Protecting E-Commerce Systems From Online Fraud
|
|
|
- Dustin Manning
- 10 years ago
- Views:
Transcription
1 Protctng E-Commrc Systms From Onln Fraud Frst Author P.PhanAlkhya Studnt, Dpartmnt of Computr Scnc and Engnrng, QIS Collg of Engnrng & Tchnology, ongol, Andhra Pradsh, Inda. Scond Author Sk.Mahaboob Basha Assstant Profssor, Dpartmnt of Computr Scnc and Engnrng, QIS Collg of Engnrng &Tchnology, ongol, Andhra Pradsh, Inda. Abstract- Du to th advnt of Intrnt tchnologs, E- commrc wdly adaptd mod of busnss n modrn tms. Wth th growth of E-commnc doman crdt card usag has bcom a common phnomnon. Ths has gvn chanc to advrsars to commt fraud. In th ral world, thr wr plnty of nstancs of fraud cass. It has ts mpact on fnancal outfts that ssu crdt cards, th E-commrc busnss ntts and also th customrs of th E-commrc applcatons. To ovrcom ths problm and to buld confdnc n th stakholdrs of th E- commrc many tchnqus cam nto xstnc. As smpl pattrn matchng mthods ar nadquat to solv th problm many modrn tchnqus cam nto xstnc. Thy ar basd on Gntc programmng, Squnc Algnmnt, Machn larnng, Fuzzy logc, Data mnng and Artfcal ntllgnc. Ths tchnqus ar capabl of dtctng fraudulnt transactons. In ths papr w xplor varous tchnqus bng usd. W also buld a prototyp applcaton whch dmonstrats th ffcncy of Gntc Programmng to dtct crdt card fraud. Th mprcal rsults rvald that th proposd soluton s ffctv. Kywords Crdt card fraud dtcton, fraud dtcton tchnqus, E-commrc INTRODUCTION Crdt card fraud dtcton s an actv and contnuous rsarch ara as t nvolvs montary transactons. Th rsarch s mportant n th lght of wb tchnologs that support E-commrc applcatons n buldng and managng. Morovr busnsss n th world ar gong onln. Th onln busnsss ar abl to rach global markts and thy rach global customrs. Th E-commrc applcatons mak t possbl to shop tms anytm and anywhr. Thr ar no tm and gographcal rstrctons. Ths has plnty of advantags for both consumrs and busnsss. Thr ar many knds n E-commrc. B2B (Busnss to Busnss), B2C (Busnss to Consumr) and C2C (Consumr to Consumr) ar th thr popular forms of E-commrc applcatons. Th transactons n E- commrc mght hav fraudulnt transactons along wth gnun ons. It s ssntal to hav a systm that can dtct fraudulnt transactons. Varous tchnqus such as Hddn Markov Modl, Artfcal Intllgnc, Squnc Algnmnt, and Gntc Programmng cam nto xstnc to combat ths problm. In ths papr w mplmnt Gntc Algorthm (GA) n ordr to dtct crdt card fraud. Th GA has provson for valuatng populatons contnuously untl a bst ft s found. Th oprators lk cross ovr and mutaton hlp n ISSN: Pag3549
2 accurat prdcton of fraud cass. W also bult a prototyp applcaton that dmonstrats th ffcncy of th proposd soluton. Th xprmntal rsults rvald that th applcaton s vry usful n ral tm systms. Th rmandr of th papr s organzd as follows. Scton II rvws rlvant ltratur. Scton III prsnts som of th fraud dtcton tchnqus. Scton IV provds dtals about th proposd fraud dtcton tchnqu and also th prototyp dtals. Scton V shows xprmntal rsults whl scton VI concluds th papr. Th Dmpstr Shafr thory and Baysan larnng approach s th combnaton of two approachs [17], [18], [19]. Th vdncs from past and corrct ar combnd n ordr to dtct fraud. Informaton fuson s th approach followd by ths hybrd tchnqu. Fgur 1 shows th ovrvw of ths hybrd approach. RELATED WORKS Crdt card fraud dtcton has bcom an nvtabl part of E-commrc applcatons. As th applcatons nvolv montary transactons, fraud dtcton tchnqus ar ndspnsabl. Lot of rsarch has bn mad n ths ara [1], [2], and [3]. Many algorthms cam nto xstnc to dtct crdt card fraud [4], [2]. Th algorthms nclud fuzzy logc [5], squnc algnmnt algorthm [6], [7], data mnng tchnqus [8], [9], machn larnng and artfcal ntllgnc approachs [10], [11], [12]. Thr ar othr tchnqus such as Wb Srvcs Basd CCFD, CCFD wth Artfcal Immun Systm [13], [14], Cardwatch [15], Baysan Blf Ntworks [4], Intruson Dtcton [13], Cas Basd Rasonng for CCFD [4], Advancd Fraud Dtcton [16], CCFD basd on computatonal ntllgnc [13], CCFD usng slf-organzng maps [13]. Many ar basd on pattrn matchng, Mta larnng and artfcal ntllgnc. In ths papr w compar som of th tchnqus whch ar good for CCFD. COMPARISON OF CCFD SYSTEMS In ths scton w compar varous crdt card fraud dtcton tchnqus such as Dmpstr Shafr thory and Baysan larnng, Hddn Markov Modl (HMM) and Gntc Programmng (GP). Dmpstr Shafr thory and Baysan larnng approach Fg. 1 Hybrd approach for CCFD (xcrpt from [16]) As sn n fgur 1, ths approach has four componnts. Thy ar rul basd fltr, Baysan larnr, transacton hstory databas and Dmpstr-Shafr addr. Th vdncs found from multpl componnts ar fusd and th dtcton s mad. Ths approach s mor accurat but consums mor rsourcs bsds bng slow. CCFD usng Hddn Markov Modl (HMM) Ths modl s usd to analyz crdt card transactons. It nds tranng data and also tst data n ordr to dtct fraud. It uss K-mans data mnng algorthm ntrnally. Th K-mans algorthm taks all crdt card transactons ISSN: Pag3550
3 and numbr of clustrs as nput and gnrats clustrs that ar usd n HMM. All th transactons ar dvdd nto low, mdum and hgh, th thr clustrs. Onc th clustrs ar formd thy ar kpt n a HMM. Th HMM s usd for vry nw transacton. Th amount n nw transacton should blong to thr low, or mdum or hgh. If not th transacton s suspctd to b fraudulnt and th corrspondng popl or organzatons ar alrtd. Th gnral ovrvw of HMM s as shown blow. th crdt card, and crdt card book balanc. Th ovrvw of th GP approach s as shown n fgur 3. Fg. 3 Ovrvw of proposd archtctur for GP As can b sn n fgur 3, th data of crdt cards s takn from data warhous. Thn th data s subjctd to ruls ngn. Th ruls ngn contans fraud cas ruls. Th fltr and prorty componnts tak car of fltrng and prorty sttng. Th gntc algorthm s rsponsbl to dtct fraud. Fg. 2 Ovrvw of HMM Modl (xcrpt from [16]) CCFD usng GP Gntc programmng s wdly usd for solvng varous problms. In ths papr w mplmntd a Gntc Algorthm to dtct crdt card fraud. Ths algorthm maks us of xstng transactons of crdt cards. It uss multpl crtra to dtct fraud. Th crtra nclud crdt card usag frquncy, crdt card usag locaton, ovrdraft on PROTOTYPE IMPLEMENTATION A prototyp applcaton has bn bult n Java platform. Th applcaton s dvlopd wth Graphcal Usr Intrfac (GUI) to b usr-frndly. Th nvronmnt usd to buld th applcaton ncluds a PC wth 4GB RAM, Cor 2 dual procssor runnng Wndows XP opratng systm. NtBans s usd as IDE. Th mportant applcaton scrns ar prsntd n fgur 4 and 5. ISSN: Pag3551
4 ths papr. Th rsults hlp n undrstandng th fraud transactons and thy can b usd to tran th systm furthr n ordr to mak nw ruls and achv hghr accuracy of fraud dtcton. EXPERIMENTAL RESUTLS W compard th rsults of our approach wth that of Artfcal ntllgnc, Hddn Markov Modl, Squnc Algnmnt, and Machn Larnng. Th comparson s mad n trms of tru postvs and fals postvs. Hghst tru postvs and last fals postvs ar achvd by GP. Fg. 4 Datast usd for xprmnts As sn n fgur 4, th datast contans crdt card transacton dtals for numbr of nstancs. Ths data s usd by GA proposd n ths papr. Th GA maks us of th componnts as dscrbd n fgur 3 n ordr to dtct fraudulnt transactons. Th rsults of dtcton ar shown n fgur 5. T r u P o s80 t60 v40 s20 Comparson of CCFD Tchnqus CCFD Tchnqus 0 Fg. 6 Prformanc of CCFD tchnqus wth rspct to tru postvs As can b sn n fgur 6, th prformanc of Gntc Programmng s 100%. It has achvd 100% tru postvs whn compard wth othr tchnqus such as AI, HMM, SA and machn larnng. Fg. 5 Rsults of Fraud Dtcton As can b sn n fgur 5, basd on varous crtra mntond arlr, th fraud dtcton s don. Th crtra ar usd as part of gntc programmng modl proposd n ISSN: Pag3552
5 F a l s Fg. 7 Prformanc of CCFD tchnqus wth rspct to fals postvs Comparson of CCFD Tchnqus P o s t v s Machn Larnng Squnc Algnmnt HMM AI GP As can b sn n fgur 7, th prformanc of Gntc Programmng s mor. It has achvd vry lss prcntag of fals postvs whn compard wth othr tchnqus such as AI, HMM, SA and machn larnng. CONCLUSIONS AND FUTURE WORK CCFD Tchnqus In ths papr w studd th problm of crdt card fraud n E-commrc applcatons. W xplord varous approachs to solv th problm. Th knowldg of varous approachs can mprov th scop of protctng E-commrc applcatons. Fnally w mplmntd gntc algorthm for crdt card fraud dtcton. As th advrsars chang thr mans of attack vry tm, t s mportant to hav constant vgl on th mthods thy us and updat th tchnqus accordngly. In ths papr buld a prototyp applcaton n Java platform n ordr to dmonstrat th proof of concpt. Th applcaton uss gntc algorthm to dtct crdt card fraud. Data mnng and othr tchnqus ar avalabl to solv ths problm. Howvr, w prfrrd GA as t s ffcnt n dtctng crdt card fraud. Th xprmntal rsults rval that th proposd applcaton s usful and can b usd n ral world systms. REFERENCES [1] Tj Paul Bhatla, Vkram Prabhu & Amt Dua Undrstandng Crdt Card Frauds, [2] Lnda Dlamar, Hussn Abdou, John Ponton, Crdt card fraud and dtcton tchnqus: a rvw, Banks and Bank Systms, pp , [3] Barry Masuda, Crdt Card Fraud Prvnton: A Succssful Rtal Stratgy, crm prvnton, Vol. 6, [4] Ezawa.K. & Norton.S, Constructng Baysan Ntworks to Prdct Uncollctbl Tlcommuncatons Accounts, IEEE Exprt, Octobr;45-51, [5] Ptr J. Bntly, Jungwon Km, Gl-Ho Jung and Jong-Uk Cho, Fuzzy Darwnan Dtcton of Crdt Card Fraud, In th 14th Annual Fall Symposum of th Koran Informaton Procssng Socty, 14 th Octobr [6] Amlan Kundu, S. Sural, A.K. Majumdar, Two-Stag Crdt Card Fraud Dtcton Usng Squnc Algnmnt, Lctur Nots n Computr Scnc, Sprngr Vrlag, Procdngs of th Intrnatonal Confrnc on Informaton Systms Scurty, Vol. 4332/2006, pp , [7] Amlan Kundu, Suvasn Pangrah, Shamk Sural and Arun K.Majumdar, BLAST-SSAHA Hybrdzaton for Crdt Card Fraud Dtcton, IEEE Transactons On Dpndabl And Scur Computng, vol. 6, Issu no. 4, pp , Octobr-Dcmbr [8] Phlp K. Chan,W Fan, Andras L. Prodromds, Salvator J. Stolfo, Dstrbutd Data Mnng n Crdt Card Fraud Dtcton, IEEE Intllgnt Systms ISSN, Vol. 14, Issu No. 6, Pags: 67 74, Novmbr [9] C. Phua, V. L, K. Smth, R. Gaylr, A Comprhnsv Survy of Data Mnng-basd Fraud Dtcton Rsarch, Artfcal Intllgnc Rvw, [10] Ray-I Chang, Lang-Bn La, Wn-D Su, Jn-Chh Wang, Jn-Shang Kouh, Intruson Dtcton by Backpropagaton Nural Ntworks wth Sampl-Qury and Attrbut-Qury, Rsarch IndaPublcatons, pp.6-10, Novmbr 26, [11] Ghosh, D.L. Rlly, Crdt Card Fraud Dtcton wth a Nural-Ntwork, Procdngs of th Intrnatonal Confrnc on Systm Scnc, pp , ISSN: Pag3553
6 [12] R. Braus, T. Langsdorf, M. Hpp, Nural Data Mnng for Crdt Card Fraud Dtcton, Intrnatonal Confrnc on Tools wth Artfcal Intllgnc, pp ,1999. [13] Fan, W. Mllr, M.Stolfo, S.L & P Chan, Usng Artfcal Anomals to Dtct Unknown and Known Ntwork Intrusons, Proc. of ICDM01, pp , [14] Manol Frnando Alonso Gad, Xd Wang, Alar Prra do Lago, Crdt Card Fraud Dtcton wth Artfcal Immun Systm, Lctur Nots n Computr Scnc, Vol. 5132/2008, pp , [15] E. Alskrov, B. Frslbn, B. Rao, CARDWATCH: A Nural Ntwork Basd Databas Mnng Systm for Crdt Card Fraud Dtcton, Procdngs of IEEE/IAFE Confrnc on Computatonal Intllgnc for Fnancal Engnrng (CIFEr), pp , [16] S. Bnson Edwn Raj and A. Ann Porta, Analyss on Crdt Card Fraud Dtcton Mthods, ICCCET, 2001, p1-5 [17] M. Mhd, S. Zar, A. Anou and M. Bnsbt, A Baysan Ntworks n Intruson Dtcton Systms, Intrnatonal Journal of Computatonal Intllgnc Rsarch, Issu No. 1, pp Vol. 3, [18] Lam, Bacchus, Larnng baysan blf ntworks: An approach basdon th MDL prncpl, Computatonal Intllgnc, Vol. 10, Issu No. 3, pp , August [19] Sam Mas, Karl Tuyls, Bram Vanschonwnkl, Brnard Mandrck, Crdt card fraud dtcton usng Baysan and nural ntworks, Intractv mag-gudd nurosurgry, pp , ISSN: Pag3554
Online Load Balancing and Correlated Randomness
Onln Load Balancng and Corrlatd Randomnss Sharayu Moharr, Sujay Sanghav Wrlss Ntworng and Communcatons Group (WNCG) Dpartmnt of Elctrcal & Computr Engnrng Th Unvrsty of Txas at Austn Austn, TX 787, USA
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
Int. J. Informaton an Computr Scurty, Vol. 1, No. 1/2, 27 21 An RSA-bas (t, n) thrshol proxy sgnatur schm wth frwll ntts Ya-Fn Chang Grauat Insttut of Accountng, Natonal Chung Hsng Unvrsty, Tachung 42,
Personalized Web Search by User Interest Hierarchy
Prsonalzd Wb arch by Usr Intrst Hrarchy Abstract Most of th wb sarch ngns ar dsgnd to srv all usrs, ndpndnt of th nds of any ndvdual usr. Prsonalzaton of wb sarch s to carry out rtrval for ach usr ncorporatng
Constrained Renewable Resource Allocation in Fuzzy Metagraphs via Min- Slack
Intrntonl Journl of ppld Oprtonl Rsrch Vol 1, No 1, pp 7-17, Summr 011 Journl hompg: wwworlur Constrnd Rnwl Rsourc llocton n Fuzzy Mtgrphs v Mn- Slck S S Hshmn* Rcvd: Jnury 31, 011 ; ccptd: My 1, 011 strct
How To Write A Recipe Card
Employng Rlvanc Fdback to mbd Contnt and Srvc Importanc nto th Slcton Procss of Compost Cloud Srvcs Dmosthns Kyrazs, Nkolaos Doulams, Gorg Kousours, Andras nychtas, arnos Thmstoclous, Vasslos C. Vscouks
Authenticated Encryption. Jeremy, Paul, Ken, and Mike
uthntcatd Encrypton Jrmy Paul Kn and M Objctvs Examn thr mthods of authntcatd ncrypton and dtrmn th bst soluton consdrng prformanc and scurty Basc Componnts Mssag uthntcaton Cod + Symmtrc Encrypton Both
Modern Portfolio Theory (MPT) Statistics
Modrn Portfolo Thory (MPT) Statstcs Mornngstar Mthodology Papr Novmr 30, 007 007 Mornngstar, Inc. All rghts rsrvd. Th nformaton n ths documnt s th proprty of Mornngstar, Inc. Rproducton or transcrpton
Reputation Management for DHT-based Collaborative Environments *
Rputaton Managmnt for DHT-basd Collaboratv Envronmnts * Natalya Fdotova, Luca Vltr Unvrsty of Parma, Italy Abstract Ths artcl addrsss a problm of ntgraton of rputaton managmnt mchansms and lookup procsss
ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS WITH COMPOUND POISSON DEMAND
8 th Intrnatonal Confrnc of Modlng and Smulaton - MOSIM - May -2, 2 - Hammamt - Tunsa Evaluaton and optmzaton of nnovatv producton systms of goods and srvcs ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS
The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.
Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl
No 28 Xianning West Road, Xi an No 70 Yuhua East Road, Shijiazhuang. [email protected]
On-Ln Dynamc Cabl Ratng for Undrground Cabls basd on DTS and FEM Y.C.Lang *, Y.M.L School of Elctrcal Engnrng * Dpartmnt of Elctrcal and Informaton X an Jaotong Unvrsty Hb Unvrsty of Scnc and Tchnology
Non-Linear and Unbalanced Three-Phase Load Static Compensation with Asymmetrical and Non Sinusoidal Supply
Non-Lnar and nbalancd Thr-Phas Load Statc Comnsaton wth Asymmtrcal and Non Snusodal Suly Rys S. Hrrra and P. Salmrón Elctrcal Engnrng Dartmnt Escula Poltécnca Suror, nvrsty of Hulva Ctra. Palos d la Frontra,
FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data
FACULTY SALARIES FALL 2004 NKU CUPA Data Compard To Publishd National Data May 2005 Fall 2004 NKU Faculty Salaris Compard To Fall 2004 Publishd CUPA Data In th fall 2004 Northrn Kntucky Univrsity was among
[email protected]
[email protected] ABSRAC Enhancmnt of tchnology-basd systm support for knowldg workrs s an ssu of grat mportanc. h Knowldg work Support Systm (KwSS) framwork analyzs ths ssu from a holstc prspctv. KwSS
QUANTITATIVE METHODS CLASSES WEEK SEVEN
QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.
ESA Support to ESTB Users
ESA Support to ESTB Usrs Dr. Javir Vntura-Travst Europan Spac Agncy 3 rd ESTB Workshop Nic 12 Novmbr 2002 OUTLINE! ESA ESTB wbsit support! Th ESTB/EGNOS Hlpdsk! Th ESTB Nwslttr! Th ESA SISNET tchnology!
ERLANG C FORMULA AND ITS USE IN THE CALL CENTERS
IFORTIO D OUITIO TEHOLOGIES D SERVIES, VOL. 9, O., RH 2 7 ERLG FORUL D ITS USE I THE LL ETERS Er HROY., Tbor ISUTH., atj KVKY. Dpartmnt of Tlcommuncatons, Faculty of Elctrcal Engnrng and Informaton Tchnology,
Control of Perceived Quality of Service in Multimedia Retrieval Services: Prediction-based mechanism vs. compensation buffers
1 Control of Prcvd Qualty of Srvc n ultmda Rtrval Srvcs: Prdcton-basd mchansm vs. compnsaton buffrs Aurlo La Cort, Alfo Lombardo, Srgo Palazzo, Govann Schmbra Isttuto d Informatca Tlcomuncazon, Unvrsty
by John Donald, Lecturer, School of Accounting, Economics and Finance, Deakin University, Australia
Studnt Nots Cost Volum Profit Analysis by John Donald, Lcturr, School of Accounting, Economics and Financ, Dakin Univrsity, Australia As mntiond in th last st of Studnt Nots, th ability to catgoris costs
A Probabilistic Approach to Latent Cluster Analysis
Procdngs of th Twnty-Thrd Intrnatonal Jont Confrnc on Artfcal Intllgnc A Probablstc Approach to Latnt Clstr Analyss Zhpng X R Dong, Zhnghng Dng, Zhnyng H, Wdong Yang School of Comptr Scnc Fdan Unrsty,
Life Analysis for the Main bearing of Aircraft Engines
f Analyss for th Man barng of Arcraft Engns Png n a, Xaolng Zhang a, png H a, anglang Dng a a School of Mchancs, Elctronc, and Industral Engnrng, Unvrsty of Elctronc Scnc and Tchnology of Chna, Chngdu,
The influence of advertising on the purchase of pharmaceutical products
Th nflunc of advrtsng on th purchas of pharmacutcal products Jana VALEČKOVÁ, VŠB-TU Ostrava Abstract Th sz of th pharmacutcal markt and pharmacutcal sals s ncrasng constantly. Th markt s floodd wth nw
Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.
Volum 3, Issu 6, Jun 2013 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: wwwijarcsscom Dynamic Ranking and Slction of Cloud
Adverse Selection and Moral Hazard in a Model With 2 States of the World
Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,
A Project Management framework for Software Implementation Planning and Management
PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis [email protected] Th goal of introducing nw tchnologis into your company
is knowing the car market inside out.
Exprts s knowng th car markt nsd out. Vokswagn Group Lasng s both a ft managmnt company and a dvson of Vokswagn Fnanca Srvcs (UK) Lmtd. Ths aows us to offr a comprhnsv rang of srvcs wth packags to sut
Game of Platforms: Strategic Expansion into Rival (Online) Territory
Gam of Platforms: Stratgc Expanson nto Rval (Onln) Trrtory Sagt Bar-Gll Ϯ Abstract Onln platforms, such as Googl, Facbook, or Amazon, ar constantly xpandng thr actvts, whl ncrasng th ovrlap n thr srvc
Section 3: Logistic Regression
Scton 3: Logstc Rgrsson As our motvaton for logstc rgrsson, w wll consdr th Challngr dsastr, th sx of turtls, collg math placmnt, crdt card scorng, and markt sgmntaton. Th Challngr Dsastr On January 28,
Analysis of Credit Card Fraud Detection Techniques
Analysis of Credit Card Fraud Detection Techniques Sunil Bhatia 1, Rashmi Bajaj 2, Santosh Hazari 3 1 Vivekanand Education Society s Institute of Technology, Collector s Colony, Chembur, Mumbai 400074,
Continuity Cloud Virtual Firewall Guide
Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY
EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS
25 Vol. 3 () January-March, pp.37-5/tripathi EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS *Shilpa Tripathi Dpartmnt of Chmical Enginring, Indor Institut
A Formal Model for Data Flow Diagram Rules
Volum No. MAY 0 ARPN Journal o Sytm and Sotwar 00- AJSS Journal. All rght rrvd htt://www.cntc-ournal.org A Formal Modl or Data Flow Dagram Rul Rozat Ibrahm Sow Yn Yn Dartmnt o Sotwar Engnrng Unvrty Tun
VOL. 25, NÚM. 54, EDICIÓN JUNIO 2007 PP. 122-155
Ensayos sobr POÍTICA ECONÓMICA PENSION FUND MANAGERS AND THE STRUCTURE OF THE FOREIGN EXCHANGE MARKET HERNANDO VARGAS YANNETH ROCÍO BETANCOURT ENSAYOS SOBRE POÍTICA ECONÓMICA, VO. 25, NÚM. 54, EDICIÓN
Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131
Sci.Int.(Lahor),26(1),131-138,214 ISSN 113-5316; CODEN: SINTE 8 131 REQUIREMENT CHANGE MANAGEMENT IN AGILE OFFSHORE DEVELOPMENT (RCMAOD) 1 Suhail Kazi, 2 Muhammad Salman Bashir, 3 Muhammad Munwar Iqbal,
Buffer Management Method for Multiple Projects in the CCPM-MPL Representation
Industra ngnrng & Managmnt Systms Vo No 4 Dcmbr 22 pp.397-45 ISSN 598-7248 ISSN 2234-6473 http://dx.do.org/.7232/ms.22..4.397 22 KII Buffr Managmnt Mthod for Mutp Projcts n th CCPM-MP Rprsntaton Nguyn
Parallel and Distributed Programming. Performance Metrics
Paralll and Distributd Programming Prformanc! wo main goals to b achivd with th dsign of aralll alications ar:! Prformanc: th caacity to rduc th tim to solv th roblm whn th comuting rsourcs incras;! Scalability:
Modelling Exogenous Variability in Cloud Deployments
Modllng Exognous Varablty n Cloud Dploymnts Gulano Casal 1 Mrco Trbaston 2 [email protected] [email protected] 1 : Impral Collg London, London, Untd Kngdom 2 : Ludwg-Maxmlans-Unvrstät, Munch, Grmany
Enterprise Resource Planning (ERP) Systems
Entrpris Rsourc Planning (ERP) Systms For Non-Practitionrs Octobr 1997 Octobr 1997 National Industry Srvics - Industrial & Automotiv Products ERP nabls companis to driv th optimum intr-oprability btwn
Abstract. Introduction. Statistical Approach for Analyzing Cell Phone Handoff Behavior. Volume 3, Issue 1, 2009
Volum 3, Issu 1, 29 Statistical Approach for Analyzing Cll Phon Handoff Bhavior Shalini Saxna, Florida Atlantic Univrsity, Boca Raton, FL, [email protected] Sad A. Rajput, Farquhar Collg of Arts
Rural and Remote Broadband Access: Issues and Solutions in Australia
Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity
ITIL & Service Predictability/Modeling. 2006 Plexent
ITIL & Srvic Prdictability/Modling 1 2 Plxnt Th Company 2001 Foundd Plxnt basd on an Expandd ITIL Architctur, CMMI, ISO, and BS15000 - itdna 2003 Launchd itdna Srvic Offring 2003 John Groom, past Dirctor
Managing the Outsourcing of Two-Level Service Processes: Literature Review and Integration
Procdns of th 43rd Hawa Intrnatonal Confrnc on Systm Scncs - 2010 Manan th Outsourcn of Two-Lvl Srvc Procsss: Ltratur Rvw and Intraton Edal Pnkr Unvrsty of Rochstr [email protected] Robrt Shumsky Dartmouth
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Dtcting Profil Cloning in Onlin Social Ntworks MortzaYousfi Kharaji 1 and FatmhSalhi Rizi 2 1 Dptartmnt of Computr and Information Tchnology Enginring,Mazandaran of Scinc and Tchnology,Babol,
Mininum Vertex Cover in Generalized Random Graphs with Power Law Degree Distribution
Mnnum Vrtx Covr n Gnralzd Random Graphs wth Powr Law Dgr Dstrbuton André L Vgnatt a, Murlo V G da Slva b a DINF Fdral Unvrsty of Paraná Curtba, Brazl b DAINF Fdral Unvrsty of Tchnology - Paraná Curtba,
A Note on Approximating. the Normal Distribution Function
Applid Mathmatical Scincs, Vol, 00, no 9, 45-49 A Not on Approimating th Normal Distribution Function K M Aludaat and M T Alodat Dpartmnt of Statistics Yarmouk Univrsity, Jordan Aludaatkm@hotmailcom and
Logistic Regression for Insured Mortality Experience Studies. Zhiwei Zhu, 1 Zhi Li 2
Logstc Rgrsson for Insurd Mortalty Exprnc Studs Zhw Zhu, Zh L 2 Prsntd at th Lvng to 00 Symposum Orlando, Fla. January 8 0, 204 Copyrght 204 by th Socty of Actuars. All rghts rsrvd by th Socty of Actuars.
Gold versus stock investment: An econometric analysis
Intrnational Journal of Dvlopmnt and Sustainability Onlin ISSN: 268-8662 www.isdsnt.com/ijds Volum Numbr, Jun 202, Pag -7 ISDS Articl ID: IJDS20300 Gold vrsus stock invstmnt: An conomtric analysis Martin
Category 7: Employee Commuting
7 Catgory 7: Employ Commuting Catgory dscription This catgory includs missions from th transportation of mploys 4 btwn thir homs and thir worksits. Emissions from mploy commuting may aris from: Automobil
Hardware Modules of the RSA Algorithm
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 11, No. 1, Fbruary 2014, 121-131 UDC: 004.3`142:621.394.14 DOI: 10.2298/SJEE140114011S Hardwar Moduls of th RSA Algorithm Vlibor Škobić 1, Branko Dokić 1,
5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power
Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim
Facts About Chronc Fatgu Syndrom - sample thereof
Cardac Toxcty n Chronc Fatgu Syndrom: Rsults from a Randomzd 40-Wk Multcntr Doubl-blnd Placbo Control Tral of Rntatolmod Bruc C. Stouch, Ph.D 1 Davd Strayr, M.D 2. Wllam Cartr, M.D 2. 1 Phladlpha Collg
Analyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop
Intrnational Journal of Computr Scinc and Enginring Opn Accss Rsarch Papr Volum-2, Issu-1 E-ISSN: 2347-2693 Analyzing Failurs of a Smi-Structurd Suprcomputr Log Fil Efficintly by Using PIG on Hadoop Madhuri
A Multi-Heuristic GA for Schedule Repair in Precast Plant Production
From: ICAPS-03 Procdings. Copyright 2003, AAAI (www.aaai.org). All rights rsrvd. A Multi-Huristic GA for Schdul Rpair in Prcast Plant Production Wng-Tat Chan* and Tan Hng W** *Associat Profssor, Dpartmnt
CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises
CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY Outcom 10 Rgulation 11 Safty and Suitability of Prmiss CQC Rf 10A 10A(1) Lad Dirctor / Lad Officr Rspons Impact Liklihood Lvl of Concrn
CCD CHARGE TRANSFER EFFICIENCY (CTE) DERIVED FROM SIGNAL VARIANCE IN FLAT FIELD IMAGES The CVF method
CCD CHARGE TRANSFER EFFICIENCY (CTE) DERIVED FROM SIGNAL VARIANCE IN FLAT FIELD IMAGES Th CVF mthod Fbrc Chrstn 1, Konrd Kujkn 1,, Dtrch Bd 3, Cyrl Cvdor 4, Sbstn Drs 3, Olf Iwrt 3. 1 Kptyn Astronomcl
Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means
Qian t al. Journal of Inqualitis and Applications (015) 015:1 DOI 10.1186/s1660-015-0741-1 R E S E A R C H Opn Accss Sharp bounds for Sándor man in trms of arithmtic, gomtric and harmonic mans Wi-Mao Qian
Lecture 3: Diffusion: Fick s first law
Lctur 3: Diffusion: Fick s first law Today s topics What is diffusion? What drivs diffusion to occur? Undrstand why diffusion can surprisingly occur against th concntration gradint? Larn how to dduc th
LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W
Cllo Tchnology LG has introducd th NON 2, with nwly dvlopd Cllo Tchnology which improvs prformanc and rliability. Up to 320W 300W Cllo Tchnology Cll Connction Elctrically Low Loss Low Strss Optical Absorption
Product Overview. Version 1-12/14
Product Ovrviw Vrsion 1-12/14 W ar Grosvnor Tchnology Accss Control Solutions W dvlop, manufactur and provid accss control and workforc managmnt solutions th world ovr. Our product offring ompasss hardwar,
Global Sourcing: lessons from lean companies to improve supply chain performances
3 rd Intrnational Confrnc on Industrial Enginring and Industrial Managmnt XIII Congrso d Ingniría d Organización Barclona-Trrassa, Sptmbr 2nd-4th 2009 Global Sourcing: lssons from lan companis to improv
TELL YOUR STORY WITH MYNEWSDESK The world's leading all-in-one brand newsroom and multimedia PR platform
TELL YOUR STORY WITH MYNEWSDESK Th world's lading all-in-on brand nwsroom and multimdia PR platform SO WHAT'S THE STORY WITH MYNEWSDESK? Th world s lading all-in-on nwsroom and digital PR platform. Usd
Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)
con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc
Bank Incentives, Economic Specialization, and Financial Crises in Emerging Economies
Bank Incntvs, Economc Spcalzaton, and nancal Crss n Emrgng Economs Amar Gand a,*, Kos John b, and mma W. Snbt c a Cox School of Busnss, Southrn Mthodst Unvrsty, 6 Bshop Blvd., Dallas, TX 7575 USA b Strn
Mathematics. Mathematics 3. hsn.uk.net. Higher HSN23000
hsn uknt Highr Mathmatics UNIT Mathmatics HSN000 This documnt was producd spcially for th HSNuknt wbsit, and w rquir that any copis or drivativ works attribut th work to Highr Still Nots For mor dtails
CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions
CPS 22 Thory of Computation REGULAR LANGUAGES Rgular xprssions Lik mathmatical xprssion (5+3) * 4. Rgular xprssion ar built using rgular oprations. (By th way, rgular xprssions show up in various languags:
Real-Time Evaluation of Email Campaign Performance
Singapor Managmnt Univrsity Institutional Knowldg at Singapor Managmnt Univrsity Rsarch Collction L Kong Chian School Of Businss L Kong Chian School of Businss 10-2008 Ral-Tim Evaluation of Email Campaign
Term Structure of Interest Rates: The Theories
Handou 03 Econ 333 Abdul Munasb Trm Srucur of Inrs Ras: Th Thors Trm Srucur Facs Lookng a Fgur, w obsrv wo rm srucur facs Fac : Inrs ras for dffrn maurs nd o mov oghr ovr m Fac : Ylds on shor-rm bond mor
Expert-Mediated Search
Exprt-Mdiatd Sarch Mnal Chhabra Rnsslar Polytchnic Inst. Dpt. of Computr Scinc Troy, NY, USA [email protected] Sanmay Das Rnsslar Polytchnic Inst. Dpt. of Computr Scinc Troy, NY, USA [email protected] David
Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling
Planning and Managing Coppr Cabl Maintnanc through Cost- Bnfit Modling Jason W. Rup U S WEST Advancd Tchnologis Bouldr Ky Words: Maintnanc, Managmnt Stratgy, Rhabilitation, Cost-bnfit Analysis, Rliability
Contents Stochastic Ray Tracing
Contnts Stochastc Ray Tacng Kad Bouatouch IRISA Emal: [email protected] Mont Calo Intgaton Applcaton to dct lghtng by aa lght soucs Solvng th adanc quaton wth th Mont Calo Mthod Dstbutd Ray Tacng Path Taycng 2
Fetch. Decode. Execute. Memory. PC update
nwpc PC Nw PC valm Mmory Mm. control rad writ Data mmory data out rmmovl ra, D(rB) Excut Bch CC ALU A vale ALU Addr ALU B Data vala ALU fun. valb dste dstm srca srcb dste dstm srca srcb Ftch Dcod Excut
embedded e e in numbers, facts and figures
FACTSHEET EMBEDDED mbddd in numbrs, facts and figurs 25th Intrnational Trad Fair for Elctronic Componnts, Systms and Applications Nw Munich Trad Fair Cntr Novmbr 13 16, 2012 www.lctronica.d Focusing on
(Analytic Formula for the European Normal Black Scholes Formula)
(Analytic Formula for th Europan Normal Black Schols Formula) by Kazuhiro Iwasawa Dcmbr 2, 2001 In this short summary papr, a brif summary of Black Schols typ formula for Normal modl will b givn. Usually
Multi-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
Have Debit Cards Changed Thai Consumer Shopping Behavior?
Intrnational Journal of Markting Studis Novmbr, 2009 Hav Dbit Cards Changd Thai Consumr Shopping Bhavior? Chtsada Noknoi Economics and Businss Administration Faculty, Thaksin Univrsity 140 Moo 4, Kanajanavanit
Traffic Flow Analysis (2)
Traffic Flow Analysis () Statistical Proprtis. Flow rat distributions. Hadway distributions. Spd distributions by Dr. Gang-Ln Chang, Profssor Dirctor of Traffic safty and Oprations Lab. Univrsity of Maryland,
UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS:
UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS: CASE OF NAIROBI CITY WATER AND SEWERAGE COMPANY By TABITHA MBETE NGEI P58/63441/2011
An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore
Intrnational Journal of mrging Tchnology and dvancd nginring Wbsit: www.ijta.com (ISSN 2250-2459, Volum 2, Issu 4, pril 2012) n road outlin of Rdundant rray of Inxpnsiv isks Shaifali Shrivastava 1 partmnt
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Long run: Law of one price Purchasing Power Parity. Short run: Market for foreign exchange Factors affecting the market for foreign exchange
Lctur 6: Th Forign xchang Markt xchang Rats in th long run CON 34 Mony and Banking Profssor Yamin Ahmad xchang Rats in th Short Run Intrst Parity Big Concpts Long run: Law of on pric Purchasing Powr Parity
Teaching Computer Networking with the Help of Personal Computer Networks
Taching Computr Ntworking with th Hlp of Prsonal Computr Ntworks Rocky K. C. Chang Dpartmnt of Computing Th Hong Kong Polytchnic Univrsity Hung Hom, Kowloon, Hong Kong [email protected] ABSTRACT
Remember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D
24+ Advancd Larning Loan Application form Rmmbr you can apply onlin. It s quick and asy. Go to www.gov.uk/advancdlarningloans About this form Complt this form if: you r studying an ligibl cours at an approvd
Moving Securely Around Space: The Case of ESA
Moving Scurly Around Spac: Th Cas of ESA Prpard By: Andra Baldi, Jos Frnandz Balsiro, Marco Incollingo Tommaso Parrinllo, Cristiano Silvagni, Stfano Zatti Europan Spac Agncy [email protected] ESA Scnario
union scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME!
union scholars YOU CAN CHANGE THE WORLD... program AND EARN MONEY FOR COLLEGE AT THE SAME TIME! AFSCME Unitd Ngro Collg Fund Harvard Univrsity Labor and Worklif Program APPLICATION DEADLINE: FEBRUARY 28
Tax Collection, Transfers, and Corruption: the Russian Federation at the Crossroads 1)
ÝÊÎÍÎÌÈ ÅÑÊÈÉ ÆÓÐÍÀË ÂØÝ ¹ 1 2003 3 ÂÎÏÐÎÑÛ ÒÅÎÐÈÈ Tax Collcton, Transfrs, and Corrupton: th Russan Fdraton at th Crossroads 1) M. Mokhtar, I. Grafova Abstract Aftr thortcally consdrng th problms of tax
Secure User Data in Cloud Computing Using Encryption Algorithms
Scur Usr Data in Using Encrypt Algorithms Rachna Arora*, Anshu Parashar ** *(Rsarch Scholar, HCTM, Kaithal, Haryana) ** (Associat Profssor, HCTM, Kaithal, Haryana) ABSTRACT is transming inmat tchnology.
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg
Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly
A Graph-based Proactive Fault Identification Approach in Computer Networks
A Graph-basd Proacti Fault Idntification Approach in Computr Ntworks Yijiao Yu, Qin Liu and Lianshng Tan * Dpartmnt of Computr Scinc, Cntral China Normal Unirsity, Wuhan 4379 PR China E-mail: yjyu, liuqin,
Online Price Competition within and between Heterogeneous Retailer Groups
Onlin Pric Comptition within and btwn Htrognous Rtailr Groups Cnk Kocas Dpartmnt of Markting and Supply Chain Managmnt, Michigan Stat Univrsity [email protected] Abstract This study prsnts a modl of pric comptition
http://www.wwnorton.com/chemistry/tutorials/ch14.htm Repulsive Force
ctivation nrgis http://www.wwnorton.com/chmistry/tutorials/ch14.htm (back to collision thory...) Potntial and Kintic nrgy during a collision + + ngativly chargd lctron cloud Rpulsiv Forc ngativly chargd
