Defining Perfect Location Privacy Using Anonymization

Size: px
Start display at page:

Download "Defining Perfect Location Privacy Using Anonymization"

Transcription

1 Defg Perfect Locato Prvacy Usg Aoymzato Zarr otazer Electrcal a Computer Egeerg Departmet Uversty of assachusetts Amherst, assachusetts Emal: seyeehzar@umass.eu Amr Houmasar College of Iformato a Computer Sceces Uversty of assachusetts Amherst, assachusetts Emal: amr@cs.umass.eu Hosse Pshro-Nk Electrcal a Computer Egeerg Departmet Uversty of assachusetts Amherst, assachusetts Emal: pshro@eg.umass.eu Abstract The popularty of moble evces a locato-base servces LBS) has create great cocers regarg the locato prvacy of users of such evces a servces. Aoymzato s a commo techque that s ofte beg use to protect the locato prvacy of LBS users. I ths paper, we prove a geeral formato theoretc efto for locato prvacy. I partcular, we efe perfect locato prvacy. We show that uer certa cotos, perfect prvacy s acheve f the pseuoyms of users s chage after on r 2 ) observatos by the aversary, where N s the umber of users a r s the umber of sub-regos or locatos. I. INTRODUCTION oble evces capable of commucatg over the Iteret wth hgh-precso localzato capablty have become pervasve the past several years. These commucatg moble evces prove a we rage of servces base o the geographc locato of the user. We refer to such servces that use the geographc locato of ther users as locato-base servces LBS). Whle LBSes prove so may servces to ther users thaks to ther urestrcte access to the locato formato of the users, they also mpose sgfcat prvacy threats to them. Some mechasms have bee propose orer to protect locato prvacy of LBS users, [] [7], geerally referre to as locato prvacy protecto mechasms LPP). Toay s LPPs ca be classfe to two ma categores: etty perturbato LPPs [5] [7] mofy the etty of moble users orer to protect ther locato prvacy e.g., through aoymzato techques), other wors they am at mprovg locato prvacy by cocealg the mappg betwee users a locato observatos. Locato perturbato LPPs are the seco category [] [4], [7], whch a ose to moble users locato coorates. Ths ca potetally mprove locato prvacy by returg accurate locato formato to the LBS applcatos. Some LPPs combe both mechasms to aress ths problem, but ths may egrae the performace of a LBS system. Ufortuately, espte prevous stues o locato prvacy, the esg of LPP systems reles o a-hoc algorthmc heurstcs such as ag ose a shufflg ettes. I ths paper, we propose a fuametal, aalytcal stuy of locato prvacy for locato-base servces. We assume the strogest moel for the aversary,.e., a aversary who has complete statstcal kowlege of the users movemets. The, we efe locato prvacy base o the mutual formato betwee the aversary s observato a actual locato ata. Ths allows us to efe perfect locato prvacy where users have provably prvate locatos. The, we show that for r possble.. locatos, f the aversary obtas less tha on r 2 ) observatos per user, the all users have perfect locato prvacy at all tme. We show that perfect locato prvacy s ee achevable f the LPPs are esge approprately. II. RELATED WORK Exstg work o the esg of LPP mechasms ca be classfe to two ma categores of etty perturbato LPPs [5] [7] a locato perturbato LPPs [] [4], [7]. Locato perturbato LPPs a ose to users locato coorates whle etty perturbato LPPs mofy the ettes of moble users. A commo approach use by etty perturbato LPPs s to obfuscate user ettes wth a group of users, a approach kow as k-aoymty [2], [8]. A seco commo approach to etty perturbato LPPs s to exchage users pseuoyms wth specfc areas calle mx-zoes [9], [0]. Freuger et al. show that combg techques from cryptography wth mx-zoes ca result hgher levels of locato prvacy [5]. Also, ashae et al. use game theoretc approaches to mprove the locato prvacy protecto prove by mx-zoes []. Locato cryptography s aother recto take towars protectg locato formato [2]. ay propose locato perturbato LPPs work by replacg each user s locato formato wth a larger rego, a techque kow as cloakg [2], [3], [3], [4]. Aother recto to locato perturbato s clug ummy locatos the set of possble locatos of users [5], [6]. Several works [4], [7] [20] use fferetal prvacy to protect locato prvacy locato formato atasets. Ths sures that the presece of o sgle user coul sgfcatly chage the outcome of the aggregate locato formato.

