Application of Grey Relational Analysis in Computer Communication

Size: px
Start display at page:

Download "Application of Grey Relational Analysis in Computer Communication"

Transcription

1 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author Iformato Egeerg Departmet, Luzhou Ralway Vocatoal Techcal College, LuZhou, , Cha, E-mal: @139.com Abstract Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. Keywords: Multple Attrbute Decso Makg (MADM), Computer Commucato Network, Grey Relatoal Aalyss (GRA), Relatoal Degree 1. Itroducto So far, there was ot a ormal ad tegrated rsk assessmet system for computer etwork formato securty, ad also, the opo of sortg rsk assessmet dd t come to a agreemet. Sce absece of rsk assessmet stadard, dfferet rsk assessmet departmet got the dfferet result evaluatg the same system. At the same tme, wth speedg up orgazato formato process ad ehacg the foudato ad teger of etwork formato system, formato securty problem became more ad more mportat. Curret formato securty eeded to stregthe the rsk assessmet quckly. The exsted research areas cluded securty costructo ad developmet for computer etwork system, rule ad method of etwork formato securty rsk assessmet. Wth aalyzg the curret stuato of computer formato system, the key pots ad problems of rsk assessmet could be foud to provde the referece ad bass for etwork securty orgazato. Because may formato system securty rsk assessmet theores were hard to be operated, regularty uo rsk assessmet was desged ad mplemeted to mprove the maeuverablty, acheved qualtatve ad measurable rsk aalyss, at the same tme, aalyzed ad dscussed developmet aspect of etwork formato securty rsk assessmet. Wth the developmet of the Iformato Techology, computer etworks have bee wdely used may felds. But people are axous for the securty of the computer etworks more ad more. Recet years, more tha 60% user etworks have bee broke. The computer etworks have the great rsk. The desre of the etworks for dfferet type of users s dfferet. The etwork egeers usually costruct a computer etwork accordg to ther experece ad the requests of the user. Qualtatve aalyss of the securty for a etwork s ofte used. Wth the rapd developmet of formato techology, the teret has already become the vtal vehcle for formato dssemato globally. However, sce after the advet of the teret, resource sharg ad formato securty have tur to oe par of rrecoclable cotradctos. The more ad the wder teret formato s shared, the more ad the deeper Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos(JDCTA) Volume6,Number22,December 2012 do: /jdcta.vol6.ssue

2 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J formato securty problems are creasgly exposured. Therefore, tradtoal passve protecto s ot adaptable to the curret securty stuato, ad the theory of proactve etwork securty assessmet has bee created accordgly. The favorable etwork securty assessmet ca assst the maagemet staff to comprehesvely ad precsely cotrol the level of securty, ths makes a great mportace to safeguard the teret to ru smoothly[1-10]. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss are the multple attrbute decso makg (MADM) problems.the am of ths paper s to vestgate the MADM problems for evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I order to do so, the rest of the paper s orgazed as follows: ext secto brefly troduce some basc cocepts related to the grey relatoal aalyss (GRA) model. I Secto 3, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I Secto 4 we llustrate our proposed algorthmc method wth a example. The fal secto cocludes. 2. Grey relatoal aalyss Grey relatoal aalyss (GRA) method [11-12] was orgally developed by Deg ad has bee successfully appled solvg a varety of MADM problems [13-21]. The ma procedure of GRA s frstly traslatg the performace of all alteratves to a comparablty sequece. Ths step s called grey relatoal geeratg. Accordg to these sequeces, a deal target sequece s defed. The, the grey relatoal coeffcet betwee all comparablty sequeces ad deal target sequece s calculated. Fally, base o these grey relatoal coeffcets, the grey relatoal degree betwee deal target sequece ad every comparablty sequeces s calculated. If a comparablty sequece traslated from a alteratve has the hghest grey relatoal degree betwee the deal target sequece ad tself, that alteratve wll be the best choce. The procedures of grey relatoal aalyss are show Fg. 1 [11-12]. Fgure 1. Procedure of grey relatoal aalyss 418

