A Keyword Filters Method for Spam via Maximum Independent Sets

Size: px
Start display at page:

Download "A Keyword Filters Method for Spam via Maximum Independent Sets"

Transcription

1 Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2 Air Defene Fores Aademy 3 Inner Mongolia eletri power information and Communiation Center lzjtuwhl@163.om Abstrat In order to evade the keyword filtering, the spammers insert omments into s, suh as unusual symbols # or, to divide some keywords. In the paper, one keyword filters method for spam via maximum independent sets is presented, and the main ontents inlude: (1) build a mathing relation matrix algorithm to help us to improve the performane of maximal independent sets; (2) develop a judgmental riterion aording to the mathing relation matrix algorithm. (3) design a behavior reognition tehnology, whih an detet and rejet the whih reeiving. Proved by the experiments and analyses of examples, the spae and time omplexity of this algorithm is muh smaller than (mn). The operating effiieny is also satisfatory, and is able to ahieve the omplete filtering of targeted unusual symbols during the keyword filtering. Keywords: Maximum independent sets; semi-diagonal line; keyword filters; mathing relation matrix 1. Introdution has beome the important method for network ommuniation as it is widely used among the Internet users and is regarded as one of the most ommonly used network appliations. However, with the development of Internet, junk s (spam) bothering most people do not only bring disontent to users, but also ause some web seurity issues and eonomi losses. In reent years, a large number of dediated servers generate and send out spam though . Aording to the statistis from the anti-spam enter of the Internet Soiety of China, There are more than 1 servers per month whih were sent into the blaklisted by authoritative foreign anti-spam organization sine 25. With the development of the network, spam beomes an inreasingly serious global seurity problem. More and more researhers pay attention and onern to this field. Negative effets derived from spam, whih bring great eonomi losses and result in large amounts of data and information blokage, have beome a worldwide problem. Numerous experts and sholars put forward a lot of targeted prevention methods that ease the problem to some extent. Data Mining is a relatively popular tehnique for the filtering of ontents and theme keywords, whih detet spam keywords through keyword lassifiation and statistial algorithm. Bayes filter is an effetive method. The harateristis of Bayes filter are adaptation and self-learning. Bayes filter has the advantages of high detetion auray [1]. Other widely used deteting approahes inlude detetion based on memorial information, detetion based on desription of event features, and filtering based on spam feature analysis and regular expression mathes. 31

2 Vol. 7, No. 3, May, Related Filtering Tehnology and Analysis In Anti-Spam Solutions and Seurity, Dr. Neal Krawetz sorts the anti-spam tehniques into four main ategories: Filter, Reverse lookup, Challenges, and Cryptography. All of these solutions an ease the spam problems, but have respetive limitations. Filter is a relatively simple and widely used tehnique in spam detetion. It is ommonly used in mail reeiving management system for judging and eliminating spam. Currently, most of the mail servers apply anti-spam plug-ins, detetion gateways and lient-side spam filtering, based on varieties of filtering tehniques suh as keyword filtering algorithm, blak and white list, rule-based filtering and Bayesian filtering algorithm [2]. 2.1 Keyword filtering algorithm Mail ontent filtering uses a key word or multiple keywords as a general basis to judge. Using keyword hit rate to onfirm whether this message is spam or not, if the hit rate is large than a set threshold, it is onsidered as a spam. In addition, the key words an also be phrases and short sentenes. Mail header information is the original reord of the mail delivery proess whih is also a very important sense data, this is spam. Spammers use various tools and randomly send the span to forged losing sender, subjet and ontent, but some ommon information stored in the message header information, whih onsist IP address, host name, X-identifiation [3]. Through the filter of this information, you an find out the spam from several mail sent from the same address whih inludes different transeiver address and subjet. Keyword filtering algorithm generally reated some spam assoiated keyword table to judge and proess spam. If ertain keyword appears in large numbers of spam , then we an put them on the filtered list. The defet of this algorithm are there is a great impat on filtering apaity, the seletion proedure osts a lot resoures, and relatively low effiieny in the stage of seletion of keywords. In addition, the word-split funtion and wordombination funtion an easily avoid the filtering. 2.2 White and Blak List The blaklist ontains the basi information of onfirmed spammers: IP address or IP address of the mail sender. If the sender of the mail is the same as the address of the known spam, we an judge this message as a spam, and rejet the mail. The disadvantage of this method is that the an bypass the blaklist deteted by using a different IP address. The spammer an use the forgery and hanged sender's address [4]. In addition, rely on manual proessing administrator is unable to update the blaklist in time effetively. The whitelist ontains the trusted address, or IP address. If the information of send s mail mathes the data in whitelist. This mail an be onsidered as a normal mail and was released. The disadvantage of this approah is that if the user wishes to reeive from a ertain address, the user reeives this address mail rules must be set in advane to allow. If a user want to hange his/her mail address, the whitelist should be updated in time. Otherwise, the mail server will rejet this mail. 2.3 Rule-based Filtering The rule-based filtering tehnology defines the filtering expressions or rules mainly by seleting ertion harateristis of keywords to desribe spam s feature value. The fatal defet of this filtering method is that it requires managers to maintain a relatively large rules library, 32

