Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)
|
|
|
- Alan Griffith
- 10 years ago
- Views:
Transcription
1 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei University of Engineering, Handan, China Junhu Ruan School of Econoics and Manageent, Hebei University of Engineering, Handan, China Abstract Networ security has close relationships with the physical environent of inforation carriers, inforation transission, inforation storage, inforation anageent and so on, and these relations have uch abiguity. Therefore, it is reasonable and scientific to apply fuzzy coprehensive evaluation ethod for networ security fuzzy evaluation. The core of networ security fuzzy evaluation is ebership degree transforation calculation. But the transforation ethods should be discussed, because redundant data in index ebership degree is also used to copute obect ebership degree, which is not useful for obect classification. The new algorith is: using data ining technology based on entropy to ine nowledge inforation about obect classification hidden in every index, affir the relationship of obect classification and index ebership, eliinate the redundant data in index ebership for obect classification by defining distinguishable weight and extract valid values to copute obect ebership. The new algorith of ebership degree transforation includes three calculation steps which can be suarized as effective, coparison and coposition, which is denoted as M(,2,3). The paper applied the new algorith in networ security fuzzy evaluation. Index Ters networ security, ebership degree transforation, fuzzy evaluation, M(,2,3) odel I. INTRODUCTION With the developent and universal application of coputer networs and counication technologies, our lives have been undergoing enorous changes. Internet and odern counications have brought us great convenience and speed. Our lives and wors are increasingly dependent on the, which provide us a variety of inforation. But at the sae tie, a new proble is also haunting us networ security. Networ security probles can be found in any areas such as coputer systes subected to virus infection and daage, coputer hacing activities, online political Hua Jiang, , Handan, China, [email protected] subversion activities, and so on. In view of this status quo, networ construction and aintenance personnel should tae preventive easures to solve networ security probles and iniize various networ security threats, so it is essential to evaluate networ syste security in advance. There are any factors that effect networ security such as hardware equipent, software systes, an-ade destruction, anageent syste, external environent and so on, which ultiately deterine the safety of networs together. And the relations aong these factors have uch abiguity, so it is reasonable and scientific to apply fuzzy coprehensive evaluation ethod for networ security fuzzy evaluation. Ref. [], according to the principles of scientificity, coprehensiveness, feasibility and coparability, set up a networ security evaluation index syste and used expert scoring ethod to deterine the ebership vectors of the base indexes on five evaluation grades, which fored networ security fuzzy evaluation atrix, as Table shows. The core of networ security fuzzy evaluation is ebership degree transforation calculation. But the existing transforation ethods including the ethod in Ref. [] should be discussed, because redundant data in index ebership degree is also used to copute obect ebership degree, which is not useful for obect classification. The new algorith is: using data ining technology based on entropy to ine nowledge inforation about obect classification hidden in every index, affir the relationship of obect classification and index ebership, eliinate the redundant data in index ebership for obect classification by defining distinguishable weight and extract valid values to copute obect ebership. The paper will apply the new algorith in networ security fuzzy evaluation. II. EXISTING MEMBERSHIP DEGREE TRANSFORMATION METHODS A. Fuzzy Logic The theoretical basis of fuzzy logic is fuzzy set theory, 29 ACADEMY PUBLISHER
