Practical Issues and Algorithms for Analyzing Terrorist Networks 1

Size: px
Start display at page:

Download "Practical Issues and Algorithms for Analyzing Terrorist Networks 1"

Transcription

1 Practcal Issues and Algorthms for Analyzng Terror Networks 1 Tam Carpenter, George Karakoas, and Davd Shallcross Telcorda Technologes 445 South Street Morrown, NJ Keywords: socal network analyss, centralty, betweenness, path-fndng algorthms. INTRODUCTION In socal network analyss, graphs are used to model relatonshps between actors or partcpants n a socal settng. Each node or vertex n the graph represents a partcpant or actor. Each lnk or edge represents a connecton or relatonshp between two partcpants. A varety of graph algorthms have been developed to analyze the ructure of socal networks and to assess the roles or mportance of the ndvdual players. Snce the September 11 bombng of the World Trade Center, socal network analyss has emerged as a potental vehcle for modelng and analyzng the ructure of terror networks [10, 15]. There are a varety of measures to assess the mportance or centralty of each actor n a socal network [16]. The mo popular of these centralty measures requre the computaton or enumeraton of shorte paths between all pars of nodes n the graph. Such computatons can be tme consumng n large graphs. Moreover, they may become problematc even n more moderately-szed networks when changng data or what-f scenaro analyss warrant frequent recomputaton. In ths paper, we assume that terror network models may be large, dynamc and characterzed by uncertanty. The latter two propertes, n partcular, are true not only for terror networks, but are true more generally of covert networks, where there may be a delberate effort to hde llct actvty. Models of covert networks may be large, not necessarly because the networks themselves are large, but because the networks are unknown to us, so the set of actors we montor s lkely to be a superset of those that are actually engaged n llct actvty. The models are dynamc because both covert networks and our knowledge of them change over tme. Lkewse, specfc attrbutes assocated wth nodes or lnks n the network model contan uncertanty. Although socal network analyss has been used to udy covert crmnal networks n the pa (see [5] for example), these networks are not as large or as dynamc as terror networks, nor are the akes surroundng them as hgh. A prevous paper n ths sesson (see Behrens and Stephenson) descrbes a framework (called NetOperatve) to support lawmakers n ther effort to dentfy and montor terror networks. Ths framework combnes atcal technques wth deas from socal network analyss and wth effcent computatonal algorthms to support such analyss. In ths paper we focus on algorthms for computng measures of centralty. We descrbe the current be theoretcal runnng tmes for computng varous centralty measures; we dscuss the current ate-of-the-art for dynamcally updatng these measures n response to network changes; and we descrbe some practcal decomposton deas that can also beneft from mantanng dynamcally updated data ructures. In addton, we dscuss some alternatve measures of centralty that may be more robu n the face of uncertanty. CENTRALITY MEASURES To defne centralty measures more precsely, we need to eablsh some notaton. The notaton that we employ s smlar to that defned n Brandes [3]. We let G=(V, E) denote a graph wth vertex set V and edge set E. In general, edges may be ether drected or undrected. We let n represent the number of vertces n V, and we let m represent the number of edges n E. An edge e E has an assocated weght or length denoted l(e). If the graph s unweghted, l(e) s assumed to be equal to 1 for all e E. Edges may be represented as a par of ncdent vertces, so that (s, represents the edge between nodes s, t V. We let d(s, denote the shorte 1 Copyrght 2002, Telcorda Technologes, Inc. All rghts reserved.