3 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 3. Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Wth the cotuous developmet of computer techology ad the wde spread of etwork applcato, etwork securty s becomg a mportat ssue whch techcas face ad may studes relatg to the etwork securty techology are becomg mature. Network securty stuatoal awareess s a techology whch ca realze the etwork securty specto ad motorg. Besdes, t s a hot topc o the formato securty research. It s very sgfcat to carry out ths research, for t ca mprove the emergecy respose ablty of et system, mtgate the harm caused by cyber attacks, dscover the malcous vaso behavor ad mprove the system s couter-attack ablty. I ths secto, we cosder a multple attrbute decso makg problems to evaluate the computer commucato etwork securty based o grey relatoal aalyss. Let A A1, A2,, Am dscrete set of alteratves, ad G G G G be the set of attrbutes,,,, 1 2 s the weghtg vector of the attrbutesgj j1, 2,,, where j 0,1, j1 that A aj s the decso matrx, where j m be a 1, 2,, 1 j. Suppose a s a preferece value, gve by the decso maker for the alteratve A A wth respect to the attrbutegj G. I the followg, we wll exted the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Step 1. Calculate the ormalzed decso matrx. The ormalzed value b j s calculated as If attrbute G j s a beeft crtero: b j aj m aj max a m a j j, 1, 2,, m, j 1, 2,,. (1) If attrbute G j s a cost crtero: b j max aj aj max a m a j j, 1, 2,, m, j 1, 2,,. (2) Step 2. Determe the postve deal soluto ad egatve deal soluto,, 1 max b j B b b,, 1 m b j B b b (3) (4) Step 3. Calculate the grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: The grey relatoal coeffcet of each alteratve from PIS s gve as 419

4 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J j m m b b max max b b b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (5) Smlarly, the grey relatoal coeffcet of each alteratve from NIS s gve as m m b b max max b b j b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (6) where the detfcato coeffcet 0.5. Step 4. Calculatg the degree of grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: jj j1 w, 1,2,, m. (7) jj j1 w, 1,2,, m. (8) The basc prcple of the GRA method s that the chose alteratve should have the largest degree of grey relato from the postve deal soluto ad the smallest degree of grey relato from the egatve deal soluto. Step 5. Calculatg the relatve relatoal degree of each alteratve from PIS usg the followg equato, Step 6. Rak all the alteratves A 1, 2,, m 1, 2,, m. If ay alteratve has the hghest alteratve. Step 7. Ed. 4. Numercal example, 1,2,, m. (9) ad select the best oe(s) accordace wth value, the, t s the most mportat The calculator techque develops quckly ad makes owadays the socal developmet have already caed ot got away from a formato etwork. Because the calculator etwork delvers of volve each realm of face, scece educato, ad mltary...etc. the formato, clude huge ecoomy or atoal terest amog them, so ecessary etwork from each sde of everyoe attack stoes, the etwork attack stoes of the mafestato s also vared, lke vrus fecto, steal the dstortg of data, formato delete to add a etc.. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths secto, we preset a emprcal case study of evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The am s to evaluate the best eterprse from evaluatg the computer commucato etwork securty. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are evaluated. The expert groups must take a decso accordg to the followg sx attrbutes: G1 s the flmsess of the etwork; G2 s the 420

5 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J etwork safety of etwork formato safety; G3 s the famlar etwork attack the method ad couter pla; G4 s the etwork safety costructo; G5 s the etwork safety techology; G6 s the etwork safety strategy. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are to be evaluated by the decso makers uder the above sx attrbutes (whose weghtg vector 0.12,0.20,0.15,0.18,0.21,0.14 T ) usg the 0-10 scale, ad costruct the A a j : decso matrx as follows 5 6 A A A A A A To get the most desrable computer commucato etwork systems, the followg steps are volved: Step 1. Costructg the ormalzed decso matrx as B by usg formula (1) ad (2): Step 2. Determg the PIS ad the NIS G1 G2 G3 G4 G5 G6 A A A A A A B B Step 3. Calculatg the grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS 5 6 j

6 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 5 6 j Step 4. Calculatg the degree of grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS , , , , , , , , Step 5. Calculate the relatve relatoal degree of each computer commucato etwork system from PIS , , , , Step 6. Accordg to the relatve relatoal degree, the rakg order of the fve computer commucato etwork systems s: A5 A1 A2 A4 A3, ad thus the most desrable computer commucato etwork system s A Cocluso Computer techology s developg very rapdly, powerful computers ad Itraet/Iteret are becomg popular all over the world. Iformatolzato ad etworklzato become tedecy of today s ecoomc ad socety s developmet of the world. Iformato techology ad computer etwork have already appled wdely. Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. 6. Refereces [1] ZANG Wehua, GUO Ru, "The Applcato of Neural Network based o Evolutoary Strategy 422

