Efficient Traceback of DoS Attacks using Small Worlds in MANET

Size: px
Start display at page:

Download "Efficient Traceback of DoS Attacks using Small Worlds in MANET"

Transcription

1 Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, Abstract Moble Ad hoc NETwork (MANET) s a creasgly promsg area of research wth may practcal applcatos. However, MANET s vulerable to a umber of attacks cludg Dealof-Servce (DoS) attacks due to ts autoomous ature. DoS attacker traceback s challegg ssue MANET sce each ode works as a autoomous termal, actg as both host ad router. Moblty of odes MANET makes problem eve worse sce t s hard to trace back attacker whe they are movg aroud frequetly chagg etwork topology. We propose to use a effcet o-the-fly search techque to trace back DoS attackers. Our scheme s based o small world cocept ad effectvely exteds Cotacts [3] for MANET utlzg locato formato. I addto, to deal wth address spoofg problems DoS attacks, we use Traffc Patters Matchg (TPM) [5] ad propose to use Traffc Volume Matchg (TVM) as matchg-depth to detfy a attacker. We also processg etwork processg ad drectoal expaded rg search to reduce commucato overhead attacker traceback. We show that our scheme successfully trace back attacker usg both TPM ad TVM. I addto, we show our scheme curs very low commucato overhead. INTRODUCTION Deal-of-servce (DoS) attacks cosume the resources of a remote host or etwork, thereby deyg or degradg servce to legtmate users. Such attacks are amog the most trcate securty problems to address because they are easy to mplemet, dffcult to prevet, ad very dffcult to trace. The most commo DoS clude attacks smlar SYN Flood, Smurf, UDP Flood. Determg the source geeratg attack traffc s especally dffcult whe usg stateless routg protocols (as the Iteret or geographc routg). Attackers routely dsguse ther locato usg correct, or spoofed, source address. Ahmed Helmy was supported by NSF Career, Itel ad Pratt & Whtey PWICE Isttute There are may IP traceback scheme proposed for the Iteret such as lk testg, packet markg, loggg, ICMP traceback, etc [],[5],[6],[7]. Such traceback schemes are ot drectly applcable to Moble Ad Hoc NETwork (MANET) due to the followg reasos. I MANET, there s o fxed frastructure. Each ode works as a autoomous termal, actg as both host ad a router. Each ode moves ad out, frequetly chagg etwork topology. Network badwdth ad battery power are lmted. To perform effcet DoS attacker traceback uder such a harsh evromet MANET, we propose to use a effcet o-the-fly search techque. For that, we propose to use the small world cocept. Establshg a small world reduces the degrees of separato betwee the attacked ode (vctm) ad the attacker ad provdes a effcet traceback mechasm. Helmy et,.al [3] establshed the applcablty of small world graphs to wreless etworks. I ths paper, we effectvely exted Cotacts [3] for MANET utlzg locato formato. By usg locato formato, we ca optmally select Cotacts reducg coverage overlap ad costruct a small world to detfy ad trace attackers wth reduced commucato overhead. I addto, to deal wth address spoofg problems, we use traffc patters [5] to detfy a attacker. We also propose traffc volume matchg to complemet the traffc patter matchg. We call ths matchg-depth. A traffc patter s defed by the sequece of umber of packet a tme slot at each ode. We also use -etwork processg ad drectoal expaded rg search to reduce commucato overhead. Our paper s orgazed as follows. I secto, we provde related work o DoS attack traceback the Iteret. I secto 3, we troduce our Cotact-based DoS traceback archtecture. We show smulato result secto 4. I secto 5, we coclude our paper preset future works /4/$. 4 IEEE 3979 Authorzed lcesed use lmted to: Uversty of Florda. Dowloaded o November 8, 8 at 3: from IEEE Xplore. Restrctos apply.

