Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Size: px
Start display at page:

Download "Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment"

Transcription

1 Iteratoal Joural of Securty ad Its Applcatos, pp Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology, X'a Iteratoal Uversty, , X'a Shaax Cha lfegqua@xau.edu.c Abstract Wth the rapd developmet of computer techology ad formato techology, formato has bee a ew asset of the eterprse ad played more ad more mportat role. How to protect formato securty s the problem that all compaes eed to solve together. I ths paper, we propose a ovel method to evaluate the eterprse s formato securty maagemet uder tutostc fuzzy evromet. The tutostc fuzzy set whch cosders ot oly membershp ad o-membershp, but also hestacy ca express the decso maker s prefereces more precse. The exteded TOPSIS approach wth correlato coeffcet stead of dstace measure s troduced the procedure of decso makg. Fally, the applcato ad comparso aalyss are demostrated to verfy valdty ad relablty of the method. Keywords: formato securty maagemet, Itutostc fuzzy set, TOPSIS, correlato coeffcet 1. Itroducto Wth the growg spread of commucato meda ad the expoetal crease of electroc storage ad trasmsso of formato, the eed for formato securty has rse to hgh levels. Systemzed ad stadardzed are ma tred the developmet of formato securty maagemet. The settg-up of formato securty maagemet system s the effectve way to guaratee formato securty. The evaluato of formato securty maagemet has receved more ad more atteto. L [1] troduced D-S evdece theory to evaluate the capacty of formato securty maagemet. The characterstcs of formato securty maagemet were aalyzed ad based o the PDRR, the ew formato securty maagemet model was proposed. Huag [2] cetered the study o the formato securty maagemet of the persoal data protecto to promote ther stadardzato. Belloe [3] proposed some specfc operatoal plas ad approaches to assess formato securty maagemet. To evaluate a set of alteratves, the decso maker should gve prefereces o each attrbute for each alteratve. However, t s dffcult to express the decso maker s prefereces accurately. Fuzzy logc ad fuzzy set are popular whe hadlg mperfect, vague or mprecse prefereces. Sce fuzzy set was proposed by Zadeh [4], t has bee successfully used for hadlg fuzzy decso makg problems. The ma characterstc of fuzzy sets s that: the membershp fucto assgs to each elemet x a uverse of dscourse X a membershp terval [0, 1] ad the o-membershp degree equals oe mus the membershp degree. Frutful research results of fuzzy sets have bee acheved may dfferet felds [5, 6]. I applcato, however, the formato combes ot oly evdece for x or evdece agast x, but also ucertaty. Because of the lack of kowledge, the decso maker does ot kow whether evdece for x or ot. I order to solve ths problem, Ataassov [7] troduced the cocept of tutostc ISSN: IJSIA Copyrght c 2015 SERSC

