Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment
|
|
- Elmer Fowler
- 8 years ago
- Views:
Transcription
1 Iteratoal Joural of Securty ad Its Applcatos, pp Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology, X'a Iteratoal Uversty, , X'a Shaax Cha lfegqua@xau.edu.c Abstract Wth the rapd developmet of computer techology ad formato techology, formato has bee a ew asset of the eterprse ad played more ad more mportat role. How to protect formato securty s the problem that all compaes eed to solve together. I ths paper, we propose a ovel method to evaluate the eterprse s formato securty maagemet uder tutostc fuzzy evromet. The tutostc fuzzy set whch cosders ot oly membershp ad o-membershp, but also hestacy ca express the decso maker s prefereces more precse. The exteded TOPSIS approach wth correlato coeffcet stead of dstace measure s troduced the procedure of decso makg. Fally, the applcato ad comparso aalyss are demostrated to verfy valdty ad relablty of the method. Keywords: formato securty maagemet, Itutostc fuzzy set, TOPSIS, correlato coeffcet 1. Itroducto Wth the growg spread of commucato meda ad the expoetal crease of electroc storage ad trasmsso of formato, the eed for formato securty has rse to hgh levels. Systemzed ad stadardzed are ma tred the developmet of formato securty maagemet. The settg-up of formato securty maagemet system s the effectve way to guaratee formato securty. The evaluato of formato securty maagemet has receved more ad more atteto. L [1] troduced D-S evdece theory to evaluate the capacty of formato securty maagemet. The characterstcs of formato securty maagemet were aalyzed ad based o the PDRR, the ew formato securty maagemet model was proposed. Huag [2] cetered the study o the formato securty maagemet of the persoal data protecto to promote ther stadardzato. Belloe [3] proposed some specfc operatoal plas ad approaches to assess formato securty maagemet. To evaluate a set of alteratves, the decso maker should gve prefereces o each attrbute for each alteratve. However, t s dffcult to express the decso maker s prefereces accurately. Fuzzy logc ad fuzzy set are popular whe hadlg mperfect, vague or mprecse prefereces. Sce fuzzy set was proposed by Zadeh [4], t has bee successfully used for hadlg fuzzy decso makg problems. The ma characterstc of fuzzy sets s that: the membershp fucto assgs to each elemet x a uverse of dscourse X a membershp terval [0, 1] ad the o-membershp degree equals oe mus the membershp degree. Frutful research results of fuzzy sets have bee acheved may dfferet felds [5, 6]. I applcato, however, the formato combes ot oly evdece for x or evdece agast x, but also ucertaty. Because of the lack of kowledge, the decso maker does ot kow whether evdece for x or ot. I order to solve ths problem, Ataassov [7] troduced the cocept of tutostc ISSN: IJSIA Copyrght c 2015 SERSC
2 Iteratoal Joural of Securty ad Its Applcatos fuzzy set (IFS), whch as a geeralzato of the cocept of fuzzy set cosders the membershp degree, the o-membershp degree ad the ucerta degree. Meawhle, Ataassov [8] defed some operatoal laws of tutostc fuzzy sets. The tutostc fuzzy set has receved more ad more atteto sce ts appearace [9-11]. Szmdt ad Kacprzyk [12] used tutostc fuzzy sets to solve group decso makg problems. Xu ad Yager [13] proposed some aggregato operators based o tutostc fuzzy sets, ad appled them to multple attrbute decso makg. Xu [14] developed some tutostc fuzzy aggregato operators, cludg the tutostc fuzzy weghted averagg operator, tutostc fuzzy ordered weghted averagg operator, ad tutostc fuzzy hybrd aggregato operator, whch ca be used to aggregate tutostc fuzzy formato. I [15], a automotve compay s desred to select the most approprate suppler for oe of the key elemets ts maufacturg process. It s dffcult how to select the best suppler from fve caddates. Meawhle, four attrbutes should be