A Covariance Analysis Model for DDoS Attack Detection*

Size: px
Start display at page:

Download "A Covariance Analysis Model for DDoS Attack Detection*"

Transcription

1 A Covarace Aayss Mode or DDoS Attac Detecto* Shuyua J Deartmet o Comutg HogKog Poytechc Uversty HogKog Cha cssy@com.oyu.edu.h Dae S. Yeug Deartmet o Comutg HogKog Poytechc Uversty HogKog Cha csdae@et.oyu.edu.h Abstract Ths aer dscusses the eects o mutvarate correato aayss o the DDoS detecto ad rooses a exame a covarace aayss mode or detectg oodg attacs. The smuato resuts show that ths method s hghy accurate detectg macous etwor trac DDoS attacs o deret testes. Ths method ca eectvey deretate betwee orma ad attac trac. Ideed ths method ca detect eve very subte attacs oy sghty deret rom orma behavors. The ear comexty o the method maes ts rea tme detecto ractca. The covarace mode ths aer to some extet veres the eectveess o mutvarate correato aayss or DDoS detecto. Some oe ssues st exst ths mode or urther research. I. INTRODUCTION Dstrbuted Dea o Servce (DDoS) attacs whch am at overwhemg a target server wth a mmese voume o useess trac rom dstrbuted ad coordated attac sources are a maor threat to the stabty o the Iteret []. But or our reasos t s dcut to detect a ogog DDoS attac: Frsty because a DDoS attac has to be detected o-e there s tte tme to detect ad corm a ogog DDoS attac. Normay the system admstrators or securty exerts have to ascerta the attacs or trace bac the attacers ess tha oe hour. Secody some Iteret worms roagato may aso drecty resut DDoS whch maes DDoS detecto much more comex. Thrdy orma deese measures such as ratemtg acet-terg tweag sotware arameters or equg more servers are a useu but mted ther caabtes. Fay the exact dstcto betwee DDoS attacs ad ash crowds remas a oe ssue. [2] has roosed a taxoomy but t s based oy o HTTP rotoco ad web evets. It s esseta that we be abe to detect DDoS attacs ast accuratey ad rea tme. DDoS attacs exhaust host resources or the etwor badwdth. It s cosequety mortat to detect resource usage chages ad reduce the detecto tme. Such aborma chages coud be detected statstcay. For exame the etroy method [3] uses requecy-sorted dstrbutos o seected acet attrbutes a tme wdow to comute etroy ad use the etroy chages to dcate the aomaes. I [4] the Ch-Square statstcs aroach s used to dety the aomaes. [5] Demostrates how Aderso-Darg statstca method s used to detect etwor trac chages. The adatve sequeta ad batchsequeta methods [6] emoy statstca aayss o data rom mute ayers o etwor rotocos to detect very subte trac chages. The robem wth statstcs-based detecto methods s that t s ot ossbe to determe wth certaty the orma etwor acet dstrbuto. Rather t ca oy be smuated as a uorm dstrbuto. Some aers suggest the usage o custerg methodoogy to ormuate the orma atters. For exame [7] ho-cout ormato erred rom Tme To Lve (TTL) vaue the IP header s used to custer the orma address rexes. [2] uses a etwor aware custerg method to dstgush betwee the HTTP-based ash evets ad DDoS attacs. Oe o the advatages o custerg methods over statstcs-based methods s that they do ot rey o ay ror ow data dstrbuto. There exst may varabes that ca be used to dety orma etwor atters: cet characterstcs such as the source IP address or Roud-Tr Tme (RTT) etwor trac atters such as the deret rotoco dstrbuto acet rate ad ow terva ad server atters such as the umber o cets ad ther dstrbuto er-cet request rate ad request e dstrbutos. The choce o whch varabes seected as a adequate custerg crtero remas a oe robem. Modeg detecto robems to cotro theory [8] ad matera ow [9] cotro robems may aso rovde ove ersectves o the DDoS detecto. The covarace aayss method roosed ths aer s aso a statstcs-based method but ue the wors [4] [5] ad [6] t does ot rey uo ay resumtos o the orma etwor acets dstrbutos. Ths method s eectve because t accuratey detects DDoS attacs o deret testes ad because the method s sme t ca be memeted o-e. Ths aer cams three ma cotrbutos: Ths aer ams at dscussg the eect o mutvarate correato aayss o the detecto o DDoS attacs. Athough the exermets we oy use a ags the cotro ed o TCP header as raw data ad oy use covarace matrces to detect oodg attacs t may ot obstruct the mortace ad geerazato o our roosed aroach. I [] t was show that oodg attacs coud aso be detected usg the o-arametrc Cumuatve Sum (CUSUM) method. The derece betwee these two * Ths research wor s suorted by a Hog Kog RGC roect research grat umber B-Q57 IEEE Commucatos Socety /4/$2. (c) 24 IEEE

