Fault Tree Analysis of Software Reliability Allocation

Size: px
Start display at page:

Download "Fault Tree Analysis of Software Reliability Allocation"

Transcription

1 Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, Japa ad Yaxag HE Computer School, Wuha Uversty Wuha, Hube, Cha ABSTRACT Tradtoal methods for Software Relablty Allocato (SRA) ofte suffer from laggg behd system desg stage, qute complexty, cosderable subectvty, or badly rely o the experetal data, so the accuracy ad effectveess of the result s doubtful. Our goal s to develop a set of methods that address these weakesses. I ths paper, we propose a ovel method to gude software relablty allocato by usg software fault tree aalyss (SFTA). Wth respect to the mult-user oreted software, we troduce a ew algorthm to fgure out each compoet s mportace, ad establsh a ew relablty allocato model based o software utlty ad total developmet cost. Keywords: Software Relablty Allocato, Software Fault Tree Aalyss, Mmal Cut Set, Software Utlty.. INTRODUCTION Software Relablty Allocato (SRA) s a mportat process software relablty egeerg, t deals wth the settg of relablty goals for dvdual compoets such that a specfed system relablty goal s met ad the compoet goals are well balaced amog themselves []. But most of the exstg software relablty models estmate the relablty of software the testg ad operatoal stages, after the completo of the tal stage of product developmet. These models aswer the questo: how relable s the system? They could ot aswer the questo: how relable should system compoets be? They provde o gudace o how much tme ad effort should be sped o dfferet compoets of the product the plag, desg, ad early codg ad developmet stages, the stages are crucal to subsequet relablty of the system. Hece they could have hardly ay mpact o the plag ad desg stages of software proect. A umber of relablty allocato models have bee developed. Fatemeh Zahed ad Noush Ashraf cotrbuted a SRA model based o system structure, utlty, prce ad cost, by usg the method of Aalytc Herarchy Process (AHP) [2, ], ad the relablty of each module s derved from the herarchy of user utlty, fucto, program ad module, ot by the heret relablty relatoshps amog the system modules ad the actual relablty demad of each module; Oded Berma ad Noush Ashraf proposed four optmzato models for relablty of modular software systems [4], but t oly draws the atteto o how to make a optmal selecto out of a avalable pool of modules wth kow relablty ad cost, gve o gudace o how to allocate relablty to system modules the plag ad desg stage of the system; Mchael R.lyu dscussed optmzato methods of relablty allocato ad testg schedule for software systems wth sgle or multple applcatos [5], but t also does ot fgure out teral relatoshps amog system modules, whch s very mportat to guld the relablty allocato. Software Fault Tree Aalyss (SFTA) s a method for detfyg ad documetg the combatos of lower-level software evets that allow a top-level evet (or root ode) to occur. Whe the root ode s a hazard, the SFTA asssts the requremets process by descrbg the ways whch the system ca reach that usafe state []. The safety requremets for the system ca the be derved from the software fault tree, ether drectly [7][8] or drectly va a shared model [9]. I the work descrbed here, we use SFTA to assst aalyzg ad verfyg the logc relatoshp of the system modules ad ther respectve relablty requremets. Based o these aalyses, we preset a ovel algorthm to allocate the software relablty, ad ca solve the problem amog the system relablty obect, total developmet cost, ad the utlty of mult-user oreted software. The rest of the paper s orgazed as follows. Secto 2 provdes some backgroud kowledge of SFTA. Secto elaborates a fast relablty allocato model based o SFTA. Secto 4 dscusses how to defe each module s mportace of mult-user oreted software. Secto 5 presets a effcet relablty allocato algorthm, whch s based o the software utlty ad total developmet cost. Secto cotas cocludg remarks. 2. BACKGROUND OF SFTA Fault Trees Aalyss (FTA) have bee wdely used for relablty aalyss for years. They were frst developed the 90s to facltate aalyss of the Mutema mssle system [0] ad have bee supported by a rch body of research sce ther cepto.

