A Bayesian Networks in Intrusion Detection Systems

Size: px
Start display at page:

Download "A Bayesian Networks in Intrusion Detection Systems"

Transcription

1 Joural of Computer Scece 3 (5: 59-65, 007 ISSN Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract: Itruso detecto systems (IDSs have bee wdely used to overcome securty threats computer etwors. Aomaly-based approaches have the advatage of beg able to detect prevously uow attacs, but they suffer from the dffculty of buldg robust models of acceptable behavour whch may result a large umber of false alarms caused by correct classfcato of evets curret systems. We propose a ew approach of a aomaly Itruso detecto system (IDS. It cossts of buldg a referece behavour model ad the use of a Bayesa classfcato procedure assocated to usupervsed learg algorthm to evaluate the devato betwee curret ad referece behavour. Cotuous re-estmato of model parameters allows for real tme operato. The use of recursve Log-lelhood ad etropy estmato as a measure for motorg model degradato related wth behavor chages ad the assocated model update show that the accuracy of the evet classfcato process s sgfcatly mproved usg our proposed approach for reducg the mssgalarm. ey words: Computer etwor, Securty, Itruso detecto, Probablstc reasog, Bayesa learg, Real-tme. INTRODUCTION Itruso detecto ca be defed as the process of detfyg malcous behavor that targets a etwor ad ts resources. Itruso detecto systems have tradtoally bee classfed as ether msuse-based or aomaly-based. Systems that use msuse-based techques cota a umber of attac descrptos, or sgatures, that are matched agast a stream of audt data loog for evdece of the modeled attacs. The audt data ca be gathered from the etwor [], from the operatg system, or from applcato log fles. Sgature-based systems have the advatage that they usually geerate few false postves (.e., correctly flaggg a evet as malcous whe t s legtmate. Ufortuately, they ca oly detect those attacs that have bee prevously specfed. That s, they caot detect trusos for whch they do ot have a predefed sgature Aomaly-based techques follow a approach that s complemetary wth respect to msuse detecto. These approaches rely o models, or profles, of the ormal behavour of users, applcatos ad etwor traffc. Devatos from the establshed models are terpreted as attacs. Aomaly detecto systems have the advatage that they are able to detfy prevously uow attacs. By defg a Correspodg Author:: MEHDI Merouae, Electrocs Departmet, Uversty of Blda, Algera 59 expected, ormal state, ay abormal behavor ca be detected, whether t s part of the threat model or ot. Ths capablty should mae aomaly-based systems a preferred choce. However, the advatage of beg able to detect prevously uow attacs s usually pad for terms of a large umber of false postves. Ths ca mae the system uusable by floodg ad evetually desestzg the system admstrator wth large umbers of correct alerts. We have detfed two ma problems that cotrbute to the large umber of false postves. Frst, the decso whether a evet should be classfed as aomalous or as ormal s made a smplstc way. Aomaly detecto systems usually cota a collecto of models that evaluate dfferet features of a evet. These models retur a aomaly score or a probablty value that reflects the ormalty of ths evet accordg to ther curret profles. However, the system s faced wth the tas of aggregatg the dfferet model outputs to a sgle, fal result. The secod problem of aomaly-based systems s that they caot dstgush betwee aomalous behavor caused by uusual but legtmate actos ad actvty that s the mafestato of a attac. Ths leads to the stuato where ay devato from ormal behavor s reported as suspcous, gorg

