Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)

Size: px
Start display at page:

Download "Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)"

Transcription

1 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei University of Engineering, Handan, China Junhu Ruan School of Econoics and Manageent, Hebei University of Engineering, Handan, China Abstract Networ security has close relationships with the physical environent of inforation carriers, inforation transission, inforation storage, inforation anageent and so on, and these relations have uch abiguity. Therefore, it is reasonable and scientific to apply fuzzy coprehensive evaluation ethod for networ security fuzzy evaluation. The core of networ security fuzzy evaluation is ebership degree transforation calculation. But the transforation ethods should be discussed, because redundant data in index ebership degree is also used to copute obect ebership degree, which is not useful for obect classification. The new algorith is: using data ining technology based on entropy to ine nowledge inforation about obect classification hidden in every index, affir the relationship of obect classification and index ebership, eliinate the redundant data in index ebership for obect classification by defining distinguishable weight and extract valid values to copute obect ebership. The new algorith of ebership degree transforation includes three calculation steps which can be suarized as effective, coparison and coposition, which is denoted as M(,2,3). The paper applied the new algorith in networ security fuzzy evaluation. Index Ters networ security, ebership degree transforation, fuzzy evaluation, M(,2,3) odel I. INTRODUCTION With the developent and universal application of coputer networs and counication technologies, our lives have been undergoing enorous changes. Internet and odern counications have brought us great convenience and speed. Our lives and wors are increasingly dependent on the, which provide us a variety of inforation. But at the sae tie, a new proble is also haunting us networ security. Networ security probles can be found in any areas such as coputer systes subected to virus infection and daage, coputer hacing activities, online political Hua Jiang, , Handan, China, [email protected] subversion activities, and so on. In view of this status quo, networ construction and aintenance personnel should tae preventive easures to solve networ security probles and iniize various networ security threats, so it is essential to evaluate networ syste security in advance. There are any factors that effect networ security such as hardware equipent, software systes, an-ade destruction, anageent syste, external environent and so on, which ultiately deterine the safety of networs together. And the relations aong these factors have uch abiguity, so it is reasonable and scientific to apply fuzzy coprehensive evaluation ethod for networ security fuzzy evaluation. Ref. [], according to the principles of scientificity, coprehensiveness, feasibility and coparability, set up a networ security evaluation index syste and used expert scoring ethod to deterine the ebership vectors of the base indexes on five evaluation grades, which fored networ security fuzzy evaluation atrix, as Table shows. The core of networ security fuzzy evaluation is ebership degree transforation calculation. But the existing transforation ethods including the ethod in Ref. [] should be discussed, because redundant data in index ebership degree is also used to copute obect ebership degree, which is not useful for obect classification. The new algorith is: using data ining technology based on entropy to ine nowledge inforation about obect classification hidden in every index, affir the relationship of obect classification and index ebership, eliinate the redundant data in index ebership for obect classification by defining distinguishable weight and extract valid values to copute obect ebership. The paper will apply the new algorith in networ security fuzzy evaluation. II. EXISTING MEMBERSHIP DEGREE TRANSFORMATION METHODS A. Fuzzy Logic The theoretical basis of fuzzy logic is fuzzy set theory, 29 ACADEMY PUBLISHER