7 Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Network Securty Quatfcato Aalyss", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 2, pp , [2] Je Zhag, Ju Tag, Fag Pe, "A method for etwork securty rsk assessmet ad decsomakg based o the cloud model", JCIT: Joural of Covergece Iformato Techology, Vol. 7, No. 6, pp , [3] Ja Wu, "A Approach to Evaluatg the Computer Network Securty wth Ucerta Lgustc Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 5, pp , [4] Lao Hu-fe, "The Research o Network Securty Detecto Based o Improved Geetc Neural Algorthm", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 13, pp , [5] ChuaA Wag, Yaju Wag, Hua Ge, "Itellgece Computg Strategy for Computer Network Securty Itruso Detecto", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 13, pp , [6] Xuchag L, "Model for Evaluatg the Computer Network Securty Ucerta Lgustc Evromet", IJACT, Vol. 4, No. 4, pp , [7] Yupg L, Jgyua Y, Guoqag Wu, "Model for Evaluatg the Computer Network Securty wth Iterval-Valued Itutostc Fuzzy Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 6, pp , [8] Yupg L, Xja Sha, Guoqag Wu, "Comprehesve Evaluato Model for Computer Network Securty wth Lgustc Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 3, No. 9, pp , [9] Yua Jag, Dogmg Jag, "A Approach to Wreless Sesor Network Securty Assessmet wth Fuzzy Number Itutostc Fuzzy Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces,Vol. 3, No. 9, pp , [10] Xagya Tao, Chagyu Ja, Cheg Yag, "Securty Aalyss o Cha Campus Network ad Costructo o Network Securty System", JCIT: Joural of Covergece Iformato Techology, Vol. 6, No. 11, pp , [11] Julog Deg, Itroducto to Grey System, The Joural of Grey System (UK), vol.1, o.1, pp.1-24, [12] Julog Deg, Grey System Theory, Wuha: press of Huazhog Uversty of Scece & Techology, Cha, [13] Desheg Wu, Suppler selecto a fuzzy group decso makg settg: A method usg grey related aalyss ad Dempster-Shafer theory, Expert Systems wth Applcatos, vol.36, o.2, pp , [14] Guwu We, GRA method for multple attrbute decso makg wth complete weght formato tutostc fuzzy settg, Kowledge-Based Systems, Vol.23, No.3, pp , [15] Guwu We, Grey relatoal aalyss model for dyamc hybrd multple attrbute decso makg, Kowledge-based Systems, vol.24, o.5, pp , [16] Guwu We, Grey relatoal aalyss method for 2-tuple lgustc multple attrbute group decso makg wth complete weght formato, Expert Systems wth Applcatos, vol.38. o.5, pp , [17] Yaoguo Dag, Sfeg Lu, B Lu, Study o cdece decso makg model of mult-attrbute terval umber, Joural of Najg Uversty of aeroautcs & astroautcs, vol. 36, o.3, pp , [18] Jju Zhag, Desheg Wu, D. L. Olso, The method of grey related aalyss to multple attrbute decso makg problems wth terval umbers, Mathematcal ad Computer Modellg, vol. 42, o.3, pp , [19] Pede Lu, A ovel method for hybrd multple attrbute decso makg, Kowledge-Based Systems, vol. 22, o.5, pp , [20] D. L. Olso, D. Wu, Smulato of fuzzy multattrbute models for grey relatoshps, Europea Joural of Operatoal Research, vol. 175, o.4, pp , [21] Y. Kuo, T. Yag, G.W. Huag, The use of grey relatoal aalyss solvg multple attrbute decso-makg problems, Computers & Idustral Egeerg, vol. 55, o.1, pp ,

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6) Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

MULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION

MULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION MULTI-CRITERIA OPTIMIZATION OFTWARE LEVI-.0 A TOOL TO UPPORT DEIGN AND MANAGEMENT IN CONTRUCTION Edmudas Kazmeras Zavadskas Vlus Gedmas Techcal Uversty, auleteko av., Vlus, LT-0, Lthuaa, Emal: edmudas.zavadskas@adm.vtu.lt