cosdered. TOPSIS(techque for order preferece by smlarty to a deal), proposed by Hwag ad Yoo [16], whose basc prcple s to choose the alteratve wth the shortest dstace from the postve deal soluto(pis) ad the farthest dstace from the egatve deal soluto(nis). It has gaed a lot of atteto. Mash Agarwal [17] compared Choquet tegral wth TOPSIS terms of solvg the suppler selecto problem uder fuzzy evromet. TOPSIS was appled to facal vestmet advaced maufacturg systems [18]. G. R. Jahashahloo [19] exteded the TOPSIS method to decso-makg problems wth fuzzy data, where the ratg of each alteratve ad the weght of each crtero are expressed tragular fuzzy umbers. I ths paper, motvated by the metoed method of tutostc fuzzy set, we propose a ew TOPSIS method wth correlato coeffcet. I tradtoal TOPSIS approach, dstace measure s used to measure devato of alteratves ad the postve deal soluto (PIS) or the egatve deal soluto (NIS). I the ew TOPSIS approach, we defe the weghted correlato coeffcet to measure the correlato of two tutostc sets stead of dstace measure. It ca provde more choce to make best decso. Correlato dcates how well two varable move together a lear fasho [20]. As a mportat cotet fuzzy mathematcs, correlato betwee fuzzy sets has gaed much atteto [21]. Przemyslaw Grzegorzewsk troduced Kedall s correlato coeffcet for fuzzy preferece [22]. Ye [23] used correlato coeffcet to tutostc, terval-valued tutostc fuzzy multple attrbute decso makg. The characterstcs of the weghted correlato coeffcet cludg commutatvty, boudary, ad reflexvty are demostrated ad prove. Smlar to tradtoal TOPSIS approach, the correlato coeffcet s used to compute the closeess coeffcet to rak all the alteratves. The greater the closeess coeffcet s, the better the alteratve wll be. The ma cotrbuto of ths paper cludes the followg: (1) the desg of ew evaluato model of formato securty maagemet uder tutostc fuzzy evromet; (2) the troducto of weghted correlato coeffcet of tutostc fuzzy set; (3) the creato of ew TOPSIS approach wth correlato coeffcet; ad(4) the practcal applcato of the ew method. The rest of ths paper s orgazed as follows. I Secto 2, we revew some basc cocepts related to tutostc fuzzy set. Secto 3 troduces the weghted correlato coeffcet uder tutostc fuzzy evromet. I Secto 4, a ew TOPSIS approach s proposed. I Secto 5, a evaluato problem of formato securty maagemet s vestgated to demostrate the proposed method, ad verfy ts valdty ad applcablty. Fally, Secto 6 cocludes ths paper. 2. Prelmares Itutostc fuzzy set whch geerates the cocept of Zadeh s fuzzy set s 44 Copyrght c 2015 SERSC
3 Iteratoal Joural of Securty ad Its Applcatos characterzed by a membershp degree, a o-membershp degree ad a hestacy degree to descrbe ucertaty ad vagueess more proper. I ths secto, we revew some cocepts of tutostc fuzzy set. Defto 1 [7] Let X be a ordary fte o-empty set. A tutostc fuzzy set X s a expresso A gve by A x, u ( x), v ( x) x X (1) A Where u : X 0,1 deotes the degree of membershp ad : 0,1 A A v X deotes the degree of o-membershp wth the codto: 0 ua va 1, for all x X. For each tutostc fuzzy set A X, f the amout ( x) 1 u ( x) v ( x), x X A A A The ( x ) s called the degree of determacy of x to A. Especally, A If A( x) 1 ua( x) va( x) 0, x X The the tutostc fuzzy set A s reduced to a fuzzy set. For computatoal coveece, ths paper, we call ua( x), va( x) a tutostc fuzzy value. Defto 2 [8] Let a% ( u, v ) ad b % ( u, v ) be two tutostc fuzzy values, the a % a % b % b % (1) a% b% ( ua %, u uau, vav ) b % % b % % b % (2) a% (1 (1 ua %),( va %) ), 0 Defto 3 [13] Gve two tutostc fuzzy values a ad b, the followg operatos are vald: (1) a% b% b% a% a% b% a% b% (2) (3) a% a% ( ) a% 3. The Correlato Coeffcet uder Itutostc Fuzzy Evromet Cosderg the operatoal characterstc of tutostc fuzzy set, we troduce the followg correlato coeffcets betwee tutostc fuzzy sets: the correlato coeffcet ad the weghted correlato coeffcet. Defto 4. (Gerstekor ad Mako, 1991)Gve two tutostc fuzzy sets M= x, um( x), vm( x) x X ad N= x, un( x), vn( x) x X, the correlato coeffcet betwee M ad N s gve as: C( M, N) IF M, N C( M, M ) C( N, N) 1 u ( x ) u ( x ) v ( x ) v ( x ) M N M N u ( ) ( ) 1 M x vm x u ( ) ( ) 1 N x vn x 1 1 Defto 5. Gve two tutostc fuzzy sets M= x, um( x), vm( x) x X ad N= x, un( x), vn( x) x X, the weghted correlato coeffcet betwee M ad N s gve as: IFW M, N C( M, N) C( M, M ) C( N, N) A (2) Copyrght c 2015 SERSC 45