2 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY which was first proposed by Lotfi Zadeh in 965 (Stefi 995) [2]. Fuzzy set theory was introduced to solve probles that are ipossible for classical set theory and two-valued logic. In the real world, people possess extensive abilities to deal with fuzzy nowledge, which ay be vague, iprecise, uncertain, abiguous, inexact or probabilistic in nature (Orchard 995). People are also able to reason and solve probles using this fuzzy nowledge. While it is difficult for traditional logic to represent these fuzzy concepts and siulate the fuzzy reasoning process, fuzzy logic overcoes this liitation by extending classical set theory and logic [3]. In traditional set theory, an eleent x in the universal set U either belongs to a set S or does not. Fuzzy set theory, on the other hand, allows an eleent x in universal set U to partially belong to a fuzzy set FS. A fuzzy set can be described by a characteristic function or ebership function. The ebership value of an eleent in that fuzzy set can vary fro. to.. A ebership value of. indicates that the eleent x has no ebership in the fuzzy set FS. On the other hand, a ebership value of. indicates that x has coplete ebership in FS. Using this idea, any fuzzy concepts can be represented readily. For exaple, suppose the universe of discourse of huan age is between and ; then the fuzzy concepts Young and Old can be expressed graphically as shown in Fig.. One point noticeable in fuzzy logic is that an eleent x can belong to a given fuzzy set S and its copleent S at the sae tie. This characteristic does not hold in traditional two-valued logic [4]. Fro Fig., it can be seen that when one is less than 2, this person is young (ebership is.). When this person gets older, his/her degree of being young decreases. Last, when he/she reaches the age 55 or so, this person is no longer young (ebership is ). The curve representing the fuzzy set Old can be explained siilarly. Consequently, a fuzzy variable can tae these fuzzy sets as its values. For exaple, if John s age is a fuzzy variable, it can tae on the values Young or Old. In practice two ost frequently adopted ethods to represent a ebership function are enueration representation and function representation. In certain situations, it is convenient to use a set of strict atheatical functions lie those illustrated in Fig. 2 to represent the ebership functions of a fuzzy set. Another ore coonly used approach is to siplify the Figure 2. Linear Function Representation of Fuzzy Set Young strict atheatical function by using a piecewise linear function (see Fig. 2 for an exaple) and to further represent the function by enueration. For exaple piecewise linear function for Young shown in Fig. 2 also could be expressed as: Young=(/., 2/., 3/.6, 4/.2, 5/., 6/., /.) B. Mebership Functions The ebership function of a fuzzy set is a generalization of the indicator function in classical sets. In fuzzy logic, it represents the degree of truth as an extension of valuation. Degrees of truth are often confused with probabilities, although they are conceptually distinct, because fuzzy truth represents ebership in vaguely defined sets, not lielihood of soe event or condition. Mebership functions were introduced by Zadeh in the first paper on fuzzy sets (965). For any set X, a ebership function on X is any function fro X to the real unit interval [, ]. Mebership functions on X represent fuzzy subsets of X. The ebership function which represents a fuzzy set A ~ is usually denoted by A. For an eleent x of X value A (x) is called the ebership degree of x in the fuzzy set A ~. The ebership degree A (x) quantifies the grade of ebership of the eleent x to the fuzzy set A ~. The value eans that x is not a eber of the fuzzy set; the value eans that x is fully a eber of the fuzzy set. The values between and characterize fuzzy ebers, which belong to the fuzzy set only partially [5]. Mebership function of a fuzzy set is shown as Fig. 3. Soeties [2], a ore general definition is used, where ebership functions tae values in an arbitrary fixed algebra or structure L; usually it is required that L be at least a poset or lattice. The usual ebership Figure. Graphical Representation of the Fuzzy Sets Young and Old Figure 3. Mebership function of a fuzzy set 29 ACADEMY PUBLISHER