2 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY which was first proposed by Lotfi Zadeh in 965 (Stefi 995) [2]. Fuzzy set theory was introduced to solve probles that are ipossible for classical set theory and two-valued logic. In the real world, people possess extensive abilities to deal with fuzzy nowledge, which ay be vague, iprecise, uncertain, abiguous, inexact or probabilistic in nature (Orchard 995). People are also able to reason and solve probles using this fuzzy nowledge. While it is difficult for traditional logic to represent these fuzzy concepts and siulate the fuzzy reasoning process, fuzzy logic overcoes this liitation by extending classical set theory and logic [3]. In traditional set theory, an eleent x in the universal set U either belongs to a set S or does not. Fuzzy set theory, on the other hand, allows an eleent x in universal set U to partially belong to a fuzzy set FS. A fuzzy set can be described by a characteristic function or ebership function. The ebership value of an eleent in that fuzzy set can vary fro. to.. A ebership value of. indicates that the eleent x has no ebership in the fuzzy set FS. On the other hand, a ebership value of. indicates that x has coplete ebership in FS. Using this idea, any fuzzy concepts can be represented readily. For exaple, suppose the universe of discourse of huan age is between and ; then the fuzzy concepts Young and Old can be expressed graphically as shown in Fig.. One point noticeable in fuzzy logic is that an eleent x can belong to a given fuzzy set S and its copleent S at the sae tie. This characteristic does not hold in traditional two-valued logic [4]. Fro Fig., it can be seen that when one is less than 2, this person is young (ebership is.). When this person gets older, his/her degree of being young decreases. Last, when he/she reaches the age 55 or so, this person is no longer young (ebership is ). The curve representing the fuzzy set Old can be explained siilarly. Consequently, a fuzzy variable can tae these fuzzy sets as its values. For exaple, if John s age is a fuzzy variable, it can tae on the values Young or Old. In practice two ost frequently adopted ethods to represent a ebership function are enueration representation and function representation. In certain situations, it is convenient to use a set of strict atheatical functions lie those illustrated in Fig. 2 to represent the ebership functions of a fuzzy set. Another ore coonly used approach is to siplify the Figure 2. Linear Function Representation of Fuzzy Set Young strict atheatical function by using a piecewise linear function (see Fig. 2 for an exaple) and to further represent the function by enueration. For exaple piecewise linear function for Young shown in Fig. 2 also could be expressed as: Young=(/., 2/., 3/.6, 4/.2, 5/., 6/., /.) B. Mebership Functions The ebership function of a fuzzy set is a generalization of the indicator function in classical sets. In fuzzy logic, it represents the degree of truth as an extension of valuation. Degrees of truth are often confused with probabilities, although they are conceptually distinct, because fuzzy truth represents ebership in vaguely defined sets, not lielihood of soe event or condition. Mebership functions were introduced by Zadeh in the first paper on fuzzy sets (965). For any set X, a ebership function on X is any function fro X to the real unit interval [, ]. Mebership functions on X represent fuzzy subsets of X. The ebership function which represents a fuzzy set A ~ is usually denoted by A. For an eleent x of X value A (x) is called the ebership degree of x in the fuzzy set A ~. The ebership degree A (x) quantifies the grade of ebership of the eleent x to the fuzzy set A ~. The value eans that x is not a eber of the fuzzy set; the value eans that x is fully a eber of the fuzzy set. The values between and characterize fuzzy ebers, which belong to the fuzzy set only partially [5]. Mebership function of a fuzzy set is shown as Fig. 3. Soeties [2], a ore general definition is used, where ebership functions tae values in an arbitrary fixed algebra or structure L; usually it is required that L be at least a poset or lattice. The usual ebership Figure. Graphical Representation of the Fuzzy Sets Young and Old Figure 3. Mebership function of a fuzzy set 29 ACADEMY PUBLISHER
3 326 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 functions with values in [,] are then called [,] valued ebership functions. C. Existing Mebership Degree Transforation Methods For a hierarchical structure, if obtaining ebership degree of i index belonging to C class, it can obtain ebership degree fro interediate level to top general goal Z belonging to C class. And every ebership degree transforation in every level can be suarized in the following ebership transforation odel: Suppose that there are indexes which affect obect Q, where the iportance weights λ of ( = ~ ) index about obect Q is given and satisfies: λ, = Q = λ () Every index is classified into p classes. C K represents the K th class and C K is prior to C K+. If the ebership K (Q ) of th index belonging to C K is given, where K = ~ P