Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information

Size: px
Start display at page:

Download "Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information"

Transcription

1 2668 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER 2013 Automated Trust Negotiatio Model based o Dyamic Game of Icomlete Iformatio Hogwei Che, Shuig Wag, Hui Xu, Zhiwei Ye,*Chuzhi Wag School of Comuter Sciece, Hubei Uiversity of Techology, Wuha, Chia chw2001@siacom Abstract This aer rooses a automated trust egotiatio model based o dyamic game of icomlete iformatio Through the trust evaluatio o the early stage of the cosultatio rocess ad differet rocesses for trust at the later stage, this aer itroduces the thought of dyamic game ad establishes a evaluatio model based o trust relatioshi aalysis First of all, through the aalysis ad comariso, this aer combies the automatic egotiatio rocess ad the thought of game, ad discusses the trust evaluatio factors for the early stage of the egotiatio Ad the this aer quatifies the rivacy value ad the trust degree, rovides a method of establishig automated rocess for trust egotiatio based o the dyamic game, ad fially gives the examle aalysis ad discussio for this model Idex Terms Automated Trust Negotiatio, Dyamic Game, Trust Degree, Game Tree I INTRODUCTION I the oe etwork eviromet, Automated Trust Negotiatio (ATN) mechaism is suitable for rocessig requests of users ad etwork services about trust issues i differet security domais, icludig disclosure of the resective access cotrol strategy, the certificate exchage, cosultatio message assig, rivacy rotectio[1-2] Its characteristics are as follows First, the trust relatioshi betwee strager etities through the attribute certificate exchage is established Secod, both cosultative arties ca defie the access cotrol olicy, i order to regulate each other for the resource access Third, trusted third-arty articiatio is ot required I trust egotiatio based o the attribute certificate, the focus of egotiatio is to cotrol the access to a resource, ad the strategy is achieved by secific access cotrol [3-5] Geerally, there exist two eer etities i the automated trust egotiatio model, oe called server which ows resources, ad the other called cliet which requests sources Servers ad cliets are i differet trust domais, so the two egotiatio arties do t fully trust each other The sesitive iformatio or service ca be accessed util trust is established through egotiatio As for egotiatio strategy, William ut forward the ethusiastic egotiatio strategy with higher efficiecy ad the stigy egotiatio strategy for better rivacy rotectio Yu thought that, cotrollig the access to rotected resources i trust egotiatio ot oly icluded the demad resources of users for fial access, but also icluded the certificate itself [6] Boatt made use of the rimitive redicate filter to reduce access cotrol olicy ad imroved the egotiatio efficiecy Tia Liqi used the Bayesia etwork to redict user s behavior trust, ad attemted to use the game theory to build trust TrustBuilder trust system used careful egotiatio strategy ad attemted to sythesize the advatages of both ethusiastic ad stigy egotiatio strategies Trust- X egotiatio strategy used vote of cofidece ad trust memory, so that the egotiatio efficiecy was imroved [7-11] Game theory is a effective tool to aalyze the iteractio of both sides May scholars aly game theory to etwork trust ad security A L1-VPN fair resource sharig roblem as a Adative Two-Stage Bargaiig Process Scheme is formulated by game theory [12] A trust evolutio model for social etwork is established based o Logistic model ad evolutioary game theory, [13] A Game Theory-Based model which describes the relatioshi betwee security ad efficiecy is reseted, ad the existece of Nash equilibrium i this model is roved [14] I order to revet ratioal layers cheatig, the reeated iteractio method to rovide motivatio so as to attract the layers to cooerate i the recostructio hase is alied The scheme has higher safety ad effectiveess, to better meet the alicatio requiremets [15] I this aer, a automated trust egotiatio model based o dyamic game of icomlete iformatio is roosed I sectio 2, we discuss trust relatioshis, roose a automated trust egotiatio model, ad give a game model for automated trust egotiatio I sectio 3, we establish a dyamic egotiatio mechaism, icludig calculatio of trust degree evaluatio, settig of a threshold for dyamic adustmet, calculatio of certificate loss, choosig of Policy, ad rocess of dyamic game I sectio 4, we rovide maig rules betwee egotiatio sequece ad game tree, ad give stes for costructio of the game tree I sectio 5, we roose a algorithm of dyamic game for automated trust egotiatio, ad aalyze the algorithm comlexity I sectio 6, we aalyze the egotiatio rocess of dyamic game i the case of icomlete iformatio through a examle I sectio 7, we give our coclusio II TRUST RELATIONSHIPS AND GAME ANALYSIS A Characteristics of Game for Iteractio doi:104304/sw