2 Iteratoal Joural of Securty ad Its Applcatos fuzzy set (IFS), whch as a geeralzato of the cocept of fuzzy set cosders the membershp degree, the o-membershp degree ad the ucerta degree. Meawhle, Ataassov [8] defed some operatoal laws of tutostc fuzzy sets. The tutostc fuzzy set has receved more ad more atteto sce ts appearace [9-11]. Szmdt ad Kacprzyk [12] used tutostc fuzzy sets to solve group decso makg problems. Xu ad Yager [13] proposed some aggregato operators based o tutostc fuzzy sets, ad appled them to multple attrbute decso makg. Xu [14] developed some tutostc fuzzy aggregato operators, cludg the tutostc fuzzy weghted averagg operator, tutostc fuzzy ordered weghted averagg operator, ad tutostc fuzzy hybrd aggregato operator, whch ca be used to aggregate tutostc fuzzy formato. I [15], a automotve compay s desred to select the most approprate suppler for oe of the key elemets ts maufacturg process. It s dffcult how to select the best suppler from fve caddates. Meawhle, four attrbutes should be cosdered. TOPSIS(techque for order preferece by smlarty to a deal), proposed by Hwag ad Yoo [16], whose basc prcple s to choose the alteratve wth the shortest dstace from the postve deal soluto(pis) ad the farthest dstace from the egatve deal soluto(nis). It has gaed a lot of atteto. Mash Agarwal [17] compared Choquet tegral wth TOPSIS terms of solvg the suppler selecto problem uder fuzzy evromet. TOPSIS was appled to facal vestmet advaced maufacturg systems [18]. G. R. Jahashahloo [19] exteded the TOPSIS method to decso-makg problems wth fuzzy data, where the ratg of each alteratve ad the weght of each crtero are expressed tragular fuzzy umbers. I ths paper, motvated by the metoed method of tutostc fuzzy set, we propose a ew TOPSIS method wth correlato coeffcet. I tradtoal TOPSIS approach, dstace measure s used to measure devato of alteratves ad the postve deal soluto (PIS) or the egatve deal soluto (NIS). I the ew TOPSIS approach, we defe the weghted correlato coeffcet to measure the correlato of two tutostc sets stead of dstace measure. It ca provde more choce to make best decso. Correlato dcates how well two varable move together a lear fasho [20]. As a mportat cotet fuzzy mathematcs, correlato betwee fuzzy sets has gaed much atteto [21]. Przemyslaw Grzegorzewsk troduced Kedall s correlato coeffcet for fuzzy preferece [22]. Ye [23] used correlato coeffcet to tutostc, terval-valued tutostc fuzzy multple attrbute decso makg. The characterstcs of the weghted correlato coeffcet cludg commutatvty, boudary, ad reflexvty are demostrated ad prove. Smlar to tradtoal TOPSIS approach, the correlato coeffcet s used to compute the closeess coeffcet to rak all the alteratves. The greater the closeess coeffcet s, the better the alteratve wll be. The ma cotrbuto of ths paper cludes the followg: (1) the desg of ew evaluato model of formato securty maagemet uder tutostc fuzzy evromet; (2) the troducto of weghted correlato coeffcet of tutostc fuzzy set; (3) the creato of ew TOPSIS approach wth correlato coeffcet; ad(4) the practcal applcato of the ew method. The rest of ths paper s orgazed as follows. I Secto 2, we revew some basc cocepts related to tutostc fuzzy set. Secto 3 troduces the weghted correlato coeffcet uder tutostc fuzzy evromet. I Secto 4, a ew TOPSIS approach s proposed. I Secto 5, a evaluato problem of formato securty maagemet s vestgated to demostrate the proposed method, ad verfy ts valdty ad applcablty. Fally, Secto 6 cocludes ths paper. 2. Prelmares Itutostc fuzzy set whch geerates the cocept of Zadeh s fuzzy set s 44 Copyrght c 2015 SERSC

3 Iteratoal Joural of Securty ad Its Applcatos characterzed by a membershp degree, a o-membershp degree ad a hestacy degree to descrbe ucertaty ad vagueess more proper. I ths secto, we revew some cocepts of tutostc fuzzy set. Defto 1 [7] Let X be a ordary fte o-empty set. A tutostc fuzzy set X s a expresso A gve by A x, u ( x), v ( x) x X (1) A Where u : X 0,1 deotes the degree of membershp ad : 0,1 A A v X deotes the degree of o-membershp wth the codto: 0 ua va 1, for all x X. For each tutostc fuzzy set A X, f the amout ( x) 1 u ( x) v ( x), x X A A A The ( x ) s called the degree of determacy of x to A. Especally, A If A( x) 1 ua( x) va( x) 0, x X The the tutostc fuzzy set A s reduced to a fuzzy set. For computatoal coveece, ths paper, we call ua( x), va( x) a tutostc fuzzy value. Defto 2 [8] Let a% ( u, v ) ad b % ( u, v ) be two tutostc fuzzy values, the a % a % b % b % (1) a% b% ( ua %, u uau, vav ) b % % b % % b % (2) a% (1 (1 ua %),( va %) ), 0 Defto 3 [13] Gve two tutostc fuzzy values a ad b, the followg operatos are vald: (1) a% b% b% a% a% b% a% b% (2) (3) a% a% ( ) a% 3. The Correlato Coeffcet uder Itutostc Fuzzy Evromet Cosderg the operatoal characterstc of tutostc fuzzy set, we troduce the followg correlato coeffcets betwee tutostc fuzzy sets: the correlato coeffcet ad the weghted correlato coeffcet. Defto 4. (Gerstekor ad Mako, 1991)Gve two tutostc fuzzy sets M= x, um( x), vm( x) x X ad N= x, un( x), vn( x) x X, the correlato coeffcet betwee M ad N s gve as: C( M, N) IF M, N C( M, M ) C( N, N) 1 u ( x ) u ( x ) v ( x ) v ( x ) M N M N u ( ) ( ) 1 M x vm x u ( ) ( ) 1 N x vn x 1 1 Defto 5. Gve two tutostc fuzzy sets M= x, um( x), vm( x) x X ad N= x, un( x), vn( x) x X, the weghted correlato coeffcet betwee M ad N s gve as: IFW M, N C( M, N) C( M, M ) C( N, N) A (2) Copyrght c 2015 SERSC 45