4 Iteratoal Joural of Securty ad Its Applcatos 1 w u ( x ) u ( x ) v ( x ) v ( x ) M N M N w ( ) ( ) 1 um x vm x w ( ) ( ) 1 un x vn x 1 1 Theorem1 Let M ad N be two IFSs o a uverse of dscourse X x x x correlato coeffcet betwee M ad N should satsfy the followg propertes: (1) Commutatvty (2) Boudedess IFW ( M, N) ( N, M) IFW 0 ( M IFW, N ) 1 (3) 1, 2, L,, the (3) Reflexvty ( M IFW, N ) 1, f M=N Proof. C( M, N) (1) IFW M, N C( M, M ) C( N, N) 1 w u ( x ) u ( x ) v ( x ) v ( x ) M N M N w ( ) ( ) 1 um x vm x w ( ) ( ) 1 un x vn x w u ( x ) u ( x ) v ( x ) v ( x ) N M N M w ( ) ( ) 1 un x vn x w ( ) ( ) 1 um x vm x 1 1 ( NM IFW, ) (2) The equalty ( M IFW, N ) 0 s obvous. Below let us prove ( M IFW, N ) 1; 1 C( M, N) w u ( x ) u ( x ) v ( x ) v ( x ) N M N M wu ( x ) u ( x ) L w u ( x ) u ( x ) w v ( x ) v ( x ) L w v ( x ) v ( x ) 1 M 1 N 1 M N 1 M 1 N 1 M N w u ( x ) w u ( x ) L w u ( x ) w u ( x ) + 1 M 1 1 N 1 M N w v ( x ) w v ( x ) L w v ( x ) w v ( x ) Accordg to the Cauchy-Schwarz equalty: We ca obta: 1 M 1 1 N 1 M N 2 x1 y1 x2 y2 x y x1 x2 x x1 x2 x C( M, N) 2 w1 um ( x1 ) L w um ( x ) w1 vm ( x1 ) L w vm ( x ) ( ) L ( ) ( ) L ( ) 1 N 1 N 1 N 1 N w u x w u x w v x w v x w1 um x1 vm x w um x vm x w1 un ( x1) vn ( x ) L w un ( x ) vn ( x ) = w u ( x ) v ( x ) w u 2 ( x ) v 2 ( x ) 1 N N 1 M M ( ) ( ) L ( ) ( ) = C( M, M) C( N, N) 46 Copyrght c 2015 SERSC
5 Iteratoal Joural of Securty ad Its Applcatos Therefore The (3) f M=N, IFW (, ) 2 C M N C( M, M) C( N, N) C( M, N) C( M, M) C( N, N) C( M, N) IFW ( M, N) 1 C( M, M ) C( N, N) M, M C( M, M ) =1 C( M, M ) C( M, M ) Whe w 1 ( 1,2, L, ), tutostc fuzzy weghted correlato coeffcet reduces to tutostc fuzzy correlato coeffcet. 4. Decso Makg Procedure based o TOPSIS Approach I tradtoal TOPSIS approach, the devato betwee the alteratve ad the postve deal soluto or the egatve deal soluto s measured by dstace. Its basc prcple s to choose the alteratve whch has the smallest dstace to the postve deal soluto ad the bggest dstace to the egatve deal soluto. I ths secto, we exted the TOPSIS wth correlato coeffcet stead of dstace measure the procedure of decso makg problem. The proposed TOPSIS approach s basc prcple s to choose the alteratve whch has the bggest value of correlato coeffcet to the postve deal soluto ad the smallest value of correlato coeffcet to the egatve deal soluto. The correlato s troduced to compare the alteratve wth the postve deal soluto or the egatve deal soluto. Uder tutostc fuzzy evromet, the tutostc fuzzy PIS, deoted by A +, ad the tutostc fuzzy NIS, deoted by A - ca be defed as follows: A x, max u( x ),m v( x ) 1,2, L, (4) A x,m u ( x ) max, v( x) L 1,2,, (5) I order to smplfy, we use the Eq. (6) ad Eq. (7) stead of the Eq. (4) ad Eq. (5). A x,1,0 1,2, L, (6) A x,0,1 1,2, L, (7) The relatve closeess coeffcet of a alteratve A wth respect to the hestat tutosc fuzzy PIS A + s expressed as follows: CC (8) Where 0 CC 1, 1,2,... m. Obvously, whe a alteratve s closer to the tutostc fuzzy PIS ad farther from the tutostc fuzzy NIS, CC wll be closer to 1. Hece, accordg to the closeess coeffcet CC, the rakg-order of all alteratves ca be determed ad the best alteratve ca be foud. Accordg to the above models, we ca preset a ovel approach to solve MADM problem, where attrbute values take the form of tutostc fuzzy formato. The approach volves the followg step: Step 1. For a MADM problem, we costruct the decso matrx D [% ] m, where all the argumets % ( 1,2,... m; 1,2,... ) are IFS, gve by the DM. As for every alteratve a ( 1,2,..., m), the decso maker s vted to express evaluato or preferece Copyrght c 2015 SERSC 47
