Cyber-Security Via Computing With Words
|
|
|
- Justin Gardner
- 10 years ago
- Views:
Transcription
1 Cyber-Seurty Va Computng Wth Words John. Rkard Dstrbuted Infnty, In Shoshone Drve Larkspur, CO 808 Emal: ABSRAC Cyber-seurty systems must deal wth a hgh rate of observable events essentally n real tme. In order to detet malous behavors on a network, these raw events typally must be aggregated nto features orrespondng to hgher-level desrptons of network atvtes, from whh nferenes an be made onernng suspous behavors. hs paper employs a omputatonally feasble approah to formulatng human- or mahne-generated queres n large yber-networks, usng word desrptons of both the features and the queres. he word desrptons are modeled usng nterval type- (I) fuzzy membershp funtons (MF) on an approprate sale. By pre-omputng and storng approprate desrptors of these MFs, we an perform automated montorng of large ybernetworks n real tme. We llustrate our approah wth an etended eample. I INRODUCION In prevous work [], we desrbed an approah to pereptual omputng n soal networks, based upon Yager s Paradgm for Intellgent Soal Network Analyss (PISA) [],[3]. hs work etended Yager s results to the use of nterval type- (I) membershp funton (MF) representatons of word voabulares desrbng node attrbutes and relatonshps. he advantage of ths approah s that t enables us to partton features havng ontnuous ranges of values nto a set of word desrptors havng an adequate degree of preson to perform query operatons, whle substantally redung the omputatonal requrements. In a reent paper [4] we etended ths approah to word-based queres of yber-networks, n whh the nodes onsst of both users and network deves. he understandng of yber network behavor requres ntellgent queres of Allen Ott Dstrbuted Infnty, In. 38 Quartz Mountan Drve Larkspur, CO 808 Emal: [email protected] large volumes of very detaled data that s at the same tme mprese wth respet to nluson n any gven behavor dentfaton. For eample, tme of day of a remote logn to a database server s typally reported n mllseonds of Unversal me n the yber network event stream and the relevant desred nformaton s whether or not the logn ourred durng the normal work day. he symbol word desrptons enable and manage the mpreson wthn the detaled data through word desrptons of the feature spae, and enable fully modeled desrptons of the behavor through word desrptons of the queres. hs paper employs the analytal foundaton n [4] to llustrate ts applaton n yber-seurty. II REVIEW OF ECHNICAL APPROACH We frst revew some of the tehnal bakground provded n []-[4]. A yber-network onssts of a set X of nodes eah haraterzed by a olleton of attrbutes U on whh a vetor fuzzy set F ( U ) s defned. For eample, U mght represent the eperene level and the omputer sene sklls of a system user, and elements of F mght then nlude fuzzy sets rangng from nove to guru n the frst nstane, or very low to epert n the seond nstane. Alternatvely, U mght represent the frequeny of aesses to a set of fles and the level of traff over a port n a network deve. In ths ase, the element of F mght then nlude fuzzy sets rangng from seldom ever to very often n the frst nstane, or very low to very hgh n the seond nstane. A fuzzy relatonshp Ry (,): XX 0, represents the strength of the onneton between nodes, y X, where a node an be ether a person or a deve. Suh a onneton mght desrbe, for eample, the ntensty of ommunatons between two users, or between ASE 04 ISBN:
2 two deves, or between a user and a deve on the network. ypally, many dfferent relatonshps wll be of nterest n haraterzng a yber-network, eah of them havng ts own desrptve matr funton Ry. (,) R( y,) represents the dret lnk strength between a par of nodes wthout any ntervenng lnks. hs s generalzed through the omposton operator defned by R (,) z R(,) zr(,) z ma mn Ry (, ), Ryz (, ), () yx y, z where by onventon, R 0 (,) z 0 and R (,) z R(,) z, and by the reursve relatonshp k k R (,) z R(,) zr (,) z () k From (), R (,) z s the strongest onneton between and z nvolvng at most k ntervenng lnks. hese defntons are etensble to type- fuzzy membershps for the elements of F and R, whose MFs are defned n terms of ther -uts F and R []-[4]. he type- formulaton an further be etended to I fuzzy sets, where these sets are used to represent words desrbng the attrbute membershps and relatonshp strengths. Use of I fuzzy sets to desrbe these words aptures both the granularty and the mpreson n the meanngs of suh words. hs Computng wth Words (CWW) approah orgnally was proposed by Zadeh [5] and later advaned by Mendel and Wu [6], and t provdes an analytal means of epressng the often mprese knowledge of node membershps and lnk strengths, as ompared to usng rsp sngleton values. he strength of a path,,, 0 n a set of nodes s defned by between S ( ) m n R (, ),,, 0,, (3) for eah -ut, whle the path length s defned by L ( ),,, 0,. (4) n R (, ) he measures S ( ) and L () an n turn be used to desrbe suh terms as strong path or short path, from whh we defne addtonal network features and desrptons. wo of partular nterests n yber-networks are a work group and the entralty of a partular node. A work group Q mght for eample be defned as a subset of users and network deves n X suh that ) all elements n Q are onneted by short strong paths, and ) no element not n Q s onneted to any element n Q by a strong path. th he k -order entralty of a node may be defned as the normalzed sum of the strengths of the strongest paths between ths node and all other nodes n the network,.e., n k, j C R n j j. (5) Note that (5) provdes a measure both for the entralty of a gven user n a yber-network and for a gven deve on the network. Furthermore, one an restrt the sums n (5) to alulate four dfferent degrees of entralty approprate to yber-networks: ) between a gven user and all other users; ) between a gven user and all network deves; 3) between a gven network deve and all users; and 4) between a gven network deve and all other network deves. Eah of these entralty measures has ts own ASE 04 ISBN:
3 mportane relatve to queres and automated montorng funtons for yber-networks. A partularly powerful mean-type aggregaton operator known as the weghted power mean (WPM) was etended to I fuzzy nputs and weghts n [7],[8]. he WPM aptures several ommonly employed averagng operatons suh as the mnmum, harmon mean, geometr mean, arthmet mean, root-mean square and mamum, dependng upon the eponent p hosen. A further etenson to non-mean, thresholdng type aggregaton operators s desrbed n a forthomng par of papers [9],[0]. hese latter aggregaton operators aount for all-n and all-out type desons at threshold values ontrolled by a sngle parameter. WPM operators an also be used to onstrut onjuntve or dsjuntve partal absorpton operators [],[]. Conjuntve partal absorpton operators enable us to desgnate ertan of the nput varables as mandatory, n the sense that a good sore n eah of these nputs s neessary to produe an aggregate good sore, whle the other nputs are smply desrable, n the sense that a good sore n any of these enhanes the output sore but s not neessary to aheve a good overall sore. Smlarly, dsjuntve partal absorpton operators enable us to desgnate ertan of the nput varables as suffent, n the sense that a good sore n any one of these varables produes an aggregate good sore. he general dea behnd ths style of CWW s to spefy a voabulary of desrptve nput and mportane words, along wth ther orrespondng I MFs defned for eample on a sale of 0,0, and then spefy the type of nferene engne desred. Gven ths set of nput and mportane words, the engne omputes a orrespondng output I MF, whh may then be used dretly as omputed, or t may be deoded nto a word from an output voabulary va smlarty omputatons wth respet to the I MFs representng these output words. A ommonly used salar smlarty measure s the Jaard smlarty [3], whh provdes a symmetr, salar measure of the smlarty between two I MFs. In other nstanes, we may wsh to determne the degree to whh an output I MF A satsfes a ertan property, e.g., path shortness n a ybernetwork, as haraterzed by an I MF B. In these ases, we use the subsethood