2 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER I etwork eviromet, resource betwee odes or service iteractio ofte exhibits a game behavior [16-23] Automated trust egotiatio is a dyamic game rocess of icomlete iformatio for both arties to exchage certificate or resource, select the aroriate egotiatio strategy ad be mutually authorized The basis of iteractio for both arties is mutual trust, ad the buildig of trust esures the ormal service I the iteractive rocess of gradually buildig trust betwee odes, some commo exteral behaviors ca be discovered as follows (1) Both arties of iteractio show ratioality, which reflects i two asects First, as arties of iteractio, both obtai the other arty's trust realized by certificate iteractio, ad the trust is obtaied by this kid of obective existece Secod, whe both make decisios, they ot oly take ito accout the curret iteractio, but also cosider other odes with the same the iterests for each other (2) Dyamic ad reetitive characteristics of game Iteractio betwee the two arties of the game is ofte a dyamic game of icomlete iformatio, ad each other makes trust evaluatio through some obective factors, such as iteractive history, thus dyamically adusts their strategies Reroducibility meas reeated games of certificate or resource i a iteractio ad role exchages for iteractio of odes (3) No-zero-sum characteristic of game Usually, the game betwee odes is a o-zero-sum game, which ca achieve a wi-wi situatio through the iteractio, ad is usually erformed i a successful iteractio that the resource demader ca obtai the corresodig resource, ad the resource rovider ca access each other's trust, ready for subsequet resource request iteractio Failure of the iteractio causes egative effects for subsequet iteractio due to the historical record B The Process of Trust Negotiatio This aer cosiders the trust evaluatio at the early stage of the cosultatio ad differet situatios for the trust at the later stage, divides the automated trust egotiatio rocess ito three hases, as show i Figure 1 Negotiatio arties of both Cliet ad Server eter ito the early stage of egotiatios, ad first obtai the situatio of each other's trust from resective local areas, called as the stage of obective trust evaluatio The accordig to each other's assessmet situatio, select the aroriate egotiatio strategy for cosultatio, called as the stage of dyamic egotiatio Fially, at the ed of cosultatios, both arties of egotiatios udate their cosultatio iformatio to record the history ad rovide iformatio to other odes, call as the stage of cosultatio recordig Figure 1 A Automated trust egotiatio Model C Game Model for Automated Trust Negotiatio The existig egotiatio strategy is the rocess to costruct the egotiatio tree Usually, certificates are suosed as odes, ad the rocess of ulock-certificates are suosed as sides This rocess is similar to the game with icomlete iformatio Both sides who articiate i the game ca be abstracted by decisio ode, ad the certificate set of disclosig ca be abstracted by brach The rocess of egotiatio is the rocess of costructig the game tree; via icome fuctio to calculate the articiator s fial effectiveess ad to solve the Nash equilibrium I the dyamic game of icomlete iformatio, accordig to the aalysis above, the trust egotiatio model based o dyamic game ca be abstracted ito quadrule form Γ = ( PCSU,,, ), i which P is game articiat, icludig both arties, the Server arty ad the Cliet arty, P : P = { Server, Cliet}, C is the collectio of cosultatio certificates, the oe for Server recorded as C s ad the oe for Cliet oted as C c ad their corresod rivacy values are resectively marked as ad s, c s S: S = { Ss, Sc}, S is the strategy set of c the Cliet arty, o-emty set, S s is the strategy set of the Server arty, o-emty set, ad U is loss (rofit) fuctio Sc Ss U III ESTABLISHMENT OF DYNAMIC NEGOTIATION MECHANISM A Calculatio of Trust Degree Evaluatio Before the cosultatio betwee the two arties, reliability is collected from the etwork ad history, which are ad h for hyothesis, i [0,1], i {, h} If h( ) is recorded as historical iformatio for iteractio, ad h is measured by roortio of the successful umber for iteractio ad the total umber, the

