzer, J. Roberts, Protectng the grd from cyber attack Part 2: Safeguardng IEDs, substatons and SCADA systems, Utlty Automaton & Engneerng T&D 7 (1) (2002) [7] M. Papa, S. Sheno (Eds.), Crtcal Infrastructure Protecton II, Sprnger, Boston, Massachusetts, [8] K. Stouffer, J. Falco, K. Kent, Gude to Supervsory Control and Data Acquston (SCADA) and ndustral control systems securty ntal publc draft, Natonal Insttute of Standards and Technology, Gathersburg, Maryland, [9] P. Tsang, S. Smth, YASIR: A low-latency, hgh-ntegrty securty retroft for legacy SCADA systems, n: Proceedngs of the Twenty-Thrd IFIP TC 11 Internatonal Informaton Securty Conference, 2008, pp [10] Unted States Computer Emergency Readness Team (US- CERT), Control Systems Securty Program, U.S. Department of Homeland Securty, Washngton, DC. control_systems/ndex.html. [11] A. Wrght, J. Knast, J. McCarty, Low-latency cryptographc protecton for SCADA communcatons, n: Proceedngs of the Second Internatonal Conference on Appled Securty and Network Securty, 2004, pp [12] N. Rcker, Model predctve control of a contnuous, nonlnear, two-phase reactor, Journal of Process Control 3 (2) (1993)

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Fragility Based Rehabilitation Decision Analysis

Fragility Based Rehabilitation Decision Analysis .171. Fraglty Based Rehabltaton Decson Analyss Cagdas Kafal Graduate Student, School of Cvl and Envronmental Engneerng, Cornell Unversty Research Supervsor: rcea Grgoru, Professor Summary A method s presented

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

In Quest of Benchmarking Security Risks to Cyber-Physical Systems

In Quest of Benchmarking Security Risks to Cyber-Physical Systems In Quest of Benchmarkng Securty Rsks to Cyber-Physcal Systems Saurabh Amn, Massachusetts Insttute of Technology Galna A. Schwartz, Unversty of Calforna at Berkeley Alefya Hussan, Unversty of Southern Calforna

More information

Determination of Integrated Risk Degrees in Product Development Project

Determination of Integrated Risk Degrees in Product Development Project Proceedngs of the World Congress on Engneerng and Computer Scence 009 Vol II WCECS 009, October 0-, 009, San Francsco, USA Determnaton of Integrated sk Degrees n Product Development Project D. W. Cho.,

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas

More information

AN ONLINE SIMULATION TO LINK ASSET CONDITION MONITORING AND OPERATIONS DECISIONS IN THROUGH-LIFE ENGINEERING SERVICES. Evandro Leonardo Silva Teixeira

AN ONLINE SIMULATION TO LINK ASSET CONDITION MONITORING AND OPERATIONS DECISIONS IN THROUGH-LIFE ENGINEERING SERVICES. Evandro Leonardo Silva Teixeira Proceedngs of the 03 Wnter Smulaton Conference R. Pasupathy, S.-H. Km, A. Tolk, R. Hll, and M. E. Kuhl, eds AN ONLINE SIMULATION TO LINK ASSET CONDITION MONITORING AND OPERATIONS DECISIONS IN THROUGH-LIFE

More information

Assessment of the legal framework

Assessment of the legal framework 46 Toolkt to Combat Traffckng n Persons Tool 2.4 Assessment of the legal framework Overvew Ths tool offers gudelnes and resources for assessng a natonal legal framework. See also Tool 3.2 on crmnalzaton

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Physical Security and Vulnerability Modeling for Infrastructure Facilities

Physical Security and Vulnerability Modeling for Infrastructure Facilities Proceedngs of the 39th Hawa Internatonal Conference on System Scences - 2006 Physcal Securty and Vulnerablty Modelng for Infrastructure Facltes Dean A. Jones Chad E. Davs Sanda Natonal Laboratores Albuquerque,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

Response Coordination of Distributed Generation and Tap Changers for Voltage Support

Response Coordination of Distributed Generation and Tap Changers for Voltage Support Response Coordnaton of Dstrbuted Generaton and Tap Changers for Voltage Support An D.T. Le, Student Member, IEEE, K.M. Muttaq, Senor Member, IEEE, M. Negnevtsky, Member, IEEE,and G. Ledwch, Senor Member,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Depreciation of Business R&D Capital

Depreciation of Business R&D Capital Deprecaton of Busness R&D Captal U.S. Bureau of Economc Analyss Abstract R&D deprecaton rates are crtcal to calculatng the rates of return to R&D nvestments and captal servce costs, whch are mportant for

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

The Current Employment Statistics (CES) survey,

The Current Employment Statistics (CES) survey, Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Stress test for measuring insurance risks in non-life insurance

Stress test for measuring insurance risks in non-life insurance PROMEMORIA Datum June 01 Fnansnspektonen Författare Bengt von Bahr, Younes Elonq and Erk Elvers Stress test for measurng nsurance rsks n non-lfe nsurance Summary Ths memo descrbes stress testng of nsurance

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA*

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* Luísa Farnha** 1. INTRODUCTION The rapd growth n Portuguese households ndebtedness n the past few years ncreased the concerns that debt

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Allocating Time and Resources in Project Management Under Uncertainty

Allocating Time and Resources in Project Management Under Uncertainty Proceedngs of the 36th Hawa Internatonal Conference on System Scences - 23 Allocatng Tme and Resources n Project Management Under Uncertanty Mark A. Turnqust School of Cvl and Envronmental Eng. Cornell

More information

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120 Kel Insttute for World Economcs Duesternbrooker Weg 45 Kel (Germany) Kel Workng Paper No. Path Dependences n enture Captal Markets by Andrea Schertler July The responsblty for the contents of the workng

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Omega 39 (2011) 313 322. Contents lists available at ScienceDirect. Omega. journal homepage: www.elsevier.com/locate/omega

Omega 39 (2011) 313 322. Contents lists available at ScienceDirect. Omega. journal homepage: www.elsevier.com/locate/omega Omega 39 (2011) 313 322 Contents lsts avalable at ScenceDrect Omega journal homepage: www.elsever.com/locate/omega Supply chan confguraton for dffuson of new products: An ntegrated optmzaton approach Mehd

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information