6 Iteratoal Joural of Securty ad Its Applcatos accordg to each attrbute c ( 1, 2,..., ) by a tutostc fuzzy value a% ( u, v )( 1,2 L, m; 1,2, L, ), Where u dcates the hestat degree that the decso maker cosders what the alteratve should satsfy the crtera c, v dcates the hestat degree that expert e cosders what the alteratve should ot satsfy the crtera c.the we ca obta a decso makg matrx as follow: a% 11 a% 12 L a% 1 a21 a22 a2 D % % L % M M O M a% m1 L L a% m Step 2: Utlze Eq. (6) ad Eq. (7) to determe the correspodg tutostc fuzzy PISA + ad the tutostc fuzzy NISA -. PISA NISA Step 3: Utlze the tutostc fuzzy correlato coeffcet to calculate the correlato betwee the alteratve ad the PISA + ad the correlato betwee the alteratve ad the NISA -. IFW AA, * 1 1 C A A C A A * (, ) * * (, ) C( A, A ) w u ( x ) A w ua( x ) va( x ) w 1 va( x ) 1 (10) 2 w ( ) ( ) 1 ua x va x Step 4: Calculate the closeess coeffcet of each alteratve: ( a%%, a ) CC, 1,2,... m (11) ( a%, a% ) a% ( a%, ) Step 5: Rak all the alteratve a accordg to the closeess coeffcet CC, where the greater the value of the closeess coeffcet CC, the better the alteratve a. Step 6: Ed. 5. Numercal Example I ths secto, a evaluato problem of formato securty maagemet s aalyzed by the proposed method to demostrate ts applcablty ad valdty. 5.1 Descrpto of the Effcet Evaluato Problem The most ofte cted referece for whch protectve measures that comprse good formato securty s the ISO stadard. The scope of ISO s to establsh gudeles ad geeral prcples for tatg, mplemetg, matag ad mprovg formato securty maagemet a orgazato [25]. However, t does ot provde ay structos o how to acheve a evaluato problem of formato securty maagemet a specfc compay. The, we take some large state-owed eterprses as a example. A relevat expert from a famous uversty acts as the decso maker. He 1 2 (9) 48 Copyrght c 2015 SERSC
7 Iteratoal Joural of Securty ad Its Applcatos chooses fve large state-owed eterprses deoted as a 1, a 2, a 3, a 4, a 5. Meawhle, he detfes four attrbutes based o the former studes deoted as c 1, c 2, c 3, c 4 Table 1 ad specfes w = (0.35, 0.25, 0.3, 0.1) Attrbutes c 1 c 2 c 3 c 4 Table 1. The Meag of the Seve Attrbutes Meag Physcal securty maagemet (It cludes equpmet securty maagemet, Evromet securty maagemet etc.,) Operato securty maagemet (It cludes operatg system mateace securty maagemet, etwork mateace securty maagemet, database mateace securty maagemet etc.,); Rsk maagemet (It cludes evromet rsk, operato rsk, database rsk, cotrol rsk etc.,,) Huma resources ad polcy maagemet (It cludes huma resources maagemet, strategy maagemet, eterprse s relevat polcy maagemet, etc.,) 5.2 Soluto to the Evaluato Problem wth Novel TOPSIS Method As metoed above, the proposed method whch exteds the TOPSIS approach wth correlato coeffcet s troduced to evaluate ths fve eterprses formato securty maagemet. The evaluato model s demostrated the Fgure 1. Copyrght c 2015 SERSC 49
8 Iteratoal Joural of Securty ad Its Applcatos Fgure 1. The Evaluato Model of Iformato Securty Maagemet Based o the evaluato model, the procedure of the decso makg problem s as follows: Step 1: Wth respect to attrbute c ( 1, 2, L, ) the evaluato of the alteratve a ( 1,2, L, m) s made by a tutostc fuzzy value a% ( u, v ) 1,2, L, m; 1,2, L,. The we ca obta a decso makg matrx as follow: Table 2. The Traspose of Itutostc Fuzzy Decso Matrx Attrbutes a 1 a 2 a 3 a 4 a 5 c 1 {0.7}{0.2} {0.5}{0.3 } {0.4}{0.4} {0.4}{0.6} {0.7}{0.1 } c 2 {0.6}{0.2} {0.5}{0.3} {0.3}{0.6} {0.5}{0.4} {0.6}{0.3} c 3 {0.7}{0.1} {0.2}{0.7} {0.2}{0.6} {0.6}{0.2 } {0.7}{0.3} c 4 {0.3}{0.6} {0.5}{0.4} {0.6}{0.2} {0.6}{0.2} {0.3}{0.6} Step 2: The correspodg tutostc fuzzy PISA + ad the tutostc fuzzy NISA - ca be acqured: PISA Copyrght c 2015 SERSC