2 possble dance between vertces s and t n G. Fnally, we let σ denote the number of shorte paths between s and t n G, and we let σ (v) denote the number of such paths that nclude vertex v V. Now, we can defne two well-known [16] centralty measures that we use for lluratve purposes n subsequent dscusson. Addtonal measures and varatons are descrbed n the text by Wasserman and Fau [16] and references theren. 1 C( v) = Closeness centralty, d( v, t V B v) = ( Betweenness centralty. s t v V σ ( v) σ We note that computng closeness centralty requres computng the length of a shorte path between all pars of nodes n G. Ths requres solvng the well-known all-pars shorte-paths (APSP) problem. The current be algorthms for APSP on sparse graphs requre O(nm) operatons n unweghted graphs and 2 O ( nm + n log n) operatons n weghted graphs [9]. In dense graphs, these bounds asymptotcally become O ( n 3 ) n the wor case, but recent (more complcated) algorthms yeld somewhat better wor-case bounds [18]. Computng betweenness requres enumeratng all of the shorte paths between each par of nodes, whch s even more work. The fae algorthms for computng betweenness are provded by Brandes [3] and requre O(nm) operatons n unweghted graphs and 2 O ( nm + n log n) operatons n weghted graphs. These bounds are asymptotcally the same as those for solvng APSP n sparse graphs. Emprcal results presented n [3] for randomlygenerated, undrected, unweghted, sparse graphs sugge that betweenness n a 6000 node graph can be computed n roughly 15 mnutes on a SUN Ultra10 workaton. Soluton tmes appear to be slower for weghted graphs and wll slow consderably as n ncreases nto the tens of thousands of nodes. PRACTICAL ATTACKS ON COMPUTING CENTRALITY As n gets very large, the tme to compute the centralty measures can become prohbtve. Nonetheless, there are some practcal methods that can sometmes be exploted to make these computatons more tenable n large graphs. Thus, n addton to seekng algorthms wth mproved theoretcal runnng tmes for the underlyng problems lke APSP, we can try to explot other features characterc of our applcaton. In partcular, the sparsty of socal networks may be exploted n practcal approaches that nvolve approxmaton or decomposton. Often these rateges are employed n attacks on NP-hard optmzaton problems, but they can be appled any tme the sze of a problem makes t dffcult to solve. Gven the amount of uncertanty that we expect to encounter n models of terror networks, approxmaton methods may be partcularly attractve for these applcatons. A recent paper by Eppen and Wang [8] explots the small world phenomenon that s sad to characterze socal networks n order to develop an approxmaton algorthm for closeness centralty. An open queon s: can we develop fa approxmaton algorthms for betweenness or for the more closely related graph centralty measure [3], whch s defned as: 1 g( v) = Graph centralty. max d( v, t V More common practcal approaches nvolve decomposton. Sparse networks may have small cuts that yeld places where we can break the problem apart. (A cut n a graph s a set of vertces or edges whose removal dsconnects the graph.) A basc decomposton rategy would proceed as follows: dentfy a cut; break the problem apart at the cut; solve the smaller problems on each sde of the cut; and sew the solutons together to obtan a soluton on the entre graph. Ths rategy s often employed n attacks on NP-hard optmzaton problems. (See, for example, [4].) However, even for computatonally tractable problems, lke APSP, we mght ll use decomposton n a heurc fashon to effectvely reduce n n the runnng tme.