4 Iteratoal Joural of Securty ad Its Applcatos 1 w u ( x ) u ( x ) v ( x ) v ( x ) M N M N w ( ) ( ) 1 um x vm x w ( ) ( ) 1 un x vn x 1 1 Theorem1 Let M ad N be two IFSs o a uverse of dscourse X x x x correlato coeffcet betwee M ad N should satsfy the followg propertes: (1) Commutatvty (2) Boudedess IFW ( M, N) ( N, M) IFW 0 ( M IFW, N ) 1 (3) 1, 2, L,, the (3) Reflexvty ( M IFW, N ) 1, f M=N Proof. C( M, N) (1) IFW M, N C( M, M ) C( N, N) 1 w u ( x ) u ( x ) v ( x ) v ( x ) M N M N w ( ) ( ) 1 um x vm x w ( ) ( ) 1 un x vn x w u ( x ) u ( x ) v ( x ) v ( x ) N M N M w ( ) ( ) 1 un x vn x w ( ) ( ) 1 um x vm x 1 1 ( NM IFW, ) (2) The equalty ( M IFW, N ) 0 s obvous. Below let us prove ( M IFW, N ) 1; 1 C( M, N) w u ( x ) u ( x ) v ( x ) v ( x ) N M N M wu ( x ) u ( x ) L w u ( x ) u ( x ) w v ( x ) v ( x ) L w v ( x ) v ( x ) 1 M 1 N 1 M N 1 M 1 N 1 M N w u ( x ) w u ( x ) L w u ( x ) w u ( x ) + 1 M 1 1 N 1 M N w v ( x ) w v ( x ) L w v ( x ) w v ( x ) Accordg to the Cauchy-Schwarz equalty: We ca obta: 1 M 1 1 N 1 M N 2 x1 y1 x2 y2 x y x1 x2 x x1 x2 x C( M, N) 2 w1 um ( x1 ) L w um ( x ) w1 vm ( x1 ) L w vm ( x ) ( ) L ( ) ( ) L ( ) 1 N 1 N 1 N 1 N w u x w u x w v x w v x w1 um x1 vm x w um x vm x w1 un ( x1) vn ( x ) L w un ( x ) vn ( x ) = w u ( x ) v ( x ) w u 2 ( x ) v 2 ( x ) 1 N N 1 M M ( ) ( ) L ( ) ( ) = C( M, M) C( N, N) 46 Copyrght c 2015 SERSC