2 For stace, Ho et al. [2] propose a fferetally prvate locato patter mg algorthm usg quatree spatal ecomposto. Dewr [22] combe k-aoymty a fferetal prvacy to mprove locato prvacy. Some locato perturbato LPPs are base o eas from fferetal prvacy [4], [23] [26]. For stace, Ares et al. he the exact locato of each user a rego by ag Laplaca strbute ose to acheve a esre level of geo-stgushablty [26]. Several works ame at quatfyg locato prvacy protecto. Shokr et al. [7], [27] efe the expecte estmato error of the aversary as a metrc to evaluate LPP mechasms. O the other ha, a et al. [6] uses ucertaty about users locato formato to quatfy user locato prvacy vehcular etworks. A. Defg Locato Prvacy III. FRAEWORK To vestgate the locato prvacy problem, we frst ee to prove a geerc mathematcal efto for locato prvacy. Coser a etwork cosstg of N users, a suppose that a LPP s use to protect the prvacy of the users. Let A be a aversary who s tereste kowg the locatos of the users as they move. To esure prvacy, we assume the strogest aversary the sese that we assume the aversary has complete statstcal kowlege of the users movemets. That s, through prevous observatos or other sources, the aversary has a complete moel that escrbes the movemet of users as a raom process o the correspog geographc area. Now, startg at tme zero, the users move through the area. I partcular, let X t) be the locato of user at tme t. Aversary A s tereste kowg X t) for =,2,..., N. However, he ca oly observe the aoymze a obfuscate versos of X t) s prouce by the LPP. I partcular, let Y be a collecto of observatos avalable to the aversary. We efe perfect locato prvacy as follows: Defto. User has perfect locato prvacy at tme t wth respect to aversary A, f a oly f lm IX t); Y) = 0, N where I.) shows the mutual formato. The above efto requres that the observatos of the aversary oes ot gve her ay useful formato about the locato of user. It also assumes a large umber of users N ). Ths assumpto s val for almost all applcatos that we coser. I ths paper, to acheve locato prvacy, we use oly aoymzato techques. That s, we perform a raom permutato Π o the set of N users, a the assg the pseuoym Π ) to user. Π : {,2,, N} {,2,, N} Throughout the paper, we assume the permutato Π s chose uformly at raom amog all N! possble permutatos. For smplcty of otatos we sometmes rop the superscrpts, e.g., Π = Π. For =,2,, N let X ) = X ), X 2),, X )) T be a vector whch shows the th user s locatos at tmes,2,,. The aversary observes a permutato of users locato vectors, X ) s, usg the permutato fucto Π. I other wors, the aversary observes where, Y ) = PermX ),X ),,X ) 2 N ; Π ) = X ) Π ),X), Π,X) 2) Π ) = Y ),Y ),,Y ) 2 N ) Y ) Π ) = X) = X ), X 2),, X )) T We trouce two lemmas here that wll be use to prove the ma result through the paper. Lemma. For k =,2,..., let Z k) = Z k), Z k),, Z k) 2 k) ) be a sequece of epeet raom vectors wth sze k) k, such that k) = ak b where a > 0 a 0 < b < are costats. Assume Z k), Z k),, Z k) 2 are epeet screte raom varables wth etcal rage,.e., PZ k) = x) > 0 f a oly f PZ k) j = x) > 0. Further, suppose that ther strbutos F Z k ) coverge to the staar ormal strbuto. I partcular, for each γ > 0, there exsts k 0 N such that f k > k 0, the { } sup F Z k ) x) Φx) : x R, {,2,...,k)} γ Let Y k) be a permute verso of the Z k) uer the raom permutato Π ) : Y k) = PermZ k), Z k) 2,, Z k) ; Π ) ), For > 0 we efe a set A k) as follows: A k) = { y k) : PΠ k) ) = j Y k) = y k) ) < }, The, for ay > 0, we have lm k PYk) A k) ) = Proof. Sketch) Here, the goal s to stuy the cotoal probablty PΠ ) ) = j Y k) = y k) ). I partcular, we wat to stuy the power of a aversary fg the permutate value of,.e., Π k) ), base o the observe ata Y k). To get the ea beh ths lemma, let s assume that Z s have exactly ormal strbuto stea of coserg Z s strbutos covergg to N 0,)). So, all Z s are.. raom varables. If we observe Y k) Z k) N 0,) Y k) = PermZ k), Z k) 2,, Z k) ; Π ) ),