and = ~, and K (Q ) satisfies:, = (2) K P K = What is the ebership K (Q) of obect Q belonging to C K? Obviously, whether the above transforation ethod is correct or not deterines that the evaluation result is credible or not. For the above ebership transforationre are four transforation ethods in fuzzy coprehensive evaluation: M ( Λ, V ), M (, V ), M ( Λ, ) and M (, + ) [6]. However through a long-tie research on the application, only M (, + ) is accepted by ost researchers, which regards obect ebership as weighted su : ~ = = λ,( = p) (3) And the M (, + ) ethod as the ainstrea ebership transforation algorith is widely used [7-2]. And above ethod is basic ethod realizing ebership transforation fro universeu fuzzy set to universe V fuzzy set in fuzzy logical syste. But M (, + ) ethod is in dispute in acadeic circles especially in application field. For exaple, [3, 4] pointed out that the weighted su ethod was too siple and did not use inforation sufficiently. In [3], the authors proposed a subective and obective coprehensive ethod based on evidence deduction and rough sets theory to realize ebership transforation. In [4], in the iproved fuzzy coprehensive evaluation, a new coprehensive weight is defined to copute weighted su instead of index iportance weight. K However, including these entioned ethods, any existing ebership transforation ethods are not designed for obect classification, thus they can t indicate which parts in index ebership are useful for obect classification and which parts are useless. The redundancy of ebership degree transforation shows that: the correct ethod realizing ebership degree transforation is not found, which need further study. In order to delete the redundant data in existing ebership transforation ethods, we use data ining technology based on entropy [5-9] to ine nowledge inforation about obect classification hidden in every index, affir the relationship of obect classification and index ebership, eliinate the redundant data in index ebership for obect classification by defining distinguishable weight and extract valid values to copute obect ebership. III. THE NEW ALGORITHM OF MEMBERSHIP DEGREE TRANSFORMATION M(,2,3) Fro the viewpoint of classification, what are concerned ost are these following questions: Dose every index ebership play a role in the classification of obect Q? Are there redundant data in index ebership for the classification of obect Q? These questions are very iportant. Because their answers decide which index ebership and which value are qualified to copute ebership of obect Q. To find the answers, we analyze as follows. A. The Distinguishable Weight Assue that = 2 = L = p n th index ebership iplies that the probability of classifying obect Q into every grade is equal. Obviously, this inforation is of no use to the classification of obect Q. Deleting th index will not affect classification. Let α (Q) represent the noralized and quantized value describing th index contributes to classificationn in this case α =. 2 If there exists an integer K satisfying = and other eberships are zeron th index ebership iplies that Q can be only classified into C. In this case, th index contributes ost to classification and α (Q) should obtain its axiu value. 3 Siilarly, if (Q) is ore concentrated for K, th index contributes ore to classification, i.e., α (Q) is larger. Conversely, if (Q) is ore scattered for K, th index contributes less to classification, i.e., α (Q) is saller. The above ()~(3) show that α (Q), reflecting the value that th index contributes to classification, is decided by the extent (Q) is concentrated or scattered for K. And it can be described quantitatively 29 ACADEMY PUBLISHER
4 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY by the entropy H (Q). Therefore, α (Q) is a function of H (Q) : p H = log = (4) v = H (5) log p t t= α = ν ν ( = ~ ) (6) Definition : If (Q) ( = ~ p, = ~ ) is the ebership of th index belonging to C and satisfies Eq. (); by (4) (5) (6), α (Q) is called distinguishable weight of th index corresponding to Q. Obviously, α (Q) satisfies B. The Effective Value α, α = (7) = The significance of α (Q) lies in its distinguishing function, i.e., it is a easure that reveals the exactness of obect Q being classified by th index ebership and even the extent of the exactness. If α =, fro the properties of entropyn = 2 = L = p. This iplies th index ebership is redundant and useless for classification. Naturally the redundant index ebership can t be utilized to copute ebership of obect Q. Definition 2: If (Q) ( = ~ p, = ~ ) is the ebership of th index belonging to C and satisfies Eq. (), and α (Q) is