Statistical and Fuzzy Approach for Database Security

Size: px
Start display at page:

Download "Statistical and Fuzzy Approach for Database Security"

Transcription

1 tatistical ad Fuzzy Approach for Database ecurity Gag Lu, Jukai Yi chool of Iformatio ciece ad Techology Beijig iversity of Chemical Techology Beijig , Chia Kevi Lü Bruel iversity, xbridge B8 3PH, K Abstract A ew type of database aomaly is described by addressig the cocept of Cumulated Aomaly i this paper. Dubiety-Determiig Model (DDM), which is a detectio model basig o statistical ad fuzzy set theories for Cumulated Aomaly, is proposed. DDM ca measure the dubiety degree of each database trasactio quatitatively. oftware system architecture to support the DDM for moitorig database trasactios is desiged. We also implemeted the system ad tested it. Our experimetal results show that the DDM method is feasible ad effective. 1. Itroductio The umber of security-breakig attempts origiated iside a orgaizatio is icreasig steadily [5][8]. These attacks are usually made by "authorized'' users of the system. Typically, i oe type of itrusio, a attacker who is authorized to modify data records uder certai costraits deliberately hides his itetios to chage data beyod costraits i differet operatios ad differet trasactios. Ofte, i this type of attack, each idividual trasactio is legitimate; however, the accumulated results of the attacker s operatios are malicious. The existig Itrusio Detectio ystems (ID) ca be grouped ito two classes: (1) misuse detectio, which maitais a database of kow itrusio techiques or behaviors ad detects itrusios by comparig users behaviors agaist the database [7][8]; (2) aomaly detectio, which aalyzes user behaviors ad the statistics of a process i a ormal situatio, ad checks whether the system is beig used i a differet maer [3][9]. I geeral, misuse detectio model caot detect ew, ukow itrusios [7]. Aomaly detectio eeds to maitai the records of users' behaviors ad the statistics for ormal usages, which is referred to as profiles. The profiles ted to be large. That makes detectig itrusio eeds a large amout of system resources, ad delays detectio decisio makigs. If attackers hide their operatios ito other places, aomaly detectio may ot eve be able to detect them. It is fair to say that either aomaly detectio or misuse detectio would be able to effectively detect Cumulated Aomaly. New techiques eed to be ivestigated. I this study, we ivestigate Cumulated Aomaly ad propose a model for detectio. I this model, the detectio rules are set up maually based o the statistical properties of itrusios amogst the ormal trasactios. I additio, membership fuctios [5] i fuzzy set theory, with their parameters specified ito the detectio rules, are applied i the model to moitor ad preset the possibility of itrusios i real time. Membership fuctios assist detectio rules to idicate the likelihood of a trasactio beig itrusive. If a trasactio is idetified by a detectio rule as a possible itrusio, it is said that the rule matches the trasactio. A idicator (degree) withi the iterval [ 01, ] will be calculated. This idicator is used to represet the dubiety degree of a trasactio. Therefore, this model is amed as Dubiety- Determiig Model (DDM). I this method, the dubiety of various types of database trasactios ca be quatitatively deoted i a uified form way. By showig the dubiety degrees of database trasactios, the model ca detect possible aomalies if their dubiety degrees are high. The rest of the paper is as follows. ectio 2 reviews some related work briefly. ectio 3 describes the DDM method. Desig ad implemetatio issues

