A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy

Size: px
Start display at page:

Download "A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy"

Transcription

1 A Game Theory Based Approach to the Geerato of Optmal DDo edg trategy Lag Huag, Degguo Feg, Yfeg La, Ygju Zhag, ad Yulg Lu Trusted Computg ad Iformato Assurace Laboratory, Isttute of oftware, The Chese Academy of ceces, Bejg, Cha {lacerhuag, feg, layf, yjzhag, ABTRACT Wth the growg threat of DDo attacks, ew attackg mechasms emerge every day I order to cofrot the ever-evolvg DDo attacks, t s suffcet to select defedg strategy merely from exstg strategy set I ths paper, we propose a method that geerates ew defedg strateges ad that selects the optmal oe amog them, thus creasg the defedg ablty The Game Model for DDo Coutermeasure electo s establshed to model the DDo scearo that cosders the attacker ad the defeder as two players the game The the ew defedg strateges are geerated ad are cluded the defedg strategy set Next, the Nash equlbrum s calculated to dcate the optmal defedg strategy The expermets, whch s performed wth the etwork smulator, show the effectveess of our method KEYWORD DDo, Game Theory, Optmal edg trategy, trategy electo, Effect Evaluato INTRODUCTION The Dstrbuted Deal-of-ervce (DDo) attack has become oe of the most severe threats to the etwork securty ackers utlze the compromsed hosts to sed overwhelmgly large umber of requests to the vctm, exhaustg the vctm s ources, makg t uable to provde servces I order to fght agast the DDo attack effectvely, ot oly coutermeasu agast the DDo attacks are proposed, but also methods of selectg the optmal defese coutermeasu are developed These methods help to select the sutable defedg strategy the defedg strategy set However, attackers cotuously refe attackg process to crease the attack effect, so that ew attackg mechasms emerge every day Therefore, t s suffcet to select the best coutermeasure amog exstg defese coutermeasu I order to cofrot the ever-evolvg attacks, we have to fd a way to mprove coutermeasu Ths paper proposes a approach of geeratg ew defedg strateges ad selectg the optmal oe from them As a ult, the defese effect s creased Frstly, the defedg strateges are combed to geerate ew strateges ecodly, the Game Model for DDo Coutermeasure electo (GMDC) s bult The attacker ad the defeder are two players the model Thrdly, utlty fuctos for the attacker ad the defeder are troduced, cludg the fuctos of calculatg the effect of the combed defedg strateges ad the effect of the corpodg attackg strateges Thrdly, the Nash equlbrum that dcates the optmal defedg strategy both the orgal defedg strategy set ad the ewly geerated defedg strategy set s solved Fally, expermets are made usg the etwork smulator to valdate the correctess ad the effectveess of the method The t of the paper s orgazed as follows We descrbe related works ecto 2, pet the GMDC model ecto 3 Detals of utlty fuctos for both the attacker ad the defeder are provded ecto 4 We demostrate the expermets ecto 5, ad we summarze ths paper ecto 6 2 RELATED WORK I order to cofrot the DDo attacks, may coutermeasu have bee proposed, such as attack detectg, flow flterg, source detfyg, ad so o [-3] Mrkovc et al [4] classfed the DDo IBN: DIWC 4