2 Software Fault Tree Aalyss (SFTA) s a method for detfyg ad documetg the combatos of lower-level software evets that allow a top-level evet (or root ode) to occur. Whe the root ode s hazard, the FTA asssts the requremets process by descrbg the ways whch the system ca reach that usafe state []. To aalyze the software relablty by usg the SFTA techology, frst we should defe the most udesrable evet as the root evet. All the root evets make up a root evets table, or call t a key fault evets table. For each root evet the table, s correspodg to a Fault Tree. By the logc relatoshps amog the compoets of the program, we ca aalyze what modules or seteces (mddle evets) may cause the root evet to occur. Cotue to aalyze the mddle evets utl we reach a sgle setece or a stop codto, amely reach the basc evet. The, based o these aalyses above, we ca draw the Fault Tree of the software. A cut set s a set of basc evets whose occurrece causes the system to fal []. A cut set s called a mmum cut set f t caot be reduced ad ca stll cause the system to fal []. A mmum cut set of a fault tree gves a mmum set of successful evets ecessary to satsfy the root. To get the mmum cut set, we troduce a top-dow algorthm, Fuseell-vesely algorthm [2]. ) From the root evet dowwards gradually, lst evets accordg to dfferet logc relatoshps. 2) If a gate below the root evet s a OR gate, the lst the put evets to dfferet rows. If t s a AND gate, the lst the put evets to oe row. ) Wth respect to the mddle evet, G, regard t as a root evet step, ad repeat the step 2, utl reach the basc evet. 4) Fally we get some sets of evets, they are the whole cut sets of the fault tree. 5) To get the mmum cut sets from the whole cut sets step (4), frst we arrage all the cut sets accordg to the umber of ther elemets, ad let each cut set be a product of basc evets. The to use the relatoshps of the evets below to absorb the redudat cut sets. At last, we get the mmum cut sets. A+A=A A+AB=A AA=A Leveso ad Harvey have also show that SFTA ca be performed at varous levels ad stages of software developmet. The hghest level of aalyss s the fuctoal descrpto. At the lowest level of vestgato SFTA aalyss the program code. I ths paper, we use SFTA at the level of fucto module, to aalyze ad vestgate the heret relablty relatoshps ad requremets of system modules. I our curret work, wth respect to software system, we regard ts fucto module/compoet as the basc evet, ad let the evet of system falure as the root evet. The, resortg to SFTA, we ca fd whch modules are more mportat, ad should be allocated hgher relablty & safety, because they are easer to make the system to fal f they are urelable.. FAULT TREE ANALYSIS OF SOFTWARE RELIABILITY ALLOCATION Presume that the maxmum acceptable Falure Rate (FR) s F, ad the system cossts of modules, let them be: m, m2,, m. By usg SFTA, we get x mmum cut sets. The we preset a algorthm below []. Algorthm If oe mmum cut set cotas modules, the the maxmum FR of each module ths mmum cut set s G G m m 2 Fm (=,2,,) () x If there exst tersectos the mmum cut sets, that s to say, the result of may have k dfferet values, let them be F y, y, 2, y m k. The we defe m T (,,,, ) F = M y y y y (2) 2 k It should be metoed that our algorthm s a geometrc mea algorthm some sese, whch s the reverse process of the tradtoal aalyss of software falure rate by usg SFTA [4]. The tradtoal method ca solve ths problem: gve pre-specfed or kow falure rate of each module (these data ca get from software testg stage), ca aalyze the falure rate of software system qualty ad quatty. Our dea s ust the verse method, gve the relablty requremet of software system the software plag or desg stage, try to determe ad vestgate each module s relablty ad ther heret relatoshps. To our kowledge, we are the frst to propose a relablty allocato algorthm by usg SFTA. I our algorthm, the results of F m are gotte by geometrc mea algorthm, ad may have lttle devato. But the process of aalyzg software fault tree, we ca gve software egeer (SE) a comprehesve uderstadg of the structure of software system ad relablty requremet of each module, help them to kow whch modules are most/more mportat modules (key module) ad allocate hgher relablty to these modules. Compared to the tradtoal methods, such as AHP oly get relatve weghts from users, our method s more reasoable ad relable, the devato s trflg ad acceptable. To expla the algorthm detal, let s frst exame a example. (Root Evet) (OR Gate) G 2 m G 4 G 5 (Mddle Evet) (AND Gate) m 4 m 5 m m Fgure : A fault tree as rug example Example : If a software system cossts of sx modules, let them be: m, m2, m, m4, m5, m. The system demads that the maxmum FR, F 0.0. How should we allocate the