2 are discussed i ectio 4. I ectio 5, the experimetal results are itroduced. ectio 6 is the coclusio. 2. Related work The characteristics of widespread used databases with the ivaluable data held i them make it vital to detect ay itrusio or itrusio attempts made at the databases. Therefore, basig o the developmet of itrusio detectios o computer systems, itrusio detectio for databases is becomig imperative eeds. Besides access policies, roles, admiistratio procedures, physical security, security models, ad data iferece, misuse detectio ad aomaly detectio at databases have bee focused o. Christia Yip Chug, Michael Gertz ad Karl Levitt developed DEMID, which is a misuse detectio system for database systems tailored to relatioal database systems [2]. Fracesco M. Malvestuto, Mauro Mezzii ad Maria Moscarii propose a approach to avoid releasig summary statistics that could lead to the disclosure of cofidetial idividual data i [4]. I [8] ad [10], i Yeug Lee, Wai Lup Low ad Pei Yue Wog describe a algorithm that summarizes the raw trasactioal QL queries ito compact regular expressios. All of them have poited out that the cotet of trasactios ca be used to abstract the users profiles, which will be used durig misuse detectio or aomaly detectio. However, to make the detectio results more precise, some quatitative approaches should be employed. I the existig database itrusio detectio researches, fuzzy set theory is maily used with other theories such as eural etwork i buildig profiles for aomaly detectio [1][9][11]. For example, [6] uses a fuzzy Adaptive Resoace Theory (ART) ad eural etwork to detect aomaly itrusio of database operatios, by moitorig the coectio activities to a database. As a result, we have a motivatio of itegratig fuzzy set theory ad itrusio detectio techique to deal with Cumulated Aomaly i databases precisely i real time. 3. Dubiety-Determiig Model (DDM) Give a metric for a radom variable X ad observatios X,, 1 X, the purpose of the statistical sub-model of X is to determie whether a ew observatio X + is abormal with respect to the 1 previous observatios. The mea avg ad the stadard deviatio stdev of X, 1 X are defied as:, X1 + X2 + + X avg = stdev = i= 1 ( X avg) i 2 (1) (2) A ew observatio X 1 + is defied to be abormal if it falls outside a cofidece iterval that is stadard deviatios from the mea, which is deoted by CI: CI = avg ± dev (3) dev = d stdev with d as a parameter. Note that 0 (or ull) occurreces should be icluded so as ot to bias the data. This model ca be applied to variat cases such as evet couters accumulated over a fixed time iterval. Therefore, it would apply for the case of Cumulated Aomaly. Membership fuctios are used to measure the dubiety degrees for each trasactio. For each trasactio, a value of variable X ca be observed. It ca be mapped ito the iterval [ 0,1 ] by a membership fuctio. We defie 0 meas completely acceptable, ad 1 implies aomaly or completely uacceptable. The values betwee 0 ad 1 are called dubious degree. I this way, the dubiety of trasactios ca be deoted i a uified form. A appropriate membership fuctio is the basis of quatitative aalysis o fuzzy attributes ad plays a key role i fuzzy mathematics. The most widely used fuctios iclude -shaped fuctios ( F ), -shaped fuctios ( F ) ad π -shaped fuctios ( F π ). With - shaped fuctios ( F ) defied as complemetarities of π -shaped fuctios, as Figure 1 shows. I Figure 1, we assume that a b c. It is straightforward to prove that whe a= b= c, F ad F both have oly two values which are 0 ad 1, while F π oly has 0 ad F oly has 1 as their values. By adjustig the values of a, b ad c, the shapes of F π ad F ca be chaged. F F π F F Figure 1. The curves of the membership fuctios