3 326 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 functions with values in [,] are then called [,] valued ebership functions. C. Existing Mebership Degree Transforation Methods For a hierarchical structure, if obtaining ebership degree of i index belonging to C class, it can obtain ebership degree fro interediate level to top general goal Z belonging to C class. And every ebership degree transforation in every level can be suarized in the following ebership transforation odel: Suppose that there are indexes which affect obect Q, where the iportance weights λ of ( = ~ ) index about obect Q is given and satisfies: λ, = Q = λ () Every index is classified into p classes. C K represents the K th class and C K is prior to C K+. If the ebership K (Q ) of th index belonging to C K is given, where K = ~ P and = ~, and K (Q ) satisfies:, = (2) K P K = What is the ebership K (Q) of obect Q belonging to C K? Obviously, whether the above transforation ethod is correct or not deterines that the evaluation result is credible or not. For the above ebership transforationre are four transforation ethods in fuzzy coprehensive evaluation: M ( Λ, V ), M (, V ), M ( Λ, ) and M (, + ) [6]. However through a long-tie research on the application, only M (, + ) is accepted by ost researchers, which regards obect ebership as weighted su : ~ = = λ,( = p) (3) And the M (, + ) ethod as the ainstrea ebership transforation algorith is widely used [7-2]. And above ethod is basic ethod realizing ebership transforation fro universeu fuzzy set to universe V fuzzy set in fuzzy logical syste. But M (, + ) ethod is in dispute in acadeic circles especially in application field. For exaple, [3, 4] pointed out that the weighted su ethod was too siple and did not use inforation sufficiently. In [3], the authors proposed a subective and obective coprehensive ethod based on evidence deduction and rough sets theory to realize ebership transforation. In [4], in the iproved fuzzy coprehensive evaluation, a new coprehensive weight is defined to copute weighted su instead of index iportance weight. K However, including these entioned ethods, any existing ebership transforation ethods are not designed for obect classification, thus they can t indicate which parts in index ebership are useful for obect classification and which parts are useless. The redundancy of ebership degree transforation shows that: the correct ethod realizing ebership degree transforation is not found, which need further study. In order to delete the redundant data in existing ebership transforation ethods, we use data ining technology based on entropy [5-9] to ine nowledge inforation about obect classification hidden in every index, affir the relationship of obect classification and index ebership, eliinate the redundant data in index ebership for obect classification by defining distinguishable weight and extract valid values to copute obect ebership. III. THE NEW ALGORITHM OF MEMBERSHIP DEGREE TRANSFORMATION M(,2,3) Fro the viewpoint of classification, what are concerned ost are these following questions: Dose every index ebership play a role in the classification of obect Q? Are there redundant data in index ebership for the classification of obect Q? These questions are very iportant. Because their answers decide which index ebership and which value are qualified to copute ebership of obect Q. To find the answers, we analyze as follows. A. The Distinguishable Weight Assue that = 2 = L = p n th index ebership iplies that the probability of classifying obect Q into every grade is equal. Obviously, this inforation is of no use to the classification of obect Q. Deleting th index will not affect classification. Let α (Q) represent the noralized and quantized value describing th index contributes to classificationn in this case α =. 2 If there exists an integer K satisfying = and other eberships are zeron th index ebership iplies that Q can be only classified into C. In this case, th index contributes ost to classification and α (Q) should obtain its axiu value. 3 Siilarly, if (Q) is ore concentrated for K, th index contributes ore to classification, i.e., α (Q) is larger. Conversely, if (Q) is ore scattered for K, th index contributes less to classification, i.e., α (Q) is saller. The above ()~(3) show that α (Q), reflecting the value that th index contributes to classification, is decided by the extent (Q) is concentrated or scattered for K. And it can be described quantitatively 29 ACADEMY PUBLISHER

4 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY by the entropy H (Q). Therefore, α (Q) is a function of H (Q) : p H = log = (4) v = H (5) log p t t= α = ν ν ( = ~ ) (6) Definition : If (Q) ( = ~ p, = ~ ) is the ebership of th index belonging to C and satisfies Eq. (); by (4) (5) (6), α (Q) is called distinguishable weight of th index corresponding to Q. Obviously, α (Q) satisfies B. The Effective Value α, α = (7) = The significance of α (Q) lies in its distinguishing function, i.e., it is a easure that reveals the exactness of obect Q being classified by th index ebership and even the extent of the exactness. If α =, fro the properties of entropyn = 2 = L = p. This iplies th index ebership is redundant and useless for classification. Naturally the redundant index ebership can t be utilized to copute ebership of obect Q. Definition 2: If (Q) ( = ~ p, = ~ ) is the ebership of th index belonging to C and satisfies Eq. (), and α (Q) is the distinguishable weight of th index corresponding to Q n α ( = ~ p) (8) is called effective distinguishable value of K th class ebership of th index, or K th class effective value for short. If α =, it indicates that th index ebership is redundant and useless for the classification of obect Q, so it can not be utilized to copute ebership of obect Q. Note that if α = n α =. So in fact coputing K th class ebership (Q) of obect Q isn t to find (Q) but to find α. This is a crucial fact. When index ebership is replaced by effective value to copute obect ebership, distinguishable weight is a filter. In the progress of ebership transforation, it can delete the redundant index eberships that are useless in classification and the redundant values in index ebership. C. The Coparable Value Undoubtedly, α is necessary for calculating (Q). However the proble is in general K th class effective values of different indexes aren t coparable and can t be added directly. Because, for deterining K th class ebership of obect Q, in ost cases these effective values are different in unit iportance. The reason is, generally, index ebership doesn t iply relative iportance of different indexes. So when using K th class effective value to copute K th class ebership, K th effective value ust be transfored into K th class coparable effective value. Definition 3: If α is K th class effective value of th index, and β (Q) is iportance weight of th index related to obect Q n β α ( = ~ p) (9) is called coparable effective value of K th class ebership of th index, or K th class coparable value for short. Clearly, K th class coparable values of different indexes are coparable between each other and can be added directly. Definition 4: If β α is K th class coparable value of th index of Q, where ( = ~ ), then = M = β α ( = ~ p) () is naed K th class coparable su of obect Q. Obviously bigger M (Q) is ore possibly that obect Q belongs to C K. Definition 5: If M (Q) is K th class coparable su of obect Q, and (Q) is the ebership of obect Q belonging to n Δ C K p = M M ( = ~ p) () t= Obviously, given by Eq.(), ebership degree (Q) satisfies: t p = (2) = Up to now, supposing that index ebership and index iportance weight are given, by Eq. (4), (5), (6), (8), (9), (), () transforation fro index ebership to obect ebership is realized. And this transforation needs no prior nowledge and doesn t cause wrong classification inforation. The above ebership transforation ethod can be suarized as effective, coparison and coposition, M,2,3 [2]. which is denoted as 29 ACADEMY PUBLISHER

