Application of Grey Relational Analysis in Computer Communication
|
|
- Bertram Sherman
- 8 years ago
- Views:
Transcription
1 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author Iformato Egeerg Departmet, Luzhou Ralway Vocatoal Techcal College, LuZhou, , Cha, E-mal: @139.com Abstract Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. Keywords: Multple Attrbute Decso Makg (MADM), Computer Commucato Network, Grey Relatoal Aalyss (GRA), Relatoal Degree 1. Itroducto So far, there was ot a ormal ad tegrated rsk assessmet system for computer etwork formato securty, ad also, the opo of sortg rsk assessmet dd t come to a agreemet. Sce absece of rsk assessmet stadard, dfferet rsk assessmet departmet got the dfferet result evaluatg the same system. At the same tme, wth speedg up orgazato formato process ad ehacg the foudato ad teger of etwork formato system, formato securty problem became more ad more mportat. Curret formato securty eeded to stregthe the rsk assessmet quckly. The exsted research areas cluded securty costructo ad developmet for computer etwork system, rule ad method of etwork formato securty rsk assessmet. Wth aalyzg the curret stuato of computer formato system, the key pots ad problems of rsk assessmet could be foud to provde the referece ad bass for etwork securty orgazato. Because may formato system securty rsk assessmet theores were hard to be operated, regularty uo rsk assessmet was desged ad mplemeted to mprove the maeuverablty, acheved qualtatve ad measurable rsk aalyss, at the same tme, aalyzed ad dscussed developmet aspect of etwork formato securty rsk assessmet. Wth the developmet of the Iformato Techology, computer etworks have bee wdely used may felds. But people are axous for the securty of the computer etworks more ad more. Recet years, more tha 60% user etworks have bee broke. The computer etworks have the great rsk. The desre of the etworks for dfferet type of users s dfferet. The etwork egeers usually costruct a computer etwork accordg to ther experece ad the requests of the user. Qualtatve aalyss of the securty for a etwork s ofte used. Wth the rapd developmet of formato techology, the teret has already become the vtal vehcle for formato dssemato globally. However, sce after the advet of the teret, resource sharg ad formato securty have tur to oe par of rrecoclable cotradctos. The more ad the wder teret formato s shared, the more ad the deeper Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos(JDCTA) Volume6,Number22,December 2012 do: /jdcta.vol6.ssue
2 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J formato securty problems are creasgly exposured. Therefore, tradtoal passve protecto s ot adaptable to the curret securty stuato, ad the theory of proactve etwork securty assessmet has bee created accordgly. The favorable etwork securty assessmet ca assst the maagemet staff to comprehesvely ad precsely cotrol the level of securty, ths makes a great mportace to safeguard the teret to ru smoothly[1-10]. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss are the multple attrbute decso makg (MADM) problems.the am of ths paper s to vestgate the MADM problems for evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I order to do so, the rest of the paper s orgazed as follows: ext secto brefly troduce some basc cocepts related to the grey relatoal aalyss (GRA) model. I Secto 3, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I Secto 4 we llustrate our proposed algorthmc method wth a example. The fal secto cocludes. 2. Grey relatoal aalyss Grey relatoal aalyss (GRA) method [11-12] was orgally developed by Deg ad has bee successfully appled solvg a varety of MADM problems [13-21]. The ma procedure of GRA s frstly traslatg the performace of all alteratves to a comparablty sequece. Ths step s called grey relatoal geeratg. Accordg to these sequeces, a deal target sequece s defed. The, the grey relatoal coeffcet betwee all comparablty sequeces ad deal target sequece s calculated. Fally, base o these grey relatoal coeffcets, the grey relatoal degree betwee deal target sequece ad every comparablty sequeces s calculated. If a comparablty sequece traslated from a alteratve has the hghest grey relatoal degree betwee the deal target sequece ad tself, that alteratve wll be the best choce. The procedures of grey relatoal aalyss are show Fg. 1 [11-12]. Fgure 1. Procedure of grey relatoal aalyss 418
3 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 3. Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Wth the cotuous developmet of computer techology ad the wde spread of etwork applcato, etwork securty s becomg a mportat ssue whch techcas face ad may studes relatg to the etwork securty techology are becomg mature. Network securty stuatoal awareess s a techology whch ca realze the etwork securty specto ad motorg. Besdes, t s a hot topc o the formato securty research. It s very sgfcat to carry out ths research, for t ca mprove the emergecy respose ablty of et system, mtgate the harm caused by cyber attacks, dscover the malcous vaso behavor ad mprove the system s couter-attack ablty. I ths secto, we cosder a multple attrbute decso makg problems to evaluate the computer commucato etwork securty based o grey relatoal aalyss. Let A A1, A2,, Am dscrete set of alteratves, ad G G G G be the set of attrbutes,,,, 1 2 s the weghtg vector of the attrbutesgj j1, 2,,, where j 0,1, j1 that A aj s the decso matrx, where j m be a 1, 2,, 1 j. Suppose a s a preferece value, gve by the decso maker for the alteratve A A wth respect to the attrbutegj G. I the followg, we wll exted the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Step 1. Calculate the ormalzed decso matrx. The ormalzed value b j s calculated as If attrbute G j s a beeft crtero: b j aj m aj max a m a j j, 1, 2,, m, j 1, 2,,. (1) If attrbute G j s a cost crtero: b j max aj aj max a m a j j, 1, 2,, m, j 1, 2,,. (2) Step 2. Determe the postve deal soluto ad egatve deal soluto,, 1 max b j B b b,, 1 m b j B b b (3) (4) Step 3. Calculate the grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: The grey relatoal coeffcet of each alteratve from PIS s gve as 419
