DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

Size: px
Start display at page:

Download "DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing"

Transcription

1 World Applied Scieces Joural 23 (11): , 2013 ISSN IDOSI Publicatios, 2013 DOI: /idosi.wasj DDoS Verificatio ad Attack Packet Droppig Algorithm i Cloud Computig Muhammad Zakarya Departmet of Computer Sciece, Abdul Wali Kha Uiversity, Marda, Pakista Submitted: Ju 8, 2013; Accepted: Jul 17, 2013; Published: Jul 25, 2013 Abstract: DDoS attacks o the World Wide Web i broad-spectrum ad predomiatly i moder cloud computig has become a oticeable issue for researchers i academia ad idustry related to the field of computer scieces. DDoS attacks are cool to provoke but their ucoverig is a very challegig ad digy task ad therefore, a eye-catchig weapo for hackers. Hece DDoS torrets do ot have familiar appearaces; therefore curretly existig IDS caot idetify ad discover these attacks perfectly. Correspodigly, there implemetatio is a bamboozlig task. I practice, gossip based detectio machies are used to detect such types of attacks by exchagig stream of traffic over lie but still results i etwork cogestio ad have upstairs of superfluous ad bous packets. Keepig the above drawbacks i mid, we have proposed a DDoS detectio ad prevetio mechaism i [1], that has the attractiveess of beig easy to adapt ad more trustworthy tha existig couterparts. We have itroduced etropy based detectio mechaism for DDoS attack detectio. I [2] we have implemeted the same algorithm to grids platform, where we obtai a accuracy of 90%. Our proposed solutio has o overhead of extra packets, hece resultig i good QoS. I this paper we are goig to implemet the same algorithm o clouds. Key words: DdoS QoS IDS AS ADS CloudSim INTRODUCTION carriage of a large amout of packets to a objective machie, usig istataeous teamwork of umerous Cloud computig is a most moder ad hottest hosts which are scattered throughout the cloud buzzword owadays, emerges as a key service of the computig eviromet. The rest of paper is orgaized as utility or o-demad computig [1] which builds o follows. I sectio 2 some related work is preseted. decade of research i the groud of computer etworkig, Sectio 3 is about our previous work followed by existig World Wide Web ad software services. People are problem i ext sectio. Solutio to the existig problem lookig for fastest, QoS, secure, efficiet ad reliable is discussed i sectio 5 followed by simulatio results i services ad that s why a umber of researchers are ext sectio. Performace evaluatio are show i sectio devoted to the distributed computig research icludig 7. Fially some cocludig remarks ad future work is clusters, HPC, grids ad clouds. Cloud computig put discussed i sectio 8. forwards a service orieted architecture, reduced iformatio techology overhead for the ed-user, Related Work: Accordig to [3, 4], ay statemets that eormous ad huge flexibility ad reduced total cost of owership. Recet attacks o the clouds especially DDoS poses as a potetial itimidatio ad dager to this key have some shock ad importace are called iformatio. Some believe that iformatio theory is to be a subset of commuicatio theory, but we cosider it much more. techology of the expectatios ad future. I this paper Etropy is a measure of the chaos of a group of particles d we are goig to preset a ew DDoS attack cofirmatio i.e. 2 law of thermodyamics. If there are a umber of possible messages, the each oe ca be expected to ad packet droppig algorithm for cloud eviromet. occur after certai fractio of time kow as probability of A etropy based ADS approach is preseted to mitigate the message. I [9-15] Shao proved that iformatio the attack which further improves etwork performace i cotet of a message is iversely related to its probability terms of computatioal time, QoS ad high availability. of occurrece. To summarize, the more ulikely a message SaaS, PaaS, IaaS ad IT foudatio are four basic types of is, the more iformatio it cotais. I [6, 16], Etropy cloud computig. DDoS attacks are throw through H(X) is give by Correspodig Author: Muhammad Zakarya, Departmet of Computer Sciece, Abdul Wali Kha Uiversity, Marda, Pakista. 1418