2 aers es that we am at roosg a geerc correato method to detect DDoS attacs ad the teto o exermets o detectg oodg attacs oy see to exemy ths dea. Ths attemt w be heu the research o eature seecto or detectg DDoS attacs. I act may arameters were used detectg DDoS such as source IP address ad RTT [2 7 ad ]. But o systematc way o choosg these arameters has bee roosed. [] resets a eature rag ad seecto or IDS ad [6] dscusses a ove eature reducto techque. Ther exermets are based o datasets descrbed [2]. They dd ot dscuss some other arameters such as ow ter-arrva tme or acet rate. Nor dd t cosder the eect o ay correato coecets o detecto. Ths aer rooses a eectve o-e detecto method based o covarace aayss. The method coud ot oy deretate betwee the orma ad attac trac oodg stuatos but aso detect the subte attacs that exose ew aaret dereces rom orma behavors. It s we ow that The most dcut art or deedg agast DDoS attacs s that t s very hard to deretate betwee orma trac ad attac trac. Ths s the udameta robems o the Iteret [5]. Besdes the ear comexty o our method maes DDoS rea-tme detecto ecet ad ractca. The rest o ths aer s orgazed as oows: Secto II descrbes the covarace aayss detecto methodoogy used DDoS detecto. Secto III vadates the covarace detecto method smuatos ad exermets o detectg oodg attacs. Secto IV aayzes the method s eectveess. Fay cocusos ad dscussos are roosed Secto V. II. OVERVIEW OF COVARIANCE ANALYSIS METHOD The ma dea s that the characterstcs o a ormato system coud be descrbed by the correatos amog ts eatures. Rag ad seectg the ow arameters as eatures coud he to dety the atters o the Iteret whe the correatos amog the eatures may rovde addtoa esseta ormato. The correatos are exected to be sestve eough to ag some chages. I terms o correato the orma atters w be deret rom the aborma atters. I ths sese the correato may be seected as a chage dcator ad ay chages or aborma actvtes w detey chage the correato coecets o these eatures gotte the orma stuatos. So detectg the correato chages coud determe the occurrece o the chage. I statstcs theory the eectveess o ths chage detecto method s obvous ad ts ececy s determed by the sutabe data voume we coud gather a mted observato wdow. The detas o the method are descrbed as beow: Assume there are eatures... whch comose a radom vector X = (... ). Let x... x are the observed vectors x = (... ) s the th observed vectors. s the vaue o the th observato durg the th tme terva T. We dee a ew varabe y ad the covarace matrx M to characterze the varabe y as oows: y = () M = y (2)... 2 We dee varabe z as the dstace betwee two matrces M y ad the mea o M y or EM ( ) y : z = M E( M ) y y (3) where z measures the chage or the aomay. To smy the robem descrto the oowg dstace ucto o two matrces s used: 2 M M2 = ( a b ) a M b M2 (4) I the orma stuato oe ca d a ot c ad a costat a or z equato (3) whch satsy z c < a Ζ. The costat a s seected as the uer threshod o the..d z c. So or the observed data gathered durg the th tme terva we cacuate the corresodg z z c > a the aborma behavors coud be determed. III. FLOODING SIMULATIONS AND DETECTION We seect a the ags cotro ed o TCP header as eatures the covarace mode. Each ag occues oy bt the TCP header. As [3] a bre descrto o each bt s gve the oowg tabe: TABLE DESCRIPTION OF FLAGS IN THE CONTROL FIELD OF TCP HEADER Fag PSH Descrto The vaue o urget oter ed s vad The vaue o acowedgemet ed s vad Push the data The coecto must be reset Sychroze sequece umbers durg coecto Termate the coecto As we ow oodg attacs the umbers o ad do ot match. Our method tres to use the covarace o each ar o the above sx ags to detect the oodg attacs. The dataset we use are descrbed tabe 2. Each o these two traces cotas a hour's worth o a wde-area trac betwee Dgta Equmet Cororato ad the rest o the word. The traces were gathered at Dgta's rmary IEEE Commucatos Socety /4/$2. (c) 24 IEEE