3 Vol. 7, No. 3, May, 213 and in order to keep the effetive and real-time of the system, managers need to organize new rules regularly [5]. 2.4 The stati ontent filtering tehnology Stati ontent filtering atually is only useful for the ruling spam. For example, marketing advertising is a spam whih always ontains these rules, the advertising mail inludes a subjet if ADV. If the user does not want to reeive the spam like this type, he an simply set a filter to rejet the mail whih subjet with the ADV tag. However, the further mail spam appears, for example, some of the words "free" was transformed into "Free... fee" or "Free - fee" spam. It beomes another hot problem in filtering fields. If we san the mail and rejet the mail whih inludes these types data, some normal mail will be deleted. Therefore, the keyword filtering tehnology based on the message ontent will lead to a high false rate in pratial. This tehnology an be used in the environment under highly ontrolled [6]. 2.5 Bayesian Algorithm Bayesian filter mainly alulates the probability that whether an inludes a spam message ontent (TOKEN string), trains from the manually identified spam and legitimate mail. Thus the result is more effetive than other average ontent filters. Bayesian filter is a sore determined filter whih utilize the automati reation of spam feature table. The algorithm first analysis respetive feature value in massive spam and legitimate mails, and then alulate the probability that multiple features ontains in the mail. The priniple of this algorithm is to hek the keywords in spam set and legitimate mail set, statistis eah feature value as a TOKEN string, then builds hash tables respetively for TOKEN string in the spam set and legitimate mail set aording to the ourrenes of the extrated TOKEN string, named as word frequeny. And these tables store the mapping relationship from TOKEN string to the word frequeny. We ompute the probability that TOKEN string exists in the hash tables by WF,WF is the word frequeny of a ertain TOKEN string, and L is the P L length of orresponding hash table. P indiates the probability that new reeived is spam when the mail ontent ontains ertain TOKEN string in the hash tables established by system [7]. Finally, we get the spam deision sore from the overall mail, alulating by the omposite probability formula we obtain: P( A t 1,t, t 2 n ) P * P 1 2 P1 * P2 * Pn * P (1- P )*(1- P ) (1 P ) n 1 2 n (1) P(A t i ), where P i (1 i n) denotes the probability that a mail is spam when it ontains the TOKEN string. If the result is greater than a speified threshold, we set the mail as the spam; otherwise, the mail is legitimate. What we an observe from the Bayesian algorithm that spammers may esape the Bayesian algorithm filtering by random inserting a word or sentene. Beause of these filter using the stati passive detetion tehnology, many of them an be most effetive only within a very short period. In order to maintain the effetiveness and real-time of spam detetion, the managers should update the rules of filter onstantly [8]. Currently, the main anti-spam systems ommonly used keywords filtering tehnology based on omplete mathing, interepting samples, analyzing harateristis, generating rules, 33