5 328 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 TABLE I. THE INDEX DATA OF NETWORK SECURITY FUZZY EVALUATION The goal The criterion level The factor level Mebership vectors (C, C 2, C 3, C 4, C 5 ) Networ security fuzzy evaluation S Physical security A (.33) Logical security A 2 (.46) Manageent security A 3 (.2) Surrounding roo environent B (.7) (.2,.6,.2,.,.) Teperature, huidity and cleanliness control B 2 (.3) (.5,.5,.,.,.) Fire prevention easures B 3 (.9) (.6,.4,.,.,.) Lightning prevention easures B 4 (.3) (.3,.6,.,.,.) Anti-static easures B 5 (.) (.7,.3,.,.,.) Power supply B 6 (.3) (.9,.,.,.,.) Free-standing equipent on ground and des fixed easures B 7 (.) (.,.3,.6,.,.) Heart touching settings B 8 (.8) (.,.6,.2,.,.) Servers, bacbone equipent and lines bacup strategies B 9 (.5) (.,.5,.4,.,.) Bacup of iportant data B 2 (.9) (.6,.4,.,.,.) Syste security audit B 22 (.8) (.3,.5,.2,.,.) Syste operation log B 23 (.6) (.,.2,.7,.,.) Data recovery echanis B 24 (.6) (.,.,.2,.5,.2) Data encryption B 25 (.3) (.8,.2,.,.,.) Inforation syste access control echaniss B 26 (.) (.6,.3,.,.,.) Syste software security B 27 (.4) (.2,.6,.2,.,.) Anti-hacing easures B 28 (.7) (.,.3,.4,.3,.) Anti-virus easures B 29 (.7) (.4,.4,.2,.,.) Inforation anageent security sector leaders and organization B 3 (.8) (.9,.,.,.,.) Inforation security syste B 32 (.2) (.4,.5,.,.,.) Inforation security personnel training easures B 33 (.9) (.2,.4,.3,.,.) Equipent and data anageent syste copleteness B 34 (.2) (.6,.4,.,.,.) Registration file syste B 35 (.) (.9,.,.,.,.) Anti-theft and anti-loss easures B 36 (.) (.,.,.2,.6,.2) Password anageent security syste B 37 (.7) (.3,.3,.4,.,.) Accident eergency plan B 38 (.) (.6,.3,.,.,.) IV. FUZZY EVALUATION ON NETWORK SECURITY BASED ON M(,2,3) A. Networ Security Fuzzy Evaluation Matrix According to Ref. [], we can the networ security fuzzy evaluation atrix in soe organization, as Table I shows. In Table I values in bracets behind corresponding indexes are their iportance weights; the vectors behind the base indexes are their ebership vectors including five grades: C (very good), C 2 (good), C 3 (general), C 4 (bad), and C 5 (very bad). The data in the table are fro Ref. []. B. Fuzzy Evaluation Steps Based on M(,2,3) Model ) Calculating the ebership vector of physical security A : A includes nine base indexes B ~ B9 evaluation atrix is: U ( A ) = ACADEMY PUBLISHER