3 Iteret access ot whch s a Etheret DMZ etwor oerated by Dgta's Pao Ato research grous. TABLE 2 THE TCP TRACE DESCRIPTION Trace Start Tme TCP Pacets dec-t- 22: Wed March 8th mo dec-t-2 2: Thu March 9th mo I the smuato these two traces rereset orma trac. We arse the two traces ad extract the cotro ed vaue o each acet the traces. We seect 2 secods as a tme terva. Fgures (a) ad (b) rereset the characterstcs o deret ds o acet umber uder orma oeratos. These two gures gve a geera descrto o two traces the seected tme terva terms o deret acet tyes. Pacet Number every 2 secods PUSH Tme (Secods) Pacet Number every 2 secods PUSH Tme (Secods) (a) dec-t- (b) dec-t-2 Fgure Norma Pacet Number accordg to deret ags 2 secod terva Accordg to equato (2) we cacuate a matrces Ms 2 secods the trace dec-t- ad dec-t-2 searatey. The we d the corresodg z s deed by equato (3) accordg to the dstace deto gve (4). The resut s descrbed gures 2 (a) ad (b) whch ustrate the dstace betwee the covarace matrx ad the mea o a covarace matrces uder orma stuatos. Dstace betwee Covarace Matrx ad Mea Matrx Dstace betwee Covarace Matrx ad Mea Matrx Tme (Secods) (b) dec-t-2 Fgure 2 Covarace Matrx Dstace uder Norma Oeratos The aborma trac s smuated the same way as descrbed []. I a DDoS attac the severe eect o the vctm comes rom the aggregate oodg rate rather tha rom oy oe sge attac source. So the sestvty eeds or attacer-earest-router ocated ad vctm-earest-router ocated DDoS detecto are deret. The attacer-earestrouter ocated DDoS detecto ocuses o revetg the outut o tera macous trac to the Iteret whch corresods to the ow attac acet rate detecto. Vctm-earest-router ocated DDoS detecto may ocuses o rotectg the vctms whch corresods to the hgh attac acet rate detecto. To attac a rotected server the aggregate oodg acet rate shoud be arger tha 4 []. I order to detect our method s sestvty both asects we smuate two stuatos: 5 acets er secod to the vctm-earestrouter ocated detecto ad 35 acets er secod to the attacer-earest-router ocated detecto. Each s the mma attac acet rate each case. I order to show the treds o the eects o deret attac acet rates o the covarace matrces dstace betwee the orma ad the aborma oe we aso smuate the stuato o a attac rate o 8 acets er secod. From gure 3 we ca see that ths covarace matrx dstace method erorms we detectg ot oy arge oodg DDoS attacs but aso subte DDoS attacs eve the attac rate s 35 acets every secod (gures 3 (a) ad (b)) where at east 4 stub etwors wth ths attac rate woud be eeded to mae a successu DDoS attac. So the sestvty o ths method s obvousy hgh. It w have a % detecto rate the threshod o dstace s set as.. The resuts showed that uder very subte attacs the method coud st detect them eve they exosed very smar behavors to the orma oes. The resuts aso showed the detecto accuracy treds whe attac rate creased. It s cear that creasg the attac rate w greaty earge the ga betwee the dstace uder orma oeratos ( gure 2) ad that uder aborma oeratos ( gure 3) Tme (Secods) (a) dec-t- IEEE Commucatos Socety /4/$2. (c) 24 IEEE