4 Vol. 7, No. 3, May, 213 rules issued and ontent filtering tehnology. In order to avoid speial keywords filtering, spammers often insert a large number of omments into the in order to split some keywords (suh as 法 轮 功 ) and mix the mail ontent by some speial methods. for example: inserting symbols into Keywords 法 # 轮 功 et. Sometimes they onvert promotional ontent into a Zip pakage as the attahment to evade the filter. In this paper, we design and implement an adopted algorithm whih an effetively solve the problems inluding keywords split and ombine, as well as inserting speial symbols. Considering the traditional filter tehnology always hek the after all the ontent download into the loal disk, whih downgrade the performane. We also design a behavior reognition tehnology, whih an detet and rejet the whih reeiving. In this way, we do not need to wait all the ontent fully reeived from the remote nodes, and diretly blok the at the very beginning of the transfer. The entire filter rule will be build at the initial period of the establishing SMTP onnetion. 3. The Keywords Filtering Algorithm Based on the Maximal Independent Set 3.1 Mathing relation matrix of string Given any two strings S and T, the maximum mathing problem of them is equivalent to the maximal independent set of mathing relation matrix. Define S a1 a2 am, T b1b 2 bn. Note that n { 1, 2,, n}, m {1, 2,, m} Thus i, j) i m, j n, a i b } is alled mathing relation set of S and {( j T, written M ( S, T) [5], here we assume that n m generally [9]. C mathing relation matrix, an be defined as follow: C m m1 1 n 2n mn (2) Where ij 1, if ai bj, if ai b j We only disuss the situation that weight C ij 1 in this paper. Definition This thesis defines that eah node in the independent set only exist a orresponding node at the bottom right loated in the different row or different olumn, alled quasi diagonal. 34

5 Vol. 7, No. 3, May, 213 The set of nodes whih value are 1 ( C 1) over a quasi diagonal of mathing relation ij matrix is alled an independent set. The keyword mathing problem an be transformed into solving maximal independent set of mathing relation matrix, and searhing all independent sets in a given mathing relation matrix. So the longest set is the answer. In partiular, we an searh points in mathing relation matrix that of whih value is 1 to determine whether they are ompletely math in the proess. However, the idea disuss above will make the problem more ompliated, we find that finding the maximal independent sets an be regarded as searhing for a road in the mathing relation matrix of whih value is 1. Eah node in the independent set only exist a orresponding node at the bottom right loated in the different row or different olumn, alled quasi diagonal, searh the bottom right aording to the quasi diagonal [1]. We introdue a new problem solving algorithm to find the independent sets in this paper. We will desribe the detail in Setion 3.2. The relationship between output result with original input string will satisfy the following relationship: a1 11 a2 21 am m m2 1 n b1 2n b2 mn bn (3) 3.2 The algorithm of maximal independent set of mathing relation matrix In order to searh the bottom right orresponding with the quasi diagonal, we propose an improved algorithm of maximal independent set of mathing relation matrix as follows: Assume string α and β are independent sets obtained in searhing, we set the length of them as α and β. The proedure of algorithm desribes as follows: Step 1. When searh the olumn j, if α β, and the absissa of the last harater of α i1 < i2(the absissa of the last harater of β), then stop the operation of β. Step 2. When searh the row i, if α β, and the ordinate of the last harater of α j1 < j2 (the ordinate of the last harater of β), then stop the operation of β. Step 3. When searhing mathing relation matrix is ompleted, the length of α is equal to the original string, then keywords are found [11]. In this algorithm, it may generate multiple result of β, beause we just find the length of α with the length of original string, so we an get multiple independent sets in the end. The finding proedure will be present as a pseudo ode in following [12]: 35