2 ( ) p( x) log p( x) H X = x x (1) The log is to the base 2 ad etropy is expressed i bits. To say ucertaity is directly proportioal to etropy i.e. more accidetal they are, more etropy is there. The value of etropy lies betwee 0 ad log(). The etropy value is smaller whe the class distributio belogs to oly oe ad same class while etropy value is larger whe the class distributio is more eve. Therefore, comparig etropy values of some traffic feature to that of aother traffic feature provides a mechaism for detectig chages i the upredictability. We use traffic distributio like IP address ad applicatio port umber i.e. (IP address, Port). If we wats to calculate etropy of packets at a sigle or uique source i.e. 32 destiatio, the maximum value of must be 2 for IPV4 address. Similarly if we wat to gauge etropy at multiple applicatio ports the value of is the total umber of ports [5, 7, 17, 18]. I similar way, p(x) where x º X, is the probability that X takes the value x. We radomly examie X for a fix time widow (w), the p(x) = m/m i Where, m i is the total umber we examie that X takes value x i.e m = i= 1 mi Puttig these values i etropy equatio 1, we get (2) Fig. 1: Proposed Cloud Architecture [1] Remember that total umber of packets is the umber of packets observed i a specific time slot (w). Whe this calculatio fiishes, ormalized etropy is calculated to get the overall probability of the captured flow i a specific time widow (w). Normalized Etropy is give by Normalized etropy = H / log o ( Where is the umber of dissimilar values of x, i a o specific time slot (w). Durig the attack, the attack flow domiates the whole traffic, resultig i decreased ormalized etropy. To cofirm our attack detectio, agai we have to calculate the etropy rate i.e. growth of etropy values for radom variables, provided that the limit exists ad is give by (6) ( ) ( mi/m) log( mi/m) H X = i= 1 (3) H 1 ( ) = lim H( x, x...x ) 1 2 (7) Similarly, if we wat to calculate the probability p(x), the m is the etire umber of packets, but m i is the umber of packets with value x at destiatio as source [8]. Mathematically give as Nuber of pac kets with x i as source ( destiatio) address P( x) = Total umber of packets Agai if we wat to calculate probability p(x) for each destiatio port, the Nuber of pac kets with x i as source ( destiatio) port P( x) = Total umber of packets (4) (5) Proposed Solutio ad Results: I [1] the authors proposed a cloud architecture ad a DDoS detectio mechaism that has the beauty of beig easy to adapt ad more reliable tha existig couterparts. The author s claims, that their proposed solutio has o overhead of extra packets, hece resultig i good QoS. The architecture is show i Fig 2. The whole cloud eviromet is divided ito multiple sites either o geographical or admiistrative base. Every CS is uder the cotrol of a powerful AS. Our ADS is istalled o every edge router. Our cofirmatio algorithm eeds to be istalled o subsequet ad attached router to the edge router. Oce DDoS [19-21] is detected at edge router, the flow is trasferred to ext eighborig router, where agai the flow is checked agaist those iformatio that were collected o edge router. If there is o chage the attack 1419

3 is cofirmed ad the packet is discarded or dropped. Otherwise the packet is throw to its destiatio o its way. CloudSim was used for the evaluatio of this approach. Results see are of iterest but high etwork access ca lead to icrease false positive rate. I ext sectio we are goig to propose a cofirmatio algorithm to limit these false positives. Our ADS ca detect 100% DDoS attack oly i case of good threshold value, which is oe of the most challegig tasks i developig ay ADS. We coclude our story that a threshold value of 0.97 results i good detectio rate. A value greater tha 0.97, results i good detectio rate i.e. 100 % DDoS detectio but geerate more false positive alarms, as the value is icreased from 0.97 to 1.0. I [2] we guessed a perfect threshold value of 0.95 while simulatig i GridSim. Differeces are due to the high umber of packets. We coclude by examiig small, medium ad large flow of etwork packets, that where umber of packets are icreased i a platform, we have to set the threshold value a little bit larger. The steps i algorithm are as uder. Fig 5 shows the flow diagram of detectio algorithm. Existig Problem: We have proposed a DDoS detectio ad prevetio mechaism i [1], that has the beauty of beig easy to adapt ad more depedable tha existig couterparts. As, i service level security issues DoS, DDoS ad etwork overcrowdig, are most importat. Solvig the dispute of DDoS attack also results i etwork high availability as well as good QoS. The problem i that solutio was that, i huge etwork usage or cogested etwork flow our proposed detectio algorithm will raise the attack alarm i.e. false positives, but it is ot always be the case. To cofirm the attack flow ad decide to flush out or washout the flow, we are goig to propose a cofirmatio algorithm, i this paper. Proposed Packet Droppig Algorithm: I [1, 3, 22] the authors proposed etropy rate for cofirmatio of the attack flow, but still o exact solutio was proposed. Etropy rate shows the icrease or decrease ratio of distributio. We are goig to exted our idea i this article ad will propose ad study a DDoS cofirmatio algorithm. Based o the results of such a cofirmatio algorithm the router will decide either to allow the flow of packets or to discard ad drop that packet flow. We eed such a algorithm because durig high etwork access our DDoS detectio algorithm will geerate false positives Fig. 2: Flow diagram [1] Fig. 3: Cofirmatio Algorithm ad will alert the ext edge router for DDoS attack, but it might ot be the case. Our ADS is istalled o each edgig router. Our verificatio algorithm eeds to be istalled o cosequet ad attached router to the edge router [22-26]. Oce DDoS is detected at edge router, the flow is trasferred to subsequetly adjacet router, where for a secod time the flow is checked agaist those iformatio that were claimed [27, 28] o edge router. If there is o alteratio the attack is cofirmed ad the packet is superfluous oe ad hece eeds to be dropped. Otherwise the packet is throw to its target ode or system o its ow way. We have used CloudSim for simulatio of our algorithm ad have compared a umber of cases to coclude performace evaluatio. A simple ad straightforward solutio is to ru the same algorithm o receiver side router. But the problem is that we are goig to detect ad drop the packet flow early i.e. ear the source. Suppose i Fig 6 below the user ab1 1420