3 Relablty to each module? The fault tree of the software system s gve above fgure. By usg Fuseell-vesely algorthm, frst we derve the whole cut sets of the fault tree fgure, K = { m }, K = { m, m }, K = { m, m, m }, K = { m, m, m }. But m = m + mm4m5, or aother word, K s a subset of K, so fally we get three mmum cut sets, { m },{ m, m },{ m, m, m } The by usg Eq. (), we get the results: F F m = 0.0 m m2 2 = F = 0. Fm = F m = F 5 m = That s to say, the maxmum FR of each module s (0.,0., 0.0,0.25,0.25,0.25), so ther relablty must be (0.9, 0.9,0.99,0.785,0.785,0.785). Aalyss: SFAT of software relablty allocato s very vsual, smple ad effectve. Not oly t ca be used the level of system aalyss, but also the level of subsystem ad module aalyss. Because the process of costructg software fault tree tself s a thorough comprehesve uderstadg process to the system, t requres that the SE must grasp the heret relatoshps amog system modules, make clear the fluece of each potetal usafe factor, so the result data of relablty s more ratoal. I addto, SFAT s a graphc deductve method, shows the system heret relatoshp clearly, whch make t very easy to fd the key modules ad allocate relablty vsually. Based o the defto of mmum cut set ad the aalyss above, we ca get a mportat ferece, f the umber of the module the mmum cut set s fewer, the the module the mmum cut set should be allocated hgher relablty. I example, because the umber of the module K < K2 < K4, we ca quckly get the cocluso: m s the key module or the most mportat module of the system, ad should be allocated hghest relablty, whle m4, m5, m could be allocated lower relablty correspodg to m. 4. DEFINE THE MODULE IMPORTANCE From the vewpot of the user, they are more cocered about the software utlty. Especally mult-user oreted software, because the mportace of each module may dfferet from dfferet user s (user group s) vewpot, so we must fd a way to affrm the relatve mportace of each module. Defto: Utlty s a cocept from the pot of vew of users. It refers to the depedablty whch user uses the software to acheve dfferet fuctos. Whe the utlty s hgh, t shows that the software qualty s also good. Gve a software cotas fucto modules, { m, m2,, m }, ts utlty s: (, ) = U r w w R w R w R () Where w s the mportace of module, the relatve mportace from the users vew the total assessmet of the software, ther value ca be derved by requremet aalyss. R s the relablty of module. For geeralty, defe 0< w < ad w =. = To get the value of method below [5]. w more obectvely, we adopt the Suppose software orets k users ad cotas modules, dog a survey to each module mportace by users. The arrage the result lst by descedg sequece of the module mportace. The result lst of user s lke { m, m 2,, m,,, m m}, where m deotes ay oe module of { m, m2,, m }. So, we ca get k result lsts below. { m, m,, m,, m, m } 2 { m, m,, m,, m, m } { m, m,, m,, m, m } k k k k k 2 The, by defg the mportace value of the ordered modules as {,,,,, }, we ca get the mportace value of module, where ϕ s the mportace value of module gve by user. w = = (4) k wm ϕ k = I addto, the results maybe show that dfferet modules may have the same mportace value, but t s a acceptable ormal stace. Let us demostrate ths algorthm wth a smple example. Example 2: Suppose a software system cotas sx modules: { m, m2, m, m4, m5, m }, vestgate ther relatve mportace from three dfferet users (user groups), ad get ther respectve result of mportace order as follows: { m, m, m2, m4, m5, m } ; { m2, m, m4, m, m, m 5} ; { m, m, m2, m, m5, m 4}. So, we ca fgure out: 2 = = ( + + ) = = = w w m