2 RELATED WORKS There are two exstg approaches to the problem of determg the route of a packet flow the Iteret: oe ca audt [5],[6],[7] the flow as t traverses the etwork, or oe ca attempt to fer the route based upo ts mpact o the state of the etwork []. Route ferece was poeered by Burch ad Cheswck who cosdered the restrcted problem of large packet flows ad proposed a ovel techque that systematcally floods caddate etwork lks. By watchg for varatos the receved packet flow due to the restrcted lk badwdth, they are able to fer the flow s route. Ths requres cosderable kowledge of etwork topology ad the ablty to geerate large packet floods o arbtrary etwork lk. Oe ca categorze audtg techques to two classes accordg to the way whch they balace resource requremet across the etwork compoets. Some techques requre resources at both the ed host ad the routg frastructure; others requre resources oly wth the etwork tself. Of those that requre oly frastructure support, some add packet processg to the forwardg ege of the routers whle others offload the computato to the cotrol path of the routers. Both approaches are ot feasble ad effcet MANET sce they cosume sgfcat badwdth/power ad each ode moves aroud frequet chagg etwork topology. 3 CONTACT-BASED TRACEBACK ARCHITECUTRE 3. Desg Requremets The desg requremets for effcet traceback MANET clude: (I) (II) (III) (IV) Robustess to moblty: The mechasm should be robust to hadle frequet moblty. That s, we should be able to trace a attacker despte of frequet termedate ode moblty. Robustess to address spoofg: It s a commo attackg techque to spoof addresses. We should be able to trace a attacker spte of address spoofg. Scalablty: Applcatos of large-scale ad hoc etworks volve mltary ad sesor etwork evromets that may clude thousads of odes. Hece traceback mechasm should be scalable term of commucato overhead wth crease etwork sze. Effcecy: Ad hoc etworks clude portable devces wth lmted battery power. (V) Traceback mechasm should be powereffcet. Decetralzed operato: For the etwork to be rapdly deployable, t should ot requre ay cetralzed cotrol. 3. Archtecture ad Deftos Each ode matas formato oly about ts Vcty usg very lmted broadcasts wth square from the ode. Ulke [3], a ode does ot eed to mata formato about a set of odes, called Cotacts, beyod the vcty. I our scheme, Cotact s selected usg locato formato, whch further reduces commucato overhead. Ideal locato of Cotacts s selected frst. The, odes closest to the deal Cotacts are selected as Cotacts. For stace, fg., there are 8 deal locatos of Cotacts ad odes whch are the closest to the each deal Cotact locatos each rectagle are selected as actual Cotacts. Cotacts of a ode are called level- Cotacts. Cotacts of the Cotacts are called level- Cotacts, ad so o. Durg a search for the attack traffc patter the wreless etwork a ode queres ts Cotacts, ad ther Cotacts, so o, up to level-d Cotacts. D s called the depth-of-search. Whe each Cotact performs lmted broadcast, they sed queres to eghbor odes specfyg ts rectagle rego. Whe, eghbor odes receve the query, they check whether they are the square rego or they have already receved the same query from other odes. If they are outsde the square rego or they have already receved the same query, they dscard the query. Otherwse, they broadcast the query to ther eghbors. The attack Traffc patter s defed by the varato of packet umber over tme. For stace, whe the umber of data s m for a tme wdow, traffc patter s expressed as A (A,A,A 3,,A m ). I DoS attack, large amout of packets s geerated towards the vctm. For stace, -5 pps of SYN packets are geerated []. However, ormal case, oly oe SYN packet s geerated per coecto. Accordgly, a large amout of SYN packets ca be suspected as attack. The quered odes are asked to perform a TPM to determe the correlato coeffcet betwee two traffc patter (A,B). I case correlato coeffcet of (A,B) s hgh (greater tha.7), the traffc A s sad to match traffc B (fg.). For stace, whe traffc patter observed at ode s gve as L (,,, N ), ad traffc patter observed at ode s L (m,m,,m N ), correlato coeffcet s obtaed as follows /4/$. 4 IEEE 398 Authorzed lcesed use lmted to: Uversty of Florda. Dowloaded o November 8, 8 at 3: from IEEE Xplore. Restrctos apply.

