Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
|
|
- Leon Pierce
- 8 years ago
- Views:
Transcription
1 Vol. 9, No. 5 (2016), pp Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou *, Jian Wan, Jilin Zhang and Yuyu Yin School of Coputer Science and Technology, Hangzhou Dianzi University, Hangzhou, China. Key Laboratory of Coplex Systes Modeling and Siulation, Ministry of Education, Hangzhou, China. * rjzhou@ hdu.edu.cn Abstract In this paper, we propose an analysis ethod of spatial and teporal characteristics of education network traffic based on flexible ultiscale entropy (FMSE). As an iproved ethod, flexible ultiscale entropy has a significant iproveent in stability and accuracy over ultiscale entropy (MSE). We analyze network traffic in different tie scales, space scales and traffic levels by building network traffic tie-space analysis odel and using flexible ultiscale entropy as a ethod to quantify coplexity of different network traffic subsequences. The results show that there are distinct characteristics in the coplexity of different levels of network traffic. We also find that the existence of a large nuber of sall network traffic flows has a significant influence on the coplexity of network traffic. Keywords: education network, network traffic, flow, ultiscale entropy, flexible ultiscale entropy, spatioteporal scale transforation 1. Introduction With the continuous developent of the Internet, it has becoe an indispensable part of people's life and odern education. How to ensure safe, stable and efficient operation of education network has becoe an urgent proble needs to be solved. As the carrier of the data flow in network, the spatioteporal characteristic of network traffic can help to understand the coplex network structure and the dynaic characteristics of network, and it has iportant significance for designing, ipleenting and onitoring network. The self-siilarity and long range dependence [1, 2], have been a hot research topic since they were discovered. As an iportant atheatical tool, the wavelet transfor has been widely applied in the research of network traffic [3]. With the continuous developent of achine learning, any achine learning ethods have been applied into the analysis and research of network traffic [4-6]. However, there are few researches on the coplexity of network traffic. As the network heterogeneity brings the difference of network behavior. Although the IP syste in the user level unify all kinds of heterogeneous network and doain anageent, but the IP layer only shield the heterogeneity of network, and the difference in the network is still exist. According to the research of network coplexity, we can reveal the intrinsic characteristics of network traffic, which can provide a strong theoretical basis for network traffic prediction and anoaly detection. As a easure of syste coplexity, entropy often iplies the level of whole syste coplexity. Entropy theory can help us to discover the inherent dynaics of network * Renjie Zhou and Chen Yang are co-first authors who contribute to this work equally. Renjie Zhou is the corresponding author. ISSN: IJXX Copyright c 2016 SERSC
2 traffic [7]. However, traditional entropy theory can only describe tie series fro a single scale, which cannot reveal the coplexity of tie series copletely. Multiscale entropy cobined entropy theory and ulti scale idea for the first tie, analyzing tie series fro different scales to discovery the correlation of tie series in different scales. Multiscale entropy has been widely applied in different fields, e.g., Janne Riihijärvi use ultiscale to study characteristics of networks and wireless counication [9]. Multiscale entropy has obvious advantages copared with inforation entropy and self-siilar paraeter H, and ultiscale entropy also has a good effect on the prediction of network traffic. In this paper, we use flexible ultiscale entropy as a characterization tool for tie series coplexity. As an iproved algorith of ultiscale entropy, flexible ultiscale entropy has a great iproveent on the stability and accuracy of coputation, and has less dependence on the length of tie series. The rest of the paper is organized as follows. In Section 2, we introduce flexible ultiscale entropy and the tie-space analysis odel in detail. In Section 3, we apply flexible ultiscale entropy and the analysis odel to real network traffic data. In Section 4, we provide the result of traffic statistics and analysis. Finally, we conclude the paper in Section Methodology 2.1. Flexible Multiscale Entropy Saple entropy (SapEn) is a easureent of tie series coplexity proposed by Richan [10], which can be used to quantify the