3 the, by coserg that Z k) s are.. a usg symmetry, probablty of fg the rght permutato fucto base o ths observato s PΠ ) ) = j Y k) = y k) ) =. I the lemma, as Z s strbutos coverge to N 0,), we are ot able to say ths probablty s exactly, but t s close to t. Ths ca be show usg the cotuty of the probablty strbuto fuctos. I partcular, we ca show < PΠ) ) = j Y ) = y ) ) < + wth hgh probablty. Thus, wth hgh probablty PΠ)) = j Y k) = y k) ) < for ay > 0, a that proves the lemma. Lemma 2. Let Y k) = Y k) be the aversary s observatos as efe above. Let us efe Y as, Y = Y k). k= The, gve Y,Y 2,,Y N, we have that Π a Y N are epeet. Proof. Ths s the mmeate result of the fact that Y,Y 2,,Y N ) = Y s a suffcet statstc for p s. I partcular, f Y Y,Π) = f Y Y ) whch meas that Y a Π are epeet gve the average values Y. B. Locato Prvacy for a Smple Two-State oel To get a better sght about the locato prvacy problem, here we coser a smple scearo. Coser a scearo where there are two locatos, locatos 0 a. At ay tme k {0,,2, }, user has probablty p 0,) to be at locato, epeetly from prevous locatos a epeetly from other users locatos. Therefore, X k) Beroullp ). To keep thgs geeral, we assume that p s are raw epeetly from some cotuous esty f P p) o the 0,) terval. Specfcally, f P p) = 0 for all p 0,) a there are δ 2 > δ > 0 such that δ < f P p) < δ 2 for all p 0,). The values of p s are kow to the aversary. Theorem. For two locatos wth above efto a observato vector Y ) f all the followg hols, ) = cn 2 α, whch c,α > 0 a are costat 2) p 0,) 3) p 2, p 3,, p N ) f p, 0 < δ < f p < δ 2 4) P = p, p 2,, p N ) be kow to the aversary the, we have k N, lm IX k); Y ) ) = 0 N Before provg a formal proof for Theorem, let us prove the tuto beh t. Let us look from the aversary s perspectve. The aversary woul lke to obta X k). The aversary, kows the value of p. To obta X k), t suffces that the aversary obtas Π). Sce X k) Beroullp ), to o so, the aversary ca look at the averages Y Π) = Y Π)) + Y Π) 2) Y Π) ). I fact, we show Lemma 2 that Y Π) s prove a suffcet statstcs for ths problem. Now, tutvely, the aversary s successful recoverg Π) f two cotos hol ) Y Π) p. 2) For all, Y Π) s ot too close to p. Now, ote that by the cetral lmt theorem CLT), Y Π) p p p ) N 0,). That s, loosely speakg, we ca wrte Y Π) N p, p ) p ). Coser a terval I 0,) such that p I a the legth of I, legthi), s equal to L N = c N where c > 0 s a arbtrary costat. Note that for ay,2,, N the probablty that p I s larger tha δl N = cδ N. I other wors, by choosg c large eough, we ca guaratee that a large umber of p s be I. O the other ha, ote that we have VarY Π) ) legthi) = = p p ) c N N on 2 ). Note that here, we wll have a large umber of ormal raom varables Y Π) whose expecte values are terval I wth hgh probablty a ther staar evato s much larger tha the terval legth. Thus, stgushg betwee them wll become mpossble for the aversary. I other wors, the probablty that the aversary wll correctly etfy Πl) goes to zero as N goes to fty. That s, the aversary wll most lkely choose a correct value j for Πl). I ths case, sce the locatos of fferet users are epeet, the aversary wll ot obta ay useful formato by lookg at X j k). Proof of Theorem. We efe X X = X k). k=