3 r( A, B) S S where, S S A)( L A) B) ( k) B) (Eq.) (Eq.3), ad A & B s the average of data, L ad L. Cotact3(X3,Y3) Cotact4(X4,Y4) Cotact5(X5,Y5) [Fgure.] Locato-based Cotact selecto (Eq.) We propose to use TVM to complemet the traffc patter matchg. We defe that traffc volume s matchg betwee two pots, whe L ad L shows smlar traffc volume sze. Mathematcally, we use the followg equato (least-squares method) to kow the matchg level. a N k N k Cotact(X,Y) (Eq.4) Whe, the a s close to, the traffc volume s matchg. Traffc volume matchg s ecessary for correct traceback MANET sce other ode ca show hgh correlato coeffcet uder heavy backgroud traffc. By checkg TVM level as well as TPM level (we call ths matchg--depth), we ca reduce false postves our trace back. Note that mere traffc volume matchg s also ot eough sce traffc volume ca fluctuate showg dfferet traffc volume each ode depedg o backgroud traffc. Cotact(X,Y) Cotact8(X8,Y8) Cotact7(X7,Y7) Cotact6(X6,Y6) 3.3 Mechasm Descrpto Each ode motors the traffc patter/volume for a certa tme wdow. The tme vares based o the attack type. A ode keeps oly the varace of packet umber over tme, whch reduces the processg load. attacker vctm [Fgure.] Traffc patter based traceback We descrbe the traceback scheme as follows: () Whe a vctm ode, s, detects attack such as SYN floodg applcato level, t seds query to odes wth vcty ad level- Cotact specfyg depth of search (D) whch s large eough to detect a attacker. We use greedy forwardg to sed a query to Cotact. I case of local maxmum, permeter mode [3] s used to take a detour. () I case a traffc patter/volume matchg report s observed by vctm ad other odes, frst step of trace s competed. For stace, we sed query to 3 level- Cotacts aroud the vctm. (Fg.3.) The, oe level- Cotact reports that some of ts vcty odes observed matchg traffc patter/volume. Level- Level- Attack route Route of X [Fgure.3] Queres to level- Cotacts (3) Next, oly the Cotacts that observe matchg traffc patters ther vcty sed ext level query to level- Cotacts wth the path from vctm after reducg D by. Other Cotacts stop forwardg the query (I-etwork processg). I dog so, we ca perform drectoal expaded rg search. (4) Whe there are o more Cotact reports, last Cotact report to the vctm the complete attack route (Fg.4.). Our scheme s based o maorty ode report. That s, eve f some odes move out from the attack route, we ca stll fd a attack route. Respose /4/$. 4 IEEE 398 Authorzed lcesed use lmted to: Uversty of Florda. Dowloaded o November 8, 8 at 3: from IEEE Xplore. Restrctos apply.