4 Fig. 4: Flow diagram Fig. 6: Packet Flow Diagram Fig. 7: DDoS Detectio o Router 1 Fig. 5: Simulatios Study seds 90 packets to cb1, 91 packets to cb2 ad 34 packets to cb3. Whe etropy is calculated o r1, the attack is detected. Whe this flow reaches to r2, the packets that were addressed to cb3 are directed o differet way. Agai if we calculate etropy of ab1 o r3, o attack is detected. It results i, if we calculate etropy i.e. if we ru our detectio algorithm two times o edge router to seder ad receiver, the to some extet we will accurately measure DDoS ad ca drop oly attack packets. If the algorithm calculates same values, it meas the attack is cofirmed otherwise the packets are forwarded to its destiatio. The problem is that we eed to detect ad cofirm the attack ear to the source, so that the badwidth is ot wasted. The goal caot be achieved i this solutio. We ca ru the same detectio algorithm o ext edge router but still if the etwork is so large cosisted upo 100 routers. There is the possibility that Fig. 8: DDoS Detectio o Router 2 Fig. 9: DDoS Cofirmatio for Router 1 flow o Router

5 Table 1: Traffic at Router 1 Source ode Destiatio ode No of packets R1 R3 Etropy (R1) Etropy (R3) AB1 CB AB2 CB AB1 BB AB2 BB Router etropy for R1 is 1.43 ad ormalized etropy for R1 is Similarly router etropy for R3 is 1.35 ad ormalized etropy for R3 is Table 2: Traffic at Router 2 Source ode Destiatio ode No of packets R1 R3 Etropy (R1) Etropy (R3) AB3 CB AB4 CB AB3 CB AB4 CB Router etropy for R1 is 1.49 ad ormalized etropy for R1 is Similarly router etropy for R3 is 1.21 ad ormalized etropy for R3 is Table 3: Traffic at Router 3 Source ode Destiatio ode No of packets Etropy (R1) AB1 CB AB2 CB AB3 CB AB4 CB AB4 CB Router etropy for R3 is 2.28 ad ormalized etropy for R3 is the attack flow will remai o oe path crossig over multiple routers. It will cofirm the attack without ay cocer that i future the flow may be distributed over multiple paths. Followig are the steps for cofirmatio of the DDoS attack. Decide a threshold value 2 Calculate etropy rate o edge router usig Equatio VII Compare etropy rates o that router, if =< 2, DDoS cofirmed Drop the attack flow Fig. 10: DDoS detectio ad cofirmatio rate Fig. 11: DDoS false positive rate Simulatios Study ad Results: Fig 7 shows the simulatio eviromet that was created i CloudSim Simulator. To compare grids ad clouds we have implemeted the same sceario to extract more results [2]. The oly differece is that the threshold value i higher tha that was cosidered i [2]. The threshold value of 0.97 was always adjusted i [1], durig the detectio phase. The above simulatio eviromet was desiged ad developed i CloudSim simulatio eviromet. Routers are coected to each other over a 10 Mbps lik ( ), while all other coectios are made at 1 Mbps lik ( ). The reaso behid this termiology is clear as router forward more data packets as compared to a sigle trasmittig ode. Detectio algorithm was executed o Router 1 ad Router 2. O both routers attack was detected. The cofirmatio algorithm was executed o Router 3. The attack was ot cofirmed o this router; hece the flow was delivered to its destiatio odes. 1422

