Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies

Size: px
Start display at page:

Download "Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies"

Transcription

1 Fuzz Based Dagostcs Sstem for Idetfg Network Traffc Flow omales Gobthasa Rudrusam, zrud hmad, Rahmat Budarto, zma Samsud, Sureswara Ramadass Network Research Group, School of Computer Sceces Uverst Sas Malasa, Mde Campus 800, Mde, Peag, Malasa Tel: , Fax: , E-mal: { gobthasa,azru}@rg.cs.usm.m, { rahmat,azma,sures}@cs.usm.m bstract I recet ears, much work has bee costructed the area of tool developmet order to ease a etwork admstrator s job. However, there lack tools to collect ad process flow data effcetl. Ths paper dscusses the usage of etwork traffc propertes passve etwork motorg whch are used recogzg ad detfg aomal. fuzz based dagostc sstem mbedded wth propertes to recogze ad detf etwork operato aomal tellgetl alog wth Neural Network as tuer has bee proposed ths paper. Ths paper focuses o costructg a fuzz sstem b mapulatg the decoded data packets puts to detf aomales. spects such as the selecto of a sutable fuzz set operato ad tug t have proved to crease the relablt of the computed result. I ths approach, Takag Sugeo s Fuzz model has bee mplemeted. Wth ths fuzz model, etwork operato aomales are detected accord wth the test of the aomal. Ths model also has the capablt of choosg the sutable tpe of alerts; log, emal or sms. B corporatg the fuzz model wth eural etwork, etwork operators are able to sped more tme troubleshootg faults, thus mmzg the dowtme of a partcular segmet a etwork. Kewords: fuzz sstems, eural etwork, passve etwork motorg, etwork operato aomal. Itroducto The dea of developg a fuzz based dagostcs for detfg etwork traffc aomales a etwork operato has bee a vtal step to overcome problems as well as to serve as a ad the feld of etwork motorg. The eed for proper etwork motorg tools s essetal to smulate worst case or stressed etwork performace scearos order to assst etwork capact plag. Earl expermets wth traffc measuremet tools such as NetMo [] ad Spade [2] developed for motorg etwork traffc, ad MRTG [3], a popular tool used b ma etwork operators for etwork traffc measuremet, cofrmed some smlartes whch had some drawbacks. Some of the kow features of these tools whch are also part of the reportg ege are amel to provde vsual data ad/or create log fles whch requre tedous specto of the log fles. The other costrat would clude dcato of false alarm ad/or excessve otfcato of a aomal at a partcular tmestamp. Lastl, all the alarmg ad reportg facltes have a large moolthc applcato whch s dffcult to maage ad cofgure. The steps volved the process of etwork traffc specto are to classf ad detf precse characterzato of aomalous etwork traffc behavor hece represetg t a set of rules whch make up the heart of Fuzz Sstem. The ma beeft of ths sstem s to reduce the volume of data that the etwork admstrators eed to aalze, thus eablg them to sped more tme o tasks that requre hgher skll levels, such as dagosg the cause of the problem, ad fxg the fault [6]. Three classfed major aomalous traffc behavors are etwork operato aomales, etwork abuse aomales ad flash crowd aomales [4]. Ths paper focuses mal o developg a tool to motor data etwork passvel the feld of etwork operato aomales whch clude plateau behavor, etwork devce outages ad sgfcat dffereces due to cofgurato chages. Flash crowd behavor [5] has also bee looked to. The ma am of ths research s to expermetall reduce some of the possble costrats of the curret exstg tools b troducg a fuzz based dagostcs sstem for detfg etwork traffc aomales. pproach ad Methods The Ma Structure of the Sstem The ma archtecture of the fuzz sstem s featured Fgure. Ths s a geeral overvew of the whole sstem. ll the fuzz set operatos depcted the shaded boxes are defed the followg subsectos of ths paper.