4 Dstace betwee Covarace Matrx ad Mea Matrx Dstace betwee Covarace Matrx ad Mea Matrx Dstace betwee Covarace Matrx ad Mea Matrx Tme (Secods) a) dec-t Tme (Secods).5 (c) dec-t Tme (Secods).5 (e) dec-t Dstace betwee Covarace Matrx ad Mea Matrx Dstace betwee Covarace Matrx ad Mea Matrx Dstace betwee Covarace Matrx ad Mea Matrx Tme (Secods) (b) dec-t Tme (Secods) (d) dec-t Tme (Secods) () dec-t-2 Fgure 3 Sestvty o Covarace Matrx Dstace Method uder Deret Attac Rates. (a)& (b) (c) & (d) ad (e) & () show the attac rates o 35 8 ad 5 acets er secod resectvey. IV. METHOD EFFECTIVENESS ANALYSIS The eectveess o the roosed method s show by the agorthm s comexty aayss. Assume the tme terva T vectors are observed. For each eature we obta vaues. For 2 exame we get = (... ) ad 2 = (... ). The the covarace coecet γ ( ) o ad coud be rereseted as: COV ( ) γ ( ) = (5) D( ) D( ) where COV ( ) = E( ) E( ) E( ) 2 2 D( ) = E( ) ( E( )) m= m m m Sce {} we have 2 ( ) = {}. So the cacuato o γ ( ) coud be smed as: COV ( ) m PQ γ ( ) = = 2 2 (6) D( ) D( ) ( P P )( Q Q ) where P = E( ) = ~ ( ) O = Q = E = O ( ) ~ = ( ) Ad m s the occurrece umber o = = gotte by comarso oeratos. The vaue o each etry the covarace matrx coud be cacuated smy by the summato ad comarso oeratos. The comexty o the method s thereore ear whch maes the o-e detecto ractca V. CONCLUSIONS AND DISCUSSIONS Ths aer dscusses the eects o mutvarate correato aayss o the detecto o DDoS attacs. I terms o correato the orma atters w be deret rom the aborma atters. I ths sese detectg the correato chages amog deret eatures coud determe the occurrece o the aomaes. A two varabes covarace mode s reseted ths aer as a ossbe aroach to detectg the DDoS attacs. Oe coud exore the three or more varabes correato mode uture research. Comared wth exstg statstca methods used DDoS detecto [4 5 ad 6] the covarace aayss method roosed ths aer oers the advatage o deedece rom acet dstrbuto assumto. IEEE Commucatos Socety /4/$2. (c) 24 IEEE