6 Fig 6 shows packets flows that were captured durig 2. Zakarya, M. ad S. Afzal, DDoS the experimets. I our experimet, our detectio algorithm shows that o routers 1 DDoS was detected but ot cofirmed. Similarly o Router 2, o DDoS flow was detected. Durig the coformatio process o router 3, the flow was cofirmed as a attack, hece packet drop mechaism was activated ad the flow was successfully dropped. Performace Evaluatio: We observed that a threshold value of 0.97 results i good detectio rate ad a threshold value of 0.90 results i good cofirmatio. A value greater tha 0.97 ad 0.90, results i good detectio rate ad cofirmatio i.e. 100 % DDoS detectio ad cofirmatio, respectively but geerate more false positive alarms, as the value is icreased from 0.97 to 1.0 i.e. false detectio alarm or 0.90 to 1.0 i.e. false cofirmatio alarm. The reports are show i figure 10 ad figure 11, which are self-explaatory. Our experimets show that as more attacks are detected, more attacks are also cofirmed ad vice versa. I some situatios that might ot be the case, as its ot assured that more etwork traffic will always cause DDoS. Still the topic eeds researcher s attetio for further exploratio ad solutios. Coclusio ad Future Work: I this paper, we have proposed a ew solutio ad algorithm [25-27] to DDoS attack cofirmatio ad attack packet droppig for cloud computig [7, 8]. I previous versio of this article we itroduced a ADS for recogitio ad early prevetio of DDoS attacks i our suggested architecture. The problem of huge etwork access resulted false positive alarms. That issue was subject of this article. Our DdoS attack packet droppig algorithm will cofirmthe attack flow, if it is a attack flow, the flow is discarded otherwise the flow is cosidered legitimate data packets ad are forwarded to its destiatio, without ay cocer that it was targeted as a DDoS attack flow o the edge router. I future the proposed desig ad suggestio may be actually implemeted over cloud computig platform to precisely detect DDoS attacks [28-30]. The idea may also be exteded for recovery mechaism for DDoS attacks. REFERENCES 1. Zakarya, M. ad A.A. Kha, Cloud QoS, High Availability ad Service Security Issues with Solutios. IJCSNS, 12(7): 71. Cofirmatio ad Attack Packet Droppig Algorithm i O-Demad Grid Computig Platform. VAWKUM Trasactio o Computer Scieces, 1(1). 3. Claude Shao, E., A Mathematical Theory of Commuicatio, 4. Claude Shao, E., Commuicatio Theory of Secrecy Systems, 5. Cloud Security Alliace. Top Threats To Cloud Computig. Techical Report, March ml. 6. David Applebaum, Probability ad Iformatio (A Itegrated Approach), Cambridge Uiversity Press, Thomas M. Cover ad Joy A. Thomas, Elemets of Iformatio Theory, Secod Editio, 8. Deis Arturo Ludeña Romaña ad Yasuo Musashi, Etropy Based Aalysis of DNS Query Traffic i the Campus Network, Japa 9. George Nychis, A Empirical Evaluatio of Etropy-based Aomaly Detectio, May Zakarya, M., AA. Kha ad H. Hussai, Grid High Availability ad Service Security Issues with Solutios, ICIIT 2010, /10 / $ C 2010 IEEE 11. Zakarya, M. ad I. Ur Rahma, A Short Overview of Service Discovery Protocols for MANETS. VAWKUM Trasactio o Computer Scieces, 1(2). 12. Meeakshi, S. ad S.K. Srivatsa, A Comprehesive Mechaism to reduce the detectio time of SYN Floodig Attack, 13. Preeti, Yogesh Chaba ad Yudhvir Sigh, Review of Detectio ad Prevetio Policies for Distributed Deial of Service Attack i MANET, 14. Thomas M. Cover ad Joy A. Thomas, Elemets of Iformatio Theory, Secod Editio, 15. Mazur Murshed ad Rajkumar Buyya, Usig the GridSim Toolkit for Eablig Grid Computig Educatio, Moash Uiversity, Australia. 16. George Nychis, A Empirical Evaluatio of Etropy-based Aomaly Detectio. 17. Yi-Chi Wu, Wuu Yag ad Rog-Horg Ja, DDoS Detectio ad Trace-back with Decisio Tree ad Gray Relatioal Aalysis, Natioal Chiao Tug Uiversity, Taiwa. 1423