2 Membershp Fucto hghest fuzz fre stregth B Neural Network Fuzzfer Kowledge Storage Ital Rules Decso Process Fuzz Sets Defuzzfer Iputs from etwork adapter The Packet Capture Drver s mapulated order to have the capablt to capture raw data packets from Etheret/IEEE techologes [6]. It sffs all the packets the wre, ot just the packets [7] whch are teded for the partcular ode. The receved frames are decapsulated ad are fltered accord wth the parameters to be set for the sstem. Packet flter SMS E-mal Log Packet flow Network adapter o Promscuous Mode Fgure The structure of the sstem Referrg to Fgure 2, the sstem cossts of two major parts whch are Fuzz Logc ad Neural Network. The former s used the decso makg processes ad the latter for learg processes. The mplemetato of both parts metoed forms a hbrd sstem whch has the capablt of learg, adaptato ad detfcato. However, ths paper, the focus s ol gve o costructg a kowledge-based Fuzz sstem b mapulatg the data packet order to detf aomales. The characterstcs of the fuzz sstem applcato ths case would be as customar, wth decoded data packet as puts. The sstem cossts of two modes, the Surve mode ad the Read to lert mode. Each mode plas ts respectve fucto as stated Fgure 2. The fuctos are mportat sce dfferet data etwork coves dfferet patter packet movemets the wre. Lkewse, the same data etwork wth dfferet segmet has dfferet characterstcs. Each etwork has ts respectve pecular etwork traffc curve that does ot chage sgfcatl over the tme [3]. I ths case, Neural Network has bee mplemeted as a tuer for fuzz sstem. Fgure 2 The two modes for the sstem. Fgure 3 The partcular felds tueled to the fuzzfer accord wth the modules. The sstem varables ad fuzz parameters B capturg the essetals of the problem, the desg of the process s costructed, leavg asde all the factors that could be arbtrar. I geeral, the smpler parameters whch are kept cotrbute to the more uderstadable behavor of the sstem ad wll be more effcet the sese of computato power cosumpto [8], [9], [0], [].I ths paper, much atteto s gve to the aspects of selectg a sutable fuzz set operato ad tug t, takg to cosderato the relablt of the computed result. I ths sstem, Takag ad Sugeo s fuzz model [0] has bee mplemeted. Ths fuzz model ca be formulated as the followg form: R : If s ad... ad s = a 0 a a the Where R =,2... l deotes the -th mplcato, l s the umber of fuzz mplcatos, whereas s the output from the -th mplcato. Cosequet parameters are a p = 0,... wth p,... as the atecedet varables ad are fuzz sets whose membershp p fuctos are deoted b the same smbols as the fuzz values. Fgure 4 presets the stadardzed atecedet parameters

3 used for the four modules stated Fgure 3. Sce tme s a varat elemet that plas a mportat role gag patter, t s used agast tpe of packets, umber of packets ad sze of packets captured respectvel for a fxed tmestamp. accordg to the fluctuato the percetage of aomal Fgure 4 The put parameters for data etwork traffc dagostcs Out of the dfferet fuzz varable membershp fuctos, the tpe used for ths research s the tragular fucto. Tragular fuctos are used because pecewse lear fuctos are eas to hadle wth computer the sese of storage ad computatos [0]. The crsp put for the frst two modules represet the umber of packets accordg to tpe trasmtted at a partcular tmestamp. For the purpose of motorg, the Iteretwork Packet IP packets ad Iteretwork Packet Exchage IPX packets whch are the majort tpe of packets trasmtted through the Netware server the School Of Computer Scece, USM NRG Lab are expermeted wth. NetWare s used the lab to provde servces such as trasparet remote fle access ad dstrbuted etwork servces amel prter sharg [3]. Hece, t s mportat to watch over the IPX tpe of packets. The advatage about Netware s that, t s desged wth IPX RIP ad IPX SP whch broadcasts ever 60 secod for updates. For the case of IP packets, t s used to ecapsulate dfferet tpe of packets such as UDP, TCP, ICMP, OSPF ad IGMP. It captures a broader perspectve whle retag ts uque patter for a partcular data etwork segmet. Modules for Network Utlzato ad Btes per Sec. are costructed based o the stadardzed atecedet parameters as Fgure 4. For rules costructo, data collected from the selected etwork segmets are vestgated for patters. The data cocerg abormal etwork traffc flow behavors are aalzed thoroughl. Utlzg the avalable data together wth kowledge expertse, the fer rules are developed producg a precse alert tpe wth mmum overhead. Lgustc rules ad evaluato The cotrol rules are defed usg the lgustc terms assocated wth fuzz sets that appear the fuzz parttos of the domas. Fgure 5 shows the tal cotrol rule for IP Packet vs. Tme module. However, there has to be dfferet tpes of rules costructed for other respectve modules. Extreme cases are facltated for mmedate respose b the Short Message Servces SMS ad resposes dffer Fgure 5 The tal cotrol rules for IP Packet vs. Tme module From Equato 2 a0 { ExtremeLow, Low, verage, Hgh, ExtremeHg h}, { ftermd, EarlMor g, Morg, fteroo, Eveg, Nght, Mdght}, 5, 7 2,... a 2 5, 7 2 R The cosequet sets are lear form as stated equato. The decso logc determes the degree to whch a measured put fulfls the premse of the rule called degree of applcablt [0]. The decso logc apples each rule R separatel. The value of equato 2 gves the degree of applcablt of the premse of the rule R for k cotrol rules. m{ α r =,... x x, r, It ca be derved from equato 2, that rule R mples for,... the measured put x x the fuzz set. output x,... R x : Y [0,], a m{, r x,...,, r x, The choce of the defuzzfcato strateg Gve a put,... r the fal output of the fuzz model, s ferred b takg the weghted average of the s: l = = l w = w } 2 3 4