5 Iteratoal Joural of Securty ad Its Applcatos Therefore The (3) f M=N, IFW (, ) 2 C M N C( M, M) C( N, N) C( M, N) C( M, M) C( N, N) C( M, N) IFW ( M, N) 1 C( M, M ) C( N, N) M, M C( M, M ) =1 C( M, M ) C( M, M ) Whe w 1 ( 1,2, L, ), tutostc fuzzy weghted correlato coeffcet reduces to tutostc fuzzy correlato coeffcet. 4. Decso Makg Procedure based o TOPSIS Approach I tradtoal TOPSIS approach, the devato betwee the alteratve ad the postve deal soluto or the egatve deal soluto s measured by dstace. Its basc prcple s to choose the alteratve whch has the smallest dstace to the postve deal soluto ad the bggest dstace to the egatve deal soluto. I ths secto, we exted the TOPSIS wth correlato coeffcet stead of dstace measure the procedure of decso makg problem. The proposed TOPSIS approach s basc prcple s to choose the alteratve whch has the bggest value of correlato coeffcet to the postve deal soluto ad the smallest value of correlato coeffcet to the egatve deal soluto. The correlato s troduced to compare the alteratve wth the postve deal soluto or the egatve deal soluto. Uder tutostc fuzzy evromet, the tutostc fuzzy PIS, deoted by A +, ad the tutostc fuzzy NIS, deoted by A - ca be defed as follows: A x, max u( x ),m v( x ) 1,2, L, (4) A x,m u ( x ) max, v( x) L 1,2,, (5) I order to smplfy, we use the Eq. (6) ad Eq. (7) stead of the Eq. (4) ad Eq. (5). A x,1,0 1,2, L, (6) A x,0,1 1,2, L, (7) The relatve closeess coeffcet of a alteratve A wth respect to the hestat tutosc fuzzy PIS A + s expressed as follows: CC (8) Where 0 CC 1, 1,2,... m. Obvously, whe a alteratve s closer to the tutostc fuzzy PIS ad farther from the tutostc fuzzy NIS, CC wll be closer to 1. Hece, accordg to the closeess coeffcet CC, the rakg-order of all alteratves ca be determed ad the best alteratve ca be foud. Accordg to the above models, we ca preset a ovel approach to solve MADM problem, where attrbute values take the form of tutostc fuzzy formato. The approach volves the followg step: Step 1. For a MADM problem, we costruct the decso matrx D [% ] m, where all the argumets % ( 1,2,... m; 1,2,... ) are IFS, gve by the DM. As for every alteratve a ( 1,2,..., m), the decso maker s vted to express evaluato or preferece Copyrght c 2015 SERSC 47

6 Iteratoal Joural of Securty ad Its Applcatos accordg to each attrbute c ( 1, 2,..., ) by a tutostc fuzzy value a% ( u, v )( 1,2 L, m; 1,2, L, ), Where u dcates the hestat degree that the decso maker cosders what the alteratve should satsfy the crtera c, v dcates the hestat degree that expert e cosders what the alteratve should ot satsfy the crtera c.the we ca obta a decso makg matrx as follow: a% 11 a% 12 L a% 1 a21 a22 a2 D % % L % M M O M a% m1 L L a% m Step 2: Utlze Eq. (6) ad Eq. (7) to determe the correspodg tutostc fuzzy PISA + ad the tutostc fuzzy NISA -. PISA NISA Step 3: Utlze the tutostc fuzzy correlato coeffcet to calculate the correlato betwee the alteratve ad the PISA + ad the correlato betwee the alteratve ad the NISA -. IFW AA, * 1 1 C A A C A A * (, ) * * (, ) C( A, A ) w u ( x ) A w ua( x ) va( x ) w 1 va( x ) 1 (10) 2 w ( ) ( ) 1 ua x va x Step 4: Calculate the closeess coeffcet of each alteratve: ( a%%, a ) CC, 1,2,... m (11) ( a%, a% ) a% ( a%, ) Step 5: Rak all the alteratve a accordg to the closeess coeffcet CC, where the greater the value of the closeess coeffcet CC, the better the alteratve a. Step 6: Ed. 5. Numercal Example I ths secto, a evaluato problem of formato securty maagemet s aalyzed by the proposed method to demostrate ts applcablty ad valdty. 5.1 Descrpto of the Effcet Evaluato Problem The most ofte cted referece for whch protectve measures that comprse good formato securty s the ISO stadard. The scope of ISO s to establsh gudeles ad geeral prcples for tatg, mplemetg, matag ad mprovg formato securty maagemet a orgazato [25]. However, t does ot provde ay structos o how to acheve a evaluato problem of formato securty maagemet a specfc compay. The, we take some large state-owed eterprses as a example. A relevat expert from a famous uversty acts as the decso maker. He 1 2 (9) 48 Copyrght c 2015 SERSC