4 Sce X k) Beroullp ) EX = p, VarX ) = p p ). As, by applyg Cetral Lmt Theorem, X p p p ) = X p p p ) N 0,) a sce Y Π ) = X, the we ca coclue that Y Π) p p p ) N 0,). Next, we efe a raom set J as a set whch clues ces as follows where J = { : p ɛ < p < p + ɛ} ɛ = N α 3 Remember that α s gve by = cn 2 α. Also ote that J. Let us frst f the strbuto of J whch s the umber of elemets J. Note that for N large eough, ) p +ɛ Pr p ɛ < p < p + ɛ = f P p)p. p ɛ Sce δ < f P p) < δ 2, we coclue that ) 2ɛδ < Pr p ɛ < p < p + ɛ < 2ɛδ 2, So we ca wrte Pr ) p ɛ < p < p + ɛ = 2ɛδ. for some δ > 0. We coclue that J BN,2ɛδ) whe N s large eough. I partcular, for the expecte value a varace of J we get E[ J ] = 2ɛδN = 2 N α 3 V ar J ) = 2Nɛδ 2ɛδ) δn = 2δN α 3 a as N, V ar J ) 2δN α 3. Usg Chebyshev s equalty, P { J E[ J ] } > δn α V ar J ) 3 < δ 2 N 2 α 3 V ar J ) δ 2 N 2 α 3 Thus, J > δn α 3 = 2δN α 3 δ 2 N 2 α 3 0, as N wth hgh probablty. I partcular, J, as N Lemma 3. For all J, the strbuto of ormalze raom varable X coverges to ormal strbuto, X p N 0,) a sce we have Y Π ) = X, Y Π) p Proof. Note that, p p < ɛ = N α 3 N 0,). p p, as N. p p ) By kowg that, p p ) a X p = X p + p p p p ) whch we alreay kow that wrte p p ) = X p p p ) + p p p p ) X p p p ) p p p p ) a as N ɛ = N 0,), so we ca ɛ N α 2 N α 3 Same thg hols for Y sce Y Π ) = X. 0. Next we coser the case where Π J ) whch s Π J ) = {Π ) : J } s kow to the aversary ot the vual Π) s, but the whole set Π J )). I ths case, for the aversary to f Π ), she ees to just look to the set J. We show that eve f the aversary kows the set Π J ), her mutual formato goes to zero. For smplcty, we assume that where = J > δn α 3 J = {,2,,}, a let Y ) = Y Π),Y Π2),,Y Π) ). Now for the aversary to f Π), she ca look to set J wth sze rather tha all the N users. To fsh the proof of Theorem, t suffces to show that as N, HX k) Y ) HX k)). To cotue, we frst prove two lemmas. Lemma 4. Let A be as efe Lemma, partcular, we have lm N PY A ) =.

5 If for all y A, we have HX k) Y = y ) HX k)) as N. The, we have lm HX k) Y ) = HX k)). N Proof. We have HX k) Y ) = HX k) Y = y )PY = y ) y = HX k) Y = y )PY = y ) + y A y A HX k) Y = y )PY = y ). Now ote that the seco sum coverges to zero sce HX k) Y = y ) HX k)) a lm N PY A ) = 0. O the other ha, the frst sum coverges to HX k)) by the assumptos of the lemma. Lemma 4 allows us to coser oly the observatos Y = y for Y A. Lemma 5. Assume P = p, p 2,, p N ) s observe. We efe q N as the probablty that the frst user s state locato) at tme k,.e., X k) =, gve the observato vector Y a the set ΠJ ). q N = PX k) = Y,ΠJ )) Sce Y a ΠJ ) are raom, q N s a raom varable. We have q N p. Proof. Ths lemma s the result of the prevous lemma. We have q N = PX k) = Y = y,πj )). Frst, ote that gve set ΠJ ), we ca gore Y for ΠJ ), so we smply replace N wth to show ths. By applyg the Law of Total Probablty we get j ΠJ ) = PX k) = Π) = j,y ) = y ),ΠJ )) PΠ) = j Y ) = y ),ΠJ )) [y ) j k)=] PΠ) = j Y) = y ) ). j= Wth the same reasog as Lemma 4, t oly suffces to coser Y ) = y ) for y ) A. Also, by Lemma 2 f we efe Y as, Y = Y k). k= the gve Y,Y 2,,Y, we have Π a Y are epeet. Thus, PΠ) = j Y ) = y ) ) = PΠ) = j Y ) = y ) ). But by Lemma 3, Y p N 0,). Ths alog wth Lemma tells us that wth hgh probablty PΠ) = j Y ) = y ) ) +. We obta q N [y j k)=] PΠ) = j Y) = y ) ) so we get j j A ) [y j k)=] q + j A ) [y j k)=] Now, ote that Y j K) are Beroullp Π j) ) a sce we are summg over, by Law of Large Number a p Π j) p the we have [Y j k)=] p, as N j a coserg that we ca wrte )p q N + )p where ca be mae arbtrarly small so that q N p. Thus, X k) = Y = y,πj )) Beroullp ). We alreay kow that X k) Beroullp ). It meas that kowg Y = y,πj ) oes ot chage the strbuto. I other wors the etropy of X k) Y = y,πj )) coverges to HX k)). HX k) Y,ΠJ ))) HX k)) a we kow that cotog oes ot crease etropy, so, HX k) Y,ΠJ ))) HX k)) HX k) Y,ΠJ ))) HX k) Y ) HX k) Y ) HX k)) a sce HX k) Y,ΠJ ))) HX k)) a fally we ca wrte HX k) Y ) HX k)) IX k); Y ) 0, as N whch completes the proof of Theorem.