3 2670 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER 2013 h = + m hl() t h() t (1) 0 k= 1 k= 1 i which 0 is the iitial value whe the two arties without iteractio history Recommedatio of etwork odes is marked as t, ( ) i which ti () is the curret trust degrees for odes, ad 0 Iteractio ti () = If is measured by No - iteractio the weighted average of the recommedatio degree, the 1 = ti () (2) i= 1 The obective trust value of both arties for cosultatio is measured by the comositio of two arts ad h = λαh + (1 λ) β (3) i which α is the atteuatio factor, β is ucertai factor for etworks α is used to measure certai effects o iteractio caused by time i the iteractio rocess, ad β is used to measure the ucertai factors i the etworks B Settig a Threshold for Dyamic Adustmet Accordig to obtaied credibility of both arties, adust the resective iitial threshold K 0 K = (1 ) K0 (4) C Calculatio of Certificate Loss The basic value of rivacy for a certificate is marked as ϕ : ϕ [0,1] Whe the certificate is ulocked, the eed to rovide more certificates idicates that the rivacy level of a certificate is higher, i other words, disclosure eeds to reach the threshold The formula of calculatig the disclosure loss of a certificate is m i τ m κ ϕ ( ) τ ϕ ( ) ϕ0 (5) U = c s + i i i which κτ, are the comesatio factors ϕ 0 is the basic value or loss of certificates, divided ito ublic certificates ad rivacy certificates D Choosig Policy Comare the calculated value with the threshold value, i order to determie whether the ext egotiatio certificate achieves the coditios of iteractio The followig formula is used to calculate olicy A( ) { * ( ) } { * ( ) } 1 K Max K ci, s, U A( ) = 0 K < Max K ci, s, U i which the situatio of A= ( ) 1meas that the curret certificate ca cotiue to the ext ste of iteractio, the (6) value 0 meas that the coditio of iteractio is reached, eedig to re-cosult E Process of Dyamic Game A comlete rocess of cosultatio ca be exressed as follows ( ) ( ) Γ= Mi A Mi U (7) That is, each game ca obtai the best iteractio of certificates through the miimum utility IV PROCESS OF CONSTRUCTING THE GAME TREE A Maig Rules The actual egotiatio rocess is very comlex, ad it ca simlify i these coditio of covetio: (1)The resource requestor C ad the resource rovider S are both comletely ratioal (2) The resource requestor C ad the resource rovider S will ursue the maximum icome for themselves i the remise of isurig to costruct trust (3) The resource requestor C ad the resource rovider S ca obtai couterart s access cotrol strategy via egotiatio As for the study of automated trust egotiatio, access cotrol rules usually use the disuctive aradigm I the rocess of dyamic game, maig relatioshi should satisfy the followig coditios, i order to traslate the egotiatio sequece ito the costructio of the game tree (1) The aradigm for requested resource is R { Ci} { C}, i which R reresets the requested resources, ad C ad i C are eeded disuctive exressios of certificates by the requests, with maig aradigm show i Figure 2 (a) (2) The couctive aradigm for certificate requiremet is Sk { Ci} { C}, i which S k reresets coditioal disclosed certificate by either arty of egotiatio, ad C i ad C are eeded couctive exressios of certificates by the requests, with maig aradigm show i Figure 2 (b) (3) The aradigm to termiate egotiatio isck T, i which C k is ucoditioal disclosed certificate by either arty of egotiatio, usually reresetig the ed of the egotiatio The disuctive method for comositio is as follows S { C} { C } C T k i k

4 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER Ste7 Calculate the rofit or the loss set U of both arties, as the leaf odes of the tree Ste8 Ed the costructio of the game tree V ALGORITHM OF DYNAMIC GAME FOR AUTOMATED TRUST NEGOTIATION (a) resource request (b) couctive exressio (c) egotiatio termiatio Figure 2 Maig relatioshi betwee egotiatio sequece ad game tree B Costructio of the Game Tree The costructio of a game tree is divided ito two stages The first stage is to costruct the tye of the tree, the basis ad method of which is maig rules ad the thought of recursive iteractio The secod stage is to calculate the corresodig loss or utility, ad to assess ad select aroriate cosultatio sequece The stes for costructio are as follows Ste1 Iitialize the tree as a emty oe, deoted byt 0 Ste2 Add the requested resource R tot 0, as the root ode Ste3 Perform disuctive decomositio of access cotrol rules for R, ad use all sub-tyes by the decomositio as the root odes of the ext layer of odes for subset of access cotrol rules, with the maig mode R { C} { C } Ste4 Server resoses to subset of access cotrol rules for Cliet, ad accordig to the maig mode Ck { Si} { S } requests the certificate set of Cliet i a reversed way, with its rules as the ext-layer odes for the tree Ste5 Cliet resoses to subset of access cotrol rules for R, ad accordig to the maig mode Sk { Ci} { C} requests the certificate set of Server i a reversed way, with its rules as the ext-layer odes for the tree Ste6 Reeat Stes (4) ad (5), util the ed of a cycle of access rules C k T or circular deedecy existig for the certificate i A Algorithm of Dyamic Game for Automated Trust Negotiatio From the aalysis i Sectio 4, the algorithm of dyamic game is summarized as follows Iut arameters: Credetials ad Strategy // Credetials is the set of certificates of both arties, ad resources are also see as certificates here // Strategy is the set of strategies of both arties for iteractio Outut arameters: Tree ad U // Tree is the geerated game tree // U is the loss of utility, calculated accordig to the formula i Sectio 3 Tree = φ Credetials = { R, Ci, S } Strategy = { k } Select the strategy request R from Strategy Strategy = Strategy { R} While Strategy φ do For each sub _ strategy do If Ci S Credetials the Re cursio sub _, If C S True the ( strategy Credetials) i Create a ormal brach Calculate U s ad U c Edif else Create a blak or cycle brach Calculate U s ad U c Edif Tree = Tree { brach} Edfor Strategy = Strategy { k } Edwhile retur OtimalStrategy Tree U U (, s, c ) B Comlexity Aalysis of Algorithm Accordig to the aalysis o dyamic game algorithm for automated trust egotiatio, the worst case is circular