2 attacks ad coutermeasu, Peg et al [5] surveyed the coutermeasu defedg the Dos ad DDo attacks They aalyzed the defese effect of every coutermeasure Based o the sold work of DDo attack ad defese survey, methods of the attack evaluato ad the defese evaluato are proposed Butler [6] proposed ecurty rbute Evaluato Method (AEM) The method frst evaluated how well each defese coutermeasure mtgated the threats The t aalyzed the types of threat each defese coutermeasure could hadle At last, t evaluated the cost of each defese coutermeasure These three factors were cosdered as a whole to gude the selecto of defese coutermeasu Bellache et al [7] poted out that the evaluato ad comparso were based o 4 aspects, e performace, cost of deploymet, fluece to the target system, robust chwab et al [8] put the dces for DDo evaluato to three categores: dces of etwork traffc, dces of attack effect ad dces of effectveess of defese He stated that the attack effect should be evaluated by the chage of the dces before ad durg the attack, the defese effect should be evaluated by the chage of defese effect before ad after the deploymet of the defese coutermeasure However, o cocrete calculato method was provded Meadows [9] defed the cost set C ad the truder capablty set G The the tolerace relato set C G was defed to aalyze whether the protocol could st the Do attack or ot Ths method provded a comprehesve aalyss for the strateges of both attacks ad defeses However, t was too theoretcal to be put to practce Mrkovc et al [] suggested that the key of DDo defese was to keep the servce rug at a user-acceptable level Wth ths dea, Mrkovc et al [, 2] proposed a thhold based DDo attack effect evaluato method usg Qo dces ssued by 3rd Geerato Partershp Project (3GPP) If the dex was beyod the ormal Qo rage, the applcato was cosdered as faled The percetage of faled trasactos (PFT) was used as the evaluato metrc of DDo attack effect The weghted sum of PFT of the whole applcatos the etwork traffc llustrated the overall effect of DDo attacks L et al [3] evaluated the effect of DDo attacks based o packets The LAR, rato of the legtmate traffc passed rate (LTPR) over the attack traffc passed rate (ATPR), was used to measure the performace of the DDo defese The hgher of the LAR, the better of the defese Recetly may earches focused o selectg the optmal defedg strategy order to crease the securty level May theores are corporated Game theory s oe of the ma approaches Ya et al [4] bult a game-theoretcal framework for evaluatg DDo attacks ad defese The work studed the stuato that, whe mult-layer defese was deployed, how the system parameters would affect the decso of both the attacker ad the defeder Lu et al [5] bult models for attacker s teto, objectves ad strateges The attack scearos are categorzed to e types from two dmesos of aglty ad accuracy of truso detecto, ad correlato amog attack actos It was poted out that the teto, objectves ad strateges could be ferred usg game theoretc approach, whch would beeft the cyber securty We et al [6] troduced the cocept of the defese graph Icorporated wth the defese graph, the cost of strategy was calculated It the utlzed the game theoretc method to select the optmal defedg strategy Bed et al [7] modeled the badwdth depleto attack The work focused o the probabltes of allowg, redrectg ad droppg the comg traffc The optmal values of the probabltes were calculated usg game theoretc approach All these works are elghteg However, these works maly cosdered the problem of selectg the optmal defedg strategy the exstg strategy set Whle we developed the method to select the optmal defedg strategy both the exstg strategy set ad the geerated strategy set, wth the help of GMDC 3 GAME MODEL FOR DDO COUNTERMEAURE ELECTION (GMDC) I DDo attack scearos, the attacker ad the defeder are two compettors They try to amplfy ther effect Both the attacker ad the defeder have strateges to crease ther effect We buld GMDC to gude the selecto of the optmal defedg strategy GMDC s a 6-tuple vector: IBN: DIWC 5

3 G = (,, γ,, U, U ) Com The elemets GMDC are descrbed wth more detals below: s the set of the attackg strateges I ths paper, attackers have 2 attackg strateges, large umber of zombes wth slow sedg rate (LZR), ad small umber of zombes wth fast sedg rate (ZFR) Therefore, ={LZR, ZFR} s the tal set of the defedg strateges I ths paper, defeders have 3 basc defedg strateges, creasg Q lmt (IQ), rate lmtg (RL), ad source blockg (B) Qlmt s the maxmum umber of half-opeed coectos Therefore, ={IQ, RL, B} γ s the mappg relato betwee ad Com, γ : Com It repets the process of geerate ew defedg strateges by combg the defedg strateges from the tal defedg strategy set Com s the geerated defedg strategy set by combg basc strateges Com =, + + = I ths paper, Com B, RL-B, IQ-RL-B} + = 2 ={IQ-RL, IQ- Com ad form the ew set of defedg strateges, marked as New Therefore, New = + Com =, = I ths paper, New ={IQ, RL, B, IQ-RL, IQ-B, RL-B, IQ- RL-B} U, U are the utlty fuctos for the attacker ad the defeder pectvely The utlty, whch cosders both the effect ad the cost, repets the satsfacto the player expereces whe takg the strategy Therefore, We use utlty to quatfy the strateges The utlty fuctos are further dscussed wth more detals secto 4 It s easy to uderstad that the optmal defedg strategy s the oe wth the bggest utlty However, the strategy wth the bggest utlty uder oe attackg strategy may ot be the strategy wth the bggest utlty uder aother attackg strategy Therefore, the Nash equlbrum s corporated to select the optmal defedg strategy agast DDo attacks The Nash equlbrum s the state that each player gas hs maxmum utlty They have o cetve to chage ther strategy that state As a ult the Nash equlbrum ca gude the defeder to select the optmal defedg strategy I ths paper, the Nash equlbrum s peted as a vector: = { s *, s *} Nash s * s the optmal strategy for the attacker, s * s the optmal strategy for the defeder 4 UTILITIY FUNCION OF GMDC I DDo attack scearos, both the attacker ad the defeder pay the cost ad ga the reward The dfferece betwee the reward ad the cost s defed as utlty The utlty fuctos for the attack ad the defeder are lsted below α U = α Reward β () U = α Reward β (2), β, α, β are the adjust parameters The attacker gas reward whe the attack flueces the vctm The defeder gas reward whe the protecto mtgates the attack effect Itutvely, we use the attack effect ad the defese effect to quatfy the reward gaed by the attacker ad the defeder pectvely The ature of DDo attacks s to fluece the avalablty Accordgly, the varato of avalablty ca be used to repet the attack effect ad the defese effect to (ack Effect) ack Effect E s expsed as the dfferece betwee the avalablty of the vctm wth o attack Ava o _ ad that wth attack Ava E = Ava Ava (3) o _ to 2 (ese Effect) ese Effect E s expsed as the dfferece betwee the attack effect the attacker produced wth o defese E ad that wth coutermeasu E _ wth _ IBN: DIWC 6