4 where w > 0, ad s calculated for the put b cosequet equato of the -th mplcato, ad the weght w mples the overall truth value of premse of the -th mplcato for put calculated as : ormal crcumstaces, log whe the peak devates slghtl hgher tha ormal, emal whe the devato of the peak s more ad Short Message Servces SMS whe devato s acutel hgh. For the case of Fgure 6, the decso of perodc emal would be take. w = p= p p 5 Result Comparso wth exstg approach ccurate characterzg of mportat classes of aomales greatl facltates ther detfcato whch depeds o robust ad tmel data [3]. Some of the curret best practces for detfg ad dagosg traffc aomales cosst mal of vsualzg traffc from dfferet perspectves ad from pror experece [], [2], [3]. I geeral, automatg the aomal detfcato process has bee dffcult the sese of geeratg precse alerts to facltate a respectve abormal codto. There has bee vast amout of research o detfg etwork traffc aomales utlzg tools such as Itegrated Measuremet alss Platform for Iteret Traffc IMPIT whch has bee able to provde substatal formato to detect aomales [3]. IMPIT cludes sgal aalss utlt whch eables etwork traffc data to be decomposed to ts frequec compoets usg wavelet ad framelet sstems. Wavelet has bee used to provde meas for solatg characterstcs of sgals va a combed tme-frequec represetato. Ths s mal to determe solato of short ad log-lved traffc aomales. Devato score [3] has bee used to effectvel solate aomales ad has bee geeralzed for threshold based alerts. However, less focus has bee gve o the alert modes, methods of vestgatg ad facltatg varous etworks. I order to overcome ths, methods of embeddg tellgece etwork dagoss tool has bee expermeted wth ths research. Fuzz logc has bee mplemeted to accommodate ths purpose b costructg rules derved from dal ad weekl traffc ccle data. Fgure 6 Flash Crowd Behavor based o Btes Per. Sec. Module. Fgure 7 shows the comparso betwee the ormal ad abormal etwork traffc flow the NRG segmet. The abormalt of the flow was motored o a dfferet da whch power falure had occurred. Ths s a example of the short lved aomal whch was detected. Takg to cosderato of the scearo whch had a sudde ad rapd fluctuato of the spke, the tpcal respose was to alert va SMS. I the case of other factors cotrbutg towards the abormalt of the flow, the patter of the graph wll show devato from the stadard patter. Ths s clearl show Fgure 8 whereb a etwork devce, for stace a hub, caused a etwork segmet to go dow. ExtremeHgh Hgh verage Low ExtremeLow ExtremeHgh Hgh verage Low ExtremeLow Normal Network traffc based o Packet cout bormal Network traffc based o Packet cout FL based Dagostcs Two ma groups of aomales separated based o observed durato are log-lved ad short-lved evet [3]. The frst group cossts of flash crowd evets whch are log-lved evet. Example of flash crowd evet s the occurrece of heav traffc due to servces demad the most extreme. Referrg to the Fgure 6, the shaded area refers to flash crowd behavor of a segmet USM etwork due to a software release. Durg the flash crowd evet t should be oted that both the average of packet sze cremet ad the usage of module Bte Per Sec. eables eas detecto. The heght of peak of the graph Fgure 6 determes the approprate decso to be take based o tal rules stated Fgure 5. The four decsos ths case are gore uder Fgure 7 Comparso of ormal ad abormal etwork traffc based o packet cout