the distinguishable weight of th index corresponding to Q n α ( = ~ p) (8) is called effective distinguishable value of K th class ebership of th index, or K th class effective value for short. If α =, it indicates that th index ebership is redundant and useless for the classification of obect Q, so it can not be utilized to copute ebership of obect Q. Note that if α = n α =. So in fact coputing K th class ebership (Q) of obect Q isn t to find (Q) but to find α. This is a crucial fact. When index ebership is replaced by effective value to copute obect ebership, distinguishable weight is a filter. In the progress of ebership transforation, it can delete the redundant index eberships that are useless in classification and the redundant values in index ebership. C. The Coparable Value Undoubtedly, α is necessary for calculating (Q). However the proble is in general K th class effective values of different indexes aren t coparable and can t be added directly. Because, for deterining K th class ebership of obect Q, in ost cases these effective values are different in unit iportance. The reason is, generally, index ebership doesn t iply relative iportance of different indexes. So when using K th class effective value to copute K th class ebership, K th effective value ust be transfored into K th class coparable effective value. Definition 3: If α is K th class effective value of th index, and β (Q) is iportance weight of th index related to obect Q n β α ( = ~ p) (9) is called coparable effective value of K th class ebership of th index, or K th class coparable value for short. Clearly, K th class coparable values of different indexes are coparable between each other and can be added directly. Definition 4: If β α is K th class coparable value of th index of Q, where ( = ~ ), then = M = β α ( = ~ p) () is naed K th class coparable su of obect Q. Obviously bigger M (Q) is ore possibly that obect Q belongs to C K. Definition 5: If M (Q) is K th class coparable su of obect Q, and (Q) is the ebership of obect Q belonging to n Δ C K p = M M ( = ~ p) () t= Obviously, given by Eq.(), ebership degree (Q) satisfies: t p = (2) = Up to now, supposing that index ebership and index iportance weight are given, by Eq. (4), (5), (6), (8), (9), (), () transforation fro index ebership to obect ebership is realized. And this transforation needs no prior nowledge and doesn t cause wrong classification inforation. The above ebership transforation ethod can be suarized as effective, coparison and coposition, M,2,3 [2]. which is denoted as 29 ACADEMY PUBLISHER
5 328 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 TABLE I. THE INDEX DATA OF NETWORK SECURITY FUZZY EVALUATION The goal The criterion level The factor level Mebership vectors (C, C 2, C 3, C 4, C 5 ) Networ security fuzzy evaluation S Physical security A (.33) Logical security A 2 (.46) Manageent security A 3 (.2) Surrounding roo environent B (.7) (.2,.6,.2,.,.) Teperature, huidity and cleanliness control B 2 (.3) (.5,.5,.,.,.) Fire prevention easures B 3 (.9) (.6,.4,.,.,.) Lightning prevention easures B 4 (.3) (.3,.6,.,.,.) Anti-static easures B 5 (.) (.7,.3,.,.,.) Power supply B 6 (.3) (.9,.,.,.,.) Free-standing equipent on ground and des fixed easures B 7 (.) (.,.3,.6,.,.) Heart touching settings B 8 (.8) (.,.6,.2,.,.) Servers, bacbone equipent and lines bacup strategies B 9 (.5) (.,.5,.4,.,.) Bacup of iportant data B 2 (.9) (.6,.4,.,.,.) Syste security audit B 22 (.8) (.3,.5,.2,.,.) Syste operation log B 23 (.6) (.,.2,.7,.,.) Data recovery echanis B 24 (.6) (.,.,.2,.5,.2) Data encryption B 25 (.3) (.8,.2,.,.,.) Inforation syste access control echaniss B 26 (.) (.6,.3,.,.,.) Syste software security B 27 (.4) (.2,.6,.2,.,.) Anti-hacing easures B 28 (.7) (.,.3,.4,.3,.) Anti-virus easures B 29 (.7) (.4,.4,.2,.,.) Inforation anageent security sector leaders and organization B 3 (.8) (.9,.,.,.,.) Inforation security syste B 32 (.2) (.4,.5,.,.,.) Inforation security personnel training easures B 33 (.9) (.2,.4,.3,.,.) Equipent and data anageent syste copleteness B 34 (.2) (.6,.4,.,.,.) Registration file syste B 35 (.) (.9,.,.,.,.) Anti-theft and anti-loss easures B 36 (.) (.,.,.2,.6,.2) Password anageent security syste B 37 (.7) (.3,.3,.4,.,.) Accident eergency plan B 38 (.) (.6,.3,.,.,.) IV. FUZZY EVALUATION ON NETWORK SECURITY BASED ON M(,2,3) A. Networ Security Fuzzy Evaluation Matrix According to Ref. [], we can the networ security fuzzy evaluation atrix in soe organization, as Table I shows. In Table I values in bracets behind corresponding indexes are their iportance weights; the vectors behind the base indexes are their ebership vectors including five grades: C (very good), C 2 (good), C 3 (general), C 4 (bad), and C 5 (very bad). The data in the table are fro Ref. []. B. Fuzzy Evaluation Steps Based on M(,2,3) Model ) Calculating the ebership vector of physical security A : A includes nine base indexes B ~ B9 evaluation atrix is: U ( A ) = ACADEMY PUBLISHER