coplexity of tie series. The calculation of tie series coplexity can provide a theoretical basis for the prediction and detection of tie series. Costa found that saple entropy ethod applied to health and disease research often output contradictory results, and then proposed the ultiscale entropy. And experients were carried out with white noise and 1/f noise, the experiental results show that the ultiscale entropy can accurately reflect the coplexity of tie series. However, the stability and accuracy of the ultiscale entropy decreased significantly when the scale factor becoes larger. We proposed flexible ultiscale entropy, which introduces the flexible coefficient f into coputation,and the ethod of flexible accuulation is used in the calculation of saple entropy at the specific scale. By setting the flexible coefficient f to control the atching degree of teplate, the discriination of different tie series is iproved. At the sae tie, the stability and accuracy of coputation iproved greatly copare to ultiscale entropy. The calculation steps of flexible ultiscale entropy are as follows: Step1: A coarse-graining process is applied to a given tie series { x( i) 1 i N}. This process is based on coposite ultiscale entropy proposed in paper [11]. The transfored sequence is as follow: ( ) ( ) ( ) ( ) Nk1 y k { yk,1, yk,2,..., yk, P}, P,1 k (1) For every scale factor, it will build new tie series. The specific transforation forula is as follow: j k1 ( ) 1 yk, j xi,1 j P,1 k (2) i( j1) k Step2: For a given pattern length, coposing each new tie series to diensional consecutive vector sequences, the result is as follow: ( ) ( ) ( ) ( ) Y [ y, y,..., y ],1 i P 1,1 k (3) k, k, i k, i1 k, i1 304 Copyright c 2016 SERSC
3 Step3: We define vector distance d[ Y ( i), Y ( j)] as the axiu value of the ( ) ( ) k, k, difference between corresponding eleents in the two vectors. ( ) ( ) ( ) ( ) d[ Y ( i), Y ( j)] ax y y (4) k, k, k, iq k, jq 0q1 Step4: For a given siilarity criterion r, the ratio of siilar vectors of which distance is saller than r, denoted as A () r. i 1 ( ) ( ) Ai ( r) nu{ d[ Yk, ( i), Y k, ( j)] r},1 i P, i j (5) P1 where nu accuulates the nuber of siilar vectors. Step5: Define A () r as the average of A () r. i P 1 A ( r) Ai ( r) (6) P Step6: In this step, calculate A 1 ( f ). Different fro the accuulative function of saple entropy, we define a new accuulative function s here. s is a piecewise function that avoids the easureent of siilar vectors changing suddenly between 0 and 1. ( ) ( ) 0 d[ Yk, 1 ( i), Yk, 1( j)] f ( ) ( ) s d[ Yk, 1 ( i), Yk, 1 ( j)] (7) ( ) ( ) 1- d[ Yk, 1 ( i), Yk, 1( j)] f f where f is flexible siilarity criterion. The ratio of siilar vectors for pattern length +1 is as follow: P ( ) Ai f s (8) P1 Step7: Calculate A 1 ( f ) as follow: i1 j1 1 A ( f ) A ( f ) 1 P 1 i P i1 Step8: Calculate saple entropy for coarse-grained tie series 1 ( ) A ( f) k r f SapEn( y,,, ) ln[ ] A () r (10) Step9: Calculate flexible ultiscale entropy. 1 ( ) FMSE( x,,, r, f ) SapEn( y k,, r, f ) (11) k 1 Above is the calculation process of flexible ultiscale entropy. In the following calculations, we appoint =2, r=0.15,which eans siilarity criterion is 0.15*SD. SD is standard deviation of tie series{ x( i) 1 i N}. We appoint f=0.2, which eans flexible siilarity criterion is 0.2*SD Network Traffic Analysis Model Traditional ethods usually consider only one single space-tie scale, which are incapable of discovering soe inherent characteristics of network traffic. In this paper, we introduce a new ethod to analyze the spatioteporal characteristics of network traffic based on FMSE. First, we build the tie-space analysis odel as shown in Figure 1. Then, we select different space scales, tie scales and network levels, cut the original traffic data sequence into different sub sequences and y ( ) k (9) Copyright c 2016 SERSC 305
4 Network level International Journal of Grid and Distributed Coputing calculate the coplexity of each sequence with flexible utiscale entropy. Finally, suarize and copare the results of each sub sequence, discovering the evolveent echanis and the inherent characteristics of network traffic at different tie scales, space scales and network levels. We will conduct analysis fro two perspectives. One is acro level, and the other is pc level. We can first find a general law of network traffic fro acro level, and then zoo in to pc level to test the validity of the law. Since different individuals have different behaviors, soe particularities ay exist in pc level traffic. We will do a further analysis to discover the causes of particularities and find a general law that is suitable for all diensions