Software Aging Prediction based on Extreme Learning Machine

Size: px
Start display at page:

Download "Software Aging Prediction based on Extreme Learning Machine"

Transcription

1 TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty, X a , Shaax, Cha 2 School of Software Egeerg, Chagchu Uversty of Techology, Chagchu, , Jl, Cha *Correspodg author, e-mal: luhm.cc@gmal.com Abstract I the research o software agg ad rejuveato, oe of the most mportat questos s whe to trgger the rejuveato acto. Ad t s useful to predct the system resource utlzato state effcetly for determg the rejuveato tme. I ths paper, we propose software agg predcto model based o extreme learg mache (ELM) for a real VOD system. Frst, the data o the parameters of system resources ad applcato server are collected. The, the data s preprocessed by ormalzato ad prcpal compoet aalyss (PCA). The, ELMs are costructed to model the extracted data seres of systematc parameters. Fally, we get the predcted data of system resource by computg the sum of the outputs of these ELMs. Expermets show that the proposed software agg predcto method based o wavelet trasform ad ELM s superor to the artfcal eural etwork (ANN) ad support vector mache (SVM) the aspects of predcto precso ad effcecy. Based o the models employed here, software rejuveato polces ca be trggered by actual measuremets. Keywords: software agg, extreme learg mache, predcto Copyrght 2013 Uverstas Ahmad Dahla. All rghts reserved. 1. Itroducto The software relablty ad avalablty are creasgly beg demaded preset software systems [1]. Whle recet studes show that whe software applcato s executed cotuously for log tervals of tme, some error codtos them are accumulated to result performace degradato or eve a crash falure, whch s called software agg [2]. The pheomeo has bee observed may software systems, such as operatg system [3], web server [4], SOA server [5], ad so o. Because of the effect of software agg, the system relablty decreases. To couteract software agg ad ts related traset software falures, a prevetve ad proactve techque, called software rejuveato, has bee proposed ad s becomg popular [2]. It volves stoppg the rug software occasoally, cleag ts teral state ad or ts evromet ad restartg t. A extreme but well-kow example of software rejuveato s the hardware reboot [6]. I geeral, the cost of software rejuveato s substatally lower tha the cost of a system falure followed by a reactve recovery. Over the recet years, quattatve studes of software agg ad rejuveato have bee take, ad may dfferet approaches have bee developed ad the effects of software rejuveato have bee studed. These studes ca be categorzed to two kds, tme-based rejuveato polcy ad measure-based rejuveato polcy. The tme-based rejuveato polcy s characterzed by the fact that the software s perodcally rejuveated every tme a predefed tme costat has elapsed. I these approaches, a certa falure tme dstrbuto s assumed ad cotuous tme Markov cha (CTMC) [2], sem-markov process [7], Markov regeeratve process (MRGP) [8], Markov decso process (MDP) [9] or stochastc Petr et (SPN) model [10] etc s developed to compute ad optmze system avalablty or related measures. The measure-based rejuveato polcy apples statstcal aalyss to the measured data o resource avalablty to predct the expected tme to resource exhausto [11], ad t provdes a wdow of tme durg whch a rejuveato acto s advsed. The basc dea of the measure-based rejuveato polcy s to motor ad collect data o the attrbutes ad parameters, whch are resposble for determg the health of the rug software system. Garg et al. [3] proposed a methodology to detect ad estmate the agg the UNIX system, they mplemeted a SNMP based tool to collect data, ad adopted o-parametrc statstc method to detect ad estmate Receved Aprl 15, 2013; Revsed Jue 19, 2013; Accepted July 20, 2013