7 Iteratoal Joural of Securty ad Its Applcatos chooses fve large state-owed eterprses deoted as a 1, a 2, a 3, a 4, a 5. Meawhle, he detfes four attrbutes based o the former studes deoted as c 1, c 2, c 3, c 4 Table 1 ad specfes w = (0.35, 0.25, 0.3, 0.1) Attrbutes c 1 c 2 c 3 c 4 Table 1. The Meag of the Seve Attrbutes Meag Physcal securty maagemet (It cludes equpmet securty maagemet, Evromet securty maagemet etc.,) Operato securty maagemet (It cludes operatg system mateace securty maagemet, etwork mateace securty maagemet, database mateace securty maagemet etc.,); Rsk maagemet (It cludes evromet rsk, operato rsk, database rsk, cotrol rsk etc.,,) Huma resources ad polcy maagemet (It cludes huma resources maagemet, strategy maagemet, eterprse s relevat polcy maagemet, etc.,) 5.2 Soluto to the Evaluato Problem wth Novel TOPSIS Method As metoed above, the proposed method whch exteds the TOPSIS approach wth correlato coeffcet s troduced to evaluate ths fve eterprses formato securty maagemet. The evaluato model s demostrated the Fgure 1. Copyrght c 2015 SERSC 49

8 Iteratoal Joural of Securty ad Its Applcatos Fgure 1. The Evaluato Model of Iformato Securty Maagemet Based o the evaluato model, the procedure of the decso makg problem s as follows: Step 1: Wth respect to attrbute c ( 1, 2, L, ) the evaluato of the alteratve a ( 1,2, L, m) s made by a tutostc fuzzy value a% ( u, v ) 1,2, L, m; 1,2, L,. The we ca obta a decso makg matrx as follow: Table 2. The Traspose of Itutostc Fuzzy Decso Matrx Attrbutes a 1 a 2 a 3 a 4 a 5 c 1 {0.7}{0.2} {0.5}{0.3 } {0.4}{0.4} {0.4}{0.6} {0.7}{0.1 } c 2 {0.6}{0.2} {0.5}{0.3} {0.3}{0.6} {0.5}{0.4} {0.6}{0.3} c 3 {0.7}{0.1} {0.2}{0.7} {0.2}{0.6} {0.6}{0.2 } {0.7}{0.3} c 4 {0.3}{0.6} {0.5}{0.4} {0.6}{0.2} {0.6}{0.2} {0.3}{0.6} Step 2: The correspodg tutostc fuzzy PISA + ad the tutostc fuzzy NISA - ca be acqured: PISA Copyrght c 2015 SERSC

9 Iteratoal Joural of Securty ad Its Applcatos NISA 01 Step 3: The correlato coeffcet betwee the each alteratve betwee the each alteratve ad the NISA - ca be calculated: Table 3. The Correlato Coeffcet of Each Alteratve a a a a a ad the PISA + ad Step 4: Based o the correlato coeffcet, the closeess coeffcet of each alteratve ca be obtaed: Table 4. The Closeess Coeffcet of Each Alteratve CC a a a a a Step 5: Accordg to the closeess coeffcetcc, the rak-order of all the alteratve a ca be demostrated: a 1 f a 5 f a 4 f a 2 f a 3 Therefore, we ca acqure that the a 1 s the best eterprse of formato securty maagemet. I the ext step, we ca aalyze the advatage of a 1 to mprove all the eterprses formato securty maagemet. 5.3 Comparso Aalyss wth Tradtoal TOPSIS Approach I order to further realze the ew approach, we compare ths proposed TOPSIS method wth the tradtoal TOPSIS approach. I the tradtoal TOPSIS approach, step 1 ad step 2 s as same as them the ovel method. Step 3: The Eucldea dstace measure betwee the each alteratve ad the PISA + ad betwee the each alteratve ad the NISA - ca be calculated: d a a 1 fw 2 w u u v v %%, 1 d a a 1 fw 2 w u u v v %%, 1 Copyrght c 2015 SERSC 51