6 C. Exteso to r States locatos) Here we exte the results to a scearo whch we have r 2 locatos or regos, locatos 0,,,r. At ay tme k {0,,2, }, user has probablty p j 0,) to be at locato j, epeetly from prevous locatos a epeetly from other users locatos. We assume that p j s for j = 0,,,r 2) are raw epeetly from some r mesoal cotuous esty f P p) o the 0,) r. Specfcally, f P p) = 0 for all p 0,) r a there are δ 2 > δ > 0 such that δ < f P p) < δ 2 for all p {p 0, p,, p r 2 ) 0,) r : p 0 +p + +p r 2 }. The values of p j s are fxe a o ot chage as tme goes o. We the ca state the followg theorem. Theorem 2. For r locatos wth above efto a observato vector Y ) f all the followg hols, ) = cn r 2 α, whch c,α > 0 a are costat 2) p 0,) 3) p 2, p 3,, p N ) f p, 0 < δ < f p < δ 2 4) P = p, p 2,, p N ) be kow to the aversary the, we have k N, lm IX k); Y ) ) = 0 N Theorem 2 ca be prove usg smlar eas trouce the proof of Theorem. We omt the proof ue to space lmtato. IV. CONCLUSION I ths paper, we efe perfect locato prvacy base o the mutual formato betwee the aversary s observato formato a the actual user s locato ata. The we smplfe the problem to two-state locatos wth N umber of users a umber of aversary s observatos. We erve the relato betwee a N. We showe that perfect locato prvacy s achevable f cn 2 α. We the extee our moel to r-state locatos a obtae cn r 2 α to have perfect locato prvacy. REFERENCES [] R. Shokr, G. Theoorakopoulos, C. Trocoso, J.-P. Hubaux, a J.- Y. Le Bouec, Protectg locato prvacy: optmal strategy agast localzato attacks, Proceegs of the 202 AC coferece o Computer a commucatos securty. AC, 202, pp [2]. Gruteser a D. Gruwal, Aoymous usage of locato-base servces through spatal a temporal cloakg, Proceegs of the st teratoal coferece o oble systems, applcatos a servces. AC, 2003, pp [3] B. Hoh,. Gruteser, H. Xog, a A. Alrabay, Preservg prvacy gps traces va ucertaty-aware path cloakg, Proceegs of the 4th AC coferece o Computer a commucatos securty. AC, 2007, pp [4] N. E. Boreabe, K. Chatzkokolaks, a C. Palamess, Optmal geostgushable mechasms for locato prvacy, Proceegs of the 204 AC SIGSAC Coferece o Computer a Commucatos Securty. AC, 204, pp [5] J. Freuger,. Raya,. Félegyház, P. Papamtratos, a J.-P. Hubaux, x-zoes for locato prvacy vehcular etworks, [6] Z. a, F. Kargl, a. Weber, A locato prvacy metrc for v2x commucato systems, Saroff Symposum, SARNOFF 09. IEEE. IEEE, 2009, pp. 6. [7] R. Shokr, G. Theoorakopoulos, J.-Y. Le Bouec, a J.-P. Hubaux, Quatfyg locato prvacy, Securty a Prvacy SP), 20 IEEE Symposum o. IEEE, 20, pp [8] L. Sweeey, k-aoymty: A moel for protectg prvacy, Iteratoal Joural of Ucertaty, Fuzzess a Kowlege-Base Systems, vol. 0, o. 05, pp , [9] A. R. Beresfor a F. Stajao, Locato prvacy pervasve computg, IEEE Pervasve computg, o., pp , [0] J. Freuger, R. Shokr, a J.