measure ss AB, to determne ths degree of satsfaton,.e., the degree to whh A s a subset of B. We employ a salar measure of ths quantty as proposed by Vlahos and Sergads [4]. Note that smlarty s a symmetr relatonshp between ts arguments, whereas subsethood s not. Further note that the doman X need not neessarly be one-dmensonal. For eample, we ould ompute the smlarty between two network proesses n a three-dmensonal work flow spae onsstng of team attrbutes, onnetons to servers, and data flow between team members, where the subjet enttes may be defned only mpresely va I fuzzy sets. III WORD QUERIES OF CYBER- NEWORKS Use of word representatons va I fuzzy MFs allows us easly to spefy both attrbutes and relatonshp strengths n a yber-network usng relatvely stat voabulares, rather than dealng wth a ontnuum of numeral values, and further enables us to perform word queres on these quanttes and ther dervatve features. Sne human nterpretaton of numeral values s almost always n terms of qualtatve epressons, we smply spefy a set of overlappng I MFs approprate to a gven voabulary and use words from these voabulares to desrbe node attrbutes and relatonshp strengths on the network. We an pre-ompute and store many of the quanttes of nterest n a yber-network. For eample, n plae of omputng the path strength of a gven path as n (3), the -ut representatons of the varous ombnatons of voabulary words an be pre-omputed and stored, and are then avalable for reall hs enables us to employ smple reall proessng n plae of omputatonally ntensve on-the-fly proessng. For eample, onsder the ase where 7-word voabulares are used to desrbe the elements of F and the relatonshp strengths R. hen we pre-ompute 777 = 343 I MFs for the ASE 04 ISBN:
4 possble ombnatons of F and R between any par of nodes and store the -uts, entrod ntervals and defuzzfed salar values orrespondng to these MFs. Gven the flow of event reords desrbng the dynams of a vrtual yber-network, ths provdes a hghly desrable tradeoff, even n ases where relatvely large voabulares may be requred. A smlar approah an be appled to path length alulatons as n (4). By employng the above approah, we also eplot the generalty of I representatons of attrbutes and relatonshps, whh apture the nherent mpreson n desrbng the mappng of atvtes to yber-networks, wthout payng a potentally nfeasble pre for on-the-fly omputatons nvolvng these quanttes n queres and/or dynam modelng for large vrtual networks. As well, a sophstated adversary frequently eplores hard thresholds n queres desgned to detet suspous atvty and then attempts to eplot suh knowledge to avod trggerng alerts. Our ablty to defne fuzzy boundares of nlusveness wth I funtons greatly omplates the ablty for a sophstated adversary to hde nefarous atvty usng ths approah. IV EXAMPLES Consder a yber-network whose nodes onsst of a set of users and a set of deves. he users are desrbed by a set of attrbutes F, wth a relatonshp R that haraterzes the strength of onneton wth other users, e.g., the frequeny of ommunatons va hat, emal, or sharepont type onneton. In general, the th attrbute for th the j ndvdual s desrbed by an I MF F j, orrespondng to a voabulary word B F, where j F B s the voabulary hosen for the r R of the relatonshp j R between user th attrbute n F. Smlarly, eah element, j, R and user j s desrbed by an I MF ( ) j orrespondng to a voabulary word R j B, f R where B s the voabulary hosen for the relatonshp. For llustratve purposes, suppose that f s the attrbute desrbng the eperene level and f s the attrbute desrbng the software adaptaton skll of the th user and r j, s the relatonshp strength of user to user j, eah desrbed n words drawn from ther respetve voabulares F F R B, B and B shown n ABLE I. he orrespondng trapezodal MFs for the UMFs () ( ) and LMFs () ( ) are shown n ABLE II, where the fve parameters of a trapezodal funton trap (,, h lbltrtrb,,, ) followng ts argument are heght ( h ), left bottom ( lb ), left top ( lt ), rght top ( rt ) and rght bottom ( rb ), respetvely. For purposes of ths eample, we use the same set of