5 I ths aer a ags the cotro ed o the TCP header are used as eatures the covarace aayss mode. The smuato resuts showed that ths method s hghy accurate detectg oodg attacs DDoS. Ths method coud aso eectvey deretate betwee orma ad attac trac. What s more t coud detect attacs o very subte testy exosg ear-to-orma behavors. The resuts o hgh detecto accuracy the exermets ad rea-tme eectveess aayss revea some macts o the mutvarate correato aayss o the detecto o the DDoS attacs. However our reset method has three maor mtatos. Frst there s o guaratee that the 6 ags are vad or sucet eatures used the covarace aayss mode or DDoS detecto. Secod o theoretca ustcato s rovded or the hgh detecto rate as demostrated the exermets. Thrd how to seect the arorate observed tme terva s st a oe robem. REFERENCES [] Emergecy Resose Team. Resut o the Dstrbuted-Systems Iruder Toos Worsho. htt:// November 999. [2] J. Jug B. Krshamurthy M. Rabovch. Fash Crowds ad Dea o Servce Attacs: Characterzato ad Imcatos or CDNs ad Web Stes. The Eeveth Iteratoa Word Wde Web Coerece Hoouu Hawa May 22. [3] L. Feste D. Schaceberg. DDoS Toerat Networ. Proceedgs o the DARPA Iormato Survvabty Coerece ad Exosto(DISCEX 3) Ar 23. [4] L. Feste D. Schaceberg. Statstca Aroaches to DDoS Attac Detecto ad Resose. Proceedgs o the DARPA Iormato Survvabty Coerece ad Exosto(DISCEX 3) Ar 23. [5] C. Maoouos S. Paavassou. Networ Itruso ad Faut Detecto: A Statstca Aomay Aroach. IEEE Commucatos Magaze October 22. [6] R. B. Baze H. Km B. Rozovs A. Tartaovsy. A Nove Aroach to Detecto o Dea-o-Servce Attacs Va Adatve Sequeta ad Batch-Sequeta Chage-Pot Detecto Methods. Worsho o Statstca ad Mache Learg Techques Comuter Itruso Detecto Jue 22. [7] C. J H. Wag K. G. Sh. Ho-Cout Fterg: A Eectve Deese Agast Sooed Trac. ACM Coerece o Comuter ad Commucatos Securty (CCS 23) October 23. [8] Y. Xog S. Lu P. Su. O the Deese o the Dstrbuted Dea o Servce Attacs: A O-O Feedbac Cotro Aroach. IEEE Trasactos o System Ma ad Cyberetcs---Part A: System ad Humas Juy 2. [9] J. Kog M. Mrza J. Shu C. Yoedhaa M. Gera S. Lu. Radom Fow Networ Modeg ad Smuatos or DDoS Attac Mtgato. IEEE 23 Iteratoa Coerece o Commucatos May 23. [] H. Wag D. Zhag K. G. Sh. Detectg Foodg Attacs. The Twety-Frst Aua Jot Coerece o IEEE Comuter ad Commucatos Socetes INFOCOM May 22. [] S. Muamaa A. H. Sug. Feature Rag ad Seecto or Itruso Detecto usg Suort Vector Maches. Presetatos Worsho o Statstca ad Mache Learg Techques Comuter Itruso Detecto Jue 22. [2] KDD Cu 999 Data or Itruso Detecto. htt://dd.cs.uc.edu/databases/ddcu99/ddcu.ames. UCI Kowedge Dscovery Databases Archve. [3] B. A. Forouza. TCP/IP Protoco Sute Secod Edto. McGraw H 23. [4] P. Porra A. Vades. Lve Trac Aayss o TCP/IP gateways. I the roceedg o ISOC sym. o Networ ad Dstrbuted System Securty(NDSS 98) March 998. [5] T. Peg C.Lece L.Ramamohaarao. Protecto rom Dstrbuted Dea o Servce Attacs Usg Hstory-based IP Fterg. IEEE 23 Iteratoa Coerece o Commucatos May 23. [6] W. W. Y. Ng R. K.C. Chag D.S. Yeug Dmesoaty Reducto or Dea o Servce Detecto Probems Usg RBFNN Outut Sestvty to aear Proceedgs o Iteratoa Coerece o Mache Learg ad Cyberetcs Xa Cha November 23 APPENDIX I equato (2) Secto II the detos o varabe ad varabe µ are as oows: µ = E( ) = = ( )( ) = µ µ = where s the umber o eatures. s the umber o observatos durg T ad s the umber o tme tervas. I Secto IV equato (5) ca be reduced to equato (6). Sce {} we have 2 ( ) = {} E E O 2 2 ( ) = ( ) = = ( )~ ( ) = = D E E E E O ( ) = ( ) ( ( )) = ( ) ( ( )) ~ ( ) Ceary D( )~ O( ) m E( ) = ~ ( ) = O = Here m s the occurrece umber o = =. The vaue o the varabe m coud be obtaed by sme comarso oeratos. No cacuatos are eeded whe or s equa to. Oy whe the two varabes are equa to m w be creased by. IEEE Commucatos Socety /4/$2. (c) 24 IEEE