3 A set P cotaiig observatios X,, 1 X of a metric for a radom variable X, i.e. P= { X = 1,2, }, ca be obtaied. I P, there must be a miimum X mi ad a imum X. The mea of all the elemets i P is avg as (1) defies. It is defied that CI = [ X mi,x ]. Thus, by assigig X mi, avg ad X to the parameters of membership fuctios a, b ad c, respectively, ay observatio of a metric for a radom variable X ca be mapped to a real umber i [ 0,1 ]. This real umber deotes the dubiety degree of a observatio X. The values of X mi, avg ad X ca be obtaied by existig approaches. Because X mi ad X are both i CI, F ( ) < 1 ad F ( ) < 1 X mi X must stad (meaig X mi ad X do ot cause aomaly), F { F, F, F, F }. As a result, we π have the defiitio of the four types of membership fuctios show i Figure 2. The parameter α ca be assiged a proper value by users accordig to the applicatios. Nevertheless, it is recommeded that α is ot less tha 1 too much to keep the result values i (,] bc differetiable. 4. Architecture based o DDM The architecture for database trasactio moitorig based o DDM is desiged as show i Figure 3. The user iterface (I) provides tools for iteractios, which icludes ettig Rules ad display Dubiety-Determiig Results. ettig Rules allows users to set up moitorig policies. These moitorig policies are the formatted ad trasferred ito Detectio Rules Base by Mappig to Rules. The iformatio about each database trasactio is orgaized ito Audits Base by esor. Evet Aalyzig selects every ew audit record from Audits Base, ad the checks agaist the detectio rules i Detectio Rules Base. Fially, Evet Aalyzig calculates dubiety degree for the audit record, ad forwards the results to Dubiety-Determiig Result. Other mai compoets of the architecture are: Audits Base is built to store the audit records geerated by esor, while Detectio Rules Base is used to store detectio rules defied maually. ettig Rules, used to defie detectio rules, specifies which attributes of trasactios to moitor, what types of membership fuctios to use, ad what the values of the parameters i membership fuctios are, etc. Mappig to Rules. Whe the iformatio of the moitorig policy ad membership fuctio is decided, Mappig to Rules traslates it ito the format of detectio rules to store i Detectio Rules Base. esor. This module moitors the trasactios of applicatio databases i real time. By aalyzig each trasactio processed, it collects iformatio about the trasactio, ad the stores it i Audits Base. Evet Aalyzig. This is the cetre of the whole architecture. The moitorig algorithm is implemeted i this module. For each record i Audits Base, Evet Aalyzig Module is processed ad matched agaist the rules i Rules Base. The value of the moitored attribute is the obtaied. By substitutig this value i the membership fuctio defied i the rule, the result of the fuctio is calculated as the degree of dubiety. There are two basic data structures required i DDM: Audit Record ad Detectio Rule. Audit Record is for recordig the iformatio about each database trasactio. Detectio Rule is the structure for specifyig the format of the detectio rules. The details of the two structures are defied as follows. Audit Record. This data structure is 6-tuple recordig iformatio of each database trasactio: <AID, ID, QLText, Time_stampe, Data1, Data2> 0 x a 2 1 x a a < x b 2 b a F ( x, a, b, c) = 2 α + 1 α c x b < x c,0< α < c b 1 x > c F( xabc,,, ) = 1 F( xabc,,, ) a+ b F ( x, a,, b) x b 2 Fπ ( xabc,,, ) = b+ c F ( x, b,, c) x > b 2 F ( x, a, b, c) = 1 F ( x, a, b, c) π Figure 2. The defiitios of the membership fuctios Figure 3. The architecture for database trasactio moitorig based o DDM