of network traffic. Through analyzing network traffic fro two perspectives, we can iprove the accuracy and practicability of the law we discovered. Tie Figure 1. Tie and Space Analysis Model of Network Traffic 3. Experient Results 3.1. Experient Setup The data set used in our study was collected fro the east China s backbone of the CERNET (China Education and Research Network) and was released by Jiangsu Key Laboratory of Coputer Networking Technology on Noveber 9, The backbone covers over 100 universities and high schools. Its bandwidth was updated to 10G fro 2.5G in 2006 [12]. The duration of the data set is 1440 inutes and the size of the data set is GB. The analysis ethod introduced in section 2 is ipleented in Java language Macro Level Network Traffic Analysis At first, analyze network traffic fro acro level. We classify the original traffic data to different data sequences based on the network level, and then calculate the coplexity of each sequence by the flexible ultiscale entropy proposed in section 2. In the 306 Copyright c 2016 SERSC
5 calculation process, the pattern length is 2, the siilarity criterion is 0.15 and the flexible siilarity is 0.2. The axiu scale factor is often set to 20 in the calculation. However, considering that the length of traffic data contains points (seconds), we set the axiu scale factor to 180 and the scale interval to 5. Since the length of tie series is long enough, we can select different scale factors to analyze, so that it is easier to discover the inherent law of the tie series. Figure 2. Entropy Values Curve Based on Network Level Figure 2 is the flexible ultiscale entropy values of byte, packet, and flow series. In the figure, flow stands for traffic flow, which is based on the well-known five-tuple - the source IP address, destination IP address, source port, destination port and protocol fields. Pac stands for packet. The horizontal axis is the tie scale in seconds; the vertical axis is the value of flexible ultiscale entropy. The original data sequence is coarse-grained at scale factors fro 1 to 180 and calculated with flexible ultiscale entropy. Fro the figure, we can see the entropy value of traffic flow rises slowly as the scale factor increases, whereas the entropy value of packet and byte decreases slowly with the scale factor. Three entropy curves are relatively stable when the scale factor is ore than 45. Fro whole scale, the entropy value is in a relatively stable range, which indicates that network traffic exhibits long-range dependence characteristic. The larger the scale factor is, the ore inforation of the original data sequence is contained in the data sequence. Throughout all the scales, byte entropy is higher than packet and flow entropy, and the flow entropy is the lowest of the three. Furtherore, the relationship of coplexity trend of the three is relatively stable. The relative relationship aong byte, packet and traffic flow can be treated as an internal law of network traffic. And this law can be applied to analyze the behavior of network traffic, onitor and predict network traffic. The law will be further studied in the PC level traffic analysis PC level Network Traffic Analysis Based on the internal law of network traffic observed at acro level, we will investigate the terinal-level characteristics of network traffic in this section. In order to discover the law of coon characteristics in network traffic, we analyze the traffic generated by different sets of terinals. In the analysis, we use one hour s traffic data with a size of 78GB. We select eight network segents fro class A, B, C of the traffic data to analyze. The eight network segents contain 19, 26, 97, 2079, 44441, 50798, and terinals, respectively. These eight sets of data have a good continuity in an hour of tie series, and have an extensive coverage ranging fro 10 to 100 Copyright c 2016 SERSC 307
6 thousand terinals, and thus the results of the analysis are universal. By using analysis ethod in section 3.2, the traffic data of the eight groups were classified according to the network level, and calculate the flexible ultiscale entropy value for each data sequence. By coparing the coplexity of network traffic at different scales, finding the evolution echanis of network traffic at different teporal and spatial scales. 308 Copyright c 2016 SERSC