10 Iteratoal Joural of Securty ad Its Applcatos Table 5. The Eucldea Dstace Measure of Each Alteratve d d a a a a a Step 4: Based o the Eucldea dstace measure, the closeess coeffcet of each alteratve ca be obtaed: d d ( a%%, a ) CC, 1,2,... m d d d( a%, a% ) d( a%, a% ) Table 6. The Closeess Coeffcet of Each Alteratve CC a a a a a Step 5: Accordg to the closeess coeffcet CC, the rak-order of all the alteratve a ca be demostrated: a 1 f a 5 f a 4 f a 2 f a 3 Therefore, we ca acqure that the a 1 s the best eterprse of formato securty maagemet. The, t s obvously that the fal result the tradtoal approach s as same as the proposed method ths evaluato problem. But the extet of chages betwee two curves s ot qute as same Fgure2. The black le ad the red le deote the chages of closeess coeffcet wth correlato coeffcet ad closeess coeffcet wth dstace measure, respectvely. The extet of chages of the closeess coeffcet wth correlato coeffcet s chage s bgger tha the extet of chages of closeess coeffcet wth Eucldea dstace measure. So t s easy to compare the alteratves the TOPSIS approach proposed ths paper, especally there are may complex ad smlar alteratves. 52 Copyrght c 2015 SERSC

11 Iteratoal Joural of Securty ad Its Applcatos Fgure 2. The Comparso betwee the Propose Method ad the Tradtoal Method 6. Coclusos Because of the heret vagueess of huma prefereces, the attrbutes volved decso makg problems are ot always expressed real umbers, ad some are better suted to be deoted by fuzzy values, such as tutostc fuzzy values. I ths paper, cosderg membershp, o-membershp ad the ucertaty of the decso maker s preferece, we exted the TOPSIS approach wth correlato coeffcet uder tutostc fuzzy evromet. The cotrbuto of ths paper clude the followg: (1) the desg of ew evaluato model of formato securty maagemet uder tutostc fuzzy evromet; (2) the troducto of weghted correlato coeffcet of tutostc fuzzy set; (3) the creato of ew TOPSIS approach wth correlato coeffcet; ad (4) the developmet of the evaluato problem of formato securty maagemet; (5) comparso aalyss betwee the ew TOPSIS approach ad tradtoal TOPSIS approach ths evaluato model. Although the proposed method ths paper s a good soluto to the evaluato problem of formato securty maagemet, t caot aalyze more complex problems where may dfferet decso makers take part ths evaluato problem. I the future, we wll exted the method to aalyze the group decso makg problem of formato securty maagemet. Refereces [1] J. N. L, Harb: Research o formato securty maagemet metrcs, Harb Uversty of Scece ad Techology, (2007). [2] C. C. Huag, K. J. Far ad F. Y. L, A Study o Iformato Securty Maagemet wth Persoal Data Protecto, Proceedgs of the Iteratoal Coferece o Parallel ad Dstrbuted Systems, Los Alamtos, CA, Uted States IEEE Computer Socety, (2011), pp [3] J. Belloe, S. Basquat ad J. Rodrguez, Reachg Escape Velocty: a Practced Approach to Iformato Securty Maagemet System Implemetato, Iformato Maagemet ad Computer Securty, vol. 16, 1, (2008), pp [4] L. A. Zadeh, Fuzzy sets, Iformato ad Cotrol, vol. 8, (1965), pp [5] R. R. Yager ad D. P. Fler, Essetals of Fuzzy Modelg ad Cotrol, Wley, New York, (1994). [6] D. Dubos ad H. Prade, A revew of fuzzy sets aggregato coectves, Iformato Scece, vol. 36, (1985), pp [7] K. Ataassov, Itutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 20, (1986), pp [8] K. Ataassov, New operatos defed over the tutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 61, (1994), pp [9] K. Ataassov ad G. Gargov, Itutostc fuzzy logc, C. R. Acard, Bulgare, Sc., vol. 43, o. 3, (1990), pp [10] K. Ataassov, G. Pas ad R. Yager, Itutostc fuzzy terpretatos of mult-crtera mult-perso ad mult-measuremet tool decso, Iteratoal Joural of systems Scece, vol. 36, (2005), pp [11] C. Q. Ta ad X. H. Che, Itutostc fuzzy Choquet tegral operator for mult-crtera decso makg, Expert Systems wth Applcato, vol. 37, (2010), pp Copyrght c 2015 SERSC 53