3 The smple example of decomposton at a small cut arses n undrected graphs where we consder breakng the problem apart at artculaton ponts. Artculaton ponts are sngle vertces whose removal dsconnects the graph. We say that two vertces are bconnected or le n the same bconnected component f there s no artculaton pont whose removal dsconnects them. If a node v s an artculaton pont, removng v breaks the graph nto (at lea) two components, whch we call S and T n Fgure 1. Any shorte path between nodes n S {} v mu nvolve only nodes n S {} v. Lkewse, shorte paths between nodes n T {} v nvolve only nodes n T {} v. Thus, n Fgure 1, shorte paths between nodes n S {} v use only gray lnks and shorte paths between nodes n T {} v use only black lnks. Paths between two nodes, s S and t T, are conructed as the concatenaton of shorte paths between s and v wth shorte paths between v and t. Thus, we can fnd all shorte paths by solvng a smaller problem on each sde of v, effectvely reducng n n the runnng tme. S Fgure 1: Decomposng at artculaton pont v. An attractve aspect of decomposng at artculaton ponts s that artculaton ponts and the shores nduced by ther removal are dentfed by a smple O (m) algorthm [1]. The decomposton dea can be generalzed to other types of small cuts, lke two-edge cuts, but more general cuts are more tme-consumng to dentfy and also more dffcult to reconruct solutons across. Even more general decomposton rateges may also be avalable. The tree wdth of a graph may be thought of as a measure of ts complexty, and graphs wth small tree wdth can v T be recursvely decomposed by removng small sets of nodes. Such an approach requres sophcated deas from graph theory surveyed n [2]. Emprcal udes are needed to see whether these more complcated deas yeld practcal savngs. CENTRALITY IN DYNAMIC GRAPHS In addton to beng large and sparse, terror networks, or at lea our models of them, are lkely to be dynamc through tme, wth new lnks beng added and others beng removed as we gan nformaton about the actors and ther communcatons. Thus, centralty measures may have to be recomputed as the network evolves through tme. In addton to reducng the tme spent on the ntal calculaton, we would also lke to dentfy cheap algorthms for updatng centralty measures followng a change n the network. Such algorthms can also be of use n scenaro analyss, wheren we may want to examne the effect of potental network changes. For nance, wthn a tool lke NetOperatve, an analy could examne the senstvty of the centralty measures to lkely network changes, such as the addton of a beleved lnk or the removal of a key node. Fndng effcent algorthms to update the soluton of a graph problem followng the addton or deleton of lnks s an area of ntense research n the computer scence communty, as descrbed n a recent survey by Eppen, Gall, and Italano [7]. Snce the centralty measures we consder nvolve the calculaton of shorte paths between all pars of nodes, dynamc all pars shorte path algorthms may help us avod recalculatng these paths from scratch. For example, the algorthm by Demetrescu and Italano [6] supports updates (edge deleton, nserton, and weght change) n O ( Sn log n) tme per update n drected networks wth weghts that take at mo S dfferent real values. Dynamc algorthms for computng other graph propertes that may be helpful n carryng out the centralty calculatons more effcently are also descrbed n the survey [7]. For example, the mnmum spannng tree for undrected graphs 1/ 3 can be mantaned n tme O ( n log n) per update. 2-edge connectvty can be solved n

4 1/ 2 O (n ) tme per update; 3-edge connectvty 2 / 3 can be solved n O (n ) tme per update. For k-vertex connectvty wth 2 k 4 there are algorthms wth tmes rangng from 1/ 2 2 O ( n log n) to O( nα ( n)) per update. More detals can be found n [7]. If we use a decomposton-based approach, we may, n fact, wsh to mantan data ructures that allow us to update our knowledge of cuts and shores of cuts wthout havng to fully recompute them. One of the be-uded of these problems s for fully dynamc bconnectvty [11] n undrected graphs. A fully dynamc bconnectvty algorthm mantans and updates a data ructure that allows effcent queres about the bconnected components of a dynamc graph. The algorthm descrbed by Henznger [11] performs updates n O ( m log n) tme and answers queres about whether or not two nodes are n the same bconnected component n conant tme. Further, t returns all of the nodes n a bconnected component n tme that s lnear n the sze of the output. Such an algorthm could be ntegrated wthn a larger framework for montorng dynamc socal networks. Fnally, as mentoned above algorthms to support other connectvty queres n dynamc graphs have also been the subject of recent udy [7]. (See, also [13], whch consders 2- and 3-edge connectvty wth lnk nsertons.) EXTENDING BETWEENNESS The measures of centralty that we defned prevously (along wth several other well-known measures [16]) mplctly assume that communcaton occurs along shorte paths (also called geodesc paths) n the network. In analyzng networks that model terror actvty, uncertanty n the data wll be reflected n naccuraces n shorte path computatons. Thus, not only s the length of the shorte path between a par of nodes somewhat uncertan, but the path tself may change dramatcally wth relatvely small changes n the data. Ths may be especally problematc for measures lke betweenness, that depend on knowng the precse dentty of nodes n geodesc paths. The small example n Fgure 2 llurates how the betweenness centralty measure can be vulnerable to even mnor data changes. w Fgure 2: Sample network where B( = 0. Wth the gven edge lengths, the defnton of betweenness yelds B(=0, even though node w appears to be relatvely central. Notce that f the actual length of all bg edges s 1.3 nead of, w becomes the central actor n ths network, and B(=4. Examples lke ths motvate us to look for more robu varatons of the betweenness measure. For ths reason, we propose a varaton on the betweenness centralty measure, called -betweenness. Before we gve the formal defnton of ths new measure and an algorthm to compute t, we gve a few more prelmnary defntons. Fr, a smple path between nodes s and t s a path connectng s and t that vsts no node more than once. A smple path P from s to t wll be called an -shorte path f length(p) (1+)d(s,. We let σ denote the number of shorte paths between s and t n G, and we let σ (v) denote the number of such paths that nclude vertex v V. We defne the -betweenness E(v,) as follows: σ ( v) E ( v, ) = -Betweenness centralty. s v t V σ Notce that n the example gven above, wth =0.1 (.e. we count paths whose length doesn t exceed that of the shorte path by more than 10%), E(w,0.1)=2. Snce the calculaton of -betweenness nvolves approxmate shorte paths, t s more complcated and tme-consumng than the calculaton of betweenness. Furthermore, when