9 Iteratoal Joural of Securty ad Its Applcatos NISA 01 Step 3: The correlato coeffcet betwee the each alteratve betwee the each alteratve ad the NISA - ca be calculated: Table 3. The Correlato Coeffcet of Each Alteratve a a a a a ad the PISA + ad Step 4: Based o the correlato coeffcet, the closeess coeffcet of each alteratve ca be obtaed: Table 4. The Closeess Coeffcet of Each Alteratve CC a a a a a Step 5: Accordg to the closeess coeffcetcc, the rak-order of all the alteratve a ca be demostrated: a 1 f a 5 f a 4 f a 2 f a 3 Therefore, we ca acqure that the a 1 s the best eterprse of formato securty maagemet. I the ext step, we ca aalyze the advatage of a 1 to mprove all the eterprses formato securty maagemet. 5.3 Comparso Aalyss wth Tradtoal TOPSIS Approach I order to further realze the ew approach, we compare ths proposed TOPSIS method wth the tradtoal TOPSIS approach. I the tradtoal TOPSIS approach, step 1 ad step 2 s as same as them the ovel method. Step 3: The Eucldea dstace measure betwee the each alteratve ad the PISA + ad betwee the each alteratve ad the NISA - ca be calculated: d a a 1 fw 2 w u u v v %%, 1 d a a 1 fw 2 w u u v v %%, 1 Copyrght c 2015 SERSC 51
10 Iteratoal Joural of Securty ad Its Applcatos Table 5. The Eucldea Dstace Measure of Each Alteratve d d a a a a a Step 4: Based o the Eucldea dstace measure, the closeess coeffcet of each alteratve ca be obtaed: d d ( a%%, a ) CC, 1,2,... m d d d( a%, a% ) d( a%, a% ) Table 6. The Closeess Coeffcet of Each Alteratve CC a a a a a Step 5: Accordg to the closeess coeffcet CC, the rak-order of all the alteratve a ca be demostrated: a 1 f a 5 f a 4 f a 2 f a 3 Therefore, we ca acqure that the a 1 s the best eterprse of formato securty maagemet. The, t s obvously that the fal result the tradtoal approach s as same as the proposed method ths evaluato problem. But the extet of chages betwee two curves s ot qute as same Fgure2. The black le ad the red le deote the chages of closeess coeffcet wth correlato coeffcet ad closeess coeffcet wth dstace measure, respectvely. The extet of chages of the closeess coeffcet wth correlato coeffcet s chage s bgger tha the extet of chages of closeess coeffcet wth Eucldea dstace measure. So t s easy to compare the alteratves the TOPSIS approach proposed ths paper, especally there are may complex ad smlar alteratves. 52 Copyrght c 2015 SERSC
11 Iteratoal Joural of Securty ad Its Applcatos Fgure 2. The Comparso betwee the Propose Method ad the Tradtoal Method 6. Coclusos Because of the heret vagueess of huma prefereces, the attrbutes volved decso makg problems are ot always expressed real umbers, ad some are better suted to be deoted by fuzzy values, such as tutostc fuzzy values. I ths paper, cosderg membershp, o-membershp ad the ucertaty of the decso maker s preferece, we exted the TOPSIS approach wth correlato coeffcet uder tutostc fuzzy evromet. The cotrbuto of ths paper clude the followg: (1) the desg of ew evaluato model of formato securty maagemet uder tutostc fuzzy evromet; (2) the troducto of weghted correlato coeffcet of tutostc fuzzy set; (3) the creato of ew TOPSIS approach wth correlato coeffcet; ad (4) the developmet of the evaluato problem of formato securty maagemet; (5) comparso aalyss betwee the ew TOPSIS approach ad tradtoal TOPSIS approach ths evaluato model. Although the proposed method ths paper s a good soluto to the evaluato problem of formato securty maagemet, t caot aalyze more complex problems where may dfferet decso makers take part ths evaluato problem. I the future, we wll exted the method to aalyze the group decso makg problem of formato securty maagemet. Refereces [1] J. N. L, Harb: Research o formato securty maagemet metrcs, Harb Uversty of Scece ad