12 Iteratoal Joural of Securty ad Its Applcatos [12] E. Szmdt ad J. Kacprzyk, Dstaces betwee tutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 114, (2000), pp [13] Z. S. Xu ad R. R. Yager, Some geometrc aggregato operators based o tutostc fuzzy sets, Iteratoal Joural of Geeral Systems, vol. 35, (2006), pp [14] Z. S Xu, Itutostc fuzzy aggregato operators, IEEE Trasacto Fuzzy Systems, vol. 15, (2007), pp [15] F. E. Bora, S. Gec, M. Kurt ad D. Akay, A mult-crtera tutostc fuzzy group decso makg for suppler selecto wth TOPSIS method, Expert Systems wth Applcato, vol. 36, (2003), pp [16] C. L. Hwag ad K. Yoo, Multple Decso Makg: Methods ad Applcatos, Sprger, Berl, Hedelberg, New York, (1981). [17] A. Mash, H. Madasu ad B. Kaad, Choquet Itegral vs. TOPSIS: A Itutostc Fuzzy Approach, IEEE Iteratoal Coferece o Fuzzy Systems (FUZZ), Hyderabad, INDIA, vol. 7, (2013), pp [18] G. Km, C. Park ad K. P. Yoo, Idetfyg vestmet opportutes for advaced maufacturg system wth comparatve-tegrated performace measuremet, Iteratoal Joural of Producto Ecoomcs, vol. 50, (1997), pp [19] G. R. Jahashahloo, F. H. Lotf ad M. Izadkhah, Exteso of the TOPSIS method for decso-makg problems wth fuzzy data, Appled Mathematcs ad Computato, vol. 181, (2006), pp [20] H. Bustce ad P. Burllo, Correlato of terval-valued tutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 74, (1995), pp [21] D. G. Park, Y. C. Kwu, J. H. Park ad I. Y. Park, Correlato coeffcet of terval-valued tutostc fuzzy sets ad tsapplcato to multple attrbute group decso makg problems, Mathematcal ad Computer Modellg, vol. 50, (2009), pp [22] P. GrzegorzewskKedall, Correlato coeffcet for vague prefereces, Soft Compute, vol. 13, (2009), pp [23] J. Ye, Multcrtera fuzzy decso-makg method usg etropy weghts-based correlato coeffcets of terval-valued tutostc fuzzy sets, Appled Mathematcal Modellg, vol. 34, (2010), pp [24] J. Ye, Fuzzy decso-makg method based o the weghted correlato coeffcet uder tutostc fuzzy evromet, Europea Joural of Operatoal Research, vol. 205, (2010), pp [25] L. Nordstrom, Assessmet of Iformato Securty Levels Power Commucato Systems Usg Evdetal Reasog, IEEE Trasactos o Power Delvery, vol. 23, o. 3, (2008), pp Authors LI Feg-Qua, (1977), male (Ha), bor Heb Cty, Hea Provce, Cha. He s a lecturer wth master degree, ad hs maly research drectos are mage processg techology ad computer etwork techology. 54 Copyrght c 2015 SERSC

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment , pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6) Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

MULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION

MULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION MULTI-CRITERIA OPTIMIZATION OFTWARE LEVI-.0 A TOOL TO UPPORT DEIGN AND MANAGEMENT IN CONTRUCTION Edmudas Kazmeras Zavadskas Vlus Gedmas Techcal Uversty, auleteko av., Vlus, LT-0, Lthuaa, Emal: edmudas.zavadskas@adm.vtu.lt