5 2672 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER 2013 deedecy of certificates, ad the time comlexity for 2 this case is ON ( ), i which N = C is the umber of certificates umber Ad the best case is for the first time to directly create the smallest brach, ad the time comlexity for this case will show a liear time comlexity OC ( ) I geeral, mea time comlexity to create ad calculate the whole tree is O(lg N ) the formig of circular deedecy for a certificate i the last brach also causes the trust ot to be established Ad there are three actio sequeces that ca build trust, as show i Table 2 VI EXAMPLE ANALYSIS This sectio will aalyze the egotiatio rocess of dyamic game i the case of icomlete iformatio through a examle It is assumed that the certificates ad olicies for both arties are show as Table 1 As is show i Table 1, the reresetatio of olicies is the disuctive aradigm The game tree for examle is show i Figure 3 Through dyamic game, the etire game tree ca be rued, ad the trust relatioshi ca be established by calculatio ad selectio of otimal reveue from the rofits TABLE I POLICIES FOR THE EXAMPLE Figure 3 A game tree for examle See from Table 2, the sequece C6 C7 C8 S4 T is a best sequece, ad the result of the game is to build the trust relatioshi with as little as ossible exosure of a certificate ad rivacy loss I additio, the reaso of sequecec 1 Susesio is that the resource requester lacks the certificatec 1, which leads to susesio of the egotiatio Ad sequeces C 2 C 4 S 1 S 5 C 5 C 7 S 2 S 4 C 5 ad C3 C7 S1 S5 C5 S2 S4 C geerate circular 5 deedecy of the certificate C 5, ad the cosultatio caot be erformed TABLE II PATH ANALYSIS Ad trust caot be established if the actio sequece for oe arty caot rovide the certificate C 1 I additio,

6 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER average um ber of disclosured certificates eager strategy rudet strategy dyamic game strategy umber of certificates Figure 4 The comariso of simulatio results I a simulatio eviromet, the umber of certificates ad access cotrol olicies ad differet settigs of the rivacy will roduce differet results I order to better model the actual effect, the certificate ad the strategy to obey that a certai distributio is radom is reasoable Here is a selectio of the ethusiastic model ad the cautious model to serve as cotrast, ad the average disclosed certificate umber is as the comariso obect, as is show i Figure 4 VII CONCLUSION I order to solve the rivacy rotectio roblem i the rocess of automated trust egotiatio, this aer rooses a automated trust egotiatio model based o dyamic game of icomlete iformatio This aer uses dyamic game for establishig dyamic game rocess ad discusses the model through examle aalysis The work of this aer ca be summarized as follows (1) It itroduces the thought of dyamic game through aalysis; a automated trust egotiatio model, ad a game model for automated trust egotiatio is roosed (2) It alies the rocess of dyamic game ito establishmet of automated trust egotiatio A dyamic egotiatio mechaism is established, icludig calculatio of trust degree evaluatio, settig of a threshold for dyamic adustmet, calculatio of certificate loss, choosig of Policy, ad rocess of dyamic game (3) It rovides the algorithm of establishig dyamic game rocess Maig rules betwee egotiatio sequece ad game tree, ad stes for costructio of the game tree are roosed I additio, a algorithm of dyamic game for automated trust egotiatio is reseted, ad the algorithm comlexity is aalyzed (4) It gives a examle of automated trust egotiatio, ad the egotiatio rocess of dyamic game i the case of icomlete iformatio through the examle is aalyzed ACKNOWLEDGMENT This work has bee suorted by the Geeral Program for Natioal Natural Sciece Foudatio of Chia (No ), the Natioal Natural Sciece Foudatio of Chia for Youg Scholars (No ), the Key Proect for Natural Sciece Foudatio of Hubei Provice i Chia (No 2010CDA011), the Geeral Program for Natural Sciece Foudatio of Hubei Provice i Chia (No 2011CDB075, No 2012FFB00601), the Key Proect for Scietific ad Techological Research of Educatio Deartmet of Hubei Provice i Chia (No D , No D ), the Provicial Teachig Reform Research Proect of Educatio Deartmet of Hubei Provice i Chia (No ), the Key Proect for Scietific ad Techological Research of Wuha City i Chia (No ), ad the Twilight Pla Proect of Wuha City i Chia (No ) REFERENCES [1] Bailig Liu, "Efficiet Trust Negotiatio based o Trust Evaluatios ad Adative Policies", Joural of Comuters, vol 6, o 2, ,2011 [2] Yu Wag, Qiuwei Yag, "Eveloe Protocol for Privacy Protectio", Joural of Covergece Iformatio Techology, vol 7, o 1, , 2012 [3] Aa C Squicciarii, Federica Paci, Elisa Bertio, "Trust establishmet i the formatio of Virtual Orgaizatios", Comuter Stadards & Iterfaces, vol33, o1, 13-23, 2011 [4] Wai-Khue Cheg, Boo-Yaik Ooi, Huah-Yog Cha, "Resource federatio i grid usig automated itelliget aget egotiatio", Future Geeratio Comuter Systems, vol26, o8, , 2010 [5] Deqig Zou, Shagxi Du, Weide Zheg, Hai Ji, "Buildig Automated Trust Negotiatio architecture i virtual comutig eviromet", The Joural of Suercomutig, vol55, o1, 69-85, 2011 [6] Zuo Che, Qiuwei Yag, Xi Wa, Yuaya Tu, Fei Yu, Che Xu, "Automated Trust Negotiatio with Time Behavior", Joural of Networks, vol 6, o 8, , 2011