4 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J j m m b b max max b b b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (5) Smlarly, the grey relatoal coeffcet of each alteratve from NIS s gve as m m b b max max b b j b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (6) where the detfcato coeffcet 0.5. Step 4. Calculatg the degree of grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: jj j1 w, 1,2,, m. (7) jj j1 w, 1,2,, m. (8) The basc prcple of the GRA method s that the chose alteratve should have the largest degree of grey relato from the postve deal soluto ad the smallest degree of grey relato from the egatve deal soluto. Step 5. Calculatg the relatve relatoal degree of each alteratve from PIS usg the followg equato, Step 6. Rak all the alteratves A 1, 2,, m 1, 2,, m. If ay alteratve has the hghest alteratve. Step 7. Ed. 4. Numercal example, 1,2,, m. (9) ad select the best oe(s) accordace wth value, the, t s the most mportat The calculator techque develops quckly ad makes owadays the socal developmet have already caed ot got away from a formato etwork. Because the calculator etwork delvers of volve each realm of face, scece educato, ad mltary...etc. the formato, clude huge ecoomy or atoal terest amog them, so ecessary etwork from each sde of everyoe attack stoes, the etwork attack stoes of the mafestato s also vared, lke vrus fecto, steal the dstortg of data, formato delete to add a etc.. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths secto, we preset a emprcal case study of evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The am s to evaluate the best eterprse from evaluatg the computer commucato etwork securty. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are evaluated. The expert groups must take a decso accordg to the followg sx attrbutes: G1 s the flmsess of the etwork; G2 s the 420
5 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J etwork safety of etwork formato safety; G3 s the famlar etwork attack the method ad couter pla; G4 s the etwork safety costructo; G5 s the etwork safety techology; G6 s the etwork safety strategy. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are to be evaluated by the decso makers uder the above sx attrbutes (whose weghtg vector 0.12,0.20,0.15,0.18,0.21,0.14 T ) usg the 0-10 scale, ad costruct the A a j : decso matrx as follows 5 6 A A A A A A To get the most desrable computer commucato etwork systems, the followg steps are volved: Step 1. Costructg the ormalzed decso matrx as B by usg formula (1) ad (2): Step 2. Determg the PIS ad the NIS G1 G2 G3 G4 G5 G6 A A A A A A B B Step 3. Calculatg the grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS 5 6 j
6 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 5 6 j Step 4. Calculatg the degree of grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS , , , , , , , , Step 5. Calculate the relatve relatoal degree of each computer commucato etwork system from PIS , , , , Step 6. Accordg to the relatve relatoal degree, the rakg order of the fve computer commucato etwork systems s: A5 A1 A2 A4 A3, ad thus the most desrable computer commucato etwork system s A Cocluso Computer techology s developg very rapdly, powerful computers ad Itraet/Iteret are becomg popular all over the world. Iformatolzato ad etworklzato become tedecy of today s ecoomc ad socety s developmet of the world. Iformato techology ad computer etwork have already appled wdely. Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. 6. Refereces [1] ZANG Wehua, GUO Ru, "The Applcato of Neural Network based o Evolutoary Strategy 422
7 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Network Securty Quatfcato Aalyss", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 2, pp , [2] Je Zhag, Ju Tag, Fag Pe, "A method for etwork securty rsk assessmet ad decsomakg based o the cloud model", JCIT: Joural of Covergece Iformato Techology, Vol. 7, No. 6, pp , [3] Ja Wu, "A Approach to Evaluatg the Computer Network Securty wth Ucerta Lgustc Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 5, pp , [4] Lao Hu-fe, "The Research o Network Securty Detecto Based o Improved Geetc Neural Algorthm", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 13, pp , [5] ChuaA Wag, Yaju Wag, Hua Ge, "Itellgece Computg Strategy for Computer Network Securty Itruso Detecto", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 13, pp , [6] Xuchag L, "Model for Evaluatg the Computer Network Securty Ucerta Lgustc Evromet", IJACT, Vol. 4, No. 4, pp , [7] Yupg L, Jgyua Y, Guoqag Wu, "Model for Evaluatg the Computer Network Securty wth Iterval-Valued Itutostc Fuzzy Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 6, pp , [8] Yupg L, Xja Sha, Guoqag Wu, "Comprehesve Evaluato Model for Computer Network Securty wth Lgustc Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 3, No. 9, pp , [9] Yua Jag, Dogmg Jag, "A Approach to Wreless Sesor Network Securty Assessmet wth Fuzzy Number Itutostc Fuzzy Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces,Vol. 3, No. 9, pp , [10] Xagya Tao, Chagyu Ja, Cheg Yag, "Securty Aalyss o Cha Campus Network ad Costructo o Network Securty System", JCIT: Joural of Covergece Iformato Techology, Vol. 6, No. 11, pp , [11] Julog Deg, Itroducto to Grey System, The Joural of Grey System (UK), vol.1, o.1, pp.1-24, [12] Julog Deg, Grey System Theory, Wuha: press of Huazhog Uversty of Scece & Techology, Cha, [13] Desheg Wu, Suppler