6 Vol. 7, No. 3, May, 213 searh d[]=;ol=;η[]=;k=; for j ol,,n do for i k,, m do if equal(s[i],t[j]) { d[]++;ol++;k++; ontinue;} if(j<n&&k>=m) k=; End of For η[] = d[]/m; End (4) Where d[] indiates the array of length of eah independent set during the storage and alulation, η[] presents the mathing auray of eah independent set, ol is the next mathing start position of target string T[j], This setting design of ol an largely redue the mathing time omplexity. K denotes the identity of searh the original string. When the first searhing trip of the original string is finished and the target string is not ompleted, and then searh from the first harater of the original string again, the searh proess will stop until it finds all the mathing string [13]. 3.3 Judgement Criterion The Mathing auray m N C ij n i1 j1 N, where N is the length of original keywords string, N is the length of all quasi diagonal (Cij only equal or 1). If η<1,indiates the string α and the deteting target string does not math exatly, then the system outputs the results: the mail is seure; if η>1, meaningless; if η=1, then the system shows the string α and the deteting target string math exatly, keywords hidden in the string β is found, then the system give a warning, and ontinue the next steps [14]. 3.4 Complexity Analysis In this paper, we also import two tehniques in our algorithm. Firstly, the mathing relation matrix is reated dynamially; we do not need any other saving spae to store the matrix table. Seondly, In the proedure of string mathing, we does not require all the elements of the original string and the target string equal, we just searh along the bottom right of the quasi-diagonal [15], the searh detail an be find on the algorithm pseudoode desription of definition of ol. Both the spae and time omplexity of this algorithm are far less than O (mn). 4. Example Analysis Assuming that the word " 法 轮 功 " as a keyword in the list of filtering keywords, we detet the reeived mail subjet 法 # 轮 % 功 法 * 律, with our algorithm designed in this paper. All the proess steps an be desribe as follows: firstly, the Chinese mathing relation matrix as show below: 36

7 Vol. 7, No. 3, May, 213 法 # 轮 # 功 法 % 律 Figure 1. Mathing relation matrix (1) When searh along the bottom right of the quasi-diagonal aording to mathing relation matrix 1, the entry at the row labeled 1 and the olumn labeled 1 is 1,we firstly get the string α = 法, there is no relevant mathing in the seond line, then go to the third line, obtain α = 法 轮 ; similarly and so on, we an get α = 法 轮 功 ; When the program running into the seventh line, the first olumn is 1, but it is not the last node of string α, so it reate a new string β. Here we annot determine whether the length of β is the same as the keywords, thus ontinue searh β= 法. When all the searhing proedure finished, we get final string α [8]. We an use the mathing auray algorithm to determine whether the keyword is a spam, and then arry out the orresponding treatment [16]. To illustrate the effetiveness of the proposed algorithm, the haraters mathing proess via the relation matrix shows in below [17]: Figure 2. Mathing relation matrix (2) First of all, we get a temporary string φ = B (node on φ 1 ). And in the right, we find a way, row 4 ontains two 1, we an selet the above one aordane to the rules of the algorithm for solving a 1, that is to selet the first row 1, instead of 1 in the seond row. Meanwhile, in the first row there are two 1, by Theorem 3, we selet the left of that one, i.e. the fourth olumn is a. In this ase, φ = BO. However, when the algorithm is running into the fourth row, φ = BOOK, K in the sixth olumn of the third line of the Bank in the first olumn, the left side of the road φ is the last node of K, then you must reate a new one road Ψ, beause we annot determine whether future there φ Ψ. When the algorithm is run to the sixth row, φ = BOOK Ψ = NEW φ = Ψ = 3, we will the S hain on to the road φ, obtained the longest lower right road φ = BOOKS φ = 5. Thus, it is possible to alulate the degree of mathing of the two strings [18]. 37