2 6548 e-issn: X agg. Adrzejak et al. [6] used a sple-based descrpto of the agg profles ad adopted a statstcal test to verfy ts correctess of the SOAP server. Adrzejak et al. [12] also used mache learg methods to model ad predct the software agg of a web applcato. Grottke et al. [4] used o-parametrc statstcal methods to detect ad estmate treds of agg, ad adopted AR model to predct the agg of a Web server. Hoffma et al. [13] gave a practce gude to resource forecastg, they adopted several methods to model ad predct the software agg of a Web server, they foud that probablstc wrapper (PWA) was a better method for varable select, ad support vector mache (SVM) was a better approach for resource forecastg. For the predcto of tme seres, artfcal eural etwork (ANN) [14] ad support vector mache (SVM) [15] are wdely adopted. Artfcal eural etworks, especally BP etworks, are powerful tools for fttg olear tme seres. However, there are some dsadvatages mplemetg of artfcal eural etworks. Frstly t s hard to determe the parameters of euros ad the etwork structure. Furthermore, the trag process of eural etworks s tme-cosumg ad the covergece rate s slow, because the etworks ofte settle udesrable local mma of the error surface. Whe support vector mache s used for predcto, t also faces some dsadvatages ad challeges, such as slow learg rate, multparameters to be determed, ad so o. I order to overcome some challeges of ANN ad SVM, extreme learg mache (ELM) proposed by Huage et al.[16] has attracted the more ad more atteto recetly. ELM s adopted for geeralze sgle-hdde layer feedforward etworks (SLFNs), ad the hdde layer eed ot be tued, whch results better geeralzato performace, faster learg speed, ad least huma teracto. I ths paper, we aalyze the software agg pheomeo of a real VOD system, ad propose a software agg predcto model based o extreme learg mache. The ma cotrbutos of ths paper are 1) proposg a software agg predcto model based o ELM, 2) applyg PCA to reduce the dmeso of put varables of ELMs, 3) usg the data collected from a real VOD system to evaluate the software agg predcto performace. 2. Software Agg Predcto Model based o ELM I order to provde support for trggerg software rejuveato actos, we eed to predct the system resource utlzato state precsely to reflect the software system state the future. Extreme learg mache, whch s a learg algorthm, proposed by Huag et al. [16] was developed for sgle-hdde layer feedforward eural etworks (SLFNs). ELM provdes good geeralzato performace at extremely fast learg speed by choosg hdde odes radomly ad determg the output weghts of SFLNs aalytcally. Therefore, we preset a software agg predcto model based o extreme learg mache, show Fgure 1, whch llustrates the k -step predcto procedure. Fgure 1. Software Agg Predcto Model From Fgure 1, we see that the data are frstly preprocessed after they are collected. The the tme seres of target parameter yt () s putted to wavelet trasform module, ad the detal compoets D (), t 1,..., pad the approxmato compoet A() p t of yt () are gotte, where p s the decomposto level assged by user, t s the sample dex. The other TELKOMNIKA Vol. 11, No. 11, November 2013:

3 TELKOMNIKA e-issn: X 6549 parameters x ( t), 1, 2,..., are putted to PCA module, ad the frst m prcpals z ( t), 1, 2,..., m are selected, where m. The we costruct p 1 ELMs to forecast the decomposed compoets of target parameter separately. Each compoet ( A() t or D (), t 1,..., p) ad all the frst m prcpals z ( t), 1, 2,..., m are the puts of the respectve ELM, ad the output of the ELM s the k -step predcto value of the compoet ( A* ( t k) or D* ( tk), 1,..., p). Fally, all the outputs of these p 1 ELMs are summed to obta the k - step predcto value of the object parameter y*( t k). The detal steps of our approach are as follows: 1) Data Preprocess Data preprocess cludes two phases: (1) Parameter reducto ad selecto. I ths phase, the parameters whch are costat values durg the motorg perod ad the parameters that have the same meags are excluded. (2) Normalzato. I ths phase, all the selected parameters are ormalzed to elmate dmeso fluece. After ormalzato, the rage of all these parameters are lmted to [-1, 1]. 2) Prcpal Compoet Aalyss I the expermets, we collect 30 parameters of memory, 15 parameters of CPU, 17 parameters of dsk ad 27 parameters of applcato server. Some parameters are costat durg the observato terval, such as Commt Lmt of memory, C2 Trastos/sec of CPU ad so o. Some parameters have the same meag, such as Avalable Kbytes ad Avalable Mbytes of memory etc. After all these parameters are excluded, there are stll 32 parameters left. The relatoshp betwee software agg ad these parameters ca be expressed as the Equato (1): y f x1 x2 x (,,, ) (1) p p Where y deotes the avalable bytes of memory ad x 1, x 2,, x are the mpact factors of software agg the VOD system, ad here equals 32. If we take all these 32 parameters as the puts of the ELMs drectly, the etwork scale s very large, ad ts effcecy s very low. PCA [17] s a essetal method of multvarate statstcal aalyss, whch selects several represetatve prcple compoets to expla most of the data chages. Therefore, order to mprove the effcecy ad to keep the accuracy of our predcto model, PCA s adopted to reduce the put parameters here. Let the samples of these factors be X ( X1, X2, X ) T, the the procedure of PCA s as follows: (1) Normalze the samples X to remove dmeso fluece. (2) Calculate the relatve matrx P ad covarace matrx C of the sample data, ad egevalues 1, 2, ad egevectors are obtaed. (3) Calculate the cotrbuto rate of each compoet respectvely. The choce of prcpal compoet s determed based o varace cotrbuto rate ad cumulatve cotrbuto rate. The varace cotrbuto rates are calculated by the Equato (2): /( ) k (1,2,, ) (2) k k 1 Ad the cumulatve cotrbuto rate for each prcple compoet s gotte by the Equato (3): m /( ) m(1,2,, ) m j j1 1 (3) The hgher of the meas the stroger of the ablty for the frst prcpal compoet to 1 abstract the formato of x 1, x 2,, x. If the accumulato cotrbuto rate of the frst m Software Agg Predcto based o Extreme Learg Mache (Xaozh Du)