-P. Hubaux, O the optmal placemet of mx zoes, Prvacy ehacg techologes. Sprger, 2009, pp []. H. ashae, Q. Zhu, T. Alpca, T. Bacşar, a J.-P. Hubaux, Game theory meets etwork securty a prvacy, AC Computg Surveys CSUR), vol. 45, o. 3, p. 25, 203. [2] G. Ghta, P. Kals, A. Khoshgozara, C. Shahab, a K.-L. Ta, Prvate queres locato base servces: aoymzers are ot ecessary, Proceegs of the 2008 AC SIGOD teratoal coferece o aagemet of ata. AC, 2008, pp [3]. Werke, P. Skvortsov, F. Dürr, a K. Rothermel, A classfcato of locato prvacy attacks a approaches, Persoal a Ubqutous Computg, vol. 8, o., pp , 204. [4] Y. Ca a G. Xu, Cloakg wth footprts to prove locato prvacy protecto locato-base servces, Ja. 205, us Patet App. 4/472,462. [Ole]. Avalable: US [5] H. Ko, Y. Yaagsawa, a T. Satoh, A aoymous commucato techque usg ummes for locato-base servces, Pervasve Servces, ICPS 05. Proceegs. Iteratoal Coferece o. IEEE, 2005, pp [6] H. Lu, C. S. Jese, a. L. Yu, Pa: prvacy-area aware, ummybase locato prvacy moble servces, Proceegs of the Seveth AC Iteratoal Workshop o Data Egeerg for Wreless a oble Access. AC, 2008, pp [7] J. Lee a C. Clfto, Dfferetal etfablty, Proceegs of the 8th AC SIGKDD teratoal coferece o Kowlege scovery a ata mg. AC, 202, pp [8] K. Chatzkokolaks, C. Palamess, a. Stroat, Geostgushablty: A prcple approach to locato prvacy, Dstrbute Computg a Iteret Techology. Sprger, 205, pp [9] H. H. Nguye, J. Km, a Y. Km, Dfferetal prvacy practce, Joural of Computg Scece a Egeerg, vol. 7, o. 3, pp , 203. [20] A. achaavajjhala, D. Kfer, J. Abow, J. Gehrke, a L. Vlhuber, Prvacy: Theory meets practce o the map, Data Egeerg, ICDE IEEE 24th Iteratoal Coferece o. IEEE, 2008, pp [2] S.-S. Ho a S. Rua, Dfferetal prvacy for locato patter mg, Proceegs of the 4th AC SIGSPATIAL Iteratoal Workshop o Securty a Prvacy GIS a LBS. AC, 20, pp [22] R. Dewr, Local fferetal perturbatos: Locato prvacy uer approxmate kowlege attackers, oble Computg, IEEE Trasactos o, vol. 2, o. 2, pp , 203. [23] K. Chatzkokolaks,. E. Arés, N. E. Boreabe, a C. Palamess, Broaeg the scope of fferetal prvacy usg metrcs. Prvacy Ehacg Techologes. Sprger, 203, pp [24] R. Shokr, Optmal user-cetrc ata obfuscato, arxv preprt arxv: , 204. [25] K. Chatzkokolaks, C. Palamess, a. Stroat, Locato prvacy va geo-stgushablty, AC SIGLOG News, vol. 2, o. 3, pp , 205. [26]. E. Arés, N. E. Boreabe, K. Chatzkokolaks, a C. Palamess, Geo-stgushablty: Dfferetal prvacy for locato-base systems, Proceegs of the 203 AC SIGSAC coferece o Computer & commucatos securty. AC, 203, pp [27] R. Shokr, G. Theoorakopoulos, G. Daezs, J.-P. Hubaux, a J.-Y. Le Bouec, Quatfyg locato prvacy: the case of sporac locato exposure, Prvacy Ehacg Techologes Sprger, 20, pp.