selecto a fuzzy group decso makg settg: A method usg grey related aalyss ad Dempster-Shafer theory, Expert Systems wth Applcatos, vol.36, o.2, pp , [14] Guwu We, GRA method for multple attrbute decso makg wth complete weght formato tutostc fuzzy settg, Kowledge-Based Systems, Vol.23, No.3, pp , [15] Guwu We, Grey relatoal aalyss model for dyamc hybrd multple attrbute decso makg, Kowledge-based Systems, vol.24, o.5, pp , [16] Guwu We, Grey relatoal aalyss method for 2-tuple lgustc multple attrbute group decso makg wth complete weght formato, Expert Systems wth Applcatos, vol.38. o.5, pp , [17] Yaoguo Dag, Sfeg Lu, B Lu, Study o cdece decso makg model of mult-attrbute terval umber, Joural of Najg Uversty of aeroautcs & astroautcs, vol. 36, o.3, pp , [18] Jju Zhag, Desheg Wu, D. L. Olso, The method of grey related aalyss to multple attrbute decso makg problems wth terval umbers, Mathematcal ad Computer Modellg, vol. 42, o.3, pp , [19] Pede Lu, A ovel method for hybrd multple attrbute decso makg, Kowledge-Based Systems, vol. 22, o.5, pp , [20] D. L. Olso, D. Wu, Smulato of fuzzy multattrbute models for grey relatoshps, Europea Joural of Operatoal Research, vol. 175, o.4, pp , [21] Y. Kuo, T. Yag, G.W. Huag, The use of grey relatoal aalyss solvg multple attrbute decso-makg problems, Computers & Idustral Egeerg, vol. 55, o.1, pp ,
Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationResearch on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment
Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationThe impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationSoftware Reliability Index Reasonable Allocation Based on UML
Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationWeb Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm
JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationResearch on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of
More informationAutomated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationThe Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal
Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationResearch on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance
Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More informationAgent-based modeling and simulation of multiproject
Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es
More informationDECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
More informationLocation Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)
Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:
More informationA particle Swarm Optimization-based Framework for Agile Software Effort Estimation
The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationA particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
More informationFault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
More informationRESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS
Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationMULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION
MULTI-CRITERIA OPTIMIZATION OFTWARE LEVI-.0 A TOOL TO UPPORT DEIGN AND MANAGEMENT IN CONTRUCTION Edmudas Kazmeras Zavadskas Vlus Gedmas Techcal Uversty, auleteko av., Vlus, LT-0, Lthuaa, Emal: edmudas.zavadskas@adm.vtu.lt
More informationHow To Make A Supply Chain System Work
Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr
More informationExpert Systems with Applications
Expert Systems wth Applcatos 38 (2011) 7270 7276 Cotets lsts avalable at SceceDrect Expert Systems wth Applcatos joural homepage: www.elsever.com/locate/eswa Aget-based dffuso model for a automoble market
More informationCommercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives
Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School
More informationApplication of improved analytic hierarchy process in SME s competitiveness evaluation
COMPUTER MODELLING & NEW TECHNOLOGIES 04 8(C) 083-088 Wag Xawu Applcato of mproved aalytc herarchy process SME s compettveess evaluato Xawu Wag * Ahu Busess Vocatoal College, Hefe Ahu, PR Cha Abstract
More informationReport 52 Fixed Maturity EUR Industrial Bond Funds
Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationFuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment
, pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College
More informationAnalysis of Multi-product Break-even with Uncertain Information*
Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar
More informationof the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationSHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
More informationOptimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl
More informationA MULTI-CRITERIA CALL CENTER SITE SELECTION BY HIERARCHY GREY RELATIONAL ANALYSIS
A Multcrtera Call Ceter Ste Selecto by Herarchy Grey Relatoal Aalyss JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JANUARY 2014 VOLUME 7 NUMBER 1 (45-52) A MULTI-CRITERIA CALL CENTER SITE SELECTION BY
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
More informationLoad Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks
0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationAn Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin
A Automated Selectg Subcotractor Model I E-Commerce by Pao-Hug L Asst. Prof., Dept. of Cvl Egeerg, Feg-Cha Uversty, Tachug, Tawa E-mal: paol@fcu.edu.tw Abstract: From the observato of orgazato chages dgtal
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationOptimization Model in Human Resource Management for Job Allocation in ICT Project
Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationA DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
More informationHow To Balance Load On A Weght-Based Metadata Server Cluster
WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c