MFs for eah voabulary, but n general these MFs may unque for eah voabulary. F F VOCABULARIES B, ABLE I B AND R B FOR HE ARIBUES EXPERIENCE LEVEL, COMPUER SCIENCE SKILL AND RELAIONSHIP SRENGH. Eperene Level Nove (N) Software Adaptaton Skll Very Low (VL) Relatonshp Strength Voabulary MF None/Very Weak (NVW) () ( ) Amateur (A) Low (L) Weak (W) () ( ) Modest (M) Intermedate (I) Consderable (C) Substantal (S) Guru (G) Modest (M) Farly Weak (FW) (3) ( ) Average (A) Casual (C) (4) ( ) Moderately Hgh (MH) Moderately Strong (MS) (5) ( ) Hgh (H) Strong (S) (6) ( ) Very Hgh (VH) Very Strong (VS) (7) ( ) hus, for eample, the th user mght have the attrbute values f = Consderable and f = Average n ABLE I, represented by orrespondng I MFs (5) () and (4) ( ) ASE 04 ISBN:
5 defned on the doman 0,. he hoe of 0, as the doman enables us to map the subjetve judgments of eperene level and software adaptaton skll nto unt ranges approprate to users on a gven network. ( ) trap (,,0.5,0.85,,) SC ( ) trap (,,0.7,0.95,,) SC ( ) trap (,,0.65,0.85,,) HS ( ) trap (,,0.75,0.9,,) HS (6) Suppose now that the th user s attemptng to dentfy a set of network resoures apable of ondutng a spef eplot. He then may wsh to dentfy teams wth strong onnetons va at most k lnks to ndvduals havng hgh software adaptaton sklls. MF () () ABLE II RAPEZOIDAL UPPER AND LOWER MFS FOR VOCABULARY WORD MFS. rapezodal Upper and Lower MFs () ( ) trap (,,0,0,0.6,0.47) () () trap (,,0,0,0.0,0.43) he th j users ( j ) membershps SC (,) j and HS( j ) n these lasses are alulated as the followng epresson, where ssa, B denotes subsethood: k SC(,) j ss R (, ), () j SC. (7) HS() j ss (), () j HS () () (3) () (4) () (5) () (6) () () () trap(,,0.00,0.04,0.73,0.434) () () trap (,0.03,0.04,0.76,0.76,0.) (3) ( ) trap (,,0.04,0.69,0.557,0.83) (3) () trap (,0.36,0.366,0.49,0.49,0.46) (4) () trap (,,0.04,0.40,0.66,0.87) (4) () trap (,0.36,0.48,0.5,0.5,0.563) (5) () trap (,,0.43,0.63,0.84,0.997) (5) () trap (,0.39,0.673,0.78,0.78,0.765) (6) () trap(,,0.337,0.774,,) (6) () trap(,,0.739,0.98,,) he degree (,) j to whh ndvdual j( j ) satsfes ths rteron an be alulated usng a sngleton-nput WPM wth eponent p denoted as, p w, where s the vetor of nputs and w s the vetor of mportane weghts (here assumed to be equal): SC (, j) (, j), p. (8) HS() j (7) () (7) () trap(,,0.59,0.90,,) (7) () trap(,,0.877,0.99,,) Let () and () be I MFs for the SP HS lasses strong onneton and hgh software adaptaton skll, defned on the 0, domans of path strength and software adaptaton skll, respetvely. In partular, let these MFs be spefed by he hoe of p determnes the degree of onjunton requred of the satsfatons of the two rtera strong onneton and hgh software adaptaton skll. Dfferent weght values an be used f one of these rtera s more mportant than the other. Computng (,) j for eah j and rankng the results provdes a lst of prospetve network resoures n order of ther sutablty. Reall that the results for both R k (, ) and ( ) n (7) have been pre-omputed and j stored; therefore t s only neessary at most to perform the subsethood alulatons. However, j ASE 04 ISBN:
6 f the lasses strong onneton and hgh software adaptaton skll are of general nterest n queres, these subsethood alulatons too an be pre-omputed and stored for eah ombnaton of (word) values for the frst arguments, so that only reall proessng and smple arthmet alulatons are requred to ompute the values n (8). For llustraton, suppose we onsder a network of seven users, where ndvdual # s the potental perpetrator. Assume the attrbute vetors for eperene level f and software adaptaton skll f are gven by (see ABLE I) SC () SC () HS () We note that for ths eample, SC () k SC () for k. From (8) wth p 0.7, the vetors of rteron satsfaton for node elements through 7 for k, are gven by f I C M S I G N, (9) f M M H VL M H VH A () * () * () and the relatonshp strength matr R s gven by M S W W VS C VW FW VW C C M S S S W W VS W C R W C FW M S VW VW,(0) MS W FW FW S VS VW C VW VW M S S VS W M S VW W C where the dagonal s orrespond to sngleton MFs at unty value and are not