5 we consder paths that may be longer than the shorte path, we mu take care to exclude paths contanng loops. Paths contanng loops seem to be unlkely communcaton paths and are thus explctly excluded. In ths algorthm, we assure that the paths computed are smple by enforcng that d(s,<2l(e) for all edges e and all pars s t. In partcular, f l s the length of the shorte edge and D s the maxmum shorte path dance between a par of nodes n G, then l < 2. D Now, we gve a raghtforward algorthm to compute -betweenness. Let Γ ( = { u V : ( u, E} be the nodes that are drectly connected to t, and let w Γ (. We calculate the number of -shorte paths from s to t that go through the edge (w,. Notce that any path P from s to w wth length(p) (1+δ)d(s,, (1 + ) d ( s, ( d( s, + l( w, ) where δ =, d( s, can be extended wth edge (w, to a path from s to t, whose length s at mo (1+)d(s,. Moreover, δ 0 mples that only the w s that satsfy ( 1 + ) d ( s, l( w, + d ( s, can produce such paths. It s obvous that, f we calculate δ for all neghbors w of t that satsfy the la condton, σ can be computed as follows: δ σ σ. = Assumng that we have already calculated the shorte path lengths (by, say, the method n [9]), σ can be computed recursvely, searchng from t n a breadth-fr fashon. In order to calculate σ (v), we ore all ntermedate δ results σ sw. Then t s easy to retreve the number of paths that pass through v. The runnng tme of ths algorthm can be prohbtvely hgh when the network s not acyclc. However, t s concevable that the condton ( 1 + ) d ( s, l( w, + d( s, together wth the rapd convergence of δ s to 0 may keep the space and tme requrements of the algorthm manageable. Ths s certanly a pont for further nvegaton. sw An algorthm for -betweenness can also be mplemented based on a varant of a k-shorte paths algorthm, for computng the k shorte acyclc paths between a par of nodes. Gven a graph wth weghts on the edges, a par of vertces s and t, and an nteger k, such an algorthm computes the shorte s-t path, the second shorte s-t path, up to the kth shorte s-t path. Several algorthms, ncludng those by Katoh, Ibarak, and Mne [12] and Yen [17], compute these paths n order, so that we don t have to decde on k n advance, but rather can proceed untl we generate a path of length greater than (1+)d(s,. At ths pont we have generated all of the -shorte s-t paths, and we can easly determne both σ and σ (v) for all vertces v. The tme to do ths n undrected graphs usng the algorthm n [12] s O(( σ + 1) c( n, m)), where c(n,m) s the tme to compute a shorte-path tree from a sngle vertex n a graph wth n vertces and m edges. Ths algorthm works for arbtrary nonnegatve. Underlyng the defnton of -betweenness s the assumpton that our betweenness measure wll be more able n the presence of uncertan data f we base t on a larger set of good paths. As such, we could also conruct a betweenness varant based upon the k-shorte smple paths. However, we prefer the -betweenness measure because t s more senstve to the relatve qualty of the paths for each par of nodes. These more robu measures are predcated on the assumpton that communcaton ll occurs along geodesc paths n the network, but we don t necessarly know those paths because of uncertanty n the data. Stephenson and Zelen [14] ntroduced another measure of centralty, called nformaton centralty, that weghs all paths between a par of nodes. Ther thnkng s that all paths carry nformaton. Moreover, crcutous paths may be preferred when actors wsh to hde ther communcatons. Ths measure also has the robuness of consderng multple paths and may be very well-suted to analyzng terror networks where delberate efforts are made to obfuscate communcaton. FUTURE DIRECTIONS We have descrbed both theoretcal and practcal avenues of research for computng centralty n covert networks. Perhaps the mo compellng