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems wth Applcatos 38 (2011) 7270 7276 Cotets lsts avalable at SceceDrect Expert Systems wth Applcatos joural homepage: www.elsever.com/locate/eswa Aget-based dffuso model for a automoble market

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

Application of improved analytic hierarchy process in SME s competitiveness evaluation

Application of improved analytic hierarchy process in SME s competitiveness evaluation COMPUTER MODELLING & NEW TECHNOLOGIES 04 8(C) 083-088 Wag Xawu Applcato of mproved aalytc herarchy process SME s compettveess evaluato Xawu Wag * Ahu Busess Vocatoal College, Hefe Ahu, PR Cha Abstract

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment , pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College

More information

Analysis of Multi-product Break-even with Uncertain Information*

Analysis of Multi-product Break-even with Uncertain Information* Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

A MULTI-CRITERIA CALL CENTER SITE SELECTION BY HIERARCHY GREY RELATIONAL ANALYSIS

A MULTI-CRITERIA CALL CENTER SITE SELECTION BY HIERARCHY GREY RELATIONAL ANALYSIS A Multcrtera Call Ceter Ste Selecto by Herarchy Grey Relatoal Aalyss JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JANUARY 2014 VOLUME 7 NUMBER 1 (45-52) A MULTI-CRITERIA CALL CENTER SITE SELECTION BY

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

An Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin

An Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin A Automated Selectg Subcotractor Model I E-Commerce by Pao-Hug L Asst. Prof., Dept. of Cvl Egeerg, Feg-Cha Uversty, Tachug, Tawa E-mal: paol@fcu.edu.tw Abstract: From the observato of orgazato chages dgtal

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Evaluating the Network and Information System Security Based on SVM Model

Evaluating the Network and Information System Security Based on SVM Model JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 Evaluatg the Network ad formato System Securty Based o SVM Model Shaome Yag Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

The paper presents Constant Rebalanced Portfolio first introduced by Thomas

The paper presents Constant Rebalanced Portfolio first introduced by Thomas Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess

More information

Fuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options

Fuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options Proceedgs of the World Cogress o Egeerg 11 Vol II WCE 11, July 6-8, 11, Lodo, U.K. Fuzzy Mult-crtera Method for Revaluato of ERP System Choces Usg Real Optos A.Cagr Tolga Abstract May corporate had mplemeted

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Fuzzy Risk Evaluation Method for Information Technology Service

Fuzzy Risk Evaluation Method for Information Technology Service Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg Qasheg Zhag Yrog Huag Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg 1 Qasheg Zhag 2 Yrog Huag 1 Shool of Iformats Guagdog

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments 1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Report 19 Euroland Corporate Bonds

Report 19 Euroland Corporate Bonds Rep19, Computed & Prted: 17/06/2015 11:38 Report 19 Eurolad Corporate Bods From Dec 1999 to Dec 2014 31/12/1999 31 December 1999 31/12/2014 Bechmark 100% IBOXX Euro Corp All Mats. TR Defto of the frm ad

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT

MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT Tred v podkáí vědecký časops Fakult ekoomcké ZČU v Plz Tred v podkáí, 5() 73-88 Publsher: UWB Plse MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES Nadezhda Koleda 1, Natalja Lace 2 1 Rga Techcal Uversty, Latva, adezhda.koleda@ge.com 2 Rga Techcal Uversty, Latva, atalja.lace@rtu.lv

More information

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

A system to extract social networks based on the processing of information obtained from Internet

A system to extract social networks based on the processing of information obtained from Internet A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

IT & C Projects Duration Assessment Based on Audit and Software Reengineering

IT & C Projects Duration Assessment Based on Audit and Software Reengineering Iformatca Ecoomcă, vol. 13, o. 1/2009 117 IT & C Projects Durato Assessmet Based o Audt ad Software Reegeerg Cosm TOMOZEI, Uversty of Bacău Marus VETRICI, Crsta AMANCEI, Academy of Ecoomc Studes Bucharest

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data Appled Mathematcal Sceces, Vol. 9, 215, o. 57, 289-2829 HIKARI Ltd, www.m-hkar.com http://dx.do.org/1.12988/ams.215.52164 Tme Seres Forecastg by Usg Hybrd Models for Mothly Streamflow Data Sraj Muhammed

More information

Real-Time Scheduling Models: an Experimental Approach

Real-Time Scheduling Models: an Experimental Approach Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information