8 Vol. 7, No. 3, May, Conlusions In this paper, we proposed a keyword filtering methods to filter the spam whih is related as the approximate mathing of Chinese haraters. The basi idea of our design is based on the onept of the edit distane approximate string mathing. Edit distane is defined as number how muh times a string transform into a minimum number of edits needed another string. By alulating the edit distane matrix, we an draw ahieve the best math. Searh through the parallel simulation, you an speed up the running proess of the lassial algorithm; this method is espeially good for the short string [19]. If the bit omparing proess, we import the parallel priniple idea to the mathing funtion, a number of different values paked into a omputer word length w, these words an be proessed in a single operation or operator whih need several operations or operator to omplete the funtion in traditional methods. To judge a text string in a loation or the pattern strings is mathed or not, whih may math more easily than judgment. If the filtering algorithm annot suessfully math the region, and then ombined with the non-the filtering text searh algorithm, we an also ultimately ahieve fast string mathing [2]. This paper presents a set of mail keywords filtering methods to find the maximal independent set. We design and implement an adopted algorithm whih an effetively solve the problems inluding keywords split and ombine, as well as inserting speial symbols. We also design a behavior reognition tehnology, whih an detet and rejet the whih reeiving. The experimental result shows that both spae and time omplexity are far less than O (mn), the effiieny is also satisfatory. However, if the spammers hange the produe way and onstantly sending the spam, we will always in a passive position. In future, we will further study the anti-spam tehnology to hange our passive reation position to impassive deteting the spam. Aknowledgments This researh was supported by Sientifi Researh Projet of Higher Eduation of Inner Mongolia Autonomous Region, China (NJZY1352). Referenes [1] Z. Li and H. Shen, SOAP: A Soial network Aided Personalized and effetive spam filter to lean your e- mail box, INFOCOM, 211 Proeedings IEEE, (211), pp [2] M. T. B. Aun, B. -M. Goi and V. T. H. Kim, Cloud enabled spam filtering servies: Challenges and opportunities, Sustainable Utilization and Development in Engineering and Tehnology (STUDENT), 211 IEEE Conferene on, (211), pp [3] Q. Luo, B. Liu, J. Yan and Z. He, Design and Implement a Rule-Based Spam Filtering System Using Neural Network, Computational and Information Sienes (ICCIS), 211 Int l Conferene on, (211), pp [4] P. Graham, Better Bayesian Filtering, (23) January. [5] C. Dwork and M. Naor, Priing via proessing or ombatting junk mail, in Proeedings of the 12th Annual International Cryptology Conferene on Advanes in Cryptology, Springer-Verlag, (1993), pp [6] A. Li and H. Liu, Utilizing improved Bayesian algorithm to identify blog omment spam, Robotis and Appliations (ISRA), 212 IEEE Symposium, (212), pp [7] A. C. Yao, The Complexity of Pattern Mathing for a Random String, SIAM Journal on Computing, vol. 8, no. 3, (1979), pp [8] J. A. Bondy and U. S. R. Murty, Graph Theory with Appliations, The MaCmillan Press ltd, London and Basingstoke, (1976). 38