6 theoretcal queons are whether runnng tmes for dynamc APSP can be mproved for sparse networks and whether such algorthms can be extended to computng betweenness. Gven the amount of uncertanty that we expect n models of terror networks, fndng fa approxmaton algorthms for betweenness and other centralty measures s also of ntere. From a practcal andpont, t s of ntere to see whch types of small cuts we fnd n real networks, whether socal networks have small tree wdth, whether decomposton to explot these features speeds centralty computaton, and whether more robu measures of centralty are needed. Reference L [1] Aho, J. Hopcroft, and J. Ullman. Data Structures and Algorthms. Addson- Wesley, Readng, MA, [2] D. Benock and M. Langon. Algorthmc mplcatons of the graph mnor theorem. In Network Models, Chapter 8, M. Ball, T. Magnant, C. Monma, and G. Nemhauser, eds., Elsever Scence, Amerdam, [3] U. Brandes. A faer algorthm for betweenness centralty. To appear n Journal of Mathematcal Socology. [4] G. Cornuejols, D. Naddef, and W. Pulleyblank. The travellng salesman problem n graphs wth 3-edge cutsets, J. ACM, 32, pp , [5] R. Davs. Socal network analyss: An ad n conspracy nvegatons. FBI Law Enforcement Bulletn, 50(12), pp , 1981 [6] C. Demetrescu and G. Italano. Fully dynamc all pars shorte paths wth real edge weghts. Proceedngs of the 42 nd IEEE Symposum on Foundatons of Computer Scence, pp , Las Vegas, [7] D. Eppen, Z. Gall, and G. Italano. Dynamc graph algorthms. In Algorthms and Theoretcal Computng Handbook, Chapter 8, M. J. Atallah, ed., CRC Press, [8] D. Eppen and J. Wang. Fa approxmaton of centralty. Proceedngs of the 12 th ACM Symposum on Dscrete Algorthms, pp , Washngton, [9] M. Fredman and R. Tarjan. Fbonacc heaps and ther uses n mproved network optmzaton algorthms. J. ACM, 34, [10] J. Garreau. Dsconnect the dots: maybe we can t cut off terror s head but we can take out ts nodes. Washngton Po Onlne, September 16, [11] M. Henznger. Improved data ructures for fully dynamc bconnectvty. SIAM Journal on Computng, 29, pp , [12] N. Katoh, T. Ibarak, and H. Mne. An effcent algorthm for K shorte smple paths. Networks 12(4), pp , [13] H. La Poutre. Mantenance of 2- and 3- edge-connected components of graphs II. SIAM Journal on Computng, 29, pp , [14] K. Stephenson and M. Zelen. Rethnkng centralty: Methods and examples. Socal Networks, 11, pp. 1-37, [15] T. Stewart. Sx degrees of Mohammad Atta. Busness 2.0, December, [16] S. Wasserman and K. Fau. Socal Network Analyss: Methods and Applcatons. Cambrdge Unversty Press, [17] J. Y. Yen. Fndng the K shorte loopless paths n a network. Management Scence 17, pp , [18] U. Zwck. All pars shorte paths usng brdgng sets and rectangular matrx multplcaton. Onlne techncal report. Bography Tam Carpenter receved her Ph.D. n Operatons Research from Prnceton Unversty n Upon completon, she joned Bellcore (now Telcorda Technologes) and s drector of the Network Optmzaton and Algorthms Research Group. She conducts research n communcaton network optmzaton. George Karakoas receved hs Dploma n Computer Engneerng and Informatcs from the Unversty of Patras n He got hs Ph.D. n Computer Scence from Prnceton Unversty n In 2000, he joned Telcorda Technologes. Hs research nteres nclude the desgn and analyss of approxmaton algorthms, computatonal complexty, and practcal applcatons of theory. Davd Shallcross receved hs Ph.D. n Operatons Research from Cornell Unversty n After podoctoral postons at Yale Unversty and at IBM, he joned Bellcore (now Telcorda Technologes) n Hs work has been n combnatoral and network optmzaton.