Techology, (2007). [2] C. C. Huag, K. J. Far ad F. Y. L, A Study o Iformato Securty Maagemet wth Persoal Data Protecto, Proceedgs of the Iteratoal Coferece o Parallel ad Dstrbuted Systems, Los Alamtos, CA, Uted States IEEE Computer Socety, (2011), pp [3] J. Belloe, S. Basquat ad J. Rodrguez, Reachg Escape Velocty: a Practced Approach to Iformato Securty Maagemet System Implemetato, Iformato Maagemet ad Computer Securty, vol. 16, 1, (2008), pp [4] L. A. Zadeh, Fuzzy sets, Iformato ad Cotrol, vol. 8, (1965), pp [5] R. R. Yager ad D. P. Fler, Essetals of Fuzzy Modelg ad Cotrol, Wley, New York, (1994). [6] D. Dubos ad H. Prade, A revew of fuzzy sets aggregato coectves, Iformato Scece, vol. 36, (1985), pp [7] K. Ataassov, Itutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 20, (1986), pp [8] K. Ataassov, New operatos defed over the tutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 61, (1994), pp [9] K. Ataassov ad G. Gargov, Itutostc fuzzy logc, C. R. Acard, Bulgare, Sc., vol. 43, o. 3, (1990), pp [10] K. Ataassov, G. Pas ad R. Yager, Itutostc fuzzy terpretatos of mult-crtera mult-perso ad mult-measuremet tool decso, Iteratoal Joural of systems Scece, vol. 36, (2005), pp [11] C. Q. Ta ad X. H. Che, Itutostc fuzzy Choquet tegral operator for mult-crtera decso makg, Expert Systems wth Applcato, vol. 37, (2010), pp Copyrght c 2015 SERSC 53
12 Iteratoal Joural of Securty ad Its Applcatos [12] E. Szmdt ad J. Kacprzyk, Dstaces betwee tutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 114, (2000), pp [13] Z. S. Xu ad R. R. Yager, Some geometrc aggregato operators based o tutostc fuzzy sets, Iteratoal Joural of Geeral Systems, vol. 35, (2006), pp [14] Z. S Xu, Itutostc fuzzy aggregato operators, IEEE Trasacto Fuzzy Systems, vol. 15, (2007), pp [15] F. E. Bora, S. Gec, M. Kurt ad D. Akay, A mult-crtera tutostc fuzzy group decso makg for suppler selecto wth TOPSIS method, Expert Systems wth Applcato, vol. 36, (2003), pp [16] C. L. Hwag ad K. Yoo, Multple Decso Makg: Methods ad Applcatos, Sprger, Berl, Hedelberg, New York, (1981). [17] A. Mash, H. Madasu ad B. Kaad, Choquet Itegral vs. TOPSIS: A Itutostc Fuzzy Approach, IEEE Iteratoal Coferece o Fuzzy Systems (FUZZ), Hyderabad, INDIA, vol. 7, (2013), pp [18] G. Km, C. Park ad K. P. Yoo, Idetfyg vestmet opportutes for advaced maufacturg system wth comparatve-tegrated performace measuremet, Iteratoal Joural of Producto Ecoomcs, vol. 50, (1997), pp [19] G. R. Jahashahloo, F. H. Lotf ad M. Izadkhah, Exteso of the TOPSIS method for decso-makg problems wth fuzzy data, Appled Mathematcs ad Computato, vol. 181, (2006), pp [20] H. Bustce ad P. Burllo, Correlato of terval-valued tutostc fuzzy sets, Fuzzy Sets ad Systems, vol. 74, (1995), pp [21] D. G. Park, Y. C. Kwu, J. H. Park ad I. Y. Park, Correlato coeffcet of terval-valued tutostc fuzzy sets ad tsapplcato to multple attrbute group decso makg problems, Mathematcal ad Computer Modellg, vol. 50, (2009), pp [22] P. GrzegorzewskKedall, Correlato coeffcet for vague prefereces, Soft Compute, vol. 13, (2009), pp [23] J. Ye, Multcrtera fuzzy decso-makg method usg etropy weghts-based correlato coeffcets of terval-valued tutostc fuzzy sets, Appled Mathematcal Modellg, vol. 34, (2010), pp [24] J. Ye, Fuzzy decso-makg method based o the weghted correlato coeffcet uder tutostc fuzzy evromet, Europea Joural of Operatoal Research, vol. 205, (2010), pp [25] L. Nordstrom, Assessmet of Iformato Securty Levels Power Commucato Systems Usg Evdetal Reasog, IEEE Trasactos o Power Delvery, vol. 23, o. 3, (2008), pp Authors LI Feg-Qua, (1977), male (Ha), bor Heb Cty, Hea Provce, Cha. He s a lecturer wth master degree, ad hs maly research drectos are mage processg techology ad computer etwork techology. 54 Copyrght c 2015 SERSC
Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationApplication of Grey Relational Analysis in Computer Communication