6 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY According to the th row ( = ~ 9) A distinguishable weights of B are obtained and the distinguishable weight vector is: α A = ( ) of U In Table I iportance weight vector of B ~ B 9 is given: β ( A ) = ( ) 3 Calculate the K th coparable value of =,2 L9 and obtain the coparable value atrix B N ( A ) of A : N( A ) = According to N ( A ), calculate the K th coparable su of A and obtain the coparable su vector: M ( A ) = ( ) 5 According to M ( A ), calculate the ebership vector ( A ) of A : ( A ) = ( ) 2) Calculating the ebership vector of logical security A 2 : A 2 includes nine base indexes B 2 ~ B29 evaluation atrix is: U ( A 2 ) = According to the th row ( = ~ 9) of U A 2 distinguishable weights of B 2 are obtained and the distinguishable weight vector is: α ( 2 ) ) 2 In Table I iportance weight vector of B 2 ~ B 29 is given: β ( A 2 ) = ( ) 3 Calculate the K th coparable value of =,2 L9 and obtain the coparable value B 2 atrix N ( A 2 ) of A 2 :.8.22 N( A 2 ) = According to N ( A 2 ), calculate the K th coparable su of A 2 and obtain the coparable su vector: M ( A 2 ) = ( ) 5 According to M ( A 2 ), calculate the ebership vector ( A 2 ) of A 2 : ( A 2 ) = ( ) 3) Calculating the ebership vector of anageent security A 3 A 3 includes eight base indexes B 3 ~ B38 evaluation atrix is: U A 3 = According to the th row ( = ~ 8) of U A 3 distinguishable weights of B 3 are obtained and the distinguishable weight vector is: α A 3 = ( ) In Table I iportance weight vector of B 3 ~ B 38 is given: β ( A 3 ) = ( ) 29 ACADEMY PUBLISHER
7 33 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 3 Calculate the K th coparable value of =,2 L9 and obtain the coparable value B 3 atrix N ( A 3 ) of A 3 : N A 3 = According to N ( A 3 ), calculate the K th coparable su of A 3 and obtain the coparable su vector: M ( A 3 ) = ( ) 5 According to M ( A 3 ), calculate the ebership vector ( A 3 ) of A 2 : ( A 3 ) = ( ) 4) Networ security coprehensive evaluation atrix U ( S ) Fro the above three steps, we can get networ U S : security coprehensive evaluation atrix U = ( S ) ( A ) = ( A2 ) ( A3 ) In Table I iportance weight vector of B ~ B3 is given: β ( S) = ( ) So we can calculate the final ebership vector S of the goal S : ( S ) = ( ( S ),..., 5 ( S )) = ( ) C. Networ Security Recognition Because the classification of networ security evaluation grades is orderly, that is, C is superior to C +, so we apply confidence recognition rule to deterine the grade of networ security. λ λ >.7 is the confidence, calculate Let K in t ( S ) λ, 5. = t= And udge that S belongs the K th grade, of which t S t= the confidence degree is no lower than. In the exaple, according to the final ebership vector ( S ), we can udge that S belongs the C 2 (good), with the confidence degree 8.2%( =.82). In the Ref. [] final ebership vector of networ security evaluation is: ( S ) = ( ( S ),..., 5 ( S )) = ( ) The udgent result is the sae C 2 (good), but the confidence degree is only 73.64% ( =.7364). V. CONCLUSIONS The transforation of ebership degree is the ey coputation of fuzzy evaluation for ulti-indexes fuzzy decision-aing, but the existing transforation ethods have soe questions. The paper analyzes the reasons of the questions, obtains the solving ethod, and at last builds the M (, 2, 3) odel without the interference of redundant data, which is different fro M (, + ) and is a nonlinear odel. M (, 2, 3) provides the general ethod for ebership transforation of ulti indexes decisionaing in application fields. The theory value is that it provides transforation ethod which is coply to logics to realize the transforation universe fuzzy set to universe fuzzy set in fuzzy logical syste. Fro index ebership degree of base level, after obtain one index ebership degree vector in adacent upper level by M (,2,3 ), thus, by the sae coputation, obtaining ebership degree vector of top level. Because of noralization of coputation, M (,2,3 ) is suitable for ebership transforation which contains ulti-levels, ulti-indexes, large data. Security is a very difficult topic. Everyone has a different idea of what security ' is, and what levels of ris are acceptable. The ey for building a secure networ is to tae preventive easures to solve networ security probles and iniize various networ security threats, so it is essential to evaluate networ syste security in advance. The paper applies the new algorith in the fuzzy evaluation on networ security and exaple results also prove that M (, 2, 3) can iprove the evaluation accuracy and credibility. REFERENCES [] Zhang Xihai., The Application of Fuzzy Coprehensive Evaluation for Networ Security Evaluation, Naning University of Technology and Engineering, 26. [2] Zadeh L.A., "Fuzzy sets", Inforation and Control, 965(8), pp ACADEMY PUBLISHER