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Generalizing the degree sequence problem

Generalizing the degree sequence problem Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net

Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net Graph Calculus: Scalable Shortest Path Analytcs for Large Socal Graphs through Core Net Lxn Fu Department of Computer Scence Unversty of North Carolna at Greensboro Greensboro, NC, U.S.A. lfu@uncg.edu

More information

To Fill or not to Fill: The Gas Station Problem

To Fill or not to Fill: The Gas Station Problem To Fll or not to Fll: The Gas Staton Problem Samr Khuller Azarakhsh Malekan Julán Mestre Abstract In ths paper we study several routng problems that generalze shortest paths and the Travelng Salesman Problem.

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development Abtelung für Stadt- und Regonalentwcklung Department of Urban and Regonal Development Gunther Maer, Alexander Kaufmann The Development of Computer Networks Frst Results from a Mcroeconomc Model SRE-Dscusson

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Time Value of Money Module

Time Value of Money Module Tme Value of Money Module O BJECTIVES After readng ths Module, you wll be able to: Understand smple nterest and compound nterest. 2 Compute and use the future value of a sngle sum. 3 Compute and use the

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation Exhaustve Regresson An Exploraton of Regresson-Based Data Mnng Technques Usng Super Computaton Antony Daves, Ph.D. Assocate Professor of Economcs Duquesne Unversty Pttsburgh, PA 58 Research Fellow The

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Examensarbete. Rotating Workforce Scheduling. Caroline Granfeldt

Examensarbete. Rotating Workforce Scheduling. Caroline Granfeldt Examensarbete Rotatng Workforce Schedulng Carolne Granfeldt LTH - MAT - EX - - 2015 / 08 - - SE Rotatng Workforce Schedulng Optmerngslära, Lnköpngs Unverstet Carolne Granfeldt LTH - MAT - EX - - 2015

More information

Sngle Snk Buy at Bulk Problem and the Access Network

Sngle Snk Buy at Bulk Problem and the Access Network A Constant Factor Approxmaton for the Sngle Snk Edge Installaton Problem Sudpto Guha Adam Meyerson Kamesh Munagala Abstract We present the frst constant approxmaton to the sngle snk buy-at-bulk network

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

How To Solve A Problem In A Powerline (Powerline) With A Powerbook (Powerbook)

How To Solve A Problem In A Powerline (Powerline) With A Powerbook (Powerbook) MIT 8.996: Topc n TCS: Internet Research Problems Sprng 2002 Lecture 7 March 20, 2002 Lecturer: Bran Dean Global Load Balancng Scrbe: John Kogel, Ben Leong In today s lecture, we dscuss global load balancng

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Optimal Delivery of Sponsored Search Advertisements Subject to Budget Constraints

Optimal Delivery of Sponsored Search Advertisements Subject to Budget Constraints Optmal Delvery of Sponsored Search Advertsements Subject to Budget Constrants Zoē Abrams Yahoo!, Inc. 701 Frst Avenue Sunnyvale, CA, USA za@yahoo-nc.com Ofer Mendelevtch Yahoo!, Inc. 701 Frst Avenue Sunnyvale,

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression.

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression. Lecture 3: Annuty Goals: Learn contnuous annuty and perpetuty. Study annutes whose payments form a geometrc progresson or a arthmetc progresson. Dscuss yeld rates. Introduce Amortzaton Suggested Textbook

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

A powerful tool designed to enhance innovation and business performance

A powerful tool designed to enhance innovation and business performance A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Fast degree elevation and knot insertion for B-spline curves

Fast degree elevation and knot insertion for B-spline curves Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Joe Pimbley, unpublished, 2005. Yield Curve Calculations

Joe Pimbley, unpublished, 2005. Yield Curve Calculations Joe Pmbley, unpublshed, 005. Yeld Curve Calculatons Background: Everythng s dscount factors Yeld curve calculatons nclude valuaton of forward rate agreements (FRAs), swaps, nterest rate optons, and forward

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16 Return decomposng of absolute-performance mult-asset class portfolos Workng Paper - Nummer: 16 2007 by Dr. Stefan J. Illmer und Wolfgang Marty; n: Fnancal Markets and Portfolo Management; March 2007; Volume

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information