2 potetal addtoal formato that mght suggest otherwse []. Such addtoal formato ca be exteral to the system, receved from system health motors (e.g., CPU utlzato, memory usage, process status or other truso detecto sesors. Cosder the example of a IDS that motors a web server by aalyzg the system calls that the server process voes. A sudde jump CPU utlzato ad a cotuous crease of the memory allocated by the server process ca corroborate the belef that a certa system call cotas traces of a deal-of-servce attac [3]. Addtoal formato ca also be drectly related to the models, such as the cofdece a model output. Depedg o the ste-specfc structure of put evets, certa features mght ot be sutable to dstgush betwee legtmate ad malcous actvty. I such a case, the cofdece the output of the model based o these features should be reduced. I ths paper, we propose a ew model for truso detecto followg the aomaly detecto approach. We are especally terested formato systems that are smultaeously submtted to dfferet behavor profles. Typcal examples are mult-user applcatos ad computer systems or etwors carryg dfferet commucato protocols. I such cases, audt data reflectg actos or system states assocated wth each system behavor profle usually ca ot be separated a pror. Moreover, t s sometmes eve mpossble to ow how may profles are preset the system behavor. The proposed IDS model s teded to deal wth both stuatos. Aomaly IDS desg cossts of three ma steps. Frst, t s ecessary to buld a referece behavor model for the motored system. I our case, ths referece behavor should be modeled from observed audt data descrbg the use of the system by a represetatve set of legtmate, o-malcous ettes. The am s to model dfferet ettes profles that could ot be separated a pror by a learg procedure. A parametrcal mxture model [4] s used to costruct a Bayesa classfcato procedure based o the observatos ad leads to the system behavor model. Usupervsed learg s accomplshed by fttg the mxture model parameters by the expectatomaxmzato (EM algorthm [4, 5]. As the model order may also be uow, a mmum etropy crtero s troduced to allow model order estmato [6]. The ext step cossts evaluatg audt data related to ew system actvtes to detect devatos betwee the curret ad the referece behavors. New observed data s compared to the referece model by meas of both a Bayesa classfcato ad cluster pertece evaluatos. As behavor ca chage, the behavor J. Computer Sc., 3 (5: 59-65, 007 model should be updated durg IDS operato. Ths s the last step. I our desg, the model update s doe by re-estmato of model parameters gve the ew data preseted to the system. The desg of the learg, detecto ad update phases usg Bayesa techques s the frst cotrbuto of the paper, the secod les the dscusso of real-tme capabltes of the proposed algorthms, especally the detecto ad update phase. Adaptatos of the detecto algorthm to the case of Gaussa mxture models are proposed, resultg a lear complexty for the detecto algorthm. Recursve parameter estmato s also proposed, as a possble alteratve to real-tme model update. IDS Model (Bayesa classfcato: The dea s to buld a behavor model that taes to accout multple use profles ad allows for a Bayesa classfcato of data as part of the detecto algorthm. A referece audt data set represetg the ormal system behavor s used to create the model wth a learg procedure. Before startg to descrbe the model, we should ote that audt data must be mapped to radom varables. Mappg audt data geerated by the system to radom varables, both durg extracto of referece data system behavor modelg ad system usage, s out of the scope of ths dscusso. Hereafter, we admt that audt data ca be represeted by a set of realzatos of a cotuous radom vector y, whose probablty dstrbuto fucto (PDF wll have to be modeled. Mxture Model ad EM-Algorthm: The PDF of the (d-dmesoal radom vector y, for whch realzatos are mapped from the audt data doma, are represeted by a parametrcal mxture model [4, 5]. I such models, the realzatos of y are regarded as beg trals of oe of the smple models desged by a erel probablty fucto, wth each erel fucto represetg the model of a use profle. Realzatos from y are ot clustered, e.g. the profle of each realzato y s ot observable. The mxture model fudametal expresso, gvg the probablty of y, ca be formally expressed as:,..., θ = g ( y, p( z = p( y θ θ ( where: P( z deotes the pror probablty that a data pot s geerated by mxture compoet, y s the -th 60