4 AID is the idetifier for each audit record. ID records the user ame of the trasactio. QLText records the cotet of the QL statemet of the trasactio. Time_stamp records the time whe the trasactio is executed. Data1 is the first data field that the trasactio relates to. For example, the data value before update. Data2 is the secod data field that the trasactio relates to. For example, the data value after a update. To make it clearer, from ow o i this paper, we will use the term audit record istead of trasactio. Detectio Rule. This data structure is 6-tuple defiig the format of the detectio rules: <RID, ID, Actio, Obj1, Obj2, Coditio, Time_widow, Mo_type, Fuctio, Eable> RID startig with the letter R is the idetifier for each detectio rule. ID idicates which user the rule is aimed at. Actio idicates what type of operatios the rule is related to, such as select, update, delete ad so o. Obj1 ad Obj2 records for which database object (table, view, procedure, ad so o) the rule is valid. Obj1 is the first object that Actio refers to, such as a table, a view or a procedure. Obj2 is the secod oe. If Obj1 is a table or a view, Obj2 will be a field ame. Coditio idicates the coditio of Actio. sually it is the coditio part ( clause) of the QL statemet. Time_widow specifies a umber of hours as a time rage. The audit records occurred i that time rage before the curretly beig checked oe will be sought by the rule. Mo_type is the type of moitor. It has two values: C ad. C is used for coutig umbers ad is for recordig the sum value. Fuctio is sub-tuple recordig the iformatio of the membership fuctio used by the rule: <FID, A, B, C> FID specifies which type of membership fuctio to use. It has four values. meas F. meas F. P meas F π, while meas F. A, B, ad C store the values of a, b, ad c respectively (defiitio of membership fuctio). Eable is a switch. Whe it is 1, the rule is valid; otherwise, it is ot. 5. Experimetal results The experimets are performed o the DBM of Microsoft QL erver 2000 o Microsoft Widows erver 2003 P1, to show whether DDM ca discover Cumulated Aomaly behaviors. The example database Northwid of QL erver is used i this study. The table Products i it stores product-related data, icludig ProductID ad itprice. uppose there is a product whose ProductID is 9 i Products. Assume a member of staff, A, is authorized to modify itprice of Product 9. However, if the itprice has bee chaged too much or too ofte, it could be suspicious. It is defied that itprice should ot be chaged for more tha 4 times i 30 days, ad the sum of chaged value should ot be more tha 3 pouds i 90 days. Audits Base ad Detectio Rules Base are built accordig to the two basic structures defied. Data ormal audit records are stored i the database. Their schema is described i ectio 4. They iclude Time_stamps (system clock) i a period of three moths. The values of fields QLText are commo database operatios i the form of QL statemets, icludig selectig data from a table, updatig the data i a table, isertig data ito or deletig data from a table, executig a procedure, ad opeig a database. Referrig to the above assumptios, 12 additioal audit records for A s updatig itprice of Products 9 are costructed ad mixed ito the existig audit records. These 12 records are distributed ito the rage of three moths. The Detectio Rules Base (described i ectio 4) cotais two typical detectio rules listed i Table 1 (i which the colum of Eable is ot listed to make the table ot too wide). For example, R02 is used to moitor the audit records with A as ID, update [Products] set itprice=p ProductID=9 as QLText ( p is a umber). The data items before ad after update operatio are recorded i the fields Data1 ad Data2. Whe a audit record R which meets the demad of R02 occurs, the algorithm seeks the audit records meetig the demad of R02 which have occurred 2160 hours before R, ad sums up the margis betwee each pair of Data1 ad Data2 i each of them. The, the summatio is substituted ito F defied i R02. Fially, a result value of the fuctio is calculated as the dubiety degree of that audit record. As this is a real-time process; a audit record will be examied as soo as it arrives.

5 Table 1. The two detectio rules RID ID ACTION Obj1 Obj2 CONDITION TIME_WINDOW MON_TYPE FID A B C R01 A update Products itprice ProductID=9 720 C R02 A update Products itprice ProductID= It ca be see from Table 1 that the two rules are both desiged to moitor A s operatios of updatig itprice of Products 9. R01 moitors the umber of occurreces of the operatio over 30 days (720 hours), while R02 moitors the accumulated values modified over 90 days (2160 hours). Results. I this experimet, we let α = 0.9. As a result, F( X) = F( c) = The experimet cotais three tests. I Test 1 oly R01 is eabled. I Test 2 oly R02 is eabled. Both R01 ad R02 are eabled i Test 3 to show the combied results. Figure 4 shows all results. Figure 4 (a) shows the value of itprice after A updates it for each time. Figure 4 (b) shows the moitor result of usig the rule of R01. We ca see that the dubiety degree is icreasig gradually. However, it does ot reach 1 all the while. That meas o aomaly occurs by R01. Figure 4 (c) shows the results of moitorig the modified itprice of Product 9 over 90 days by R02. It is show that the dubiety degree is more ad more close to 1. At the ed the dubiety degree reaches 1. Accordig to the defiitio of DDM, aomalies may occur. Whe R01 ad R02 are both eabled i Test 3, the results are show i Figure 4 (d). Figure 4 (d) also ca be regarded as the combiatios of Figure 4 (b) ad Figure 4 (c) by selectig the poit with the higher dubiety degree value betwee (b) ad (c) for each AID. I geeral, whe several detectio rules are matched to the same audit record, the highest value of dubiety degree amogst these rules will be selected. From the results, we ca see A s operatios cause aomaly. 6. Coclusio A ew type of database aomaly Cumulated Aomaly is ivestigated. A ew detectio method Dubiety-Determiig Model (DDM) has bee proposed for it. Based o DDM, architecture for database trasactio moitorig is desiged ad implemeted. Tests have bee performed to verify the effectiveess of our ovel method. The results suggest that our methods are capable of idetifyig suspicious user behaviors. We are curretly cosiderig developig a method based o DDM for geeral aomaly detectio i databases. Figure 4. The result of the experimet Refereces [1] Cha Ma Kuok, Ada Fu, Ma Ho Wog. Miig fuzzy associatio rules i databases. IGMOD Record, 1998, 27(1), [2] Chug C Y,Gertz M, Levitt K. DEMID: A Misuse Detectio ystem for Database ystems. I:The Third Aual IFIP TC-11 WG 11.5 Workig Cof. o Itegrity ad Iteral Cotrol i Iformatio ystems, 1999 [3] Darre Muts, Fredrik Valeur, Giovai Viga. Aomalous system call detectio. ACM Trasactios o Iformatio ad system eurity, Vol. 9, No. 1, February 2006, [4] Fracesco M. Malvestuto, Mauro Mezzii, Maria Moscarii. Auditig sum-queries to make a statistical database secure. ACM Trasactios o Iformatio ad system ecurity, Vol. 9, No. 1, February 2006, [5] Pedrycz Witold, Gomide Ferado. A Itroductio to Fuzzy ets: Aalysis ad Desig. Cambridge, Mass. MIT Press, [6] Rug Chig Che, Cheg Chia Hsieh. A aomaly itrusio detectio o database operatio by fuzzy ART eural etwork. Proceedigs of IC [7] ato I., Okazaki Y., Goto.. A improved itrusio detectig method based o process profilig. Trasactios of the Iformatio Processig ociety of Japa vol.43, o.11: Nov. 2002, [8] i Yeug Lee, Wai Lup Low, Pei Yue Wog. Learig figerprits for a database itrusio detectio system. EORIC 2002, LNC 2502, [10] Tia-Qig hu, Pig Xiog. Optimizatio of membership fuctios i aomaly detectio based o fuzzy data miig. Proceedigs of 2005 Iteratioal Coferece o Machie Learig ad Cyberetics (IEEE Cat. No. 05EX1059): (Vol. 4) Vol. 4, [11] Wai Lup Low, Joseph Lee, Peter Teoh. DIDAFIT: Detectig itrusios i databases through figerpritig trasactios. ICEI 2002.