7 2674 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER 2013 [7] Jiaxi Li, Dacheg Zhag, Jieg Huai, Jie Xu, "Cotext-aware trust egotiatio i eer-to-eer service collaboratios", Peer-to-Peer Networkig ad Alicatios, vol 2, o 2, , 2009 [8] Bailig Liu, Feg Xiao, Ke Deg, "Resolvig coflicts betwee egotiatio success ad sesitive iformatio rotectio i automated trust egotiatio", Frotiers of Comuter Sciece i Chia, vol 5, o 2, , 2011 [9] Atoio Maña, Hristo Koshutaski, Eresto J Pérez, "A trust egotiatio based security framework for service rovisioig i load-balacig clusters", Comuters & Security, vol 31, o1, 4-25, 2012 [10] Hogwei Lu, Bailig Liu, "DFANS: A highly efficiet strategy for automated trust egotiatio", Comuters & Security, vol 28, o 7, , 2009 [11] Hemalatha Chadrashekhar, Bharat Bhasker, "Quickly locatig efficiet, equitable deals i automated egotiatios uder two-sided iformatio ucertaity", Decisio Suort Systems, vol 52, o 1, , 2011 [12] Ara Kim,Hyeogeo Lee,Yuhwa Suh, Yogtae Shi, "Adative Two-Stage Bargaiig Process Resource Allocatio Scheme I Layer 1 VPN", Iteratioal Joural of Advacemets i Comutig Techology, vol 4, o 20, , 2012 [13] Guisheg Yi, Jiaguo Zhag, Yigie Wag, "Multistrategy Trust Evolutio Model Based o Logistic Equatio For Social Network", Joural of Covergece Iformatio Techology, vol 7, o 17, , 2012 [14] Yichua Wag, Jiafeg Ma, Hefeg Che, Liumei Zhag, "Game Model of Rekeyig Strategies", Iteratioal Joural of Advacemets i Comutig Techology, vol 4, o 11, 30-41, 2012 [15] Jie Wag, Yog-qua Cai, "A Ati-cheatig Ratioal Secret Sharig Scheme", Iteratioal Joural of Advacemets i Comutig Techology, vol 4, o 11, 77-86, 2012 [16] Hogwei Che, Hui Xu, Li Che, "Icetive Mechaisms for P2P Network Nodes based o Reeated Game", Joural of Networks, vol 7, o 2, , 2012 [17] Cheg Zhag, Qig-sheg Zhu, Zi-yu Che, "Credit-based Reeated Game Model Alied i Trasfer Decisio of Oortuistic Network", Joural of Software, vol 6, o 9, , 2011 [18] Cheg Zhag, Qig-sheg Zhu, Zi-yu Che, "Game-based Data-Forward Decisio Mechaism for Oortuistic Networks", Joural of Comuters, vol 5, o 2, ,2010 [19] Mohamed Amie M'hamdi, Jamal Betahar, "Schedulig Reutatio Maiteace i Aget-based Commuities Usig Game Theory", Joural of Software, vol7, o7, , 2012 [20] Guowei Wu, Zichua Xu, Qiufe Xia, Jiakag Re, " A Eergy-Aware Multi-Core Scheduler based o Geeralized Tit-For-Tat Cooerative Game", Joural of Comuters, vol 7, o 1, , 2012 [21] Weifeg Su, Qiufe Xia, Zichua Xu, Migchu Li, Zhequa Qi, "A Game Theoretic Resource Allocatio Model Based o Exteded Secod Price Sealed Auctio i Grid Comutig", Joural of Comuters, vol 7, o 1, 65-75, 2012 [22] Qiufe Ni, Rogbo Zhu, Zheguo Wu, Yogli Su, Ligyu Zhou, Bi Zhou, "Sectrum Allocatio Based o Game Theory i Cogitive Radio Networks", Joural of Networks, vol 8, o 3, , 2013 [23] Feg Zhao, Xuezhi Lv, Hogbi Che, "A Leakage-Based Beamformig Algorithm for Cogitive MIMO Systems via Game Theory", Joural of Networks, vol 8, o 3, , 2013 Hogwei Che (1975-), male, from Hubei Provice, PHD, Associate Professor of Hubei Uiversity of Techology, iterested i Peer-to-Peer, Cloud Comutig, Grid Comutig ad Mobile Aget Shuig Wag (1988-), male, from Hubei Provice, master, iterested i Peer-to-Peer, Game Theory ad Iformatio Security Hui Xu (1983-), PHD, Lecturer of Hubei Uiversity of Techology, iterested i etwork ad service maagemet Sice 2006, she has bee a certified comuter system aalyst i PR Chia I July 2008, her biograhy was selected for iclusio i the 26th editio (2009) of the Marquis Who s Who i the World, Califoria, USA Zhiwei Ye (1978-), male, from Hubei Provice, PHD, Associate Professor of Hubei Uiversity of Techology, iterested i Comutatioal Itelligece, Image Processig Chuzhi Wag (1963-), female, from Hubei rovice of Chia, Master's degree, Professor of Hubei Uiversity of Techology, Dea of School of Comuter Sciece, iterested i the security of etwork ad comuter etwork, Comuter suorted cooerative work The Chairma of Wuha of CCF Youg Comuter Scietists & Egieers Forum(2010)