5 Dscusso Optmzg wth Neural Network Fgure 8 Falure of etwork devce based o Packet cout. other example of a dfferet short-lved aomal caused b loss of the router s coectvt s show Fgure 9. I ths stace, the respose of alert chose was to SMS due to the reaso that the patter showed extremel low packet cout. The fuzz sstem s uable to completel fucto tellgetl wthout a tuer of the parameter. Takg ths to cosderato, there has bee meas to tue the sstem ad hoc whch s tme cosumg. s a step to overcome ths problem, Neural Network has bee troduced to the sstem to act as a tellget tuer [4]. Neural etwork modfes the membershp fucto whe the surve mode s actvated. It serves as a mportat fucto producg the x, dsplacemet of the vertex of fuzz set wth the hghest fuzz stregth for the membershp fucto order to obta a better cotrol of the alerts whch act as cosequet parameter. B ths process, t has the ablt to lear a uque patter of a partcular etwork segmet ad alert accordgl. There have bee researches volvg was of optmzg eural etwork to defe uverse of dscourse alog wth addg cotrollg rules for best accurac selectg the sutable alert tpe. Future Work Fgure 9 Falure of a router detected based o packet cout The fgure below shows the packet cout obtaed upo flterg IPX packet from Novell Netware operatg sstem. The graphs show a comparso betwee the ormal ad abormal patter. The devato of the abormal patter was caused b hardware falure ths case a etwork adapter. The acto of the sstem curretl works based o a smple couter order to avod spammg or creatg large umber of alerts for a partcular aomal. I order to overcome ths, the research s lookg to meas to stablze the acto of the alerts. proposed method for ths s a fucto whch works as a feedback fuzz cotroller sstem [5]. Ths wll ot ol lead to cotrollg the tpe of acto to be take but s also able to cotrol the umber of the acto take. other alteratve wa to tackle the problem would be to exchage the tal cotrol rules. The other aspect whch ca be explored further s to ehace the readablt of aomales b applg a varet of tme-frequec aalss techques, partcularl wavelet ad devato score. These techques cosder sgal varato both hgh ad medum frequec bads ad are foud to be extremel effectve at solatg aomales [3]. Utlzato of techques as such eables the achevemet of two goals. Oe, a fer characterstcs of aomales whch leads to accurate tpe of acto ad secodl, formatve alerts ca be geerated for more effcet troubleshootg to mmze etwork dowtme. Cocluso Fgure 0 Comparso of ormal ad abormal patter for IPX tpe of packets. I ths research, aspects compromsg of a Fuzz based sstem together wth Neural Network has bee mplemeted to develop a tool whch takes acto tellgetl. ll the fuzz operators whch are fxed order for the sstem to be optmzed ad reducg false alerts have bee dscussed detal. Behavoral learg of the patters b eural etwork has bee explored as well to obta more accurate alerts. The results obtaed shows that umber of aomales ca be detected partcularl etwork operato aomales. Flters at