nvolved n our omputatons. he orrespondng vetors SC () k of degrees of strong onneton between node and the remanng nodes for k, and the vetor HS of degrees of hgh software adaptaton skll for these nodes -7 are alulated from (7) as: hus the potental perpetrator s best anddates would be users #5 and #6, whh have nearly equal sores, wth user # a dstant seond. he two hghest sores for () reflet the Very Strong onneton between user # and user #5, who n turn has a Strong onneton to user #6, n ombnaton wth ther respetvely Hgh and Very Hgh software adaptaton skll. Now suppose that our potental perpetrator s leveragng a strategy that wll be more effetve and rase less suspon f lmted to more eperened network users, and partularly those wth hgher software adaptaton sklls. He mght then wsh to query hs yber-network ste wth a desre for strong onnetons to more eperened users, for whom hgh software adaptaton skll s mandatory. In ths ase, let ( ) be the I MF for the lass more ME eperened user, where the membershp of ndvdual j n ths lass s gven by M E( j) ss ( ), ( ). (3) j M E ASE 04 ISBN:
7 We then would use a partal absorpton operator [] wth the mandatory nput beng HS() j and the desred nputs beng a onjunton (of spefed degree p ) between SC () j and ME() j. hs partal absorpton operator omputaton nvolves ) a weghted partal dsjunton (denoted ) of the mandatory nput and the onjunton of the desred nputs (usng a WPM (, w ) for the dsjunton wth eponent pd d p and a WPM (, w ) for the onjunton d p wth eponent p ) followed by ) a weghted partal onjunton (denoted ) of the mandatory nput wth the result from ) (usng a WPM (, w ) wth eponent p ). p In a type- fuzzy ontet, neessarly s zero f s zero, and for non-zero, s postve (resp. negatve) when s greater (resp. less) than. he absolute dfferene s alled the reward when s greater than, and s otherwse alled a penalty []. We onstrut the operator from nested weghted power means as: whose footprnt of unertanty (FOU, the regon between the UMF and LMF) s shown n Fgure below. Fgure. FOU of the user lass more eperened. Settng a penalty of -5% and a reward of +5%, wth p 0.7, p 5.80 and p 0.69, we d obtan from (4) the vetors of rteron satsfatons for paths of length, k : HS() j HS() j () j, p (), w p SC j w d, d p w ME() j where w, p, d d w and p are hosen to aheve the desred reward and penalty values as desrbed n []. Agan, sne the varables n the weghted power means n (4) have been pre-omputed, only arthmet operatons must be performed to arrve at ths result. Let the more eperened user lass membershp funton orrespond to that of S n ABLE I (.e., () (6) () n ABLE II), ME () * (5) () * ,(4) hus, user #6 s now learly the best anddate, as he has both Guru level eperene and Very Hgh software adaptaton skll, wth user #5 provdng a reasonably strong math due to hs ombnaton of Intermedate eperene level and Hgh software adaptaton skll. User # s a somewhat lesser anddate, havng Consderable eperene level, but only Moderately Hgh software adaptaton skll. One an observe how makng software adaptaton sklls a mandatory rteron has put more dstane between the sores of user #6 and the remanng users who have lesser software adaptaton skll. o further plot hs eplot, our potental perpetrator may wsh to know the strength of the ASE 04 ISBN:
8 entralty of the other users n the network. he I entralty C(;) k of the th user over a mamum of k lnks s alulated usng (5) on the upper and lower MFs of R. We then alulate the subsethood of C(;) k n the set strong onneton havng MF () as n (6) and (7),.e., SP ((;)) C k ss C ; k, (). (6) hs yelds the followng vetors of entralty strengths CS() k for k,, wth CS( k) CS () for k : CS() CS() SC SC (7) hus user #4 has the lowest strength of entralty of any of the users, whh dependng on the nature of the eplot may prove to be an advantage or dsadvantage to the perpetrator. As a fnal query, the perpetrator may wsh to know the degree to whh users #5 and #6 onsttute a work group to themselves. As defned above, ths would be the degree to whh users #3 and #5 are onneted by short strong paths, and