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems wth Applcatos 38 (2011) 7270 7276 Cotets lsts avalable at SceceDrect Expert Systems wth Applcatos joural homepage: www.elsever.com/locate/eswa Aget-based dffuso model for a automoble market

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements Maagg Iterdepedet Iformato Securty Rsks: Cybersurace, Maaged Securty Servces, ad Rsk Poolg Arragemets Xa Zhao Assstat Professor Departmet of Iformato Systems ad Supply Cha Maagemet Brya School of Busess

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT

MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT Tred v podkáí vědecký časops Fakult ekoomcké ZČU v Plz Tred v podkáí, 5() 73-88 Publsher: UWB Plse MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH

More information

Fuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options

Fuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options Proceedgs of the World Cogress o Egeerg 11 Vol II WCE 11, July 6-8, 11, Lodo, U.K. Fuzzy Mult-crtera Method for Revaluato of ERP System Choces Usg Real Optos A.Cagr Tolga Abstract May corporate had mplemeted

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

Analysis of Multi-product Break-even with Uncertain Information*

Analysis of Multi-product Break-even with Uncertain Information* Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES Nadezhda Koleda 1, Natalja Lace 2 1 Rga Techcal Uversty, Latva, adezhda.koleda@ge.com 2 Rga Techcal Uversty, Latva, atalja.lace@rtu.lv

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Fuzzy Risk Evaluation Method for Information Technology Service

Fuzzy Risk Evaluation Method for Information Technology Service Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg Qasheg Zhag Yrog Huag Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg 1 Qasheg Zhag 2 Yrog Huag 1 Shool of Iformats Guagdog

More information

An Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin

An Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin A Automated Selectg Subcotractor Model I E-Commerce by Pao-Hug L Asst. Prof., Dept. of Cvl Egeerg, Feg-Cha Uversty, Tachug, Tawa E-mal: paol@fcu.edu.tw Abstract: From the observato of orgazato chages dgtal

More information

The paper presents Constant Rebalanced Portfolio first introduced by Thomas

The paper presents Constant Rebalanced Portfolio first introduced by Thomas Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Aggregation Functions and Personal Utility Functions in General Insurance

Aggregation Functions and Personal Utility Functions in General Insurance Acta Polytechca Huarca Vol. 7, No. 4, 00 Areato Fuctos ad Persoal Utlty Fuctos Geeral Isurace Jaa Šprková Departmet of Quattatve Methods ad Iformato Systems, Faculty of Ecoomcs, Matej Bel Uversty Tajovského

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

M. Salahi, F. Mehrdoust, F. Piri. CVaR Robust Mean-CVaR Portfolio Optimization

M. Salahi, F. Mehrdoust, F. Piri. CVaR Robust Mean-CVaR Portfolio Optimization M. Salah, F. Mehrdoust, F. Pr Uversty of Gula, Rasht, Ira CVaR Robust Mea-CVaR Portfolo Optmzato Abstract: Oe of the most mportat problems faced by every vestor s asset allocato. A vestor durg makg vestmet

More information

Application of improved analytic hierarchy process in SME s competitiveness evaluation

Application of improved analytic hierarchy process in SME s competitiveness evaluation COMPUTER MODELLING & NEW TECHNOLOGIES 04 8(C) 083-088 Wag Xawu Applcato of mproved aalytc herarchy process SME s compettveess evaluato Xawu Wag * Ahu Busess Vocatoal College, Hefe Ahu, PR Cha Abstract

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability Proceedgs of the Iteratoal MultCoferece of Egeers ad Computer Scetsts 009 Vol I The Relable Itegrated Decso for Stock Prce by Multlayer Itegrato Tme-seres of Coverage Reasoablty Chu-M Hug ad Chu-Wu Yeh*

More information

Common p-belief: The General Case

Common p-belief: The General Case GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators

More information

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function World Evrometal ad Water Resources Cogress 7: Restorg Our Natural Habtat 7 ASCE Usg the Geographcally Weghted Regresso to Modfy the Resdetal Flood Damage Fucto L.F Chag, ad M.D. Su Room, Water Maagemet

More information