9 Vol. 7, No. 3, May, 213 [9] S. Ghemawat, H. Gobioff and S. Leung, The Google File System, SIGOPS Oper. Syst. Rev., vol. 37, no. 5, (23), pp [1] R. Drewes, An artifiial neural network spam lassifier, (22) August, [11] H. Yuan and D. Wang, The New Approah of Marking Ativity-Loops Based on the String Reahable Matrix, Communiations and Mobile Computing, 29, CMC '9, WRI International Conferene, (29), pp [12] E. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, A. Irshad and M. Usman, Performane Evaluation Analysis of Group Mobility in Mobile Ad ho Networks, International Journal of Future Generation Communiation and Networking (IJFGCN), Syst. Rev., vol. 3, no. 3, (21), pp [13] J. -C. Lin and T. C. Huang, An effiient fault-ontaining self-stabilizing algorithm for finding a maximal independent set, Parallel and Distributed Systems, IEEE Transations, (23), pp [14] G. Vesztergombi, G. Odor, F. Rohrbah and G. Varga, Salable matrix multipliation algorithm for IRAM arhiteture mahine, Parallel and Distributed Proessing, 1998, PDP '98, Proeedings of the Sixth Euromiro Workshop, (1998), pp [15] C. -H. Lin, J. -C. Liu, C. -T. Kuo, M. -C. Chou and T. -C. Yang, Safeguard Intranet Using Embedded and Distributed Firewall System, International Journal of Future Generation Communiation and Networking (IJFGCN). Syst. Rev., vol. 2, no. 1, (29), pp [16] J. Xie, S. Yin, X. Ruan, Z. Ding, Y. Tian, J. Majors, A. Manzanares and X. Qin, Improving MapRedue performane through data plaement in heterogeneous Hadoop lusters, in: Parallel Distributed Proessing, Workshops and Phd Forum (IPDPSW), 21 IEEE International Symposium on, doi:1.119/ipdpsw, (21) April, 54788, pp [17] S. -C. Kim and J. -M. Chung, Message Complexity Analysis of Mobile Ad Ho Network Address Autoonfiguration Protools Mobile Computing, IEEE Transations, (28), pp [18] S. V. Viraktamath and G. V. Attimarad, Impat of Quantization Matrix on the Performane of JPEG, International Journal of Future Generation Communiation and Networking (IJFGCN), Syst. Rev., vol. 4, no. 3, (211), pp [19] M. Laoste, Arhiteting Adaptable Seurity Infrastrutures for Pervasive Networks through Components, International Journal of Future Generation Communiation and Networking (IJFGCN), Syst. Rev., vol. 3, no. 1, (21), pp [2] F. Marozzo, D. Talia and P. Trun-fio, A peer-to-peer framework for supporting mapredue appliations in dynami loud environments, in Nik Antonopoulos and Lee Gillam, editors, Cloud Computing, vol. of Computer Communiations and Networks, Springer London, (21), pp Authors Hailong Wang reeived the BS in omputer siene from North Jiaotong University, China, in 1998,and reeived the MS in omputer siene from Lanzhou Jiaotong University, China,in 27.Currently,he is an assistant professor in Computer & Information Engineering College at Inner Mongolia Normal University, China. His researh interests inlude embedded system and muti-ore proessors, and also fault tolerane and real-time database. Jiong Xie reeived the BS and MS degrees in omputer siene from BUAA (Beijing University of Aeronautis and Astronautis), China, in 24 and 28. He is urrently working toward the PhD degree at the Department of Computer Siene and Software Engineering, Auburn University. His researh interests inlude sheduling tehniques and parallel algorithms for lusters, and also multi-ore proessors and software tehniques for I/O-intensive appliations. 39

10 Vol. 7, No. 3, May,

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS HENRI COANDA AIR FORCE ACADEMY ROMANIA INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 015 Brasov, 8-30 May 015 GENERAL M.R. STEFANIK ARMED FORCES ACADEMY SLOVAK REPUBLIC GABOR AND WEBER LOCAL DESCRIPTORS

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

BENEFICIARY CHANGE REQUEST

BENEFICIARY CHANGE REQUEST Poliy/Certifiate Number(s) BENEFICIARY CHANGE REQUEST *L2402* *L2402* Setion 1: Insured First Name Middle Name Last Name Permanent Address: City, State, Zip Code Please hek if you would like the address

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

Wireless Transmission Systems. Instructor

Wireless Transmission Systems. Instructor Teleommuniation Engineering Tehnology, Texas A&M University Wireless Transmission Systems Leture Notes - Copyright Jeff M. MDougall 2 Wireless Transmission Systems Teleommuniation Engineering Tehnology,

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia A PROGRAM FOR SOLUtiON OF LARGE SCALE VEHICLE ROUTING PROBLEMS By JEFFREY ALLAN ROBBINS Bahelor of Siene Virginia Polytehni Institute and State University Blaksburg, Virginia 1974 II Submitted to the Faulty

More information

Retirement Option Election Form with Partial Lump Sum Payment

Retirement Option Election Form with Partial Lump Sum Payment Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7 Export Finane Program Guidelines Table of Contents Setion I General...........................................................1 A. Introdution............................................................1

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES

NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES The 9 th International Days of Statistis and Eonomis, Prague, September 10-1, 015 NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES Zdeněk Šul Hana Řezanková

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

protection p1ann1ng report

protection p1ann1ng report f1re~~ protetion p1ann1ng report BUILDING CONSTRUCTION INFORMATION FROM THE CONCRETE AND MASONRY INDUSTRIES Signifiane of Fire Ratings for Building Constrution NO. 3 OF A SERIES The use of fire-resistive

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Picture This: Molecular Maya Puts Life in Life Science Animations