no other users are onneted to them by a strong path. Performng ths alulaton yelds a degree of 0, ndatng that these users are not an solated workgroup. V CONCLUSION We have etended the soal and yber-network onstruts of []-[4] to the pereptual omputng doman for yber-networks usng word representatons of attrbute membershp and relatonshp strengths between users. In partular, we have dentfed means for feasbly performng alulatons usng these onstruts n large vrtual networks by pre-omputng and storng the ombnatons of attrbute/relatonshp words nvolved n the typally relatvely small voabulares requred n yber-networks. We are presently workng on the applatons of these approahes to dynam network modelng usng fuzzy ogntve maps. ACKNOWLEDGEMENS hs materal s based on researh sponsored by the Unted States Ar Fore Aademy under agreement number FA he U.S. Government s authorzed to reprodue and dstrbute reprnts for Governmental purposes notwthstandng any opyrght notaton thereon. he authors aknowledge the use of the USAF Aademy Center for Cyberspae Researh, nludng adet teams to develop prototype software and smulaton senaros. Graph onstruton apablty and salablty was eplored and evaluated by Leutenant Bryan Hall and Leutenant Josah Lane usng smulated ybernetwork reords. her work was etended to nlude the perepton engne voabulary attrbutes. he applaton of mprese queres and graph smlarty was evaluated by Leutenant Ellot Unseth and Leutenant Jon Beabout. he mprese graph smlarty researh was etended wth the pereptual omputng I Fuzzy approah. DISCLAIMER he vews and onlusons ontaned heren are those of the authors and should not be nterpreted as neessarly representng the offal poles and endorsements, ether epressed or mpled of the US Ar Fore Aademy or the US Government. Referenes [] Rkard, J.. and R.R. Yager, Pereptual omputng n soal networks, paper #9, Pro. Internatonal Fuzzy Syst. Asso. World Congress/North Ameran Fuzzy Inform. Pro. So. Annual Mtg., Edmonton, Alberta, Canada, June 03. [] Yager, R.R., Intellgent soal network analyss usng granular omputng, Int. J. Intell. Syst., vol. 3, no., pp. 96-9, Nov [3] Yager, R.R., Conept representaton and database strutures n fuzzy soal relatonal networks, IEEE rans. Syst., Man, Cybernets, Part A: Syst. and Humans, vol. 40, no., pp , Marh 00. [4] Rkard, J.. and A. Ott, Queryng ybernetworks usng words, submtted to World ASE 04 ISBN:
9 Conferene on Soft Computng 04, Berkeley, CA, May, 04 [5] Zadeh, L., Fuzzy log = omputng wth words, IEEE rans. Fuzzy Syst., vol. 4, no., pp. 03-, May 996. [6] Mendel, J.M. and D. Wu, Pereptual Computng: Adng People n Makng Subjetve Judgments, Psataway, NJ: IEEE Press, 00. [7] Rkard, J.., J. Asbett, R.R. Yager and G. Gbbon, Fuzzy weghted power means n evaluaton desons, Pro. World Symposum on Soft Computng, Paper #00, San Franso, CA, May 0. [8] Rkard, J.., J. Asbett, R.R. Yager and G. Gbbon, Lngust weghted power means: omparson wth the lngust weghted average, Pro. FUZZ-IEEE 0, 0 World Congress on Computatonal Intellgene, pp. 85-9, ape, awan, June 0. [9] Rkard, J.. and J. Asbett, New lasses of threshold aggregaton funtons based upon the salls q-eponental wth applatons to pereptual omputng, to appear n IEEE rans. Fuzzy Syst. [0] Asbett, J. and J.. Rkard, Centrods of type- and type- fuzzy sets when membershp funtons have spkes, to appear n IEEE rans. Fuzzy Syst. [] Dujmovć, J.J., Contnuous preferene log for system evaluaton, IEEE rans. Fuzzy Syst., vol. 5, no. 6, pp , De [] Dujmovć, J.J., Partal absorpton funton, J. Unv. Belgrade, EE Dept., ser. Mathemats and Physs, no. 659, pp , 979. [3] Jaard, P., Nouvelles reherhes sur la dstrbuton florale, Bulletn de la Soete de Vaud des Senes Naturelles, vol. 44, p. 3, 908. [4] Vlahos, I. and G. Sergads, Subsethood, entropy, and ardnalty for nterval-valued fuzzy sets an algebra dervaton, Fuzzy Sets and Systems, vol. 58, pp , 007. ASE 04 ISBN:
Use of Multi-attribute Utility Functions in Evaluating Security Systems
LLNL-TR-405048 Use of Mult-attrbute Utlty Funtons n Evaluatng Seurty Systems C. Meyers, A. Lamont, A. Sherman June 30, 2008 Ths doument was prepared as an aount of work sponsored by an ageny of the Unted
