Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Size: px
Start display at page:

Download "Study on Model of Risks Assessment of Standard Operation in Rural Power Network"

Transcription

1 Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang , Chna 2 Tao Yang, Correspondng author, College of Informaton and Electrcl Engneerng, Shenyang Agrculture Unversty, Shenyang , Chna { Qngj L, xmusyau@hotmal.com, Tao Yang, yangtaosx@yahoo.com.cn } Abstract. Operaton rsk s the prmary rsk to rural power company, and t s also an mportant part of securty rsk management. The paper establshes a model to assessed rsks of standard operaton n rural power network, based on Job Rsk Analyss (LEC). The example and applcaton of the model n rural power network securty rsk management system shows that t can realze the real-tme assessment of standard operaton rsk, the model use s smple and the assessment result s accurate. Ths study has mportant reference value to practcal applcaton of rural power securty rsk assessment. Key words: Model of rsks assessment, Standard operaton, Rural power network, LEC 1 Introducton Securty rsk assessment management s an mportant part of modern busness management and t also s an effectve means to ensure producton safety. In recent years, rural power companes are carryng out rsk assessment based on ts own contents and standards of rsks assessment. In these standards, some are cyclcal; others are real-tme. But they do not gve a clear and workable approach to acheve real-tme assessment that combne wth the standard operatng. Hazard dentfcaton and control measure s the core of real-tme assessment, and the model s the key to acheve real-tme evaluaton for standard operatng. Ths paper proposes an assessment model that s based on method Job Rsk Analyss (LEC) and has been mproved and perfected, so that t can be a good combnaton wth the rsk level of securty rsk assessment. The model can quantfy the hazard level and the effect of preventon measures, and then calculate the rsk level of ths operaton. Based on these remnders and descrptons of varous rsk factors leadng to the lkelhood and severty of accdents, operators can effectvely prevent accdents.

2 2 Background and platform 2.1 Background Securty rsk assessment management has been wdely used n fnance, nsurance and other ndustres. In November 2008, based on drawng and absorbng the nternatonal advanced management concepts and methods of securty, State Grd Corporaton arranged and compled The Securty Rsk Assessment Norm to Power Supply Enterprses and Supply Enterprse Securty Rsk Identfcaton and Preventon Operatons Manual. From the standpont of the company producton safety condtons, qualty of personnel, scene management, general management, the systematc assessment of enterprse securty management, the norm that manly prevents personal njury and man-made accdents evaluates enterprse securty rsk ratng and gudes enterprse to carry out securty management. The rsk calculaton formula of securty rsk assessment: Scorng rate = Σ the actual score of tems havng been checked / Σ total score of all the tems Table 1. Rsk ratng of securty rsk assessment scorng rate x x >x >x >x 0.4 x<0.4 rsk ratng Securty controlled Low rsk Medum rsk Hgh rsk Out of control 2.2 Platform In order to carry out securty rsk assessment management quckly, ChangChun Suburb Branch Company develop the "securty rsk assessment management system". The system development objectve s to acheve securty rsk assessment scentfc, convenent n the applcaton, relable, cost-savng effect, and provde comprehensve statstcal data to decson-makng to polcy-makers. The system s desgned and realzed by ASP.NET2.0 technques as well as the SQL 2000 back-stage database based on the hgher prevalence WINDOWS platform. System assessment s dvded nto two parts: real-tme assessment and perodc assessment. Perodc assessment s entrely based on The Securty Rsk Assessment Norm to Power Supply Enterprses ; real-tme assessment combnng wth standardzed operaton s a good complement to perodc assessment. Real-tme assessment model based on LEC method been mproved and perfected can quantfy the hazard level and mpact of control measures, and then calculate the rsk level of ths operaton and effectvely prevent accdents.

3 3. LEC Method 3.1 Introducton of LEC Method LEC method s also named Job Rsk Analyss. It s mathematc model as follow: D= L*E*C. (1) Value of D depends on the rsk possblty (L), the frequency (E) and the possble consequences (C). Ths assessment method s straghtforward and rsk level s clear. But the scores of LEC s determned based prmarly on experence, so the stuff who jon the assessment work must have experence and can make a far and objectve evaluaton of rsk control measures. 3.2 LEC scores and descrpton Table 2 shows the possblty of an accdent (L) and descrpton. Table 2. The possblty of an accdent (L) and descrpton score descrpton 10 Entrely possble 6 Very Lkely 3 Possble, but not often 1 completely unexpected 0.5 envsaged 0.2 Hghly unlkely 0.1 Impossble Table 3 shows frequency of exposure to hazardous (E) and descrpton. Table 3. Frequency of exposure to hazardous (E) and descrpton score descrpton 10 Contnuous 6 per day 3 Once a week, or occasonally 2 Monthly 1 Several tmes a year 0.5 Very rare Table 4 shows that accdent may result n the loss of the consequences (C) and descrpton. Table 4. Score C and descrpton