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

Inference on Proportion. Chapter 8 Tests of Statistical Hypotheses. Sampling Distribution of Sample Proportion. Confidence Interval

Inference on Proportion. Chapter 8 Tests of Statistical Hypotheses. Sampling Distribution of Sample Proportion. Confidence Interval Chapter 8 Tests of Statistical Hypotheses 8. Tests about Proportios HT - Iferece o Proportio Parameter: Populatio Proportio p (or π) (Percetage of people has o health isurace) x Statistic: Sample Proportio

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

Now here is the important step

Now here is the important step LINEST i Excel The Excel spreadsheet fuctio "liest" is a complete liear least squares curve fittig routie that produces ucertaity estimates for the fit values. There are two ways to access the "liest"

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

Agency Relationship Optimizer

Agency Relationship Optimizer Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey

More information

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of

More information

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown Z-TEST / Z-STATISTIC: used to test hypotheses about µ whe the populatio stadard deviatio is kow ad populatio distributio is ormal or sample size is large T-TEST / T-STATISTIC: used to test hypotheses about

More information

76 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 9 - NUMBER 1 - YEAR 2011 ISSN: 1690-4524

76 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 9 - NUMBER 1 - YEAR 2011 ISSN: 1690-4524 The Fuzzy ad Compartmet System Cocept for the Commuicatio System takig accout of the Hadicapped situatio M asahiroaruga DepartmetofHuma ad Iformatio Sciece,School ofiformatio Sciecead Techology,TokaiUiversity

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1 Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Mathematical goals. Starting points. Materials required. Time needed

Mathematical goals. Starting points. Materials required. Time needed Level A1 of challege: C A1 Mathematical goals Startig poits Materials required Time eeded Iterpretig algebraic expressios To help learers to: traslate betwee words, symbols, tables, ad area represetatios

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

HCL Dynamic Spiking Protocol

HCL Dynamic Spiking Protocol ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7

More information

One-sample test of proportions

One-sample test of proportions Oe-sample test of proportios The Settig: Idividuals i some populatio ca be classified ito oe of two categories. You wat to make iferece about the proportio i each category, so you draw a sample. Examples:

More information

France caters to innovative companies and offers the best research tax credit in Europe

France caters to innovative companies and offers the best research tax credit in Europe 1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public

More information

PSYCHOLOGICAL STATISTICS

PSYCHOLOGICAL STATISTICS UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

A Balanced Scorecard

A Balanced Scorecard A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Quadrat Sampling in Population Ecology

Quadrat Sampling in Population Ecology Quadrat Samplig i Populatio Ecology Backgroud Estimatig the abudace of orgaisms. Ecology is ofte referred to as the "study of distributio ad abudace". This beig true, we would ofte like to kow how may

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

Neolane Reporting. Neolane v6.1

Neolane Reporting. Neolane v6.1 Neolae Reportig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of

More information

To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e,

To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e, Busiess Itelligece Software for Retail To c o m p e t e i t o d a y s r e t a i l e v i r o m e t, y o u e e d a s i g l e, comprehesive view of your busiess. You have to tur the decisio-makig of your

More information

Practice Problems for Test 3

Practice Problems for Test 3 Practice Problems for Test 3 Note: these problems oly cover CIs ad hypothesis testig You are also resposible for kowig the samplig distributio of the sample meas, ad the Cetral Limit Theorem Review all

More information

Chapter 7: Confidence Interval and Sample Size

Chapter 7: Confidence Interval and Sample Size Chapter 7: Cofidece Iterval ad Sample Size Learig Objectives Upo successful completio of Chapter 7, you will be able to: Fid the cofidece iterval for the mea, proportio, ad variace. Determie the miimum

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS

GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS I the sprig of 2008, Stadig Together agaist Domestic Violece carried out a piece of collaborative work o domestic violece

More information

Exploratory Data Analysis

Exploratory Data Analysis 1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

GCSE STATISTICS. 4) How to calculate the range: The difference between the biggest number and the smallest number.

GCSE STATISTICS. 4) How to calculate the range: The difference between the biggest number and the smallest number. GCSE STATISTICS You should kow: 1) How to draw a frequecy diagram: e.g. NUMBER TALLY FREQUENCY 1 3 5 ) How to draw a bar chart, a pictogram, ad a pie chart. 3) How to use averages: a) Mea - add up all

More information

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place. PENSION ANNUITY Policy Coditios Documet referece: PPAS1(7) This is a importat documet. Please keep it i a safe place. Pesio Auity Policy Coditios Welcome to LV=, ad thak you for choosig our Pesio Auity.

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Extracting Similar and Opposite News Websites Based on Sentiment Analysis

Extracting Similar and Opposite News Websites Based on Sentiment Analysis 202 Iteratioal Coferece o Idustrial ad Itelliget Iformatio (ICIII 202) IPCSIT vol.3 (202) (202) IACSIT Press, Sigapore Extractig Similar ad Opposite ews Websites Based o Setimet Aalysis Jiawei Zhag, Yukiko

More information

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions Chapter 5 Uit Aual Amout ad Gradiet Fuctios IET 350 Egieerig Ecoomics Learig Objectives Chapter 5 Upo completio of this chapter you should uderstad: Calculatig future values from aual amouts. Calculatig

More information

BaanERP 5.0c. EDI User Guide

BaanERP 5.0c. EDI User Guide BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

The Big Picture: An Introduction to Data Warehousing

The Big Picture: An Introduction to Data Warehousing Chapter 1 The Big Picture: A Itroductio to Data Warehousig Itroductio I 1977, Jimmy Carter was Presidet of the Uited States, Star Wars hit the big scree, ad Apple Computer, Ic. itroduced the world to the

More information

Composable Tools For Network Discovery and Security Analysis

Composable Tools For Network Discovery and Security Analysis Composable Tools For Network Discovery ad Security Aalysis Giovai Viga Fredrik Valeur Jigyu Zhou Richard A. Kemmerer Reliable Software Group Departmet of Computer Sciece Uiversity of Califoria Sata Barbara

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles The followig eample will help us uderstad The Samplig Distributio of the Mea Review: The populatio is the etire collectio of all idividuals or objects of iterest The sample is the portio of the populatio

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information