6 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY According to the th row ( = ~ 9) A distinguishable weights of B are obtained and the distinguishable weight vector is: α A = ( ) of U In Table I iportance weight vector of B ~ B 9 is given: β ( A ) = ( ) 3 Calculate the K th coparable value of =,2 L9 and obtain the coparable value atrix B N ( A ) of A : N( A ) = According to N ( A ), calculate the K th coparable su of A and obtain the coparable su vector: M ( A ) = ( ) 5 According to M ( A ), calculate the ebership vector ( A ) of A : ( A ) = ( ) 2) Calculating the ebership vector of logical security A 2 : A 2 includes nine base indexes B 2 ~ B29 evaluation atrix is: U ( A 2 ) = According to the th row ( = ~ 9) of U A 2 distinguishable weights of B 2 are obtained and the distinguishable weight vector is: α ( 2 ) ) 2 In Table I iportance weight vector of B 2 ~ B 29 is given: β ( A 2 ) = ( ) 3 Calculate the K th coparable value of =,2 L9 and obtain the coparable value B 2 atrix N ( A 2 ) of A 2 :.8.22 N( A 2 ) = According to N ( A 2 ), calculate the K th coparable su of A 2 and obtain the coparable su vector: M ( A 2 ) = ( ) 5 According to M ( A 2 ), calculate the ebership vector ( A 2 ) of A 2 : ( A 2 ) = ( ) 3) Calculating the ebership vector of anageent security A 3 A 3 includes eight base indexes B 3 ~ B38 evaluation atrix is: U A 3 = According to the th row ( = ~ 8) of U A 3 distinguishable weights of B 3 are obtained and the distinguishable weight vector is: α A 3 = ( ) In Table I iportance weight vector of B 3 ~ B 38 is given: β ( A 3 ) = ( ) 29 ACADEMY PUBLISHER

7 33 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 3 Calculate the K th coparable value of =,2 L9 and obtain the coparable value B 3 atrix N ( A 3 ) of A 3 : N A 3 = According to N ( A 3 ), calculate the K th coparable su of A 3 and obtain the coparable su vector: M ( A 3 ) = ( ) 5 According to M ( A 3 ), calculate the ebership vector ( A 3 ) of A 2 : ( A 3 ) = ( ) 4) Networ security coprehensive evaluation atrix U ( S ) Fro the above three steps, we can get networ U S : security coprehensive evaluation atrix U = ( S ) ( A ) = ( A2 ) ( A3 ) In Table I iportance weight vector of B ~ B3 is given: β ( S) = ( ) So we can calculate the final ebership vector S of the goal S : ( S ) = ( ( S ),..., 5 ( S )) = ( ) C. Networ Security Recognition Because the classification of networ security evaluation grades is orderly, that is, C is superior to C +, so we apply confidence recognition rule to deterine the grade of networ security. λ λ >.7 is the confidence, calculate Let K in t ( S ) λ, 5. = t= And udge that S belongs the K th grade, of which t S t= the confidence degree is no lower than. In the exaple, according to the final ebership vector ( S ), we can udge that S belongs the C 2 (good), with the confidence degree 8.2%( =.82). In the Ref. [] final ebership vector of networ security evaluation is: ( S ) = ( ( S ),..., 5 ( S )) = ( ) The udgent result is the sae C 2 (good), but the confidence degree is only 73.64% ( =.7364). V. CONCLUSIONS The transforation of ebership degree is the ey coputation of fuzzy evaluation for ulti-indexes fuzzy decision-aing, but the existing transforation ethods have soe questions. The paper analyzes the reasons of the questions, obtains the solving ethod, and at last builds the M (, 2, 3) odel without the interference of redundant data, which is different fro M (, + ) and is a nonlinear odel. M (, 2, 3) provides the general ethod for ebership transforation of ulti indexes decisionaing in application fields. The theory value is that it provides transforation ethod which is coply to logics to realize the transforation universe fuzzy set to universe fuzzy set in fuzzy logical syste. Fro index ebership degree of base level, after obtain one index ebership degree vector in adacent upper level by M (,2,3 ), thus, by the sae coputation, obtaining ebership degree vector of top level. Because of noralization of coputation, M (,2,3 ) is suitable for ebership transforation which contains ulti-levels, ulti-indexes, large data. Security is a very difficult topic. Everyone has a different idea of what security ' is, and what levels of ris are acceptable. The ey for building a secure networ is to tae preventive easures to solve networ security probles and iniize various networ security threats, so it is essential to evaluate networ syste security in advance. The paper applies the new algorith in the fuzzy evaluation on networ security and exaple results also prove that M (, 2, 3) can iprove the evaluation accuracy and credibility. REFERENCES [] Zhang Xihai., The Application of Fuzzy Coprehensive Evaluation for Networ Security Evaluation, Naning University of Technology and Engineering, 26. [2] Zadeh L.A., "Fuzzy sets", Inforation and Control, 965(8), pp ACADEMY PUBLISHER