4 score descrpton 100 Dsaster, many deaths 40 Dsaster, several fataltes 15 serous, one death 7 Serous njury 3 Major accdents, dsablty 1 Small accdent, mnor njures 4. Real-tme assessment models 4.1 Assessments Model Frst, calculates the rsk value D for each hazard, and then sum total of ths assgnment as the rsk value, and prompts to the operator. There are many hazards preventon and control measures for each hazard. The score of preventon and control measures wll be multpled by the effect of e j, dvded by the total rsk value of rsk sources. Wth reference to table 1, the system reaches the safety rsk assessment rsk ratng. The mathematcal model can be descrbed by Equaton 2: n = 1 k ( e j D ( a b ) m j % + D b ) / D (2) j = 1 n = 1 Table 5 shows the value of a and b. Table 5. Relaton of a,b and D D Level of rsk a b >320 Extremely rsk ~320 Hgh rsk ~160 Sgnfcant rsk ~70 General rsk <20 Slghtly rsk The effects of a and b s that for a specfc hazard, based on level of rsk, rsk ratng of securty rsk assessment can be lmted n scope. For example, the value of D s >320, so the level of rsk s extremely rsk. For ths hazard, even f the operator take protectve measures s perfect, n the best case the rsk level of ths job s the hgh rsk. On the other hand, the level of rsk s slghtly rsk, even f the operator take no protectve measures, n the worst case the rsk level of ths job s the low rsk. Meanwhle, the models combne the level of rsk and rsk ratng of securty rsk assessment well.

5 Where m j % means the percentage level of protectve measure s control effect to a specfc hazard, and for hazard wth k- preventon measures, equaton s gven by Equaton 3: k j = 1 m j % = 1. Where k s the count of preventon measures. After that, the operator can easly score on the preventon measures to avod the uncertanty scores. Where e j means the effect of protectve effect to a specfc hazard, and e j [0,1].When a hazard wth the approprate control measures can be prevented, then the value of e j s great; else the value of e j s small. (3) 4.2 Expermental data For example,cuttng trees, the system calculate level of securty rsk based on mathematcal model. Table 6. Parameter values of cuttng trees Hazard D a b e Traffc accdent fallng Electrc shock Hurt by fallen trees The descrpton of hazards preventon measures for each hazard s no detal. Accordng by parameter values of table 6,the system Calculates scorng rate of securty rsk assessment :( ) / ( ) =0.87,Wth reference to table 1, concluson s Low rsk. Result value of 0.87 close to the 0.9 s realstc. 5. Concluson Real-tme rsk assessment plays an mportant role n the producton. The models combne LEC method and rsk ratng of securty rsk assessment well. By adjustng the value of each parameter, ther correspondng relatonshp s flexble. Wth the models, operator can vew the level of hazard rsk, and know the effect of preventon measures that wll be taken, then gan rsk level of ths job. For prmary operator, all nformaton can be warned before work, so accdents can be prevented obvously. At the same tme, large amounts of date from routne work can also serve as the bass for statstcal analyss and offer reference and decson servce to polcy makers. The value of coeffcent largely depends on experence wth professonal staff accordng to dfferent operatons, dfferent crcumstances to determne, and the fnal

6 value needs further study, standardzaton to make assessment more objectve and reasonable. Reference 1. State Grd Corporaton: The Securty Rsk Assessment Norm to Power Supply Enterprses. Chna Electrc Power Press, Bejng (2008) 2. State Grd Corporaton: Supply Enterprse Securty Rsk Identfcaton and Preventon Operatons Manual. Chna Electrc Power Press, Bejng (2008) 3. Ge Fengshan, and MaWanquan: New Power System Securty Rsk Management System and Evaluaton Methods. Chna Electrc Power Press, Bejng (2008) 4. LI Wen-yuan: Rsk assessment of power systems: models and applcatons. IEEE Press and Wley & Sons Inc, U.S. (2005)

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises 3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,

More information

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Empirical Analysis on Farmers Agriculture Insurance Purchasing. Intention of Hebei Province 1

Empirical Analysis on Farmers Agriculture Insurance Purchasing. Intention of Hebei Province 1 Emprcal Analyss on Farmers Agrculture Insurance Purchasng Intenton of Hebe Provnce 1 Wenl Feng,Yue Bo,Fang Lu (Bankng School, Hebe Unversty of Economcs and Busness) (Shjazhuang,Hebe Provnce, 050061) Abstract:In

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Stress test for measuring insurance risks in non-life insurance