4 24 = = ( + + ) = = = w2 w m 2 2 = = ( + + ) = = = w w m 7 = = ( + + ) = = w4 w m 4 = = ( + + ) = = = w5 w m 5 4 w = w m = ( + + ) = = Ad we ca valdate that the costrat = w = s true. 5. RELIABILITY ALLOCATION MODEL OF MULTI-USER ORIENTED SOFTWARE BASED ON SOFTWARE UTILITY & COST Geeral speakg, the software developg cost could ot overrus the budget, C *, Whle t should esures that the software utlty as hgher as possble. If software cotas fucto modules, { m, m2,, m }, by usg SFTA get x mmum cut sets, K (=,2,,x). Let F be the FR of module, (=,2,,), R be the Relablty of module, where R = F, ad F be the FR of the whole system. By usg the method troduced above secto, got the mportace value of each module, ( w, w2,, w ), the, we have the software relablty allocato algorthm below [5]: Algorthm 2 (Software Relablty Allocato Model) Obect fucto: Costrats: max[ U = wr ] (5) R u R l = a + c R α v * ( a + c R) C () = I Eq. (), u s the upper lmt relablty of module, ad l s the lower lmt; a deotes the commoly cost gve to module by the costrat R, c s the adustable cost; α s equal to the value of mus the proft rate, whch the vedor expected; v s the sellg prce, so α v s the estmated developg cost of module, ad ts actual cost should ot exceed t. How to decde the sellg prce of module? Let V be the prce that the user would lke to pay for the software, ad the survey process of software evaluatg by the user, we have got the relatve global sgfcace of module, w, so the mplct prce of module s: v = w V (7) Whe the software s developed ad dstrbuted batches or for mass market, the V Eq. (7) s replaced by yv, where y s the estmate umber of copes of the software wll be sold. The fourth costrat Eq. () s the resource cotrol codto of the whole proect, where C * s the avalable developg resource, the whole cost of relablty must less tha t. There are oe lear obect fucto ad + lear costrats algorthm 2. It s a lear costraed optmzato problem. May software products for optmzato ca solve ths lear optmzato problem, ad most maframe computers have lear algorthms ther optmzato packages. Oe also ca fd PC software packages for solvg ths problem. For stace, GAMS [] s a example of a product avalable o both PC ad Maframe, or try for Gude to Avalable Mathematcal Software. I ths paper, we suggest adoptg Geetc Algorthms [7, 8, 9, 20, 2] to solve ths problem. By the heret advatages of global optmzato ad mplct parallelsm of Geetc Algorthms, we ca solve the costraed optmzato problem effectvely whle other algorthms may be hard to ths problem, whch help us to use SFTA quattatve aalyss more coveetly ad effectvely. Let us demostrate the applcato of the relablty allocato model wth a smple example. Example : Suppose a software system cotas sx fucto modules, desged or developed for three ma user groups. Its aalyss of software fault tree ad calculato of module mportace are fgured out as example ad example 2 above. Assume the cash resource for the proect developmet s estmated to be $25,000. The proft mark up for ths proect * s 50%, so we get α = 0.5 ad C = 25,000. Assume the software system demads that the maxmum FR, F 0.0, how do we allocate relablty to each module, whle maxmally satsfed the users demad of software utlty? Based o the result of example ad the equato R = F, we ca get the lower lmt of each module s relablty: ( l l2 l l4 l5 l ) = ( ) I ths example, we let the ut be $000 ad set: ( a a2 a a4 a5 a ) = ( ) ; ( c c2 c c4 c5 c ) = ( ) ; u =.