3 observed data; z s the hdde vector that dcates whch source (profle the data comes from (e.g. z = f data comes from cluster ad z = 0, otherwse; g are erel dstrbuto fuctos wth respectve parameters θ, each of them modelg oe of the use profles; s the model order correspodg to the umber of sources beg modeled. The uow parameters the model (Eq. ( are the set of cluster probabltes p(z ad the parameters of erel dstrbuto fuctos of each cluster θ, represeted by µ = [ p( z, p( z,..., p( z, θ, θ,.., θ ] ( The mxture model represeted by ( has bee creasgly used to model the dstrbuto of a wde varety of supposed radom pheomea [7]. A teratve algorthm of optmzg the uow vector µ by a maxmum lelhood (ML crtero has bee defed ad s also called the expectato-maxmzato (EM algorthm [5, 6]. Let: Y = [ y, y,..., y ] T m (3 Where the subscrpts,, deote a observed m- dmesoal realzato vector of y (that has to be J. Computer Sc., 3 (5: 59-65, geeral dstrbutos (g by the ormal dstrbuto (represeted by φ ad the dstrbuto parameters θ by the mea vector (µ ad covarace matrx (R, as stated at Eq. (4, where the probablty p(z are also replaced by the weghtg factor w, for otato smplcty. p( y = w φ ( y, µ, R (4 = For completeess, we provde the EM recurso equatos (Eq. (5-(6 for the Gaussa mxture models: p( y w φ ( y, µ, R = w ' φ ( y, µ ', R ' ' = / = + = p( y y / p( = = (5 w + = p( y (6 µ y (7 + + T p( y ( y µ ( y µ + = R = (8 p( y = modeled. Y s regarded as the referece data cotag represetatve ormal behavor formato ad s used.. Etropy-Based Estmato of Model Order to ft µ usg the EM algorthm. Ths algorthm permts For the purpose of the EM-algorthm, the model both log-lelhood ad model parameter estmato to order (whch correspods to the umber of parttos be doe a teratve maer. The recursve process or data sources, whe usg parametrc mxture models should be repeated utl varato the estmated loglelhood betwee two cosecutve teratos becomes for parttog data must be provded. Sce the umber of parttos s ot ow a pror, t s useful to small, dcatg that the algorthm has coverged to a be able to estmate the most probable umber of (local maxmum of the log-lelhood data fucto, parttos, as well. gve that the realzato probabltes are expressed as Our objectve s to buld a deal parttog Eq. (. As the log-lelhood fucto evaluato at estmato for, whch should be regarded as havg the pot represeted by the parameter ftted by the the posteror probablty p( y (Eq. (5 the GMM EM-algorthm s ot guarateed to be a global case close to uty for oe value of ad close to zero maxmum, a fte umber of radom talzatos of for all the others, for each realzato. the parameters are realzed ad the EM-algorthm s As descrbed [7], ths deal parttog should be executed at dfferet tmes. The results (parameter obtaed by mmzg Shao etropy gve estmato correspodg to a maxmum log-lelhood observed data, whch ca be evaluated for each evaluato all executos are ept as the optmal observato by Eq. (9: model parameters ad are used durg detecto phase. H = p( y log( p( y (9 A detaled dscusso of the EM-algorthm s out of = the scope of ths paper, as t has already bee The expected value of ths etropy s evaluated extesvely dscussed the lterature. The reader s tag the mea of H over all observed data (Eq. (0: ased to refer to [5, 6] for a more geeral descrpto of the EM-algorthm. p( y log( p( y * = = (0 I the partcular case of Gaussa mxture models E ( H = (GMM, e.g. mxture model wth Gaussa erel Where: E* deotes a expectato estmator ad H fuctos, whch s used our expermets preseted s the measure questo. further, the Eq. ( should be rewrtte replacg the We proceed by fttg max models wth dfferet

4 J. Computer Sc., 3 (5: 59-65, 007 order ( =,,... max ad we evaluate the expected etropy (3 for each case. The resultg model a mmum of ths measure wll be cosdered the optmum model. The complete algorthm of the learg phase, used to obta a mxture model ftted wth the EM-algorthm ad wth optmal model order ( estmato ca be summarsed as follows: EM-Algorthm wth Model Order Estmato = 0, H opt = 0, opt =. = +. Ft the -order model to data usg the EM- Algorthm (Eqs. -7. Calculate expected value of H (Eq. (7. If H < H opt the H opt = H ; opt = ; ad µ = µ opt. If < max, the repeat (. Update actual model order wth optmal model order: = opt. Update actual model parameters µ wth optmal model parameters µ opt. Aomaly Detecto: Durg detecto, the behavor model has bee already ftted ad s avalable for fdg fereces a ew data preseted to the system. The am s to defe some pealty λ, whch vares from 0 to (e.g. 0 λ, dcatg the degree of ormalty cocerg ths realzato from certaly abormal (λ= 0 to a certaly ormal (λ = behavor. May dfferet approaches for defg such crtera from the behavor statstcal model represeted by Eq. ( are possble. We have defed a detecto procedure formed by two basc steps: a (Bayesa classfcato ferece ad a cluster pertece ferece [9]. The classfcato ferece s straghtforward for parametrcal mxture models ad cossts of evaluato of the posteror cluster probabltes codtoed to ew data y, p ( y', for = (,,..., ( Cluster pertece ferece s more complex. As all the erel dstrbutos used our model have a cotuous ature, cosderg data posteror probabltes codtoed to cluster probablty, p(y, by smple evaluato of the cluster probablty desty fucto s meagless. A more realstc approach cossts evaluatg the probablty of ew data beg cotaed some pertece terval (Π, defed as a fucto of cluster dstrbuto parameters (µ ad R, for stace ad the observato y, whch should be formally expressed as follows (Eq. (: p ( y' Π = g ( y, θ dπ ( Such probablty should, deed, loo le some d of cumulatve dstrbuto fucto, f we defe Π as stated Eq. (3, below [0] : Π = y µ d y R γ (3 R Where ad deote gve types of orm operators ad γ s a costat that should deped o y. Fally, detecto pealty should be defed as Eq. (4: λ ( y' = p( y' p( y' Π (4 = Model Upgradg: The behavor model should be updated to avod the rasg of erroeous alerts (false postves. Updatg should also be regarded as actualzato of smooth chages system behavor, as the basc model should become vald or complete case of expressve chages. I our approach, we smply update the estmato of model parameters. Thus, updatg s doe the cluster probabltes ad the erel parameters. Usual estmators ca be used for cotuous estmato of these model statstcs [0]. Note that both log-lelhood ad etropy should also be estmated ad compared wth prevous values (e.g. log-lelhood ad etropy obtaed after learg phase, as t could gve a dea about the goodess of the ew model whe compared to the referece oe. Real-Tme Capabltes: The learg procedure the referece behavor model costructo s usually executed off-le. Computato complexty costrats are ot strog at ths stage. However, t s usually desrable to have detecto ad update phases beg executed cotuously. Thus, the algorthms for detecto ad update should be desged for real-tme. I ths secto, we show how detecto ad updatg algorthms preseted above should be adapted for realtme executo. Although a formal performace evaluato of the proposed real-tme algorthms are stll progress, we regard them as havg a lear complexty, both wth respect to the umber of evets (ew data preseted to be aalyzed by the system ad wth respect to the model order. The IDS s desged to be mplemeted as software for executo a covetoal PC platform, wthout 6