8 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY [3] LI Feng qi, XIE Jun, LI,Yao, New Methods of Fitting the Mebership Function of Oceanic Water Masses, Periodical of Ocean University of China, 24., pp.-9. [4] Jun Chen, Susan Bridges, Julia Hodges, Derivation of Mebership Functions for Fuzzy Variables Using Genetic Algoriths, 998. [5] atics) [6] QIN Shou-ang et, The Theory and Application of Coprehensive Evaluation, Beiing: electronic industry publishing house, 23, pp.24. [7] WANG You-qiang, CHEN Shun-qing, HUANG Bing-xi, The Reliability Study of Colliery Machine Coponents, Colliery Machine, 24, (2), pp [8] LV Ying-zhao, HE Shuan-hai, The Fuzzy Reliability Evaluation for Defect Reinforced Concrete on Bridges, Journal of Traffic and Transportation Engineering, 25, 5(4), pp [9] HU Sheng-wu, LI Chang-chun, WANG Xin-zhou, GIS Quality Coprehensive Assessent Based on Multi-level Fuzzy Evaluation, Journal of Yangtze River Scientific research, 25, 22(3), pp [] ZHENG Xian-bin, CHEN Guo-ing, Fuzzy Coprehensive Evaluation Research Based on FTA Oil and Gas Transport Vessel, Systes Engineering Theory & Practice, 25, (2), pp [] LI Hai-ling, LIU Ke-ian,LI Qian, The Research of Fuzzy Coprehensive Evaluation for Proect Ris, Journal of XI Hua University, 24, 24(6), pp [2] HUANG Yu-un, CUI Xin-yuan, JIA Sa-sa, Fuzzy Coprehensive Evaluation Research for Proect, Journal ZHE Jiang transportation college, 25,6(4), pp.-5. [3] HUANG Guang-long, YU Zhong-hua, Wu Zhao-tong, Subect-Obect Coprehensive Evaluation Based on Evidence Reasoning and Rough Set Theory, China Mechanical Engineering, 2, 2(8), pp: [4] GUO Jie, HU Mei-xin, The Iproveent of Fuzzy Evaluation Research for Proect Ris, Industrial Engineering Journal, 27, (3), pp [5] Jianwei Han, Micheline, Data Mining: Concepts and Techniques, CA: Morgan Kaufan Publisher, 2. [6] JIA Lin, LI Ming, The Losing Model of Custoers of Teleco Based on Data Mining, Coputer Engineering and Aapplication, 24, pp [7] YANG Wen-xian, REN Xing-in, QIN Wei-yang, Research of Coplex Equipent Fault Diagnosis Method, Journal of Vibration Engineering, 2, 3(5), pp [8] Zhang Weiqun., A Review and Forecast of the Study and Application of Data Digging, Statistics & Inforation Foru, 24, 9():,pp [9] Gao Yilong, Data Mining and Its Application in Engineering Diagnosis, Xi'an Jiaotong University, 2. [2] Liu Kai-Di, Pang Yan-Jun, Hao Ji-Mei, The Iproved Algorith of Fuzzy Coprehensive Evaluation for Vendor Selection of Iron and Steel Enterprises,. Statistics and Decision, 28(6), pp Hua. Jiang, born in , Handan, Hebei Province, China. In March, 26, graduated fro Hebei University of Engineering and obtained postgraduate qualifications. Main research fields: networ security, inforation anageent, supply chain anageent. Now wors in Inforation Manageent Departent, Econoics and Manageent School, Hebei University of Engineering, Lecturer. Mainly published articles: Jiang, Hua, Study on obile E-coerce security payent syste, Proceedings of the International Syposiu on Electronic Coerce and Security, ISECS 28, Aug , pp ; Jiang Hua, Ruan Junhu, Analysis of Influencing Factors on Perforance Measureent of the Supply Chain Based on SCOR-odel and AHM, IEEE/SOLI'28; Beiing, China October 2-5, 28, pp ; Xiaofeng Zhao, Hua Jiang, Liyan Jiao, A Data Fusion Based Intrusion Detection Model, International Syposiu on Education and Coputer Science (ECS29), 7-8 March, 29 Wuhan, Hubei, China (in press). Current research interests: anageent optiization and scientific decision-aing. Junhu. Ruan, born in , Zhouou, Henan Province, China. Postgraduate of Hebei University of Engineering. Main research fields: logistic and supply chain anageent, scientific evaluation and prediction. Published article: Jiang Hua, Ruan Junhu, Analysis of Influencing Factors on Perforance Measureent of the Supply Chain Based on SCOR-odel and AHM, IEEE/SOLI'28; Beiing, China October 2-5, 28, pp Current research interests: scientific evaluation and cobined forecasting. 29 ACADEMY PUBLISHER