5 Whle based o example 2, we kow: ( w w2 w w4 w5 w ) = ( ) Estmate the software prce s $,000,000, the by Eq. (7), we ca get: ( v v2 v v4 v5 v ) = ( ) Now, we are ready to formulate the relablty allocato model as: max[ U = wr ] = ( ) R =,2,, R 0.9 R2 0.9 R 0.99 R R R R 0.5(27) R2 0.5(250) 0 + 8R 0.5() + 5R4 0.5(7) + 5R5 0.5() + R 0.5(42) R + 99R2 + 8R + 5R4 + 5R5 + R 25 By usg Geetc Algorthm, we get a optmal result: ( R R2 R R4 R5 R) = ( ) Ad U = , the attaable maxmal software utlty. It should be metoed out that ths example, our results of relablty allocato ad software utlty meet well wth the resource ad other costrats Eq. (), but some practcal proects, maybe there have o feasble soluto because of some specal facal costrats. To resolve these feasbltes, the SE group ad maagemet should decde to accept that o proft would be obtaed from some modules or broade/amed some restrats. Ths provdes a mportat sght to the relatoshp of techcal ad facal feasbltes of relablty goals at the module level, ad equps the maagemet wth the aalytcal tools for decdg o software qualty well advace of ay mplemetato.. CONCLUSIONS AND DISCUSSIONS From the aalyss above, whe the system relablty ad cost budget have bee gve, the model of software relablty allocato that we preseted ths paper ca solve the problem: get the maxmal utlty whle meet wth the costrats of techcal cosderatos, costs, resources ad prces. The model ths paper s a amalgamato of qualtatve ad quattatve formato reflectg the subectve vews ad obectve facts about the software system. We used SFTA to aalyze software structure ad get the relablty requremet (lower lmt of relablty) of each fucto module. We vestgated the user s vews about the software fucto modules ad gave a algorthm to fgure out module mportace wth respect to mult-user oreted software. Fally, we proposed a model to allocate software relablty whle maxmzg software utlty ad meetg wth ts costrats. We showed three examples to demostrate our algorthms. Compared to tradtoal algorthm of AHP, our method has two advatages. Frst, SFTA method ca ot oly fgure out the lower lmt relablty of each module, but also show the heret relatoshp of the system structure ad the actual relablty demad of each module, thus the allocato result s more reasoable. Whereas AHP oly smply dcates that the lower lmt relablty should be greater tha zero ad decded by the SE subectvely. Secod, the method to set user mportace of mult-user software s very smple ad effectve, ad the value ca be gaed the process of system desg, whch make t more effectvely to gude the relablty allocato. But ths process AHP s more complcate, ad t dd t gve the soluto to mult-user oreted software (Mchael R. Lyu etc descrbed aother method that how to solve the multple applcato problem usg o-lear programmg techques [5]). All these advatages cotrbute to the operablty ad effectveess of our SFTA method. I ths paper, we oly dscussed our methods at the level of fucto module, though SFTA ca be performed at varous levels ad stages of software developmet, eve to the level of program code. Ths s because that we used a smple ad effectve method to determe the user mportace, whch ca oly be performed at the fuctoal level. Obvously, oe s uable to ask drectly from the user to express hs preferece for each program ad module because hs vew of the software s a exteral oe that eds at the fuctoal level of the software herarchy [2]. O ths had, AHP s a effectve method to get user s relatve preferece for software fucto, program or module (the oto of module ths setece s dfferet from the oto of fucto module our model. It meas code module of program, whereas the oto of fucto module our model equals to the fucto of the software ths setece), whch usg the egevalue method (or other avalable computato methods [22]) for computg the relatve weghts at each level. So, from ths pot of vew, mergg these two approaches wll further mprove software relablty allocato practcal applcatos ad proects. 7. REFERENCES [] J. Musa, D. Iao, ad K. Okumoto, Software Relablty: Measuremet, Predcto. Aolcato, New York: McGraw-Hll. 987, pp. 97. [2] F.Zahed, N.Ashraf, Software Relablty Allocato Based o Structure, Utlty, Prce ad Cost, IEEE Trasacto o Software Egeerg, Vol. 7, No. 4, 99, pp [] F.Zahed, The Aalytc Herarchy Process A Survey of The Method ad Its Applcatos, Iterfaces, Vol., No. 4, 98, pp [4] Oded Berma ad Noush Ashraf, Optmzato

6 Models for Relablty of Modular Software Systems, IEEE Trasactos o Software Egeerg, Vol. 9, No., 99, pp [5] Mchael R. Lyu, Sampath Ragaraa ad Aad P. A. va Moorsel, Optmzato of Relablty Allocato ad Testg Schedule for Software Systems, Bell Laboratores ad Lucet Techologes. Avalable from: [] Leveso, N. G., Safeware: System Safety ad Computers, Addso-Wesley, Readg, MA, USA, 995. [7] De Lemos, R., Saeed, A., ad Aderso, T., Aalyzg Safety Requremets for Process-cotrol Systems, IEEE Software, Vol. 2, No., 995, pp [8] Lutz, R., ad Woodhouse, R. M., Requremets Aalyss Usg Forward ad Backward Search, Aals of Software Egeerg, (997), pp [9] Hase, K. M., Rav, A. P., ad Stavrdou, V., From Safety Aalyss to Software Requremet, IEEE Trasactos o Software Egeerg, Vol. 24, No. 7, 998, pp [0] H.A. Watso ad Bell Telephoe Laboratores, Lauch Cotrol Safety Study, Bell Telephoe Laboratores, Murray Hll, NJ USA, 9. [] Rahea, D. G., Assurace Techologes: Prcples ad Practces, McGraw-Hll Egeerg ad Techology Maagemet Seres, McGraw-Hll, New York, 99. [2] Che Ka, Lu Shula, ad L Feglg, Mathematcs of Relablty & Applcato, The Jl Educato Press, 989. [] Xag Jawe, Xu Rezuo ad Xao Ygba, Fault Tree Aalyss of Software Relablty Allocato, Joural of Wuha Uversty (Natural Scece Edto), Vol. 45, No. 5(B), 999, pp [4] Mchael R. Lyu (ed.), Hadbook of Software Relablty Egeerg, McGraw-Hll, 995, pp [5] Xu Rezuo, Xag Jawe ad Xao Ygba, Fault Tree Aalyss of Mult-User Oreted Software Relablty Allocato, M-Mcro Systems, Vol. 22, No., 200, pp [] A. Brooke, D. Kedrck, ad A. Meeraus, GAMS: A User Gude, Redwood Cty, CA: Scetfc Press, 988. [7] J. Hollad, Geetc Algorthms, Sc. Amer., July 992, pp [8] Mchalewcz Z., Geetc Algorthms + Data Structures = Evoluto Program, Sprger-Verlag, Berl [9] Lu Yog, Kag Lsha ad Che Yupg, No-Numercal Parallel Algorthm (secod volume) Geetc Algorthms, [M] Beg, the Scece Press, 997. [20] J.H. Hollad, Adaptato Natural ad Artfcal System, The Uversty of Mchga Press, 975. [2] Srvas M ad Patalk L M., Geetc Algorthms: A Survey, Computer, Jue 994, pp [22] Zahed, F., A Smulato Study of Estmato Methods The Aalytc Herarchy Process, Soco-Ecoomc Plag Sceces, Vol. 20, No., 98, pp