Stress test for measuring insurance risks in non-life insurance PROMEMORIA Datum June 01 Fnansnspektonen Författare Bengt von Bahr, Younes Elonq and Erk Elvers Stress test for measurng nsurance rsks n non-lfe nsurance Summary Ths memo descrbes stress testng of nsurance

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

ERP Software Selection Using The Rough Set And TPOSIS Methods

ERP Software Selection Using The Rough Set And TPOSIS Methods ERP Software Selecton Usng The Rough Set And TPOSIS Methods Under Fuzzy Envronment Informaton Management Department, Hunan Unversty of Fnance and Economcs, No. 139, Fengln 2nd Road, Changsha, 410205, Chna

More information

3. Present value of Annuity Problems

3. Present value of Annuity Problems Mathematcs of Fnance The formulae 1. A = P(1 +.n) smple nterest 2. A = P(1 + ) n compound nterest formula 3. A = P(1-.n) deprecaton straght lne 4. A = P(1 ) n compound decrease dmshng balance 5. P = -

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

MINIMISING INVENTORY COSTS BY PROPERLY CHOOSING THE LEVEL OF SAFETY STOCK

MINIMISING INVENTORY COSTS BY PROPERLY CHOOSING THE LEVEL OF SAFETY STOCK ECONOMIC AND BUSINESS REVIEW VOL. No. 2 2009 09 7 09 MINIMISING INVENTORY COSTS BY PROPERLY CHOOSING THE LEVEL OF SAFETY STOCK LILJANA FERBAR TRATAR* ABSTRACT: Markets are everyday becomng ever more demandng

More information

Determination of Integrated Risk Degrees in Product Development Project

Determination of Integrated Risk Degrees in Product Development Project Proceedngs of the World Congress on Engneerng and Computer Scence 009 Vol II WCECS 009, October 0-, 009, San Francsco, USA Determnaton of Integrated sk Degrees n Product Development Project D. W. Cho.,

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors:

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A Study on Security Technique of Cloud Data Processing in Electronic Commerce

A Study on Security Technique of Cloud Data Processing in Electronic Commerce Internatonal Journal of Securty and Its Applcatons, pp.283-290 http://dx.do.org/10.14257/sa.2014.8.2.29 A Study on Securty Technque of Cloud Data Processng n Electronc Commerce We Da 1, Xuefang Zhang 2

More information

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract , pp.377-390 http://dx.do.org/10.14257/jsa.2016.10.4.34 Research on the Enterprse Performance Management Informaton System Development and Robustness Optmzaton based on Data Regresson Analyss and Mathematcal

More information

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting

Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting 161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN 978-88-9568-37-; ISSN 83-916 The Italan Assocaton of

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Objectives How Can Pharmacy Staff Add to the Accountability of ACO s?

Objectives How Can Pharmacy Staff Add to the Accountability of ACO s? Objectves How Can Pharmacy Staff Add to the Accountablty of ACO s? Sandra Van Trease Group Presdent, BJC HealthCare Presdent, BJC HealthCare ACO, LLC The speaker has no conflct of nterest to declare. 1.

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Study on the Competitiveness of the Software Outsourcing Industry in Jilin Province Based on Diamond Model

Study on the Competitiveness of the Software Outsourcing Industry in Jilin Province Based on Diamond Model Study on the Compettveness of the Software Outsourcng Industry n Jln Provnce Based on Damond Model LIU Lqn School of Busness Admnstraton, Changchun Unversty of Technology, Changchun, 130012 lulqn2002@xnhuanet.com

More information

Factors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence

Factors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence Factors Affectng Outsourcng for Informaton Technology Servces n Rural Hosptals: Theory and Evdence Bran E. Whtacre Department of Agrcultural Economcs Oklahoma State Unversty bran.whtacre@okstate.edu J.

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Performance attribution for multi-layered investment decisions

Performance attribution for multi-layered investment decisions Performance attrbuton for mult-layered nvestment decsons 880 Thrd Avenue 7th Floor Ne Yor, NY 10022 212.866.9200 t 212.866.9201 f qsnvestors.com Inna Oounova Head of Strategc Asset Allocaton Portfolo Management

More information

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan

More information

Screening Tools Chart As of November 2011

Screening Tools Chart As of November 2011 Screenng Chart As of November 2011 Ths tools chart reflects the results of the fourth annual revew of screenng tools by the Center s Techncal Revew Commttee (TRC). The Center defnes screenng as follows:

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Product Quality and Safety Incident Information Tracking Based on Web

Product Quality and Safety Incident Information Tracking Based on Web Product Qualty and Safety Incdent Informaton Trackng Based on Web News 1 Yuexang Yang, 2 Correspondng Author Yyang Wang, 2 Shan Yu, 2 Jng Q, 1 Hual Ca 1 Chna Natonal Insttute of Standardzaton, Beng 100088,