7 Figure 3. Entropy Value under Different Scales of Network Figure 3 shows the entropy values based on network level fro eight groups of traffic data at different scales. In the figure, flow stands for traffic flow, which is based on the well-known five-tuple - the source IP address, destination IP address, source port, destination port and protocol fields. Pac stands for packet. As can be seen fro Figure 3, for different size of eight groups of traffic data, the entropy value curve of flow is always lower than the packet entropy curve throughout all the scales. This shows that flow sequence coplexity is lower than the packet sequence coplexity, and the relative relationship between the packet and flow does not change as traffic scale changes. At the sae tie, last section s experient also shows that flow entropy is lower than packet entropy throughout all the scales. Whereas, in the eight figures, the coplexity relationship between byte and packet is not obvious in the whole scale, it changes in different scales. Then, we focus on the coplexity relationship between flow and byte sequence. Fro the figure, we can see the coplexity of the flow is higher than the coplexity of the bytes, except for 97 and terinal s entropy curves. And for the other six groups of data, the coplexity relationship between flow and byte is relatively stable. Over the whole scale, the coplexity of byte is higher than flow. In the rest of the paper, we focus on the particularity of the entropy curves of 97 and terinals. The above statistics is based on the nuber of bytes per second and the nuber of flow per second, however, the nuber of bytes include in each flow has a great difference. Fro the traffic data, we calculate the average bytes of a flow per second. By coparing the Copyright c 2016 SERSC 309
8 coplexity between flow sequence and the sequence of average bytes that one flow contained, discovering the coon coplexity relationship between flow and byte. We copare the coplexity of two kinds of sequence easured by flexible ultiscale entropy. As we copare the coplexity of two sequence directly, we only calculate the flexible ultiscale entropy at scale factor 1. Table 1. Entropy Value at Different Scale of Network Terinals Flow-Byte Entropy Flow Entropy Entropy Difference In Table 1, Flow-Byte Entropy stands for the flexible ultiscale entropy value of average bytes for one flow per second and Entropy Difference stands for the difference between the Flow-Byte Entropy and Flow Entropy. Fro Table 1, we can see that the entropy difference in the scale of 97 terinals and terinals is saller than 0. Due to the coplexity of flow-byte is lower than the coplexity of flow, the coplexity of flow is hence higher than the coplexity of byte. This phenoenon ay be due to any sall size flows or short duration flows in the network traffic. In order to verify the results, we investigate the nuber of average bytes including in one flow per second. Table 2. Relationship between Byte and Flow at Different Scale of Network Terinals Flow-Byte In Table 2, Flow-Byte stands for the nuber of bytes including in one flow per second. As show in the table 2, the bold line is the range of terinals and 97 terinals. We can see the values of flow-byte of these two scales are the sallest aong all the groups. The traffic of these two groups includes a larger nuber of sall flows than the others. The increase of sall flows leads to the increased coplexity of flow. The coplexity between flow and byte is changed as the relationship between flow and byte changes. Fro above results, we can see coplexity of flow is higher than the coplexity of byte in ost cases. 310 Copyright c 2016 SERSC
9 4. Conclusion and Future Work In this paper, we adopted flexible ultiscale entropy (FMSE). As an iproved ethod of ultiscale entropy, flexible ultiscale entropy has an iproved stability and accuracy of calculation, especially in large scale. We also proposed a ethod to analyze network traffic based on flexible ultiscale entropy, which is used as a tool to describe the coplexity of traffic sequence. By establishing the spatial and teporal characteristic network analysis odel, describing coplexity of network traffic clearly fro different diensions. Through the experient carried on one day s network traffic, of which the size is ore than 2TB. The result shows that there is a universal law aong the different levels of network traffic. For all scales, the coplexity of packet sequence is higher than that of flow sequence. In ost cases, the coplexity of byte sequence is higher than that of flow sequence. However, the coplexity of the flow sequence will be higher than that of byte sequence when there are any sall flows in network traffic. In our future work, we will go further to analyze network traffic and build a network situational awareness odel. We will use this odel to analyze network behavior, detect anoaly aong network and predict network traffic. Analyzing in real tie is also an iportant part of our future