An SVR-Based Data Farming Technique for Web Application

An SVR-Based Data Farming Technique for Web Application A SVR-Based Data Farmg Techque for Web Appcato Ja L 1 ad Mjg Peg 2 1 Schoo of Ecoomcs ad Maagemet, Behag Uversty 100083 Bejg, P.R. Cha Ja@wyu.c 2 Isttute of Systems Scece ad Techoogy, Wuy Uversty, Jagme

More information

CSSE463: Image Recognition Day 27

CSSE463: Image Recognition Day 27 CSSE463: Image Recogto Da 27 Ths week Toda: Alcatos of PCA Suda ght: roject las ad relm work due Questos? Prcal Comoets Aalss weght grth c ( )( ) ( )( ( )( ) ) heght sze Gve a set of samles, fd the drecto(s)

More information

On Application-level Load Balancing in FastReplica

On Application-level Load Balancing in FastReplica O Appcato-eve Load Baacg FastRepca Jagwo Lee, Gustavo de Vecaa Abstract I the paper, we cosder the probem o dstrbutg arge-sze cotet to a xed set o odes. I cotrast wth the most exstg ed-system soutos to

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

STOCK INVESTMENT MANAGEMENT UNDER UNCERTAINTY. Madalina Ecaterina ANDREICA 1 Marin ANDREICA 2

STOCK INVESTMENT MANAGEMENT UNDER UNCERTAINTY. Madalina Ecaterina ANDREICA 1 Marin ANDREICA 2 "AROACHES IN ORGANISATIONA MANAGEMENT" 15-16 Noveber 01, BCHAREST, ROMANIA STOCK INVESTMENT MANAGEMENT NDER NCERTAINTY Madaa Ecatera ANDREICA 1 Mar ANDREICA ABSTRACT Ths paper presets a stock vestet aageet

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Lecture 7. Norms and Condition Numbers

Lecture 7. Norms and Condition Numbers Lecture 7 Norms ad Codto Numbers To dscuss the errors umerca probems vovg vectors, t s usefu to empo orms. Vector Norm O a vector space V, a orm s a fucto from V to the set of o-egatve reas that obes three

More information

Web Services Wind Tunnel: On Performance Testing Large-scale Stateful Web Services

Web Services Wind Tunnel: On Performance Testing Large-scale Stateful Web Services Web Servces Wd Tuel: O Performace Testg Large-scale Stateful Web Servces Marcelo De Barros, Jg Shau, Che Shag, Keto Gdewall, Hu Sh, Joe Forsma Mcrosoft Cororato {marcelod,shau,cshag,ketog,hush,osehfo}@mcrosoft.com

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Models of migration. Frans Willekens. Colorado Conference on the Estimation of Migration 24 26 September 2004

Models of migration. Frans Willekens. Colorado Conference on the Estimation of Migration 24 26 September 2004 Models of mgrato Fras Wllekes Colorado Coferece o the Estmato of Mgrato 4 6 Setember 004 Itroducto Mgrato : chage of resdece (relocato Mgrato s stuated tme ad sace Cocetual ssues Sace: admstratve boudares

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

MDM 4U PRACTICE EXAMINATION

MDM 4U PRACTICE EXAMINATION MDM 4U RCTICE EXMINTION Ths s a ractce eam. It does ot cover all the materal ths course ad should ot be the oly revew that you do rearato for your fal eam. Your eam may cota questos that do ot aear o ths

More information

Application of GA with SVM for Stock Price Prediction in Financial Market

Application of GA with SVM for Stock Price Prediction in Financial Market Iteratoa Joura of Scece ad Research (IJSR) ISSN (Oe): 39-7064 Impact Factor (0): 3.358 Appcato of GA wth SVM for Stock Prce Predcto Faca Market Om Prakash Jea, Dr. Sudarsa Padhy Departmet of Computer Scece