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationDECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
More informationThe Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal
Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag
More informationThe impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationFuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment
, pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationAutomated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
More informationOptimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationResearch on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance
Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal
More informationCommercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives
Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationResearch on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More informationOptimization Model in Human Resource Management for Job Allocation in ICT Project
Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationSHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
More informationIntegrating Production Scheduling and Maintenance: Practical Implications
Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationA particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
More informationOn Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationERP System Flexibility Measurement Based on Fuzzy Analytic Network Process
JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology
More informationImpact of Interference on the GPRS Multislot Link Level Performance
Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationLocation Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)
Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
More informationCredibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
More informationSettlement Prediction by Spatial-temporal Random Process
Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationRESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS
Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL
More informationHow To Balance Load On A Weght-Based Metadata Server Cluster
WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c
More informationReport 52 Fixed Maturity EUR Industrial Bond Funds
Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:
More informationMULTI-CRITERIA OPTIMIZATION SOFTWARE LEVI-4.0 A TOOL TO SUPPORT DESIGN AND MANAGEMENT IN CONSTRUCTION
MULTI-CRITERIA OPTIMIZATION OFTWARE LEVI-.0 A TOOL TO UPPORT DEIGN AND MANAGEMENT IN CONTRUCTION Edmudas Kazmeras Zavadskas Vlus Gedmas Techcal Uversty, auleteko av., Vlus, LT-0, Lthuaa, Emal: edmudas.zavadskas@adm.vtu.lt
More informationImpact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *
Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty
More informationUSEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT
USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationAgent-based modeling and simulation of multiproject
Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es
More informationExpert Systems with Applications
Expert Systems wth Applcatos 38 (2011) 7270 7276 Cotets lsts avalable at SceceDrect Expert Systems wth Applcatos joural homepage: www.elsever.com/locate/eswa Aget-based dffuso model for a automoble market
More informationFault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
More informationManaging Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Maagg Iterdepedet Iformato Securty Rsks: Cybersurace, Maaged Securty Servces, ad Rsk Poolg Arragemets Xa Zhao Assstat Professor Departmet of Iformato Systems ad Supply Cha Maagemet Brya School of Busess
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationBanking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
More informationON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.
ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs
More informationIP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
More informationForecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion
2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of
More informationStatistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
More information10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
More informationMULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH AND DEVELOPMENT
Tred v podkáí vědecký časops Fakult ekoomcké ZČU v Plz Tred v podkáí, 5() 73-88 Publsher: UWB Plse MULTIPLE SELECTIONS OF ALTERNATIVES UNDER CONSTRAINTS: CASE STUDY OF EUROPEAN COUNTRIES IN AREA OF RESEARCH
More informationFuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options
Proceedgs of the World Cogress o Egeerg 11 Vol II WCE 11, July 6-8, 11, Lodo, U.K. Fuzzy Mult-crtera Method for Revaluato of ERP System Choces Usg Real Optos A.Cagr Tolga Abstract May corporate had mplemeted
More informationCompressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
More informationof the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
More informationVIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN
Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE
More informationAnalysis of Multi-product Break-even with Uncertain Information*
Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationModeling of Router-based Request Redirection for Content Distribution Network
Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationChapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationEfficient Traceback of DoS Attacks using Small Worlds in MANET
Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble
More informationDYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES
DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES Nadezhda Koleda 1, Natalja Lace 2 1 Rga Techcal Uversty, Latva, adezhda.koleda@ge.com 2 Rga Techcal Uversty, Latva, atalja.lace@rtu.lv
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationA particle Swarm Optimization-based Framework for Agile Software Effort Estimation
The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah
More informationNumerical Comparisons of Quality Control Charts for Variables
Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa
More informationTESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION
TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs
More informationPerformance Attribution. Methodology Overview
erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace
More informationDynamic Service and Data Migration in the Clouds
2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg
More informationDynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center
200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College
More informationFuzzy Risk Evaluation Method for Information Technology Service
Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg Qasheg Zhag Yrog Huag Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg 1 Qasheg Zhag 2 Yrog Huag 1 Shool of Iformats Guagdog
More informationAn Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin
A Automated Selectg Subcotractor Model I E-Commerce by Pao-Hug L Asst. Prof., Dept. of Cvl Egeerg, Feg-Cha Uversty, Tachug, Tawa E-mal: paol@fcu.edu.tw Abstract: From the observato of orgazato chages dgtal
More informationThe paper presents Constant Rebalanced Portfolio first introduced by Thomas
Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess
More informationApproximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines
(ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005
More informationA DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
More informationAggregation Functions and Personal Utility Functions in General Insurance
Acta Polytechca Huarca Vol. 7, No. 4, 00 Areato Fuctos ad Persoal Utlty Fuctos Geeral Isurace Jaa Šprková Departmet of Quattatve Methods ad Iformato Systems, Faculty of Ecoomcs, Matej Bel Uversty Tajovského
More informationSoftware Reliability Index Reasonable Allocation Based on UML
Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author
More informationWeb Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm
JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com
More informationThe analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
More informationClassic Problems at a Glance using the TVM Solver
C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the
More informationM. Salahi, F. Mehrdoust, F. Piri. CVaR Robust Mean-CVaR Portfolio Optimization
M. Salah, F. Mehrdoust, F. Pr Uversty of Gula, Rasht, Ira CVaR Robust Mea-CVaR Portfolo Optmzato Abstract: Oe of the most mportat problems faced by every vestor s asset allocato. A vestor durg makg vestmet
More informationApplication of improved analytic hierarchy process in SME s competitiveness evaluation
COMPUTER MODELLING & NEW TECHNOLOGIES 04 8(C) 083-088 Wag Xawu Applcato of mproved aalytc herarchy process SME s compettveess evaluato Xawu Wag * Ahu Busess Vocatoal College, Hefe Ahu, PR Cha Abstract
More informationSoftware Aging Prediction based on Extreme Learning Machine
TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,
More informationThe Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability
Proceedgs of the Iteratoal MultCoferece of Egeers ad Computer Scetsts 009 Vol I The Relable Itegrated Decso for Stock Prce by Multlayer Itegrato Tme-seres of Coverage Reasoablty Chu-M Hug ad Chu-Wu Yeh*
More informationCommon p-belief: The General Case
GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators
More informationUsing the Geographically Weighted Regression to. Modify the Residential Flood Damage Function
World Evrometal ad Water Resources Cogress 7: Restorg Our Natural Habtat 7 ASCE Usg the Geographcally Weghted Regresso to Modfy the Resdetal Flood Damage Fucto L.F Chag, ad M.D. Su Room, Water Maagemet
More information