work. Acknowledgent The authors are grateful to the anonyous reviewers for their valuable coents and to the editors for their work that iproved this paper. This work was supported by NSF of Zhejiang under grant NO.LQ13F020017, LY14F020044, LY16F020018, and NSF of China under grant NO , , , and National Key Technology Research and Developent Progra of China under grant No.2014BAK14B04. References [1] W. E. Leland, M. S. Taqqu and W. Willinger, On the self-siilar nature of Ethernet traffic (extended version), IEEE/ACM Transactions on Networking, vol. 2, no. 1, (1994), pp [2] A. Y. Privalov and A. T. Analysis, Siulation of WAN Traffic by Self-Siilar Traffic Model with OMNET, Proceedings of 10th International Wireless Counications and Mobile Coputing Conference, Nicosia, Cyprus, (2014). [3] R. H. Riedi, M. S. Crouse and V. J. Ribeiro, A ultifractal wavelet odel with application to network traffic, IEEE Transactions on Inforation Theory, vol. 45, no. 3, (1998), pp [4] Y. Chen, B.Yang and Q. Meng, Sall-tie scale network traffic prediction based on flexible neural tree, Applied Soft Coputing, vol. 12, no. 1, (2012), pp [5] X. Liu, X. Fang and Z. Qin, A Short-Ter Forecasting Algorith for Network Traffic Based on Chaos Theory and SVM, Journal of Network & Systes Manageent, vol. 19, no. 19, (2011), pp [6] Q. F. Yao, C. F. Li, H. L. Ma and S. Zhang, Novel network traffic forecasting algorith based on grey odel and Markov chain, Journal of Zhejiang University, vol. 34, no. 4, (2007), pp [7] R. Xiang, J. Zhang and X. K. Xu, Multiscale characterization of recurrence-based phase space networks constructed fro tie series, Chaos, vol. 22, no. 1, (2012), pp [8] M. Costa, Multiscale entropy analysis of coplex physiologic tie series, Physical Review Letters, vol. 89, no. 6, (2002), pp [9] J. iihij rvi, M. Wellens and P. Mahonen, Measuring Coplexity and Predictability in Networks with Multiscale Entropy Analysis, Proceedings of IEEE INFOCOM 2009, Rio de Janeiro, Brazil, (2009). [10] J. S. Richan and J. R. Mooran, Physiological tie-series analysis using approxiate entropy and saple entropy, Aerican Journal of Physiology Heart & Circulatory Physiology, vol. 278, no. 6, (2000), pp. H2039-H2049. [11] S. D. Wu, C. W. Wu and S. G. Lin, Tie series analysis using coposite ultiscale entropy, Entropy, vol. 13, no. 3, (2013), pp [12] IPTRACE: Copyright c 2016 SERSC 311
10 Authors Chen Yang, he received the B.S degree in network engineering fro North University Of China, Taiyuan, China, in 2011 and M.S degree fro Hangzhou Dianzi University, Hangzhou, China, in His research interests include network security and coplex syste. Renjie Zhou, he is an assistant professor in School of Coputer Science and Technology at Hangzhou Dianzi University, Hangzhou, China. He received his Ph.D. degree fro Harbin Engineering University, Harbin, China, in He was a visiting scholar in the Departent of Electrical and Coputer Engineering at the University of Massachusetts at Aherst. Currently. His research interests include analysis of online social networks, and network security. JianWan, he is the Director of Grid and Service Coputing Lab in Hangzhou Dianzi University, Hangzhou, China, and is the Dean of the School of Coputer Science and Technology, Hangzhou Dianzi University. He received his Ph.D. degree fro Zhejiang University, Hangzhou, China, in His research areas include parallel and distributed coputing systes, virtualization, and grid coputing. He is a eber of the IEEE.. Jilin Zhang, he received the PhD degree in Coputer Applied Technology fro University of Science Technology Beijing, Beijing, China, in He is currently an associate professor at Hangzhou Dianzi University, China. His research interests include High Perforance Coputing and Cloud Coputing.. Yuyu Yin, he received the Ph.D. degree in coputer science fro Zhejiang University, Zhejiang, China, in He is currently an Associate Professor with Hangzhou Dianzi University, Hangzhou, China. His research interests include service coputing, cloud coputing, and iddleware techniques. 312 Copyright c 2016 SERSC
An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
More informationApplying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
More informationPERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
More informationMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu
More informationUse of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
More informationarxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
More informationAn Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
More informationAn Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration
International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration
More informationINTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS
Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE
More informationFuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,
More informationReal Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
More informationASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
More informationDesign of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
More informationManaging Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
More informationFuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)
324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei
More informationEvaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
More informationExtended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
More informationHigh Performance Chinese/English Mixed OCR with Character Level Language Identification
2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,
More informationSearching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
More informationImage restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
More informationResearch Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises
Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:
More informationThe AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment
6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,
More informationDynamic Placement for Clustered Web Applications
Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co
More informationPreference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr
More informationEfficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
More informationON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
More informationExploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
More informationAn Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
More informationResource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
More informationAdaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
More informationOnline Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
More informationQuality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
More informationA Multi-Core Pipelined Architecture for Parallel Computing
Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,
More informationAn improved TF-IDF approach for text classification *
Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: zus@zu.edu.cn An iproved TF-IDF approach for text classification
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationAN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES
Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,
More information6. Time (or Space) Series Analysis
ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,
More informationA CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
More informationEnergy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms
Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationBotnets Detection Based on IRC-Community
Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, ghorbani}@unb.ca
More informationHow To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
More informationThe Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
More informationInternational Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
More informationMedia Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
More informationEquivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
More informationGenerating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
More informationCRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship
More informationMethod of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
More informationPartitioned Elias-Fano Indexes
Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano
More informationAudio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA
Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without
More informationSUPPORTING YOUR HIPAA COMPLIANCE EFFORTS
WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation
More informationPhysics 211: Lab Oscillations. Simple Harmonic Motion.
Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.
More informationA quantum secret ballot. Abstract
A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy
More informationLeak detection in open water channels
Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical
More informationSoftware Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
More informationThe individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of
CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.
More informationImplementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
More informationREQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer
More informationA framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
More informationMarkov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
More informationDriving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms
, March 18-20, 2015, Hong Kong Driving Behavior Analysis Based on Vehicle OBD Inforation and AdaBoost Algoriths Shi-Huang Chen, Jeng-Shyang Pan, and Kaixuan Lu Abstract This paper proposes a novel driving
More informationThis paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
More informationData Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
More informationAn Application Research on the Workflow-based Large-scale Hospital Information System Integration
106 JOURNAL OF COMPUTERS, VOL. 6, NO. 1, JANUARY 2011 An Application Research on the Workflow-based Large-scale Hospital Inforation Syste Integration Yang Guojun School of Coputer, Neijiang Noral University,
More informationMathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus
Advances in Applied Matheatical Biosciences. ISSN 8-998 Volue, Nuber (0), pp. 9- International Research Publication House http://www.irphouse.co Matheatical Model for Glucose-Insulin Regulatory Syste of
More informationOpenGamma Documentation Bond Pricing
OpenGaa Docuentation Bond Pricing Marc Henrard arc@opengaa.co OpenGaa Docuentation n. 5 Version 2.0 - May 2013 Abstract The details of the ipleentation of pricing for fixed coupon bonds and floating rate
More informationA Hybrid Grey-Game-MCDM Method for ERP Selecting Based on BSC. M. H. Kamfiroozi, 2 A. BonyadiNaeini
Int. J. Manag. Bus. Res., 3 (1), 13-20, Winter 2013 IAU A Hybrid Grey-Gae-MCDM Method for ERP Selecting Based on BSC 1 M. H. Kafiroozi, 2 A. BonyadiNaeini 1,2 Departent of Industrial Engineering, Iran
More informationStudy on the development of statistical data on the European security technological and industrial base
Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,
More informationStandards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates
National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE
More informationAn online sulfur monitoring system can improve process balance sheets
Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental
More informationData Streaming Algorithms for Estimating Entropy of Network Traffic
Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,
More informationReliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
More informationLEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers
Course Code: L024 LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning prograe for frontline healthcare anagers 6 days Green Belt equivalent Are you ready to challenge the status quo and transfor
More information2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
More informationResearch on Risk Assessment of PFI Projects Based on Grid-fuzzy Borda Number
Researc on Risk Assessent of PFI Projects Based on Grid-fuzzy Borda Nuber LI Hailing 1, SHI Bensan 2 1. Scool of Arcitecture and Civil Engineering, Xiua University, Cina, 610039 2. Scool of Econoics and
More informationImpact of Processing Costs on Service Chain Placement in Network Functions Virtualization
Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico
More informationCooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn
More informationPresentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
More informationModified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index
Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa
More informationInformation Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
More informationThe Virtual Spring Mass System
The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a
More informationThe Velocities of Gas Molecules
he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes
More informationPure Bending Determination of Stress-Strain Curves for an Aluminum Alloy
Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,
More informationWork Travel and Decision Probling in the Network Marketing World
TRB Paper No. 03-4348 WORK TRAVEL MODE CHOICE MODELING USING DATA MINING: DECISION TREES AND NEURAL NETWORKS Chi Xie Research Assistant Departent of Civil and Environental Engineering University of Massachusetts,
More informationConsiderations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases
Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Nathanaël Cheriere Departent of Coputer Science ENS Rennes Rennes, France nathanael.cheriere@ens-rennes.fr
More informationCOMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES
COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,
More informationNonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search
VEHICULAR 2014 : The Third International Conference on Advances in Vehicular Systes, Technologies and Applications Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracing Systes Using Fast Orthogonal
More informationStudy on the development of statistical data on the European security technological and industrial base
Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: Poland Client: European Coission DG Migration and Hoe Affairs Brussels,
More informationOnline Community Detection for Large Complex Networks
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Online Counity Detection for Large Coplex Networks Wangsheng Zhang, Gang Pan, Zhaohui Wu, Shijian Li Departent
More informationAirline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN
Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM
More informationMarkovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
More informationExercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM
Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating
More informationSAMPLING METHODS LEARNING OBJECTIVES
6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of
More informationProtecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
More informationOptimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
More informationCLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk
More informationSensors as a Service Oriented Architecture: Middleware for Sensor Networks
Sensors as a Service Oriented Architecture: Middleware for Sensor Networks John Ibbotson, Christopher Gibson, Joel Wright, Peter Waggett, IBM U.K Ltd, Petros Zerfos, IBM Research, Boleslaw K. Szyanski,
More informationPREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
More information