4 E = E E _ wth _ = Avao _ Ava ( Avao _ Ava _ wth _ ) = Ava Ava _ wth _ (4) The avalablty ca be perceved by dfferet approaches I ths paper, we proposed a method that measu avalablty from legtmate users perspectve If the DDo attack occurs, the ormal user wll otce that the whole applcatos volvg etwork data trasmsso become slow, ad that teractos wth those applcatos take loger tme It dcates the tme betwee sedg a request ad recevg the corpodg pose ca be used to measure the avalablty, thus reflectg the mpact of DDo attacks Here we frst gve two deftos, ad the a formula for calculatg the avalablty s peted to 3 (Average Respodg Tme) Average Respodg Tme T s the average of podg tme T wth pect to the umber of successfully request-ad-pod actos T = T = ( t ' t) (5) T s the th successfully request-ad-pod acto, s the total umber of successfully request-ad-pod actos, t s the momet the legtmate user seds the request, ad t ' s the momet he successfully receves the pose to 4 (Respodg Probablty) Respodg probablty P s the probablty of a request set by the legtmate user beg poded by the vctm I ths paper, t s defed as the percetage of successfully poded requests set C Req_uccess dvded by total requests set C Req_Total P C Req_uccess = % (6) CReq_Total The avalablty s calculated usg average podg tme T ad podg probablty P : Aval = Tob [ P T + ( P) Tob ] (7) T ob s the observato tme I fact, the expso P T + ( P) Tob s the mathematcal expectato of the tme betwee sedg a request ad recevg the corpodg pose for a legtmate user Above all, the process of calculatg the utlty s peted Moreover, the processes of calculatg the utlty of the combed defedg strategy ad the utlty of the corpodg attackg strategy are dscussed below Whe calculatg the combed defedg strategy s utlty, we frst calculate the defese effect ad the cost of the combed defedg strategy usg formula (8), (9) The the utlty of the combed defedg strategy s calculated usg formula (2) E _ ECo m = [ ( )] E (8) E = (9) Com _ E s the attackg effect gaed wthout defedg strateges The utlty for the attackg strategy that cofrot the combed defedg strategy s calculated usg formula () The cost of the attackg strategy s uchaged, but the attack effect s recalculated by formula () ECo = E ECom () E Com s the defese effect of the cofrotg defedg strategy 5 EXPERIMENT The expermet s smulated usg FNet [8], a etwork smulator It cotas modules to mmc the DDo attack actvtes For the uversalty, we radomly geerated a etwork topology wth routers ackers, the vctm ad legtmate users are all attached to the routers ackers ad legtmate users sed requests to the vctm, ad the vctm pods to the requests The expermet uses the YN-flood attack as the attackg method The YN-flood attack creates a complete TCP three-way hadshake state wth the vctm by mssg the ACK packet The vctm s forced to keep a large umber of halfopeed coectos so that the ource s exhausted Therefore, the vctm s uable to pod to ew requests The objectve of the DDo attack s acheved I ths expermet, the LZR mplemets as 5 zombes sedg at /3 request/sec each The ZFR mplemets as 2 zombes sedg at request/sec each The IQ mplemets as creasg the Qlmt from 4 to 8 The RL mplemets as droppg all the packets f traffc s over 8Kbps IBN: DIWC 7