More informationOn Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
More informationEvaluating the Network and Information System Security Based on SVM Model
JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 Evaluatg the Network ad formato System Securty Based o SVM Model Shaome Yag Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationThe paper presents Constant Rebalanced Portfolio first introduced by Thomas
Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess
More informationFuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options
Proceedgs of the World Cogress o Egeerg 11 Vol II WCE 11, July 6-8, 11, Lodo, U.K. Fuzzy Mult-crtera Method for Revaluato of ERP System Choces Usg Real Optos A.Cagr Tolga Abstract May corporate had mplemeted
More informationRQM: A new rate-based active queue management algorithm
: A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew
More informationIP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
More informationModeling of Router-based Request Redirection for Content Distribution Network
Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationFuzzy Risk Evaluation Method for Information Technology Service
Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg Qasheg Zhag Yrog Huag Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg 1 Qasheg Zhag 2 Yrog Huag 1 Shool of Iformats Guagdog
More informationAnySee: Peer-to-Peer Live Streaming
ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationERP System Flexibility Measurement Based on Fuzzy Analytic Network Process
JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationChapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization
Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve
More informationAnalysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011
Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway
More informationDynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center
200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College
More informationProceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
More information10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
More informationEfficient Traceback of DoS Attacks using Small Worlds in MANET
Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble
More informationA Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments
1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,
More informationPerformance Attribution. Methodology Overview
erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace
More informationIntegrating Production Scheduling and Maintenance: Practical Implications
Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk
More informationReport 19 Euroland Corporate Bonds
Rep19, Computed & Prted: 17/06/2015 11:38 Report 19 Eurolad Corporate Bods From Dec 1999 to Dec 2014 31/12/1999 31 December 1999 31/12/2014 Bechmark 100% IBOXX Euro Corp All Mats. TR Defto of the frm ad
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationCredibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
More informationMULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT
Tred v podkáí vědecký časops Fakult ekoomcké ZČU v Plz Tred v podkáí, 5() 73-88 Publsher: UWB Plse MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH
More informationForecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion
2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of
More informationDYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES
DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES Nadezhda Koleda 1, Natalja Lace 2 1 Rga Techcal Uversty, Latva, adezhda.koleda@ge.com 2 Rga Techcal Uversty, Latva, atalja.lace@rtu.lv
More informationA Security-Oriented Task Scheduler for Heterogeneous Distributed Systems
A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer
More informationProactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework
World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos
More informationSoftware Aging Prediction based on Extreme Learning Machine
TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,
More informationA system to extract social networks based on the processing of information obtained from Internet
A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts
More informationBanking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
More informationDiscrete-Event Simulation of Network Systems Using Distributed Object Computing
Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809
More informationTESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION
TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs
More informationIT & C Projects Duration Assessment Based on Audit and Software Reengineering
Iformatca Ecoomcă, vol. 13, o. 1/2009 117 IT & C Projects Durato Assessmet Based o Audt ad Software Reegeerg Cosm TOMOZEI, Uversty of Bacău Marus VETRICI, Crsta AMANCEI, Academy of Ecoomc Studes Bucharest
More informationConstrained Cubic Spline Interpolation for Chemical Engineering Applications
Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel
More informationTime Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data
Appled Mathematcal Sceces, Vol. 9, 215, o. 57, 289-2829 HIKARI Ltd, www.m-hkar.com http://dx.do.org/1.12988/ams.215.52164 Tme Seres Forecastg by Usg Hybrd Models for Mothly Streamflow Data Sraj Muhammed
More informationReal-Time Scheduling Models: an Experimental Approach
Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -
More informationUSEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT
USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk
More informationDynamic Service and Data Migration in the Clouds
2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg
More information