4 6550 e-issn: X compoets s more tha a predetermed threshold (such as 85 percet), the frst m compoets are selected as the puts of the ELM. After PCA s fshed, formula (1) ca be reduced to the Equato (4): y f( z, z, z ) (4) 2 m where y deotes the avalable bytes of memory ad z 1, z 2,, zm s the prcpal compoets of agg mpact factors of the VOD system, ad here m. 3) Extreme Learg Maches Extreme learg mache, whch s a learg algorthm, proposed by Huag et al. [16] was developed for sgle-hdde layer feed forward eural etworks (SLFNs). ELM provdes good geeralzato performace at extremely fast learg speed by choosg hdde odes radomly ad determg the output weghts of SFLNs aalytcally. Here we cosder a sglehdde layer feed forward etwork wth L hdde euros. The put X ( z1, z2,..., zm, y) s a vector wth m+1 elemets, the output of the th hdde euro s Ga (, b, X ), where b s the bas, ad a ( a 1, a2,..., am, ay) s the weght vector, as ( s 1, 2,..., m, y) s the coecto weght betwee the th hdde euro ad the s th put euro. The the output of the SLFN s gve by the Equato (5): L yt ( k) f( X) Ga (, b, X) (5) 1 Where, ( 1,...,, y)' s the weght vector coectg hdde layer wth output layer, s the coecto weght betwee the th hdde euro ad the k th output euro. For the k case of addtve hdde euros, Ga (, b, X ) takes the followg form show by the Equato (6): Ga (, b, X) ga ( ' X b) (6) Where g: R R s the actvato fucto. m Assume that N arbtrary samples ( X, Y) R R are gve, the weght vectors a ad bas b are radomly assged. The the SLFN wth L hdde euros ca approxmate the N samples wth zero error f ad oly f there exsts, so that we get Y j by Equato (7): L Y G( a, b, X ), j 1,2,..., N (7) j j 1 The above N equatos ca be rewrtte the followg compact form show by Equato (8): H Y (8) T T Ga (, b, X1) Ga ( L, bl, X1) 1 Y 1 where H,,. Y Ga (, b, XN) Ga ( L, bl, XN) T NL T L Y L m N NM Oce the hdde ode parameters ( a, b ) are geerated radomly, they rema fxed. The trag the SLFN s equvalet to fdg the mmum orm least-squares soluto *, whch s gve by the Equato (9): * H Y (9) TELKOMNIKA Vol. 11, No. 11, November 2013:

5 TELKOMNIKA e-issn: X 6551 where H s the Moore Perose geeralzed verse of matrx H. For the trag data set {( X, Y)}, the ELM algorthm [16] s descrbed as follows: 1,2,..., N Step 1: Assg the hdde ode umber L, ad the actvato fucto g(.) ; Step 2: For 1, 2,..., L, radomly geerate the put weght vector a ad the bas b Step 3: Calculate the hdde layer output matrx H ad H ; * Step 4: Accordg Equato (9), calculate the output weght vector. For ay put sample x R, the output value y * s calculated by usg the Equato (10): L * * y g( axb) (10) 1 The, we get the k -step predcto value of the object parameter, ad the procedure s fshed. 3. Results ad Aalyss 3.1. Expermetal Setup The expermetal evromet s a real VOD system, ad ts structure s show Fgure 2. The VOD system cossts of a web server, a applcato server (or vdeo server) ad a dsk array. The web server acts as the presetato layer, whch provdes meda data to clets. Whe t receves the order request from a clet, the web server redrects ths request to the applcato server. The the clet makes coecto wth the applcato server ad receves the meda data from the applcato server drectly f the clet gets the permsso. The dsk array s used to store the meda data. I our expermets, we adopt Apache as the web server, ad Helx server as the applcato server. Fgure 2. Structure of the VOD System 3.2. Data Collectos Durg the expermets, we collect 30 parameters of memory, 15 parameters of CPU, 17 parameters of dsk ad 27 parameters of applcato server, the samplg terval s 3 mutes, 7500 samples of the system parameters are collected for 375 hours. The umber of clet access of the VOD system s llustrated Fgure 3, ad the tme seres of system avalable memory s show Fgure 4. From Fgure 3, t s foud that the umber of clet access shows a certa perodcty, however t has a large radomess ad t fluctuates frequetly. From Fgure 4, we see that the avalable memory shows a frequet ad large fluctuato, whch s caused by the stochastc arrval of clet access ad the software agg. Accordg to the tme seres of the collected system avalable memory ad the umber of clet access, we use Ma-Kedall method [4] to test whether there s software agg pheomeo the VOD system. Table 1 shows the results of tred test for the avalable memory ad the umber of clet access. From Table 1, we fd that there s a dowward tred the tme seres of the avalable memory, ad the tme seres of the umber of clet access also has a dowward tred. That s, the dowward tred of the Software Agg Predcto based o Extreme Learg Mache (Xaozh Du)

6 6552 e-issn: X system avalable memory s ot caused by the clets. Therefore, t ca be cocluded that there exsts software agg pheomeo the VOD system. Fgure 3. Number of Clet Access Fgure 4. System Avalable Memory Table 1. Tred Test data Zstatstc commet avalable memory Dowward tred detected umber of clet access Dowward tred detected 3.3. Software Agg Predcto I order to evaluate the performace of software agg predcto, root mea square error (RMSE) s adopted as dcator. RMSE s the square root of the varace of the resduals, ad t ca be terpreted as the stadard devato of the uexplaed varace. The lower the values of RMSE, the better the predcto result. RMSE s defed by the Equato (11):\ RMSE N 1 ( y ( ) y ˆ( )) N 2 (11) Where, y () deotes the actual value of the tme seres of the avalable memory, y ˆ( ) s the respectve predcto value, ad N s the pots of data set. I the expermets, the umber of prcpal compoets m s set to 2. For the ELM, we use a sgmod actvato fucto ad the umber of hdde euros s 47. The frst 4500 samples are adopted to tra these ELM, ad the resdual 3000 samples are used to test whether our method s effectve. Fgure 5 shows the oe-step forward predcto value of the avalable memory. (a) Predcto data (b) Predcto error Fgure 5. Predcto Results of System Avalable Memory TELKOMNIKA Vol. 11, No. 11, November 2013:

7 TELKOMNIKA e-issn: X 6553 From Fgure 5, we see that the error betwee the predcto data ad the actual data of the avalable memory resource s very low. The we coclude that the predcto model proposed by us s sutable for software agg forecastg. We also fd that the predcto error teds to be larger at the valley of the resource cosumpto. The reaso s that there are more clets the system at the valley of the resource cosumpto, whch results more memory resource cosumpto ad more fluctuato, so the predcto precse decreases. Table 2 shows the approxmato performace of our software agg predcto model compared wth support vector mache (SVM), artfcal eural etwork model (ANN) wth BP algorthm. The smulatos for our model, ANN are carred out MATLAB R2007a evromet rug a Core2 Duo CPU, 3GHz. The smulato for SVM s carred out by usg the LIBSVM [18] mplemeted C code rug the same PC. The umber of hdde euros of ANN s set 42, ad the kerel fucto used SVM s radal bass fucto. I our expermets, all the puts ad the outputs have bee ormalzed to [-1, 1]. 20 trals have bee coducted for all the methods ad the average results are adopted. Table 2. Predcto Results of Varous Models Model Trag data Testg data RMSE Tme (s) RMSE Tme(s) Our method SVM ANN From Table 2, t ca be see that the predcto precso of our method s superor to that of ANN ad SVM. The trag tme ad the testg tme of our method are far lower tha that of SVM, ad the trag tme of our model s far lower tha that of ANN. For the trag data, the RMSE of our method s , ad for the testg data, the RMSE s the trag tme ad the testg tme of our method are secods ad secods, whch show that the effcecy of our method s a very hgh. Therefore, the method we preseted s effectve to forecast the software agg process Sestvty Aalyss We perform sestvty aalyss for our preseted model that predcts the avalable memory of the VOD system by addg a prcpal compoet at a tme, ad calculate the model s chage RMSE. The result s show Fgure 6. Fgure 6. RMSE versus the Number of Prcpal Compoets From Fgure 6, t s show that wth the crease of the umber of prcpal compoets, the RMSE decreases, whe the umber of prcpal compoets arrves to a certa value, the mmum RMSE s gotte. The wth the cotuous crease of the umber of prcpal compoets, the RMSE creases. The reaso s that wth the crease of the umber of prcpal compoet, the more formato of put varables s cluded, but except the frst several prcpal compoets, the resdual compoets have trval formato, ad wth more Software Agg Predcto based o Extreme Learg Mache (Xaozh Du)