5 The B mplemets as detfyg ad blockg 5 zombes ome parameters of the expermet are demostrated Table Table Parameters of the expermet Parameter Meag Value the maxmum umber of halfopeed coectos Q lmt 4 the badwdth of the bottleeck lk(mbps) BW th 2 the tme of observato(secod) T ob α attack effect 6 β attack cost α defese effect β defese cost 3 LZR the cost of LZR ZFR the cost of ZFR 75 IQ the cost of IQ 2 RL the cost of RL 5 B the cost of B FNet s used to smulate dfferet DDo scearos where the attacker ad the defeder take dfferet strateges Parameters of P ad T these scearos are collected ad are show Table 2 Table 2 P ad T collected dfferet sceros cearo P T No ack No ese LZR wthout ese ZFR wthout ese LZR vs IQ LZR vs RL LZR vs B ZFR vs IQ ZFR vs RL ZFR vs B ese effects of the strateges are calculated based o formula (3), (4), (7) ese effects of the strateges Com are calculated usg formula (8) The ults are rouded to teger ad demostrated Table 3 Table 3 ese effects of the strateges ad Com ese Effect LZR ZFR IQ 4 22 RL 43 7 B IQ-RL IQ-B RL-B IQ-RL-B The cost of each combed defedg strategy s calculated usg formula (9) The ult s show Table 4 Table 4 s of the combed defedg strateges edg trategy IQ-RL 7 IQ-B 2 RL-B 5 IQ-RL-B 7 The utltes of the defedg strateges are calculated usg formula (2) ad show Table 5 The we cosder the attacker s utlty The attack effects are calculated usg formula (3) for basc attackg strateges ad () for combed strateges Results are show Table 6 Wth the cost of each attackg strategy, the utltes for the attack facg dfferet defedg strateges are calculated ad show Table 7 After that, the Nash equlbrum of the GMDC s calculated The ult s p ={84%, 859%}, p ={, 82%,,,, 998%, }, whch dcates that the optmal defedg strategy s RL-B Table 5 Utltes of defedg strateges Utlty LZR ZFR IQ RL B IQ-RL IQ-B RL-B IQ-RL-B IBN: DIWC 8

6 Table 6 ack effects ecouterg dfferet defedg strateges 6 CONCLUION ack Effect LZR ZFR IQ RL B IQ-RL IQ-B 29 5 RL-B 48 5 IQ-RL-B 38 4 Table 7 Utltes of attackg strateges Utlty LZR ZFR IQ RL B IQ-RL IQ-B RL-B 45 2 IQ-RL-B 35 I order to cofrot the severe threat of DDo attacks, ths paper proposed a approach that frst geerates ew defedg strateges, ad that selects the optmal oe amog them Frst, the GMDC model s bult based o Game theory The, from the legtmate user s perspectve, the attack effect ad the defese effect s defed They are volved calculatg the attack utlty ad the defese utlty GMDC Next, ew defedg strateges are geerated by combg exstg defedg strateges together The utltes of the combed defedg strateges ad the corpodg attackg strateges are calculated Fally, by solvg the Nash equlbrum, the optmal defedg strategy s selected Usg the etwork smulator FNet, the expermets are performed to valdate the effectveess of the method There s stll a lot to earch The cost of the defedg strateges should be surveyed from more aspects A effcet method of geeratg strategy combatos ad elmatg the bad choce at the early stage have to be foud We shall work o these jobs the future 7 ACKNOWLEDGEMENT Ths work was supported by Natoal Hgh-Tech Research ad Developmet Pla of Cha uder Grat No Q23GX2D2, 2AAA23, the Natoal Natural cece Foudato of Cha uder Grat No 6226, , the Bejg Natural cece Foudato uder Grat No 42285, 44489, the Natoal cece & Techology Pllar Program of Cha durg the Twelfth Fve-year Pla Perod uder Grat No 22BAK26B 8 REFERENCE [] Yag, X ad Z Wale, Mark-aded dstrbuted flterg by usg eural etwork for DDo defese, Global Telecommucatos Coferece, 25 GLOBECOM '5 IEEE 25 [2] Choka, A, et al, Mult-Core ese ystem (MD) for Protectg Computer Ifrastructure agast DDo acks, Parallel ad Dstrbuted Computg, Applcatos ad Techologes, 28 PDCAT 28 Nth Iteratoal Coferece o 28 p [3] Yau, DKY, et al, edg agast dstrbuted dealof-servce attacks wth max-m far server-cetrc router throttles Networkg, IEEE/ACM Trasactos o, 25 3(): p [4] Mrkovc, J ad P Reher A taxoomy of DDo attack ad DDo defese mechasms ACM IGCOMM Computer Commucato Revew 24 [5] Peg, T, C Lecke, ad K Ramamohaarao, urvey of etwork-based defese mechasms couterg the Do ad DDo problems ACM Comput urv, 27 39() [6] Butler, A, ecurty attrbute evaluato method: a cost-beeft approach, Proceedgs of the 24th Iteratoal Coferece o oftware Egeerg 22, ACM: Orlado, Florda p [7] Bellache, M ad J Gregore Measurg ese ystems Agast Floodg acks Wreless Commucatos ad Moble Computg Coferece, 28 IWCMC '8 Iteratoal 28 [8] chwab,, et al, Methodologes ad metrcs for the testg ad aalyss of dstrbuted deal of servce attacks ad defeses, IEEE Mltary Commucatos Coferece, 25 MILCOM p [9] Meadows, C, A Formal Framework ad Evaluato Method for Network Deal of ervce, Proceedgs of the 2th IEEE workshop o Computer ecurty Foudatos 999, IEEE Computer ocety p 4-3 [] Mrkovc, J, et al, Bechmarks for DDo defese evaluato, Mltary Commucatos Coferece, 26 MILCOM p [] Mrkovc, J, et al, Measurg deal Of servce, Proceedgs of the 2d ACM workshop o Qualty of protecto 26, ACM: Alexadra, Vrga, UA p [2] Mrkovc, J, et al, Towards user-cetrc metrcs for deal-of-servce measuremet, Proceedgs of the 27 workshop o Expermetal computer scece 27, ACM: a Dego, Calfora [3] L, Z, Y Xag, ad D He, mulato ad Aalyss of DDo Actve ese Evromet, Computatoal IBN: DIWC 9

7 Itellgece ad ecurty, Y Wag, Y-m Cheug, ad H Lu, Edtors 27, prger Berl Hedelberg p [4] Ya, G, et al Towards a Bayesa Network Game Framework for Evaluatg DDo acks ad ese Proceedgs of the 9th ACM coferece o Computer ad commucatos securty - CC '2, 22: p [5] Lu, P, W Zag, ad M Yu, Icetve-based Modelg ad Iferece of acker Itet, Objectves, ad trateges ACM Tras If yst ecur, 25 8(): p 78-8 [6] Jag, W, et al Optmal Network ecurty tregtheg Usg ack-ese Game Model xth Iteratoal Coferece o Iformato Techology: New Geeratos, 29 ITNG '9 29 [7] Bed, H, Roy, ad hva Game theory-based defese mechasms agast DDo attacks o TCP/TCPfredly flows 2 IEEE ymposum o Computatoal Itellgece Cyber ecurty (CIC) 2 [8] FNet, calable smulato framework etwork models, IBN: DIWC 2

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: [email protected]

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: [email protected] amh Abdul-Nab Lebaese Iteratoal

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Load and Resistance Factor Design (LRFD)

Load and Resistance Factor Design (LRFD) 53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:[email protected]

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements Maagg Iterdepedet Iformato Securty Rsks: Cybersurace, Maaged Securty Servces, ad Rsk Poolg Arragemets Xa Zhao Assstat Professor Departmet of Iformato Systems ad Supply Cha Maagemet Brya School of Busess

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data Appled Mathematcal Sceces, Vol. 9, 215, o. 57, 289-2829 HIKARI Ltd, www.m-hkar.com http://dx.do.org/1.12988/ams.215.52164 Tme Seres Forecastg by Usg Hybrd Models for Mothly Streamflow Data Sraj Muhammed

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

The paper presents Constant Rebalanced Portfolio first introduced by Thomas

The paper presents Constant Rebalanced Portfolio first introduced by Thomas Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 [email protected]

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information