Picture This: Molecular Maya Puts Life in Life Science Animations Piture This: Moleular Maya Puts Life in Life Siene Animations [ Data Visualization ] Based on the Autodesk platform, Digizyme plug-in proves aestheti and eduational effetiveness. BY KEVIN DAVIES In 2010,

More information

THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING. NURS 6390-004 Introduction to Genetics and Genomics SYLLABUS

THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING. NURS 6390-004 Introduction to Genetics and Genomics SYLLABUS THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING NURS 6390-004 Introdution to Genetis and Genomis SYLLABUS Summer Interession 2011 Classroom #: TBA and 119 (lab) The University of Texas at Arlington

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data

Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data Criminal Georaphial rofilin: Usin FCA for Visualization and Analysis of Crime Data Quist-Aphetsi Kester, MIEEE Leturer, Faulty of Informatis Ghana Tehnoloy University Collee Ara, Ghana Email: kquist-aphetsi@tu.edu.h

More information

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain Produtivity Marketpla e Software as a Servie Invoiing Ordering Domains Customer Reporting for SaaS Appliations Domain Basis Managing my Domain Managing Domains Helpful Resoures Managing my Domain If you

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introdution 1.1 Pratial olumn base details in steel strutures 1.1.1 Pratial olumn base details Every struture must transfer vertial and lateral loads to the supports. In some ases, beams or

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

computer science Program Educational Objectives

computer science Program Educational Objectives omputer siene bahelor of siene minor ertifiates: managing information on the world wide web master of siene in omputer siene master of siene in software engineering advaned ertifiate programs: bioinformatis

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

Annual Return/Report of Employee Benefit Plan

Annual Return/Report of Employee Benefit Plan Form 5500 Department of the Treasury Internal Revenue Servie Department of Labor Employee Benefits Seurity Administration Pension Benefit Guaranty Corporation Annual Return/Report of Employee Benefit Plan

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

A Design Environment for Migrating Relational to Object Oriented Database Systems

A Design Environment for Migrating Relational to Object Oriented Database Systems To appear in: 1996 International Conferene on Software Maintenane (ICSM 96); IEEE Computer Soiety, 1996 A Design Environment for Migrating Relational to Objet Oriented Database Systems Jens Jahnke, Wilhelm

More information

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

1.3 Complex Numbers; Quadratic Equations in the Complex Number System*

1.3 Complex Numbers; Quadratic Equations in the Complex Number System* 04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x

More information

CARRIER VOICE NETWORK MANAGEMENT

CARRIER VOICE NETWORK MANAGEMENT CARRIER VOICE NETWORK MANAGEMENT Elvis N. Ngah Supervised by: Dr. Sandjai Bhulai Department of Mathematis Vrije Universiteit Amsterdam The Netherlands Deryk Cole Network Operations Center Telesonique Global

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD Ghada F.Elkaany,

More information

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters nternational Journal of Supply and Operations Management JSOM November 0, Volume, ssue 3, pp. 60-78 SSN-Print: 383-359 SSN-Online: 383-55 www.ijsom.om Mathematial modeling for EOQ inventory system with

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

Social Network Analysis Based on BSP Clustering Algorithm

Social Network Analysis Based on BSP Clustering Algorithm Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum ABSRAC Soial network analysis is a new researh field in data mining. he lustering

More information

Ranking Community Answers by Modeling Question-Answer Relationships via Analogical Reasoning

Ranking Community Answers by Modeling Question-Answer Relationships via Analogical Reasoning Ranking Community Answers by Modeling Question-Answer Relationships via Analogial Reasoning Xin-Jing Wang Mirosoft Researh Asia 4F Sigma, 49 Zhihun Road Beijing, P.R.China xjwang@mirosoft.om Xudong Tu,Dan

More information

London Metropolitan Business School

London Metropolitan Business School North Campus London Metropolitan Business Shool Publi Relations Single Honours Degree Course Handbook For admission to Certifiate Level in 2011-2012 PBR4N Undergraduate Aademi Year 2011-2012 AUTUMN SEMESTER

More information