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Based on PSO cloud computing server points location searching

Based on PSO cloud computing server points location searching Iteratoa Worshop o Coud Coput ad Iforato Securty (CCIS 13) Based o PSO coud coput server pots ocato search Che Hua-sha Iforato Techooy Ceter Shaha Iteratoa Studes Uversty Shaha, cha, 1391641563 E-a: huasha@shsu.edu.c

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT

More information

Automated Alignment and Extraction of Bilingual Ontology for Cross-Language Domain-Specific Applications

Automated Alignment and Extraction of Bilingual Ontology for Cross-Language Domain-Specific Applications Automated Agmet ad Extracto of gua Otoogy for Cross-Laguage Doma-Specfc Appcatos Ju-Feg Yeh, Chug-Hse Wu, Mg-Ju Che ad Lag-Chh Yu Departmet of Computer Scece ad Iformato Egeerg Natoa Cheg Kug Uversty,

More information

Fuzzy Decision Tree for Data Mining of Time Series Stock Market Databases

Fuzzy Decision Tree for Data Mining of Time Series Stock Market Databases Fuzzy Deso Tree for Data Mg of Tme Seres Sto Maret Databases Mod Noor Md Sa, Rasd Hafeez Koar Fauty of Comuter See ad Iformato System Uversty Teoogy of Maaysa, 83 Suda, Joor, Maaysa Te: 67)-55349, Fa:

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

Key players and activities across the ERP life cycle: A temporal perspective

Key players and activities across the ERP life cycle: A temporal perspective 126 Revsta Iformatca Ecoomcă, r. 4 (44)/2007 Key layers ad actvtes across the ERP lfe cycle: A temoral ersectve Iulaa SCORŢA, Bucharest, Romaa Eterrse Resource Plag (ERP) systems are eterrse wde systems

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

STOCHASTIC approximation algorithms have several

STOCHASTIC approximation algorithms have several IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Evaluating Consulting Firms Using a Centroid Ranking Approach based Fuzzy MCDM Method

Evaluating Consulting Firms Using a Centroid Ranking Approach based Fuzzy MCDM Method EUSFAT-FA y Ax-es-Bas Frace Evaat Cost Frms Us a Cetro a Approach base Fzzy MCDM Metho Ta-Ch Ch Departmet o Maaemet a ormato Techooy Sother Tawa Uversty Tawa.O.C. E-ma: tcch@ma.stt.e.tw Abstract The prpose

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

editors & authors STUDIES AND Comparison of forecasts Time series values Period Observed Data Forecast(single) Publishing Zip

editors & authors STUDIES AND Comparison of forecasts Time series values Period Observed Data Forecast(single) Publishing Zip Rajesh gh & Floret maradache edtors & authors TUDIE I AMPLIG TECHIQUE AD TIME ERIE AALYI Comarso of forecasts Tme seres values 8 6 4 3 4 5 6 7 8 9 3 4 5 6 7 8 9 Perod Observed Data Forecast(sgle) Forecast(double)

More information

Load and Resistance Factor Design (LRFD)

Load and Resistance Factor Design (LRFD) 53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

A Bayesian Networks in Intrusion Detection Systems

A Bayesian Networks in Intrusion Detection Systems Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

Multi-way classification

Multi-way classification CS 75 Mache Learg Lecture Mult-a classfcato Mlos Hauskrecht mlos@cs.tt.edu 59 Seott Suare CS 75 Mache Learg Admstratve aoucemets Homeork 6 due o Wedesda Pla for the ucomg moth: Homeork 7 due o Wedesda

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia.