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed

More information

14.74 Lecture 5: Health (2)

14.74 Lecture 5: Health (2) 14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,

More information

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *

More information

Help is a tou ch of a button away. Telecare - keeping you safe and independent in your own home. i Personal emergency equipment

Help is a tou ch of a button away. Telecare - keeping you safe and independent in your own home. i Personal emergency equipment Help s a tou ch of a button away Telecare - keepng you safe and ndependent n your own home Personal emergency equpment 24/7 moble response - ncludng a dgnty savng lftng servce Professonal support Welcome

More information

Generalized Linear Models for Traffic Annuity Claims, with Application to Claims Reserving

Generalized Linear Models for Traffic Annuity Claims, with Application to Claims Reserving Mathematcal Statstcs Stockholm Unversty Generalzed Lnear Models for Traffc Annuty Clams, wth Applcaton to Clams Reservng Patrca Mera Benner Examensarbete 2010:2 Postal address: Mathematcal Statstcs Dept.

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Modeling Motorcycle Insurance Rate Reduction due to Mandatory Safety Courses

Modeling Motorcycle Insurance Rate Reduction due to Mandatory Safety Courses Modelng Motorcycle Insurance Rate Reducton due to Mandatory Safety Courses Shujuan Huang 1 Vadveloo Jeyaraj 1 Valdez mlano 1 Garry D. Lapdus 2 1 Mathematc Department Unversty of Connectcut Storrs CT 06269

More information

Road Construction Lead to the Issue of National Compensation

Road Construction Lead to the Issue of National Compensation Abstract Road Constructon Lead to the Issue of Natonal Compensaton Tung-Tsan Chen 1 and Yao T. Hsu 2 The Hghway conssts of the roads used by vehcles and the other publc nfrastructure facltes around t that

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

Oxygen Saturation Measurement and Optimal Accuracy in Nair

Oxygen Saturation Measurement and Optimal Accuracy in Nair The Applcaton of Threshold De-nosng n Moble Oxygen Saturaton Montorng Software Tang Nng and Xu Zhenzhen School of Computer Scence and Technology, Donghua Unversty, Shangha, Chna 201620 tnwysyd@126.com

More information

Decision Tree Model for Count Data

Decision Tree Model for Count Data Proceedngs of the World Congress on Engneerng 2012 Vol I Decson Tree Model for Count Data Yap Bee Wah, Norashkn Nasaruddn, Wong Shaw Voon and Mohamad Alas Lazm Abstract The Posson Regresson and Negatve

More information

Big Data Analytics on Acquisition Issues of Public Healthcare

Big Data Analytics on Acquisition Issues of Public Healthcare 96 Int'l Conf. on Advances n Bg Data Analytcs ABDA'15 Bg Data Analytcs on Acquston Issues of Publc Healthcare A. Habo Wang 1, B. Chenhu Zhou 1, C. We Wang 1 and D. Yaquan Xu 2 1 Sanchez School of Busness,

More information

Partner selection of cloud computing federation based on Markov chains

Partner selection of cloud computing federation based on Markov chains COMPUER MODELLING & NEW ECHNOLOGIES 2014 18(12B) 590-594 Abstract Partner selecton of cloud computng federaton based on Markov chans Lang Hong 1,2, Changyuan Gao 1* 1 School of Management, Harbn Unversty

More information

Multitone Electronics Plc. delivering certainty

Multitone Electronics Plc. delivering certainty Multtone Electroncs Plc Multtone Electroncs Plc, Multtone House, Shortwood Copse Lane, Basngstoke, Hampshre, RG23 7NL Tel: +44 (0)1256 320292 Fax: +44 (0)1256 462 643 Emal: nfo@multtone.com Web: www.multtone.com

More information

Optimal allocation of safety and security resources

Optimal allocation of safety and security resources 397 A publcaton of VOL. 31, 2013 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Eddy De Rademaeker, Bruno Fabano, Smberto Senn Buratt Copyrght 2013, AIDIC Servz S.r.l., ISBN 978-88-95608-22-8; ISSN 1974-9791

More information

An Integrated Framework for Responsive Supply Chain Management

An Integrated Framework for Responsive Supply Chain Management 1 An Integrated Framework for Responsve Supply Chan Management 1 Darsht Parmar 1 Teresa Wu 1 John Fowler Tom Callarman 3 Vncent Hargaden 4 Eamonn Ambrose 1 Phlp Wolfe 1 Department of Industral Engneerng

More information

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

M-applications Development using High Performance Project Management Techniques

M-applications Development using High Performance Project Management Techniques M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA

More information