8 6554 e-issn: X prcpal compoets, the ELMs are becomg more complex, whch results the crease of RMSE. Therefore, we should select the approprate umber of prcpal compoets based o requremet. 4. Cocluso I ths paper, we have vestgated the software agg pheomeo of a real VOD system, ad have proposed a software agg predcto model base o extreme learg mache. The expermetal results have showe that the proposed software agg predcto model s effectve to forecast the agg progress, ad the PCA s a mportat ad useful method to reduce the redudacy of data. Compared wth SVM ad ANN predcto model, our model s more effectve o precso tha ANN ad SVM. Ad the tme for trag ad testg of our model s far lower tha that of ANN ad SVM. ELM s a quck ad effcet method for resolvg the predcto problem, but how to determe the umber of hdde euros s a ope ssue, though several methods have bee preseted, t s stll a challege for the ELM. Therefore, the future we wll study ths ssue. Though ths paper we have study the software agg predcto problem, the cause resultg software agg s stll pedg, so ext we wll explore ths problem. Ackowledgemets Ths work was supported by the Natoal Natural Scece Foudato of Cha uder Grat No , the Natoal Natural Scece Foudato of Cha uder Grat No , the Natoal Postdoctoral Scece Foudato of Cha uder Grat No. 2011M500611, the Idustral Techology Research ad Developmet Specal Project of Jl Provce uder Grat No ; the Fudametal Research Fuds for the Cetral Uverstes; the Natoal College Studets' Iovatve Trag Program of Cha uder Grat No Refereces [1] Paulso LD. Computer System, Heal Thyself. IEEE Computer. 2002; 35(8): [2] Huag Y, Ktala C, Koletts N, Fulto D. Software Rejuveato: Aalyss, Module ad Applcatos. Proceedgs of the 25th Symp. O Fault Tolerat Computg. Pasadea, USA. 1995; [3] Garg S, Pulafto A, Telek M, Trved KS. A Methodology for Detecto ad Estmato of Software Agg. Proceedgs of the Itl. Symp. O Software Relablty Egeerg. NJ, USA. 1998; [4] Grottke M, L L, Vadyaatha K, Trved KS. Aalyss of Software Agg a Web Server. IEEE Trasactos o Relablty. 2006; 55(3): [5] Slva L, Madera H, Slva JG. Software Agg ad Rejuveato a Soap-based Server. Proceedgs of the Ffth IEEE Iteratoal Symposum o Network Computg ad Applcatos. Massachusetts, USA. 2006; [6] Aloso J, Matas R, Vcete E, et al. A Comparatve Expermetal Study of Software Rejuveato Overhead. Performace Evaluato. 2013; 70: [7] Bao Y, Su X, Trved KS. A Workload-based Aalyss of Software Agg ad Rejuveato. IEEE Trasactos o Relablty. 2005; 54(3): [8] Garg S, Pulafto A, Telek M, et al. Aalyss of Prevetve Mateace Trasactos Based Software Systems. IEEE Tras. o Computers. 1998; 47(1): [9] Okamura H, Doh T. Dyamc Software Rejuveato Polces a Trasacto-based System uder Markova Arrval Processes. Performace Evaluato. 2013; 70: [10] Wag D, Xe W, Trved KS. Performablty Aalyss of Clustered Systems wth Rejuveato uder Varyg Workload. Performace Evaluato. 2007; [11] Vadyaatha K, Trved KS. A Comprehesve Model for Software Rejuveato. IEEE Trasactos o Depedable ad Secure Computg. 2005; [12] Adrzejak A, Slva L. Usg Mache Learg for No-trusve Modelg ad Predcto of Software Agg. Proceedgs of the IEEE Network Operatos ad Maagemet Symposum. Salvador, Brazl. 2008; [13] Hoffma GA, Trved KS, Malek M. A Best Practce Gude to Resource Forecastg for Computg Systems. IEEE Trasactos o Relablty. 2007; 56: [14] Goh CK, Teoh EJ, Ta KC. Hybrd Multobjectve Evolutoary Desg for Artfcal Neural Networks. IEEE Trasactos o Neural Networks. 2008; 19: TELKOMNIKA Vol. 11, No. 11, November 2013:

9 TELKOMNIKA e-issn: X 6555 [15] Cao LJ, Tay FEH. Support Vector Mache wth Adaptve Parameters Facal Tme Seres Forecastg. IEEE Trasactos o Neural Networks. 2003; 14(6): [16] Huag GB, Zhu QY, Sew CK. Extreme Learg Mache: Theory ad Applcatos. Neurocomputg. 2006; 70(1-3): [17] Wag X, Kruger U, Irw GW, McCullough G, McDowel N. Nolear PCA wth the Local Approach for Desel Ege Fault Detecto ad Dagoss. IEEE Trasactos o Cotrol System Techology. 2008; 16: [18] Ferrar S, Stegel RF. Smooth Fucto Approxmato Usg Neural Networks. IEEE Trasactos o Neural Networks. 2005; 16(1): Software Agg Predcto based o Extreme Learg Mache (Xaozh Du)

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data Appled Mathematcal Sceces, Vol. 9, 215, o. 57, 289-2829 HIKARI Ltd, www.m-hkar.com http://dx.do.org/1.12988/ams.215.52164 Tme Seres Forecastg by Usg Hybrd Models for Mothly Streamflow Data Sraj Muhammed

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:asa85@hotmal.com Abstract here s some very mportat meag the study of realtme

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components BALKAN JOURNAL OF ELECTRICAL & COMPUTER ENGINEERING, 05, Vol.3, No. 4 Developg toursm demad forecastg models usg mache learg techques wth tred, seasoal, ad cyclc compoets S. Cakurt ad A. Subas Abstract

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

STOCHASTIC approximation algorithms have several

STOCHASTIC approximation algorithms have several IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data Usg Data Mg Techques to Predct Product Qualty from Physcochemcal Data A. Nachev 1, M. Hoga 1 1 Busess Iformato Systems, Cares Busess School, NUI, Galway, Irelad Abstract - Product qualty certfcato s sometmes

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

Regression Analysis. 1. Introduction

Regression Analysis. 1. Introduction . Itroducto Regresso aalyss s a statstcal methodology that utlzes the relato betwee two or more quattatve varables so that oe varable ca be predcted from the other, or others. Ths methodology s wdely used

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

Introduction to Maintainability

Introduction to Maintainability Itroducto to Mataablty The cocept of mataablty ecompasses: A operatoal measure of effectveess A characterstc of desg A egeerg specalty that supports desg A cost drver A plaed actvty each stage of product

More information

Evaluating the Network and Information System Security Based on SVM Model

Evaluating the Network and Information System Security Based on SVM Model JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 Evaluatg the Network ad formato System Securty Based o SVM Model Shaome Yag Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Three Dimensional Interpolation of Video Signals

Three Dimensional Interpolation of Video Signals Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

A Bayesian Networks in Intrusion Detection Systems

A Bayesian Networks in Intrusion Detection Systems Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

We present a new approach to pricing American-style derivatives that is applicable to any Markovian setting

We present a new approach to pricing American-style derivatives that is applicable to any Markovian setting MANAGEMENT SCIENCE Vol. 52, No., Jauary 26, pp. 95 ss 25-99 ess 526-55 6 52 95 forms do.287/msc.5.447 26 INFORMS Prcg Amerca-Style Dervatves wth Europea Call Optos Scott B. Laprse BAE Systems, Advaced

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Trend Projection using Predictive Analytics

Trend Projection using Predictive Analytics Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information