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

3 Energy. 3.3. Non-Flow Energy Equation (NFEE) Internal Energy. MECH 225 Engineering Science 2

3 Energy. 3.3. Non-Flow Energy Equation (NFEE) Internal Energy. MECH 225 Engineering Science 2 MECH 5 Egieerig Sciece 3 Eergy 3.3. No-Flow Eergy Equatio (NFEE) You may have oticed that the term system kees croig u. It is ecessary, therefore, that before we start ay aalysis we defie the system that

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1184-1190. Research Article

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1184-1190. Research Article Available olie www.ocpr.com Joural of Chemical ad Pharmaceutical Research, 15, 7(3):1184-119 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 Iformatio systems' buildig of small ad medium eterprises

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Alternative Form of Dempster s Rule for Binary Variables

Alternative Form of Dempster s Rule for Binary Variables Iteratioal Joural of Itelliget Systems, Vol. 20, No. 8, August 2005, pp. 789-797. Alterative Form of Dempster s Rule for Biary Variables Rajedra P. Srivastava Erst & Youg Professor ad Director Erst & Youg

More information

A Mixed-Integer Optimization Model for Compressor Selection in Natural Gas Pipeline Network System Operations

A Mixed-Integer Optimization Model for Compressor Selection in Natural Gas Pipeline Network System Operations Joural of virometal Iformatics 3 () 33-4 (2004) 04JI00025 726-235/684-8799 2004 ISIS www.iseis.org/jei A Mixed-Iteger Otimizatio Model for Comressor Selectio i Natural as Pielie Network System Oeratios

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

BENCHMARK NEW PRODUCT DEVELOPMENT PROCESSES USING DEA-BASED MODULARIZED APPROACH

BENCHMARK NEW PRODUCT DEVELOPMENT PROCESSES USING DEA-BASED MODULARIZED APPROACH BENCHMARK NEW PRODUCT DEVELOPMENT PROCESSES USING DEA-BASED MODULARIZED APPROACH Tzu-A Chiag, Migchi Uiversity o Techology, tachiag@mail.mit.edu.tw Amy J.C. Traey, Natioal Taiei Uiversity o Techology,

More information

MTO-MTS Production Systems in Supply Chains

MTO-MTS Production Systems in Supply Chains NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands Discrete Dyamics i Nature ad Society, Article ID 349341, 12 pages http://dx.doi.org/10.1155/2014/349341 Research Article Allocatig Freight Empty Cars i Railway Networks with Dyamic Demads Ce Zhao, Lixig