6 the level of etwork laer are mplemeted order to scrutze accord to a partcular tpe of packet. I ths case, the IPX ad IP tpe of packets are looked to ad dscussed elaborate. Some costrats evdetl arse durg ths research. Due to ucotrollable etwork operatos, some dffcult was faced whe takg the statstcal readg of the etwork traffc flow data. The other costrat arses durg the process of defg a stadard patter for a partcular etwork segmet. Measures to tackle ths problem were doe b obtag readg from varous etwork segmets rather tha from oe partcular segmet. Sce there lacks a stadardzed defto for etwork aomales, hece the process of characterzg the aomal s carred out a purel emprcal approach. The proper advacemet of tool for patter gatherg wll gve a breakthrough the area of aomal detfcato. Fall the explorato of deas ths paper augmets the exstg threshold based alerts. It s hoped that a sstem corporatg tellgece software based tools s developed to help admstrators [7]. Sce data etwork has become a vtal aspect the era of formato techolog, the dowtme of a etwork should be mmzed. I ths sese, these tools are helpful eough to passvel otf etwork admstrator regardg the health of a etwork from tme to tme. ckowledgmet The authors wsh to thak Uverst Sas Malasa for provdg the research grat whch was utlzed ths research. Refereces [] Ramadass, S Network Motor. I Proceedgs of sa Pacfc dvaced Network Coferece, 200, Peag, Malasa. [2] Hoaglad, J. ad Staford, S. Statstcal Packet omal Detecto Ege URL m [3] Oetker, T. ad Rad, D. 6 October Mult router Traffc Grapher URL [4] Barford, P. ad Ploka, D. Jue 200. Characterstcs of Network Flow omales, I Proceedgs of CM Iteret measuremet Workshop CM SIGCOMM 200. Sa Fracsco. [5] Jug, J., Krshamurth, B. ad Rabovch, M Flash Crowds ad Deal of Servce ttacks: Characterzato ad Implcatos for CDNs ad Web Stes. URL zzszwww.research.att.comzsz~balazszpaperszszwww 02-fc.pdf/jug02flash.pdf [6] Degoa, L., Rsso, F., Vare, G. ad Vao, P. 8 ugust WPcap: The Free Packet Capture rchtecture for Wdows. URL [7] Forouza, B.. eds TCP/IP Protocol Sute. McGraw-Hll. [8] Cox, E. eds The Fuzz Sstems Hadbook Secod Edto. Chappaqua, New York. cademc Press. [9] Ya, J., Ra, M. ad Power, J.,. eds Usg Fuzz Logc. Readg, Mass. ddso-wesle. [0] Kruse, R, Bebhardt, J. ad Klawo, S. eds The foudato of Fuzz Logc. Joh Wle & Sos. [] Negota, CV. eds Expert Sstems ad Fuzz Sstem. The Bejam/Cummgs Publshg Compa Ic. [2] Ramos, E., Schroeder, L. ad Smpso, L. eds Data Commucato ad etworkg fudametals usg Novell NetWare. Readg, Mass. ddso-wesle. [3] Barford, P., Kle, J., Ploka, D. ad Ro,. November Sgal alss of Network Traffc omales. I Proceedgs of CM SIGCOMM Iteret Measuremet Workshop Marselles, Frace. [4] Herrma, C.S. ugust 995. Hbrd Fuzz-Neural Expert Sstem for Dagoss. I Proceedgs of the Iteratoal Jot Coferece o rtfcal Itellgece, Motreal, Caada. [5] Sgh, S. ad Stel, M October 996. Fuzz Search Techques Kowledge-Based Sstem. I Proceedgs of the Sxth Iteratoal Coferece o Data ad Kowledge Sstems for Maufacturg ad Egeerg DKSME 96. Tempe, rzoa. [6] Lecke, C Experece ad Treds I for Network Motorg ad Dagoss. I Proceedgs of the Iteratoal Jot Coferece o rtfcal Itellgece Workshop o I Dstrbuted Iformato Networks. Motreal, Caada. [7] Mestel,. ad Messa, E. 7-9 Jul The Challege of Itellget Sstems. I Proceedgs of the 5th IEEE Iteratoal Smposum o Itellget Cotrol ISIC Ro Patras, Greece.

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

Load and Resistance Factor Design (LRFD)

Load and Resistance Factor Design (LRFD) 53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

Load Balancing Control for Parallel Systems

Load Balancing Control for Parallel Systems Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

Real-Time Scheduling Models: an Experimental Approach

Real-Time Scheduling Models: an Experimental Approach Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -

More information

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

A system to extract social networks based on the processing of information obtained from Internet

A system to extract social networks based on the processing of information obtained from Internet A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

A Framework of Business Intelligence-driven Data Mining for e-business

A Framework of Business Intelligence-driven Data Mining for e-business A Framework of Busess Itellgece-drve Data Mg for e-busess Yag Hag, Smo Fog Dept. of Computer ad Iformato Scece Uversty of Macau Macau SAR ma76562@umac.mo, ccfog@umac.mo Abstract Ths paper proposes a data

More information

Curve Fitting and Solution of Equation

Curve Fitting and Solution of Equation UNIT V Curve Fttg ad Soluto of Equato 5. CURVE FITTING I ma braches of appled mathematcs ad egeerg sceces we come across epermets ad problems, whch volve two varables. For eample, t s kow that the speed

More information

Construction of a system scanning the movement of human upper limbs

Construction of a system scanning the movement of human upper limbs Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 1, 3(14) z. 1 pp. 75 8 1, 3(14) z. 1 s. 75 8 Costructo of a system scag the movemet of huma upper lmbs Kaml Stateczy West

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

DIGITAL AUDIO WATERMARKING: SURVEY

DIGITAL AUDIO WATERMARKING: SURVEY DIGITAL AUDIO WATERMARKING: SURVEY MIKDAM A. T. ALSALAMI * MARWAN M. AL-AKAIDI ** * Computer Scece Dept. Zara Prvate Uversty / Jorda ** School of Egeerg ad Techology - De Motfort Uversty / UK Abstract:

More information

A Bayesian Networks in Intrusion Detection Systems

A Bayesian Networks in Intrusion Detection Systems Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology

More information