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process IMECS 2008 9-2 March 2008 Hong Kong Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process Kevin K.F. Yuen* Henry C.W. au Abstract This paper proposes a fuzzy Analytic Hierarchy

More information

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu [email protected] Departent of Coputer

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

- 265 - Part C. Property and Casualty Insurance Companies

- 265 - Part C. Property and Casualty Insurance Companies Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,

More information

AUC Optimization vs. Error Rate Minimization

AUC Optimization vs. Error Rate Minimization AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

An improved TF-IDF approach for text classification *

An improved TF-IDF approach for text classification * Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: [email protected] An iproved TF-IDF approach for text classification

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]

More information

( C) CLASS 10. TEMPERATURE AND ATOMS

( C) CLASS 10. TEMPERATURE AND ATOMS CLASS 10. EMPERAURE AND AOMS 10.1. INRODUCION Boyle s understanding of the pressure-volue relationship for gases occurred in the late 1600 s. he relationships between volue and teperature, and between

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

A Multi-Core Pipelined Architecture for Parallel Computing

A Multi-Core Pipelined Architecture for Parallel Computing Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,

More information

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar: CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized

More information

An online sulfur monitoring system can improve process balance sheets

An online sulfur monitoring system can improve process balance sheets Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

130: Rule-based Expert Systems. Ajith Abraham Oklahoma State University, Stillwater, OK, USA 1 PROBLEM SOLVING USING HEURISTICS

130: Rule-based Expert Systems. Ajith Abraham Oklahoma State University, Stillwater, OK, USA 1 PROBLEM SOLVING USING HEURISTICS : Rule-based Expert Systes Ajith Abraha Oklahoa State University, Stillwater, OK, USA Proble Solving Using Heuristics 99 What are Rule-based Systes? 9 Inference Engine in Rule-based Systes 9 Expert Syste

More information

COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES

COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,

More information

Automatic Name-Face Alignment to Enable Cross-Media News Retrieval

Automatic Name-Face Alignment to Enable Cross-Media News Retrieval Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Autoatic ae-face Alignent to Enable Cross-Media ews Retrieval Yueie Zhang*, Wei Wu*, Yang Li*, Cheng Jin*, Xiangyang

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search

Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search VEHICULAR 2014 : The Third International Conference on Advances in Vehicular Systes, Technologies and Applications Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracing Systes Using Fast Orthogonal

More information

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find: HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:

More information

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 [email protected] www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

An Application Research on the Workflow-based Large-scale Hospital Information System Integration

An Application Research on the Workflow-based Large-scale Hospital Information System Integration 106 JOURNAL OF COMPUTERS, VOL. 6, NO. 1, JANUARY 2011 An Application Research on the Workflow-based Large-scale Hospital Inforation Syste Integration Yang Guojun School of Coputer, Neijiang Noral University,

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

A decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process

A decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process African Journal of Business Manageent Vol. 4(3), pp. 339-349, March 00 Available online at http://www.acadeicjournals.org/ajbm ISSN 993-833 00 Acadeic Journals Full Length Research Paper A decision odel

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information