5 eed of ay specal hardware for ehacg computatoal capacty. Thus, for real-tme evaluato, the processg power avalable for the IDS executo should be comparable wth those of a stadard PC. As a prelmary referece, IDS use-tesve systems should deal wth thousads or eve mllos of ew evets per secod. Real-tme detecto algorthm wth Gaussa Mxture Models s as follows. Eq. ( ca ot be usually evaluated aalytcally. A geeral soluto should use umercal evaluato that ca be prohbtve for hgher dmesos. Besdes, umercal evaluato s computato-tesve eve the oe-dmesoal or two-dmesoal cases, mag real-tme executo dffcult ad eve mpossble. Although Eq. ( would be dffcult for arbtrary erel fuctos g, a computatoal-effcet algorthm for evaluatg ths tegral equato ca be establshed for the partcular case of Gaussa dstrbuto. These algorthms, whch are dscussed ths secto, have bee successfully used the expermets, where we are essetally dealg wth Gaussa mxture models. Wheever GMM s beg used, evaluato of the Eq. ( ca be doe by coveet choce of the udefed elemets o Eq. (3. The dea s to defe Π as the complemetary space of the sodesty ellpsod ( R d, whose boudary cotas y ad s cetered µ. Ths meas that Π s bouded terally by a d-dmesoal ellpsodal surface formed by all pots havg the same desty as y ( e. g. φ ( y, µ, R = φ( y', µ, R (5 Thus, rewrtg of Eq.(3 gves Equato (6: d y R Π = ( y γ (6 αβ α [ R ] ( y µ µ α αβ β β T T Where: y = y, y,... ; µ = ( µ, µ,... µ ; [ R ] αβ ( y d s the elemet at α -th le ad β -th colum of the verse covarace matrx, ad γ s doe by (Eq. (7: ' γ =( yα µ α [ R ] ( yβ µ β (7 αβ αβ Ths strategy s llustrated for oe ad two dmesoal spaces as showed Fg ad, respectvely. The latter was tae from a bvarate Gaussa dstrbuto, wth dagoal covarace matrx. J. Computer Sc., 3 (5: 59-65, 007 d 63 Fg. : Π for cluster wth oe-dmesoal Gaussa dstrbuto Fg. : Π for a cluster wth bvarate Gaussa dstrbuto wth dagoal covarace matrx. Ths procedure ca be used eve the case of multvarate Gaussa dstrbutos wth urestrcted covarace matrx, as t s always possble to fd a lear trasformato that maps ay multvarate Gaussa dstrbuto a equvalet ew o correlated multvarate Gaussa dstrbuto wth same value for γ as the former dstrbuto [8]. As observed data ca belog to a multdmesoal space (R, a geeralzed dstace γ, defed Eq. (8, s troduced. Ths leads to a ormalzato of the probabltes expressed by Eq.( data models belogg to dfferet dmesoal spaces, allowg computato of probabltes to be reduced to the oe dmesoal space, whch ca be executed by a smple looup table procedure, mag computatoal complexty feasble real tme. γ = γ/ d (8 RESULTS AND DISCUSSION The proposed model was mplemeted ad evaluated wth artfcal data. Fgures 3 ad 4 preset results for a model traed from data extracted from depedet ad well-separated Gaussa sources. Model order ( has bee estmated by evaluato of mmum etropy for models wth varyg from to 3. Estmated etropy for each ad optmal model parameters are show as well. Fgures 3 ad 4 also preset the detecto pealty evaluated for a ew occurrece represetg, respectvely, a clearly ormal behavor ad a clearly aomalous behavor.