4 after tracg back the attacker may clude flterg, rate lmtg, re-orgazg to preclude the compromsed ode, or blacklstg. Attack route um ber of packets attacker traffc vctm traffc tme(s) [Fgure.5] Sample traffc patter comparso betwee attacker ad vctm [Fgure.4] Attack route 4 SIMULATION RESULTS We performed smulato to vestgate the desg space parameters ad evaluate the performace of our protocol. We put odes m x m areas ad trasmsso rage s take as 5m. We used greedy forwardg as a routg protocol. Note that our scheme s geerally applcable to other adhoc routg protocols (e.g., DSR, AODV). As attack traffc, we used SYN packets ad pps traffc was geerated from attacker to vctm. Geographc locatos of all odes are radomly chose sde the rego. Backgroud traffc s geerated radomly amog [,] pps. Sce backgroud traffc ca mpact o the correct traceback of attacker, we vared the umber of seders that geerate SYN packet a gve tme wdow ad evaluated the mpact of backgroud traffc o correct traceback. Fgure 5 shows the traffc patter take at the attacker ad vctm ode. Radom umber of backgroud SYN traffc s geerated by radomly chose 5% of total odes (.e, 5 odes) at every secod. Traffc sample s take every secod. At secod, we ca observe sudde SYN packet crease. We have sampled the traffc patter whe t goes up more tha packets (Th up ) per secod. Whe, the traffc goes dow below (Th up /), we stopped samplg traffc patter. I fgure 4, we ca observe very smlar traffc patter betwee vctm ode ad attacker ode. Fgure 6 shows successful traceback rate wth small backgroud traffc (e.g., up to 4% of odes geerates backgroud traffc). It shows % traceback success rate wth oly TPM method. The correlato coeffcet of termedate odes located betwee attacker ad vctm ode shows hgh value over.9 (fg.7.). I ths case, backgroud traffc volume s very low, so we could obta hgh correlato amog vctm ode ad termedate ode. I addto, o other ode vctes showed hgh correlato coeffcet (greater tha.7) except the odes whch attacker s packet have traversed. [Fgure.6] Success rate wth low backgroud traffc [Fgure.7] Correlato coeffcet wth low backgroud traffc /4/$. 4 IEEE 398 Authorzed lcesed use lmted to: Uversty of Florda. Dowloaded o November 8, 8 at 3: from IEEE Xplore. Restrctos apply.

5 Fgure 8 shows traceback success rate whe varyg rather hgh volume of backgroud traffc. I ths case, traffc volume matchg becomes ecessary sce other odes show hgh correlato due to heavy backgroud traffc. I case of usg oly TPM method, traceback success rate goes dow as backgroud traffc crease. Traceback success rate Seder umber [Fgure.8] Success rate wth hgh backgroud traffc It s because of clusterg effect as show fgure 9. Both clusterg show hgh correlato coeffcet. traffc patter at termedate odes traffc patter at vctm [Fgure.9] Traffc volume correlato We ca separate the clusterg by traffc volume matchg usg equato (4). We set.5<r<.5 (Proper value of low boud ad hgh boud depeds o backgroud traffc volume). Note that ths s much computatoally lghter compared to clusterg algorthms such as K-meas method []. Our smulato showed that by usg both TPM ad TVM, traceback success rate becomes %. We compared our proposed scheme to floodg terms of query overhead. Fgure shows query traffc geerated. m x m area, odes, ad 8 meter trasmsso rage was used the smulato. Overhead cludes trasmsso as well as recepto packet umber. As we ca expect, our query scheme curs much less overhead sce our scheme performs drectoal expaded rg search. As etwork sze becomes bgger, the dfferece becomes sgfcat. Overhead(T x+rx p kts) Network Sze(odes) Floodg Drectoal expaded rg [Fgure.] Overhead comparso 5 CONCLUSIONS AND FUTURE WORK Our Cotact-based DoS attacker traceback mechasm MANET has the followg advatages: (I) By usg Cotacts/drectoal expaded-rgsearch/-etwork processg, we ca effectvely reduce commucato overhead to trace a attacker. (II) Usg the traffc patter eables us to fd attack routes effcetly wth reduced processg load eve f the ode address s spoofed. (III) Eve uder moblty of termedate odes, we ca trace back by utlzg less moble odes alog the attack route. I the future, we wll perform smulato wth dfferet moblty model to verfy the effcecy of our scheme uder dyamc topology chage. [REFERENCES] [] H. Burch, et al, Tracg Aoymous Packets to Ther Approxmate Source, Proc. USENIX LISA Cof., pp.39-37, Dec. [] V. Guralk ad G. Karyps, Workshop o Data Mg Boformatcs () 73-8 [3] A.Helmy, et al, A Cotact-based Archtecture for Resource Dscovery Ad Hoc Networks, ACM Baltzer MONET Joural, 4 [4] B. Karp, T. Kug, GPSR: Greedy Permeter Stateless Routg for Wreless Networks ACM Mobcom, Aug. [5] G.Masfeld, et al., Towards trappg wly truders the large, Computer Networks, Vol.34, pp.65-67, [6] Alex C. Soere, et al, Hash-Based IP Traceback, ACM SIGCOMM, [7] Stefa Savage, et al., Practcal Network Support for IP Traceback, ACM SIGCOMM, /4/$. 4 IEEE 3983 Authorzed lcesed use lmted to: Uversty of Florda. Dowloaded o November 8, 8 at 3: from IEEE Xplore. Restrctos apply.