7 18. Zakarya, M., N. Dilawar, M.A. Khattak ad M. Hayat, 24. Kha, A.A. ad M. Zakarya, Performace Eergy Efficiet Workload Balacig Algorithm Sesitive Power Aware Multiprocessor Schedulig for Real-Time Tasks over Multi-Core. World Applied i Real-time Systems. Techical Joural UET Taxila Scieces Joural, 22(10): (Pakista). 19. Zakarya, M., I.U. Rahma, N. Dilawar ad R. Sadaf, 25. Zakarya, M., I. Rahma ad I. Ullah, A A itegrative study o bioiformatics computig Overview of File Server Group i Distributed cocepts, issues ad problems. Iteratioal Joural Systems. of Computer Sciece (IJCSI), 8(6). 26. Zakarya, M., I.U. Rahma ad A.A. Kha, 20. Zakarya, M. ad I.U. Rahma, A Secure Packet (2012, October). Eergy crisis, global warmig ad IT Drop Defese Mechaism i Wireless Mobile Ad- idustry: Ca the IT professioals make it better hoc Networks, IJREAT 2013 some day? A review. I Emergig Techologies 21. Cha, B. ad J. Kim, Study of Multistage (ICET), 2012 Iteratioal Coferece o (pp: 1-6). Aomaly Detectio for Secured Cloud Computig IEEE. Resources i Future Iteret. I Depedable, 27. Goyal, U., G. Bhatti ad S. Mehmi, A Dual Autoomic ad Secure Computig (DASC), 2011 Mechaism for defeatig DDoS Attacks i Cloud IEEE Nith Iteratioal Coferece Computig Model. O, pp: IEEE 28. Jeyathi, N. ad N.C.S.N. Iyegar, Kar, S., A Aomaly Detectio Scheme for A Etropy Based Approach to Detect ad DDoS Attack i Grid Computig (Doctoral Distiguish DDoS Attacks from Flash Crowds i dissertatio). VoIP Networks. Iteratioal Joural of Network 23. Syed Navaz, S.A., V. Sageetha ad C. Prabhadevi, Security, 14(5): Etropy based Aomaly Detectio System to Prevet DDoS Attacks i Cloud. Iteratioal Joural of Computer Applicatios, 62(15):

DDoS Confirmation & Attack Packet Dropping Algorithm in On- Demand Grid Computing Platform

DDoS Confirmation & Attack Packet Dropping Algorithm in On- Demand Grid Computing Platform DDoS Confirmation & Attack Packet Dropping Algorithm in On- Demand Grid Computing Platform Muhammad Zakarya, Zahoor Jan, Imtiaz Ullah, Nadia Dilawar and Uzm Abstract- Distributed denial of service (DDoS)

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia sumitk-cs209@itrkl.ac.i, bdsahu@itrkl.ac.i ABSTRACT: Grid computig is

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Online Banking. Internet of Things

Online Banking. Internet of Things Olie Bakig & The Iteret of Thigs Our icreasigly iteretcoected future will mea better bakig ad added security resposibilities for all of us. FROM DESKTOPS TO SMARTWATCHS Just a few years ago, Americas coducted

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Pre-Suit Collection Strategies

Pre-Suit Collection Strategies Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

DDoS Attack Detection and Attacker Identification

DDoS Attack Detection and Attacker Identification DDoS Attack Detectio ad Attacker Idetificatio Brajesh Kashyap Departmet of Computer Sciece ad Egieerig Natioal Istitute of Techology Rourkela- 769008 S.K.Jea Departmet of Computer Sciece ad Egieerig Natioal

More information

Comparative Analysis of Round Robin VM Load Balancing With Modified Round Robin VM Load Balancing Algorithms in Cloud Computing

Comparative Analysis of Round Robin VM Load Balancing With Modified Round Robin VM Load Balancing Algorithms in Cloud Computing Iteratioal Joural of Egieerig, Maagemet & Scieces (IJEMS) Comparative Aalysis of Roud Robi Balacig With Modified Roud Robi Balacig s i Cloud Computig Areeba Samee, D.K Budhwat Abstract Cloud computig is