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia. Math 40 Lecture 24 Autes Facal Mathematcs How ready do you feel for the quz o Frday: A) Brg t o B) I wll be by Frday C) I eed aother week D) I eed aother moth Aa NoraEvas 403 Kerchof AaNEvas@vrga.edu http://people.vrga.edu/~as5k/

More information

DHA: Distributed Decisions on the Switch Migration Toward a Scalable SDN Control Plane

DHA: Distributed Decisions on the Switch Migration Toward a Scalable SDN Control Plane DHA: Dstrbuted Decsos o the wtch Mgrato Toward a calable DN Cotrol Plae Guozhe Cheg, Hogchag Che, Zhmg Wag, huqao Che Natoal Dgtal wtchg ystem Egeerg & Techologcal R&D Ceter Zhegzhou, Cha [Emal: guozhecheg@hotmalcom,

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

A Key-Policy Attribute-Based Broadcast Encryption

A Key-Policy Attribute-Based Broadcast Encryption 444 The Iteratoa rab Joura of Iformato Techooy Vo. 0 o. 5 September 0 Key-Pocy ttrbute-base Broacast Ecrypto J Su Yupu Hu a Leyou ha Departmet of ppcato Mathematcs X a Uversty of Techooy Cha Key Lab of

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Analysis of Multi-product Break-even with Uncertain Information*

Analysis of Multi-product Break-even with Uncertain Information* Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

FINANCIAL MATHEMATICS 12 MARCH 2014

FINANCIAL MATHEMATICS 12 MARCH 2014 FINNCIL MTHEMTICS 12 MRCH 2014 I ths lesso we: Lesso Descrpto Make use of logarthms to calculate the value of, the tme perod, the equato P1 or P1. Solve problems volvg preset value ad future value autes.

More information

How To Value An Annuity

How To Value An Annuity Future Value of a Auty After payg all your blls, you have $200 left each payday (at the ed of each moth) that you wll put to savgs order to save up a dow paymet for a house. If you vest ths moey at 5%

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy

A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy A Game Theory Based Approach to the Geerato of Optmal DDo edg trategy Lag Huag, Degguo Feg, Yfeg La, Ygju Zhag, ad Yulg Lu Trusted Computg ad Iformato Assurace Laboratory, Isttute of oftware, The Chese

More information

Mathematics of Finance

Mathematics of Finance CATE Mathematcs of ace.. TODUCTO ths chapter we wll dscuss mathematcal methods ad formulae whch are helpful busess ad persoal face. Oe of the fudametal cocepts the mathematcs of face s the tme value of

More information

Innovation and Production in the Global Economy Online Appendix

Innovation and Production in the Global Economy Online Appendix Iovato ad Producto te Goba Ecoomy Oe Appedx Costas Aroas Prceto, Yae ad NBER Nataa Ramodo Arzoa State Adrés Rodríguez-Care UC Bereey ad NBER Stepe Yeape Pe State ad NBER December 204 Abstract I ts oe Appedx

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Reinsurance and the distribution of term insurance claims

Reinsurance and the distribution of term insurance claims Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace

More information

Regression Analysis. 1. Introduction

Regression Analysis. 1. Introduction . Itroducto Regresso aalyss s a statstcal methodology that utlzes the relato betwee two or more quattatve varables so that oe varable ca be predcted from the other, or others. Ths methodology s wdely used

More information

Geometric Motion Planning and Formation Optimization for a Fleet of Nonholonomic Wheeled Mobile Robots

Geometric Motion Planning and Formation Optimization for a Fleet of Nonholonomic Wheeled Mobile Robots Proceedgs of the 4 IEEE Iteratoal Coferece o Robotcs & Automato New Orleas, LA Arl 4 Geometrc oto Plag ad Formato Otmzato for a Fleet of Noholoomc Wheeled oble Robots Rajakumar Bhatt echacal & Aerosace

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

DIGITAL AUDIO WATERMARKING: SURVEY

DIGITAL AUDIO WATERMARKING: SURVEY DIGITAL AUDIO WATERMARKING: SURVEY MIKDAM A. T. ALSALAMI * MARWAN M. AL-AKAIDI ** * Computer Scece Dept. Zara Prvate Uversty / Jorda ** School of Egeerg ad Techology - De Motfort Uversty / UK Abstract:

More information