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments 1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel

CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel CHAPTER 3 Smple Lear Regresso USING STATISTICS @ Suflowers Apparel 3 TYPES OF REGRESSION MODELS 3 DETERMINING THE SIMPLE LINEAR REGRESSION EQUATION The Least-Squares Method Vsual Exploratos: Explorg Smple

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

A Real-time Visual Tracking System in the Robot Soccer Domain

A Real-time Visual Tracking System in the Robot Soccer Domain Proceedgs of EUEL obotcs-, Salford, Eglad, th - th Aprl A eal-tme Vsual Trackg System the obot Soccer Doma Bo L, Edward Smth, Huosheg Hu, Lbor Spacek Departmet of Computer Scece, Uversty of Essex, Wvehoe

More information

The Popularity Parameter in Unstructured P2P File Sharing Networks

The Popularity Parameter in Unstructured P2P File Sharing Networks The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Maximization of Data Gathering in Clustered Wireless Sensor Networks

Maximization of Data Gathering in Clustered Wireless Sensor Networks Maxmzato of Data Gatherg Clustere Wreless Sesor Networks Taq Wag Stuet Member I We Hezelma Seor Member I a Alreza Seye Member I Abstract I ths paper we vestgate the maxmzato of the amout of gathere ata

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Load Balancing Control for Parallel Systems

Load Balancing Control for Parallel Systems Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal

More information

DIGITAL AUDIO WATERMARKING: SURVEY

DIGITAL AUDIO WATERMARKING: SURVEY DIGITAL AUDIO WATERMARKING: SURVEY MIKDAM A. T. ALSALAMI * MARWAN M. AL-AKAIDI ** * Computer Scece Dept. Zara Prvate Uversty / Jorda ** School of Egeerg ad Techology - De Motfort Uversty / UK Abstract:

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability Proceedgs of the Iteratoal MultCoferece of Egeers ad Computer Scetsts 009 Vol I The Relable Itegrated Decso for Stock Prce by Multlayer Itegrato Tme-seres of Coverage Reasoablty Chu-M Hug ad Chu-Wu Yeh*

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

A Single Machine Scheduling with Periodic Maintenance

A Single Machine Scheduling with Periodic Maintenance A Sgle Mache Schedulg wth Perodc Mateace Fracsco Ágel-Bello Ada Álvarez 2 Joaquí Pacheco 3 Irs Martíez Ceter for Qualty ad Maufacturg, Tecológco de Moterrey, Eugeo Garza Sada 250, 64849 Moterrey, NL, Meco

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

A Smart Machine Vision System for PCB Inspection

A Smart Machine Vision System for PCB Inspection A Smart Mache Vso System for PCB Ispecto Te Q Che, JaX Zhag, YouNg Zhou ad Y Lu Murphey Please address all correspodece to Departmet of Electrcal ad Computer Egeerg Uversty of Mchga - Dearbor, Dearbor,

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Reinsurance and the distribution of term insurance claims

Reinsurance and the distribution of term insurance claims Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Load and Resistance Factor Design (LRFD)

Load and Resistance Factor Design (LRFD) 53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Real-Time Scheduling Models: an Experimental Approach

Real-Time Scheduling Models: an Experimental Approach Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

A system to extract social networks based on the processing of information obtained from Internet

A system to extract social networks based on the processing of information obtained from Internet A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information