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Characterizing End-to-End Packet Delay and Loss in the Internet

Characterizing End-to-End Packet Delay and Loss in the Internet Characterizig Ed-to-Ed Packet Delay ad Loss i the Iteret Jea-Chrysostome Bolot Xiyu Sog Preseted by Swaroop Sigh Layout Itroductio Data Collectio Data Aalysis Strategy Aalysis of packet delay Aalysis of

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern. 5.5 Fractios ad Decimals Steps for Chagig a Fractio to a Decimal. Simplify the fractio, if possible. 2. Divide the umerator by the deomiator. d d Repeatig Decimals Repeatig Decimals are decimal umbers

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Bio-Plex Manager Software

Bio-Plex Manager Software Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable

More information

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks , pp.279-288 http://dx.doi.org/10.14257/ijsia.2013.7.5.26 A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology,

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Bond Valuation I. What is a bond? Cash Flows of A Typical Bond. Bond Valuation. Coupon Rate and Current Yield. Cash Flows of A Typical Bond

Bond Valuation I. What is a bond? Cash Flows of A Typical Bond. Bond Valuation. Coupon Rate and Current Yield. Cash Flows of A Typical Bond What is a bod? Bod Valuatio I Bod is a I.O.U. Bod is a borrowig agreemet Bod issuers borrow moey from bod holders Bod is a fixed-icome security that typically pays periodic coupo paymets, ad a pricipal

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

SPC for Software Reliability: Imperfect Software Debugging Model

SPC for Software Reliability: Imperfect Software Debugging Model IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1 Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig

More information

Vulnerability test system for SIP network elements

Vulnerability test system for SIP network elements Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic

More information

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means)

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means) CHAPTER 7: Cetral Limit Theorem: CLT for Averages (Meas) X = the umber obtaied whe rollig oe six sided die oce. If we roll a six sided die oce, the mea of the probability distributio is X P(X = x) Simulatio:

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

Simple Annuities Present Value.

Simple Annuities Present Value. Simple Auities Preset Value. OBJECTIVES (i) To uderstad the uderlyig priciple of a preset value auity. (ii) To use a CASIO CFX-9850GB PLUS to efficietly compute values associated with preset value auities.

More information

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III)

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III) COMPUSOFT, A iteratioal joural of advaced computer techology, 3 (3), March-2014 (Volume-III, Issue-III) ISSN:2320-0790 Adaptive Workload Maagemet for Efficiet Eergy Utilizatio o Cloud M.Prabakara 1, M.

More information

MEETING OF THE GRADUATE ASSEMBLY THE UNIVERSITY OF TEXAS AT ARLINGTON. February 15, 2001

MEETING OF THE GRADUATE ASSEMBLY THE UNIVERSITY OF TEXAS AT ARLINGTON. February 15, 2001 DRAFT GA 02-3-1 MEETING OF THE GRADUATE ASSEMBLY THE UNIVERSITY OF TEXAS AT ARLINGTON February 15, 2001 The Graduate Assembly meetig of February 15, 2001 was called to order by Chair K. Behbehai at 2:30

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

Verifying the Availability of Cloud Applications

Verifying the Availability of Cloud Applications Melaie Siebehaar, Olga Wege, Roy Has, Hasa Terca, Ralf Steimetz: Verifyig the Availability of Cloud Applicatios. I: Proceedigs of the 3rd Iteratioal Coferece o Cloud Computig ad Services Sciece (CLOSER

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized? 5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING LOAD BALACIG I PUBLIC CLOUD COMBIIG THE COCEPTS OF DATA MIIG AD ETWORKIG Priyaka R M. Tech Studet, Dept. of Computer Sciece ad Egieerig, AIET, Karataka, Idia Abstract Load balacig i the cloud computig

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks Uiversità di Bergamo Facoltà di Igegeria dell Iformazioe e etodi atematici La Protezioe elle Reti di Telecomuicazioe A Priority-Aware Protectio Techique for QoS Eabled WD etworks Fabio artigo Sommario

More information

Flood Emergency Response Plan

Flood Emergency Response Plan Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

SIP Threats Detection System

SIP Threats Detection System SIP Threats Detectio System MIROSLAV VOZNAK, FILIP REZAC Departmet of Telecommuicatios VSB Techical Uiversity of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.vozak@vsb.cz, filip.rezac@vsb.cz

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information