CONSIDER a connected network of n nodes that all wish
36 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 2, FEBRUARY 204 Coded Cooperatve Data Exhange n Multhop Networks Thomas A. Courtade, Member, IEEE, and Rhard D. Wesel, Senor Member, IEEE Abstrat
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Series Solutions of ODEs 2 the Frobenius method. The basic idea of the Frobenius method is to look for solutions of the form 3
Royal Holloway Unversty of London Department of Physs Seres Solutons of ODEs the Frobenus method Introduton to the Methodology The smple seres expanson method works for dfferental equatons whose solutons
DECOMPOSITION ALGORITHM FOR OPTIMAL SECURITY-CONSTRAINED POWER SCHEDULING
DECOMPOSITION ALGORITHM FOR OPTIMAL SECURITY-CONSTRAINED POWER SCHEDULING Jorge Martínez-Crespo Julo Usaola José L. Fernández Unversdad Carlos III de Madrd Unversdad Carlos III de Madrd Red Elétra de Espana
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Implementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
Figure 1. Inventory Level vs. Time - EOQ Problem
IEOR 54 Sprng, 009 rof Leahman otes on Eonom Lot Shedulng and Eonom Rotaton Cyles he Eonom Order Quantty (EOQ) Consder an nventory tem n solaton wth demand rate, holdng ost h per unt per unt tme, and replenshment
Modern Problem Solving Techniques in Engineering with POLYMATH, Excel and MATLAB. Introduction
Modern Problem Solvng Tehnques n Engneerng wth POLYMATH, Exel and MATLAB. Introduton Engneers are fundamentally problem solvers, seekng to aheve some objetve or desgn among tehnal, soal eonom, regulatory
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
CLASSIFYING FEATURE DESCRIPTION FOR SOFTWARE DEFECT PREDICTION
Proeengs of e 20 Internatonal Conferene on Wavelet Analyss an Pattern Reognton, Guln, 0-3 July, 20 CLASSIFYING FEAURE DESCRIPION FOR SOFWARE DEFEC PREDICION LING-FENG ZHANG, ZHAO-WEI SHANG College of Computer
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
1. Measuring association using correlation and regression
How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees
Vulnerablty Assessment of Cyberseurty for SCADA Systems Usng Attak Trees Chee-Woo Ten, Student Member, IEEE, Chen-Chng Lu, Fellow, IEEE, Manmaran ovndarasu, Member, IEEE Abstrat By penetratng the SCADA
Lognormal random eld approxmatons to LIBOR market models O. Kurbanmuradov K. Sabelfeld y J. Shoenmakers z Mathemats Subet Classaton: 60H10,65C05,90A09 Keywords: LIBOR nterest rate models, random eld smulaton,
Computer Administering of the Psychological Investigations: Set-Relational Representation
Open Journal of Appled Senes 2012 2 110-114 do:10.4236/ojapps.2012.22015 Publshed Onlne June 2012 (http://www.srp.org/journal/ojapps) Coputer Adnsterng of the Psyhologal Investgatons: Set-Relatonal Representaton
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
Peer-to-peer systems have attracted considerable attention
Reputaton Aggregaton n Peer-to-Peer etwork Usng Dfferental Gossp Algorthm Ruhr Gupta, Yatndra ath Sngh, Senor Member, IEEE, arxv:20.430v4 [s.i] 28 Jan 204 Abstrat Reputaton aggregaton n peer to peer networks
Extending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall
SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent
A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Conversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
21 Vectors: The Cross Product & Torque
21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl
An MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN [email protected] Gabrela Corsano Insttuto de Desarrollo y Dseño
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Construction Rules for Morningstar Canada Target Dividend Index SM
Constructon Rules for Mornngstar Canada Target Dvdend Index SM Mornngstar Methodology Paper October 2014 Verson 1.2 2014 Mornngstar, Inc. All rghts reserved. The nformaton n ths document s the property
When can bundling help adoption of network technologies or services?