6 J. Computer Sc., 3 (5: 59-65, 007 Trag data cossts of all realzatos of the same operato all coectos logged durg the referece data extracto. The use of recursve loglelhood ad etropy estmato as a measure for motorg model degradato related wth behavor chages ad the assocated model update. I our prelmary expermets, the proposed IDS model has bee tested a stadard PC platform. Executo of detecto ad updatg algorthms were verfed for data rates of 500 requests per secod a thrd order model (=3. 0, 0,08 0,06 0 Etropy- 3D 0,09 3 Fg. 3: 3-cluster behavor model ad ormal behavor recogto. 0, 0,08 0,06 0 Etropy- 3D 0,09 3 Fg. 4: 3-cluster behavor model ad abormal behavor detecto. Cocluso Ths probablstc approach s a tetatve research o the possblty of applyg Bayesa usupervsed learg the detecto of etwor trusos. Based o usupervsed learg algorthms (Bayesa classfcato, some ovel detecto methods are proposed showg a very hgh detecto rate wth a reasoable true postve rate as results, much better tha the classc method. By trag wth usupervsed learg algorthms, amely, Bayesa classfcato procedure, the log aalyzer performs well dscoverg the heret ature of the dataset, clusterg smlar staces to the same classes. We have preseted a ew aomaly IDS desg usg a parametrc mxture model for behavor modelg ad Bayesa based detecto. Cotuous model update s accomplshed by model parameter re-estmato. Algorthms for detecto ad update phases are desged for real-tme operatos. Prelmary expermetatos show that proposed algorthms have some lmtatos such as that the erel dstrbutos are used to model umercal data wth cotuous ad ubouded ature, the Gaussa parametrcal model may ot be sutable for complex data ad that the use of mxed models assumes statstcal depedece betwee trals, whch ca be restrctve some cases. Despte these drawbacs the system presets real-tme feasblty wth o specal hardware requremet. Moreover, t s beg exteded to detect securty volatos a heterogeeous etwored evromet. The scalablty, performace ad fault tolerace ca be mproved whe moble agets perform dstrbuted detecto ad do ot eed a cetral locato where data s gathered. For stace, for wreless etwors such as Moble Ad hoc Networs are greatly proe to securty threats. Sce truso to the trasmsso support s relatvely easy, compared to fxed etwors, the use of such IDS s greatly recommeded. 64

7 J. Computer Sc., 3 (5: 59-65, 007 REFERENCES. H. Debar, M. Dacer ad A. Wesp, 999. A Revsed Taxoomy for Itruso-Detecto Systems, IBM Research Report.. C. rügel ad T. Toth, 00. Flexble, moble aget based truso detecto for dyamc etwors, Europea Wreless, Florece Italy. 3. H. Luo, P. Zerfos, J. og, S. Lu ad L. Zhag, 004. Self Securg Ad Hoc Wreless Networs, proceedg of the 7th Iter. Symp. O computers ad commucatos. 4. P. Cheesema ad J. Stutz, 996. Bayesa classfcato (Auto Class: theory ad results Advaces owledge Dscovery ad Data Mg, edted by U.M. Fayyad et al., Calfora: The AAAI Press, pp: A. P. Dempster, N. M. Lard ad D. B. Rub, 977. Joural of the Royal Statstcal Socety B 39, pp: G. J. McLachla, D. Peel,. E. Basford ad P. Adams, 999. Joural of Statstcal Software S. J. Roberts, R. Everso ad I. Reze, 999. Patter Recogto, 33:5, pp: Z. Marrach, 00. Détecto d Itruso Comportemetale das les Systèmes à Objets Réparts: Modélsato des Séqueces de Requêtes et de la Répartto de leurs Paramètres, PhD Thess, Uversté de Rees I. 9. Z. Marrach, L. Mé, B. Vvs ad B. Mor, 000. Flexble Itruso-Detecto Usg Varable- Legth Behavor Modelg Dstrbuted Evromet: Applcato to CORBA Objects, Proceedgs of 3rd Iteratoal Worshop o the Recet Advaces Itruso Detecto, pp: R. A. Johso, D.A. Wcher ad D. W. Wcher, 998. Appled Multvarate Statstcal Aalyss 4th Edto, Pretce-Hall, pp:

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

CIS603 - Artificial Intelligence. Logistic regression. (some material adopted from notes by M. Hauskrecht) CIS603 - AI. Supervised learning

CIS603 - Artificial Intelligence. Logistic regression. (some material adopted from notes by M. Hauskrecht) CIS603 - AI. Supervised learning CIS63 - Artfcal Itellgece Logstc regresso Vasleos Megalookoomou some materal adopted from otes b M. Hauskrecht Supervsed learg Data: D { d d.. d} a set of eamples d < > s put vector ad s desred output

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Common p-belief: The General Case

Common p-belief: The General Case GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

STOCHASTIC approximation algorithms have several

STOCHASTIC approximation algorithms have several IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

MODELLING OF STOCK PRICES BY THE MARKOV CHAIN MONTE CARLO METHOD

MODELLING OF STOCK PRICES BY THE MARKOV CHAIN MONTE CARLO METHOD ISSN 8-80 (prt) ISSN 8-8038 (ole) INTELEKTINĖ EKONOMIKA INTELLECTUAL ECONOMICS 0, Vol. 5, No. (0), p. 44 56 MODELLING OF STOCK PRICES BY THE MARKOV CHAIN MONTE CARLO METHOD Matas LANDAUSKAS Kauas Uversty

More information

Regression Analysis. 1. Introduction

Regression Analysis. 1. Introduction . Itroducto Regresso aalyss s a statstcal methodology that utlzes the relato betwee two or more quattatve varables so that oe varable ca be predcted from the other, or others. Ths methodology s wdely used

More information

We present a new approach to pricing American-style derivatives that is applicable to any Markovian setting

We present a new approach to pricing American-style derivatives that is applicable to any Markovian setting MANAGEMENT SCIENCE Vol. 52, No., Jauary 26, pp. 95 ss 25-99 ess 526-55 6 52 95 forms do.287/msc.5.447 26 INFORMS Prcg Amerca-Style Dervatves wth Europea Call Optos Scott B. Laprse BAE Systems, Advaced

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Reinsurance and the distribution of term insurance claims

Reinsurance and the distribution of term insurance claims Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace

More information

Load Balancing Control for Parallel Systems

Load Balancing Control for Parallel Systems Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:asa85@hotmal.com Abstract here s some very mportat meag the study of realtme

More information

Relaxation Methods for Iterative Solution to Linear Systems of Equations

Relaxation Methods for Iterative Solution to Linear Systems of Equations Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet gerry@me.pdx.edu Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Dimensionality Reduction and Model Selection for Click Prediction

Dimensionality Reduction and Model Selection for Click Prediction Dmesoalty Reducto ad Model Selecto for Clc Predcto Author: Aet Mtra 220594 Supervsor: dr. Aue Pot Supervsor: dr. Evert Haasd Reader: dr. Fetse Bma Faculty of Sceces Bassweg 52D 08 HV Amsterdam 034 AP Amsterdam

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

AP Statistics 2006 Free-Response Questions Form B

AP Statistics 2006 Free-Response Questions Form B AP Statstcs 006 Free-Respose Questos Form B The College Board: Coectg Studets to College Success The College Board s a ot-for-proft membershp assocato whose msso s to coect studets to college success ad

More information

Crosstalk Mitigation in DMT VDSL with Impulse Noise *

Crosstalk Mitigation in DMT VDSL with Impulse Noise * Crosstal Mtgato DMT VDSL wth Impulse Nose Huayu Da, Studet Member, IEEE, ad H Vcet Poor, Fellow, IEEE Departmet of Electrcal Egeerg, Prceto Uversty Prceto, NJ 08540 Tel: (609)58-4634 Fax: (609)58-1560

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Trend Projection using Predictive Analytics

Trend Projection using Predictive Analytics Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of

More information

Near Neighbor Distribution in Sets of Fractal Nature

Near Neighbor Distribution in Sets of Fractal Nature Iteratoal Joural of Computer Iformato Systems ad Idustral Maagemet Applcatos. ISS 250-7988 Volume 5 (202) 3 pp. 59-66 MIR Labs, www.mrlabs.et/jcsm/dex.html ear eghbor Dstrbuto Sets of Fractal ature Marcel

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information