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Maximization of Data Gathering in Clustered Wireless Sensor Networks

Maximization of Data Gathering in Clustered Wireless Sensor Networks Maxmzato of Data Gatherg Clustere Wreless Sesor Networks Taq Wag Stuet Member I We Hezelma Seor Member I a Alreza Seye Member I Abstract I ths paper we vestgate the maxmzato of the amout of gathere ata

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Energy-efficient resource allocation for OFDMA two-way relay networks with imperfect CSI

Energy-efficient resource allocation for OFDMA two-way relay networks with imperfect CSI Chag et al. EURASIP Joural o Wreless Commucatos a Networkg 015 015:5 DOI 10.1186/s13638-015-0455-6 RESEARCH Ope Access Eergy-effcet resource allocato for OFDMA two-way relay etworks wth mperfect CSI Zheg

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

An Operating Precision Analysis Method Considering Multiple Error Sources of Serial Robots

An Operating Precision Analysis Method Considering Multiple Error Sources of Serial Robots MAEC Web of Cofereces 35, 02013 ( 2015) DOI: 10.1051/ mateccof/ 2015 3502013 C Owe by the authors, publshe by EDP Sceces, 2015 A Operatg Precso Aalyss Metho Coserg Multple Error Sources of Seral Robots

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

ISyE 512 Chapter 7. Control Charts for Attributes. Instructor: Prof. Kaibo Liu. Department of Industrial and Systems Engineering UW-Madison

ISyE 512 Chapter 7. Control Charts for Attributes. Instructor: Prof. Kaibo Liu. Department of Industrial and Systems Engineering UW-Madison ISyE 512 Chapter 7 Cotrol Charts for Attrbutes Istructor: Prof. Kabo Lu Departmet of Idustral ad Systems Egeerg UW-Madso Emal: klu8@wsc.edu Offce: Room 3017 (Mechacal Egeerg Buldg) 1 Lst of Topcs Chapter

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes Covero of No-Lear Stregth Evelope to Geeralzed Hoek-Brow Evelope Itroducto The power curve crtero commoly ued lmt-equlbrum lope tablty aaly to defe a o-lear tregth evelope (relatohp betwee hear tre, τ,

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

A Single Machine Scheduling with Periodic Maintenance

A Single Machine Scheduling with Periodic Maintenance A Sgle Mache Schedulg wth Perodc Mateace Fracsco Ágel-Bello Ada Álvarez 2 Joaquí Pacheco 3 Irs Martíez Ceter for Qualty ad Maufacturg, Tecológco de Moterrey, Eugeo Garza Sada 250, 64849 Moterrey, NL, Meco

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

A Hierarchical Latent Variable Model for Data Visualization

A Hierarchical Latent Variable Model for Data Visualization IEEE ASACIOS O PAE AAYSIS AD MACHIE IEIGECE, VO. 0, O. 3, MACH 998 8 A Herarchcal atet Varable Moel for Data Vsualzato Chrstopher M. Bshop a Mchael E. ppg Abstract Vsualzato has prove to be a powerful

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

Reinsurance and the distribution of term insurance claims

Reinsurance and the distribution of term insurance claims Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Relaxation Methods for Iterative Solution to Linear Systems of Equations

Relaxation Methods for Iterative Solution to Linear Systems of Equations Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet gerry@me.pdx.edu Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato

More information

Common p-belief: The General Case

Common p-belief: The General Case GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

We investigate a simple adaptive approach to optimizing seat protection levels in airline

We investigate a simple adaptive approach to optimizing seat protection levels in airline Reveue Maagemet Wthout Forecastg or Optmzato: A Adaptve Algorthm for Determg Arle Seat Protecto Levels Garrett va Ryz Jeff McGll Graduate School of Busess, Columba Uversty, New York, New York 10027 School

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

On Savings Accounts in Semimartingale Term Structure Models

On Savings Accounts in Semimartingale Term Structure Models O Savgs Accouts Semmartgale Term Structure Models Frak Döberle Mart Schwezer moeyshelf.com Techsche Uverstät Berl Bockehemer Ladstraße 55 Fachberech Mathematk, MA 7 4 D 6325 Frakfurt am Ma Straße des 17.

More information

Finito: A Faster, Permutable Incremental Gradient Method for Big Data Problems

Finito: A Faster, Permutable Incremental Gradient Method for Big Data Problems Fto: A Faster, Permutable Icremetal Gradet Method for Bg Data Problems Aaro J Defazo Tbéro S Caetao Just Domke NICTA ad Australa Natoal Uversty AARONDEFAZIO@ANUEDUAU TIBERIOCAETANO@NICTACOMAU JUSTINDOMKE@NICTACOMAU

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

The Popularity Parameter in Unstructured P2P File Sharing Networks

The Popularity Parameter in Unstructured P2P File Sharing Networks The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Near Neighbor Distribution in Sets of Fractal Nature

Near Neighbor Distribution in Sets of Fractal Nature Iteratoal Joural of Computer Iformato Systems ad Idustral Maagemet Applcatos. ISS 250-7988 Volume 5 (202) 3 pp. 59-66 MIR Labs, www.mrlabs.et/jcsm/dex.html ear eghbor Dstrbuto Sets of Fractal ature Marcel

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

A Key-Policy Attribute-Based Broadcast Encryption

A Key-Policy Attribute-Based Broadcast Encryption 444 The Iteratoa rab Joura of Iformato Techooy Vo. 0 o. 5 September 0 Key-Pocy ttrbute-base Broacast Ecrypto J Su Yupu Hu a Leyou ha Departmet of ppcato Mathematcs X a Uversty of Techooy Cha Key Lab of

More information

A multi-layer market for vehicle-to-grid energy trading in the smart grid

A multi-layer market for vehicle-to-grid energy trading in the smart grid A mult-layer market for vehcle-to-grd eergy tradg the smart grd Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad To cte ths verso: Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad. A mult-layer market

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

Models of migration. Frans Willekens. Colorado Conference on the Estimation of Migration 24 26 September 2004

Models of migration. Frans Willekens. Colorado Conference on the Estimation of Migration 24 26 September 2004 Models of mgrato Fras Wllekes Colorado Coferece o the Estmato of Mgrato 4 6 Setember 004 Itroducto Mgrato : chage of resdece (relocato Mgrato s stuated tme ad sace Cocetual ssues Sace: admstratve boudares

More information

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function

Using the Geographically Weighted Regression to. Modify the Residential Flood Damage Function World Evrometal ad Water Resources Cogress 7: Restorg Our Natural Habtat 7 ASCE Usg the Geographcally Weghted Regresso to Modfy the Resdetal Flood Damage Fucto L.F Chag, ad M.D. Su Room, Water Maagemet

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS

More information

Basic statistics formulas

Basic statistics formulas Wth complmet of tattcmetor.com, the te for ole tattc help Set De Morga Law Bac tattc formula Meaure of Locato Sample mea (AUB) c A c B c Commutatvty & (A B) c A c U B c A U B B U A ad A B B A Aocatvty

More information

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES. MATRİS KODLAR İLE McELIECE ŞİFRELEME SİSTEMİ

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES. MATRİS KODLAR İLE McELIECE ŞİFRELEME SİSTEMİ SAÜ e Blmler Dergs, 5 Clt, 2 Sayı, THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES Vedat ŞİAP* *Departmet of Mathematcs, aculty of Scece ad Art, Sakarya Uversty, 5487, Serdva, Sakarya-TURKEY vedatsap@gmalcom

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

How To Value An Annuity

How To Value An Annuity Future Value of a Auty After payg all your blls, you have $200 left each payday (at the ed of each moth) that you wll put to savgs order to save up a dow paymet for a house. If you vest ths moey at 5%

More information

3.6. Metal-Semiconductor Field Effect Transistor (MESFETs)

3.6. Metal-Semiconductor Field Effect Transistor (MESFETs) .6. Metal-Semcouctor Fel Effect rator (MESFE he Metal-Semcouctor-Fel-Effect-rator (MESFE cot of a couctg chael potoe betwee a ource a ra cotact rego a how the Fgure.6.1. he carrer flow from ource to ra

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information