When an bundlng help adopton of network tehnologes or serves? Steven Weber Dept. of ECE, Drexel U. [email protected] Roh Guérn Dept. of CSE, WUSTL [email protected] Jaudele C. de Olvera Dept. of ECE,
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
Level Annuities with Payments Less Frequent than Each Interest Period
Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Symoblc approach
) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance
Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell
A Probabilistic Theory of Coherence
A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want
Simple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
Applications of the Offset in Property-Casualty Predictive Modeling
Applatons of the Offset n Property-Casualty Predtve Modelng Jun Yan, Ph.D. James Guszza, FCAS, MAAA, Ph.D. Matthew Flynn, Ph.D. Cheng-Sheng Peter Wu, FCAS, ASA, MAAA Abstrat: Generalzed Lnear Model [GLM]
Updating the E5810B firmware
Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert
Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
Optimal Adaptive Voice Smoother with Lagrangian Multiplier Method for VoIP Service
Optmal Adaptve Voe Smoother wth Lagrangan Multpler Method for VoIP Serve Shyh-Fang HUANG, Er Hsao-uang WU and Pao-Ch CHANG Dept of Eletral Engneerng, Computer Sene and Informaton Engneerng and Communaton
8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]
24. Impact of Piracy on Innovation at Software Firms and Implications for Piracy Policy
4. mpat of Pray on nnovaton at Software Frms and mplatons for Pray Poly Jeevan Jasngh Department of nformaton & Systems Management, HKUST Clear Water Bay, Kowloon Hong Kong [email protected] Abstrat A Busness
The Mathematical Derivation of Least Squares
Pscholog 885 Prof. Federco The Mathematcal Dervaton of Least Squares Back when the powers that e forced ou to learn matr algera and calculus, I et ou all asked ourself the age-old queston: When the hell
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
Chapter 6. Demand Relationships Among Goods
Chapter 6 Demand Relatonshps Among Goods Up to ths pont, we have held the pre of other goods onstant. Now we onsder how hanges n p affet n a two-good world. I p I p I p I p p p ( ) ( ) then I p then (
An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style
Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture
Support Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.
Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
Vembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
Quantization Effects in Digital Filters
Quantzaton Effects n Dgtal Flters Dstrbuton of Truncaton Errors In two's complement representaton an exact number would have nfntely many bts (n general). When we lmt the number of bts to some fnte value
Hedging Interest-Rate Risk with Duration
FIXED-INCOME SECURITIES Chapter 5 Hedgng Interest-Rate Rsk wth Duraton Outlne Prcng and Hedgng Prcng certan cash-flows Interest rate rsk Hedgng prncples Duraton-Based Hedgng Technques Defnton of duraton
1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
Enterprise Master Patient Index
Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
Conferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre
Credit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
Multi-class kernel logistic regression: a fixed-size implementation
Mult-lass kernel logst regresson: a fxed-sze mplementaton Peter Karsmakers,2, Krstaan Pelkmans 2, Johan AK Suykens 2 Abstrat Ths researh studes a pratal teratve algorthm for mult-lass kernel logst regresson
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
Financial Mathemetics
Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,
IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS
IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,
14.74 Lecture 5: Health (2)
14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,
Finite Math Chapter 10: Study Guide and Solution to Problems
Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount
Economy-based Content Replication for Peering Content Delivery Networks
Eonomy-based Content Replaton for Peerng Content Delvery Networs Al-Muaddm Khan Pathan 1 and Raumar Buyya Grd Computng and Dstrbuted Systems (GRIDS) Laboratory Department of Computer Sene and Software
Hosted Voice Self Service Installation Guide
Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 [email protected] www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629
LiMoSense: live monitoring in dynamic sensor networks
Dstrb. Comput. DOI 10.1007/s00446-014-0213-8 LMoSense: lve montorng n dynamc sensor networks Ittay Eyal Idt Kedar Raphael Rom Receved: 7 Aprl 2013 / Accepted: 19 March 2014 Sprnger-Verlag Berln Hedelberg
Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems
Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE
Politecnico di Torino. Porto Institutional Repository
Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve