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

RISK TRANSFER FOR DESIGN-BUILD TEAMS

RISK TRANSFER FOR DESIGN-BUILD TEAMS WILLIS CONSTRUCTION PRACTICE I-BEAM Jauary 2010 www.willis.com RISK TRANSFER FOR DESIGN-BUILD TEAMS Desig-builD work is icreasig each quarter. cosequetly, we are fieldig more iquiries from cliets regardig

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Confidence Intervals for Two Proportions

Confidence Intervals for Two Proportions PASS Samle Size Software Chater 6 Cofidece Itervals for Two Proortios Itroductio This routie calculates the grou samle sizes ecessary to achieve a secified iterval width of the differece, ratio, or odds

More information

Postprint. http://www.diva-portal.org

Postprint. http://www.diva-portal.org htt://www.diva-ortal.org Postrit This is the acceted versio of a aer ublished i Joural of Public Ecoomics. This aer has bee eer-reviewed but does ot iclude the fial ublisher roof-correctios or joural agiatio.

More information

Dynamic House Allocation

Dynamic House Allocation Dyamic House Allocatio Sujit Gujar 1 ad James Zou 2 ad David C. Parkes 3 Abstract. We study a dyamic variat o the house allocatio problem. Each aget ows a distict object (a house) ad is able to trade its

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

LEASE-PURCHASE DECISION

LEASE-PURCHASE DECISION Public Procuremet Practice STANDARD The decisio to lease or purchase should be cosidered o a case-by case evaluatio of comparative costs ad other factors. 1 Procuremet should coduct a cost/ beefit aalysis

More information

SaaS Resource Management Model and Architecture Research

SaaS Resource Management Model and Architecture Research Sed Orders for Reprits to reprits@bethamsciece.ae The Ope Cyberetics & Systemics Joural, 2015, 9, 433-442 433 SaaS Resource Maagemet Model ad Architecture Research Ope Access Zhag Xiaodog 1,2,*, Zha Deche

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement roceedigs of the 2014 Iteratioal oferece o Idustrial Egieerig ad Oeratios Maageet Bali, Idoesia, Jauary 7 9, 2014 Suly hai Network Desig with referetial ariff uder Ecooic artershi greeet eichi Fuaki Yokohaa

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Pre-Suit Collection Strategies

Pre-Suit Collection Strategies Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Research Article A Selection Method Based on MAGDM with Interval-Valued Intuitionistic Fuzzy Sets

Research Article A Selection Method Based on MAGDM with Interval-Valued Intuitionistic Fuzzy Sets Mathematical Problems i Egieerig Volume 2015, rticle ID 791204, 13 pages http://dx.doi.org/10.1155/2015/791204 Research rticle Selectio Method Based o MGDM with Iterval-Valued Ituitioistic Fuzzy Sets Gai-Li

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS STRATEGIC OUTCOMES PRACTICE TECHNICAL ADVISORY BULLETIN February 2011 FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS www.willis.com Natioal Fire Protectio Associatio (NFPA) #25 a mai

More information

The Canadian Council of Professional Engineers

The Canadian Council of Professional Engineers The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig

More information

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas: Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Study on Pricing Model of Online Auction under Competitive Strategy

Study on Pricing Model of Online Auction under Competitive Strategy JOURNAL OF SOFWARE, OL. 6, NO. 2, FEBRUARY 2011 281 Study o ricig Model of Olie Auctio uder Competitive Strategy Yu Mi Iformatio echology Applicatio Research Istitute, School of Ecoomic Iformatio Egieerig,

More information

Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc

Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc 50 The Iteratioal Arab Joural of Iformatio Techology, Vol. 4, No. 1, Jauary 2007 Fuzzy Active Queue Maagemet for Cogestio Cotrol i Wireless Ad-Hoc Essam Natsheh, Adza B. Jata, Sabira Khatu, ad Shamala

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Open Access Non-operating Urban Infrastructure Project Management Maturity Model on Agent Construction Based on the Evolutionary Algorithm

Open Access Non-operating Urban Infrastructure Project Management Maturity Model on Agent Construction Based on the Evolutionary Algorithm Sed Orders for Reprits to reprits@bethamsciece.ae 112 The Ope Costructio ad Buildig Techology Joural, 2015, 9, 112-116 Ope Access No-operatig Urba Ifrastructure Project Maagemet Maturity Model o Aget Costructio

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

Unit 8: Inference for Proportions. Chapters 8 & 9 in IPS

Unit 8: Inference for Proportions. Chapters 8 & 9 in IPS Uit 8: Iferece for Proortios Chaters 8 & 9 i IPS Lecture Outlie Iferece for a Proortio (oe samle) Iferece for Two Proortios (two samles) Cotigecy Tables ad the χ test Iferece for Proortios IPS, Chater

More information

RF Engineering Continuing Education Introduction to Traffic Planning

RF Engineering Continuing Education Introduction to Traffic Planning RF Egieerig otiuig Educatio Itroductio to Traffic Plaig Queuig Systems Figure. shows a schematic reresetatio of a queuig system. This reresetatio is a mathematical abstractio suitable for may differet

More information

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization Ira. J. Chem. Chem. Eg. Vol. 6, No., 007 Sesitivity Aalysis of Water Floodig Optimizatio by Dyamic Optimizatio Gharesheiklou, Ali Asghar* + ; Mousavi-Dehghai, Sayed Ali Research Istitute of Petroleum Idustry

More information

Research Article An Approach to Evaluating Computer Network Security with Intuitionistic Trapezoidal Fuzzy Information

Research Article An Approach to Evaluating Computer Network Security with Intuitionistic Trapezoidal Fuzzy Information Joural of Cotrol Sciece ad Egieerig, Article ID 604920, 4 pages http://dx.doi.org/10.1155/2014/604920 Research Article A Approach to Evaluatig Computer Network Security with Ituitioistic Trapezoidal Fuzzy

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

1. Introduction. Scheduling Theory

1. Introduction. Scheduling Theory . Itroductio. Itroductio As a idepedet brach of Operatioal Research, Schedulig Theory appeared i the begiig of the 50s. I additio to computer systems ad maufacturig, schedulig theory ca be applied to may

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

MODELING SERVER USAGE FOR ONLINE TICKET SALES

MODELING SERVER USAGE FOR ONLINE TICKET SALES Proceedigs of the 2011 Witer Simulatio Coferece S. Jai, R.R. Creasey, J. Himmelspach, K.P. White, ad M. Fu, eds. MODELING SERVER USAGE FOR ONLINE TICKET SALES Christie S.M. Currie Uiversity of Southampto

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Locating Performance Monitoring Mobile Agents in Scalable Active Networks

Locating Performance Monitoring Mobile Agents in Scalable Active Networks Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira a_haddad@itrc.ac.ir, {dehgha,

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

HCL Dynamic Spiking Protocol

HCL Dynamic Spiking Protocol ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Application of Combination Forecasting Model in the Patrol Sales Forecast

Application of Combination Forecasting Model in the Patrol Sales Forecast Joural of Applied Sciece ad Egieerig Iovatio, Vol.2 No.12, 2015, pp. 481-485 ISSN (Prit): 2331-9062 ISSN (Olie): 2331-9070 Applicatio of Combiatio Forecastig Model i the Patrol Sales Forecast Chogyu Jiag

More information

Making training work for your business

Making training work for your business Makig traiig work for your busiess Itegratig core skills of laguage, literacy ad umeracy ito geeral workplace traiig makes sese. The iformatio i this pamphlet will help you pla for ad build a successful

More information

An Optimization Approach for Utilizing Cloud Services for Mobile Devices in Cloud Environment

An Optimization Approach for Utilizing Cloud Services for Mobile Devices in Cloud Environment INFORMATICA, 2015, Vol. 26, No. 1, 89 110 89 2015 Vilius Uiversity DOI: http://dx.doi.org/10.15388/iformatica.2015.40 A Optimizatio Approach for Utilizig Cloud Services for Mobile Devices i Cloud Eviromet

More information

A Flexible Web-Based Publication Database

A Flexible Web-Based Publication Database A Flexible Web-Based Publicatio Database Karl Riedlig ad Siegfried Selberherr 2 Istitute of Sesor ad Actuator Systems 2 Istitute for Microelectroics Techische Uiversität Wie Gusshausstrasse 27-29 A-040

More information

College of Nursing and Health care Professions

College of Nursing and Health care Professions College of Nursig ad Health care Professios a history of excellece Grad Cayo Uiversity s College of Nursig ad Health Care Professios has bee providig a outstadig health care educatio for over 25 years.

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

France caters to innovative companies and offers the best research tax credit in Europe

France caters to innovative companies and offers the best research tax credit in Europe 1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public

More information

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions Chapter 5 Uit Aual Amout ad Gradiet Fuctios IET 350 Egieerig Ecoomics Learig Objectives Chapter 5 Upo completio of this chapter you should uderstad: Calculatig future values from aual amouts. Calculatig

More information

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Information for Programs Seeking Initial Accreditation

Information for Programs Seeking Initial Accreditation Iformatio for Programs Seekig Iitial Accreditatio Aswers to Frequetly- Asked-Questios (from www.abet.org/ew-to-accreditatio/) Assurig Quality l Stimulatig Iovatio This documet iteds to aswer may of the

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur

More information