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments 1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

The paper presents Constant Rebalanced Portfolio first introduced by Thomas

The paper presents Constant Rebalanced Portfolio first introduced by Thomas Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

MDM 4U PRACTICE EXAMINATION

MDM 4U PRACTICE EXAMINATION MDM 4U RCTICE EXMINTION Ths s a ractce eam. It does ot cover all the materal ths course ad should ot be the oly revew that you do rearato for your fal eam. Your eam may cota questos that do ot aear o ths

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Real-Time Scheduling Models: an Experimental Approach

Real-Time Scheduling Models: an Experimental Approach Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment , pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College

More information

Multiobjective based Event based Project Scheduling using Optimized Neural Network based ACO System

Multiobjective based Event based Project Scheduling using Optimized Neural Network based ACO System Iteratoal Joural of Computer Applcatos (0975 8887) Volume 119 No.5, Jue 2015 Multobjectve based Evet based Project Schedulg usg Optmzed Neural Network based ACO System Vdya Sagar Poam Research Scholar,

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Analysis of Multi-product Break-even with Uncertain Information*

Analysis of Multi-product Break-even with Uncertain Information* Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

Probability Analysis for the Damage of Gravity Dam

Probability Analysis for the Damage of Gravity Dam Egeerg,, 3, 3-3 do:.436/eg..3436 Publshed Ole Aprl (http://www.scrp.org/oural/eg) Probablty Aalyss for the Damage of Gravty Dam Qag Xu, Jg L, Jayu Che, School of Cvl ad Hydraulc Eg., Dala Uversty of echology,

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

Algorithm Optimization of Resources Scheduling Based on Cloud Computing

Algorithm Optimization of Resources Scheduling Based on Cloud Computing JOURNAL OF MULTIMEDIA, VOL. 9, NO. 7, JULY 014 977 Algorm Optmzato of Resources Schedulg Based o Cloud Computg Zhogl Lu, Hagu Zhou, Sha Fu, ad Chaoqu Lu Departmet of Iformato Maagemet, Hua Uversty of Face

More information

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology

More information

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal

More information

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components BALKAN JOURNAL OF ELECTRICAL & COMPUTER ENGINEERING, 05, Vol.3, No. 4 Developg toursm demad forecastg models usg mache learg techques wth tred, seasoal, ad cyclc compoets S. Cakurt ad A. Subas Abstract

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

AP Statistics 2006 Free-Response Questions Form B

AP Statistics 2006 Free-Response Questions Form B AP Statstcs 006 Free-Respose Questos Form B The College Board: Coectg Studets to College Success The College Board s a ot-for-proft membershp assocato whose msso s to coect studets to college success ad

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

A Smart Machine Vision System for PCB Inspection

A Smart Machine Vision System for PCB Inspection A Smart Mache Vso System for PCB Ispecto Te Q Che, JaX Zhag, YouNg Zhou ad Y Lu Murphey Please address all correspodece to Departmet of Electrcal ad Computer Egeerg Uversty of Mchga - Dearbor, Dearbor,

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information