8 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY [3] LI Feng qi, XIE Jun, LI,Yao, New Methods of Fitting the Mebership Function of Oceanic Water Masses, Periodical of Ocean University of China, 24., pp.-9. [4] Jun Chen, Susan Bridges, Julia Hodges, Derivation of Mebership Functions for Fuzzy Variables Using Genetic Algoriths, 998. [5] atics) [6] QIN Shou-ang et, The Theory and Application of Coprehensive Evaluation, Beiing: electronic industry publishing house, 23, pp.24. [7] WANG You-qiang, CHEN Shun-qing, HUANG Bing-xi, The Reliability Study of Colliery Machine Coponents, Colliery Machine, 24, (2), pp [8] LV Ying-zhao, HE Shuan-hai, The Fuzzy Reliability Evaluation for Defect Reinforced Concrete on Bridges, Journal of Traffic and Transportation Engineering, 25, 5(4), pp [9] HU Sheng-wu, LI Chang-chun, WANG Xin-zhou, GIS Quality Coprehensive Assessent Based on Multi-level Fuzzy Evaluation, Journal of Yangtze River Scientific research, 25, 22(3), pp [] ZHENG Xian-bin, CHEN Guo-ing, Fuzzy Coprehensive Evaluation Research Based on FTA Oil and Gas Transport Vessel, Systes Engineering Theory & Practice, 25, (2), pp [] LI Hai-ling, LIU Ke-ian,LI Qian, The Research of Fuzzy Coprehensive Evaluation for Proect Ris, Journal of XI Hua University, 24, 24(6), pp [2] HUANG Yu-un, CUI Xin-yuan, JIA Sa-sa, Fuzzy Coprehensive Evaluation Research for Proect, Journal ZHE Jiang transportation college, 25,6(4), pp.-5. [3] HUANG Guang-long, YU Zhong-hua, Wu Zhao-tong, Subect-Obect Coprehensive Evaluation Based on Evidence Reasoning and Rough Set Theory, China Mechanical Engineering, 2, 2(8), pp: [4] GUO Jie, HU Mei-xin, The Iproveent of Fuzzy Evaluation Research for Proect Ris, Industrial Engineering Journal, 27, (3), pp [5] Jianwei Han, Micheline, Data Mining: Concepts and Techniques, CA: Morgan Kaufan Publisher, 2. [6] JIA Lin, LI Ming, The Losing Model of Custoers of Teleco Based on Data Mining, Coputer Engineering and Aapplication, 24, pp [7] YANG Wen-xian, REN Xing-in, QIN Wei-yang, Research of Coplex Equipent Fault Diagnosis Method, Journal of Vibration Engineering, 2, 3(5), pp [8] Zhang Weiqun., A Review and Forecast of the Study and Application of Data Digging, Statistics & Inforation Foru, 24, 9():,pp [9] Gao Yilong, Data Mining and Its Application in Engineering Diagnosis, Xi'an Jiaotong University, 2. [2] Liu Kai-Di, Pang Yan-Jun, Hao Ji-Mei, The Iproved Algorith of Fuzzy Coprehensive Evaluation for Vendor Selection of Iron and Steel Enterprises,. Statistics and Decision, 28(6), pp Hua. Jiang, born in , Handan, Hebei Province, China. In March, 26, graduated fro Hebei University of Engineering and obtained postgraduate qualifications. Main research fields: networ security, inforation anageent, supply chain anageent. Now wors in Inforation Manageent Departent, Econoics and Manageent School, Hebei University of Engineering, Lecturer. Mainly published articles: Jiang, Hua, Study on obile E-coerce security payent syste, Proceedings of the International Syposiu on Electronic Coerce and Security, ISECS 28, Aug , pp ; Jiang Hua, Ruan Junhu, Analysis of Influencing Factors on Perforance Measureent of the Supply Chain Based on SCOR-odel and AHM, IEEE/SOLI'28; Beiing, China October 2-5, 28, pp ; Xiaofeng Zhao, Hua Jiang, Liyan Jiao, A Data Fusion Based Intrusion Detection Model, International Syposiu on Education and Coputer Science (ECS29), 7-8 March, 29 Wuhan, Hubei, China (in press). Current research interests: anageent optiization and scientific decision-aing. Junhu. Ruan, born in , Zhouou, Henan Province, China. Postgraduate of Hebei University of Engineering. Main research fields: logistic and supply chain anageent, scientific evaluation and prediction. Published article: Jiang Hua, Ruan Junhu, Analysis of Influencing Factors on Perforance Measureent of the Supply Chain Based on SCOR-odel and AHM, IEEE/SOLI'28; Beiing, China October 2-5, 28, pp Current research interests: scientific evaluation and cobined forecasting. 29 ACADEMY PUBLISHER
Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
Fuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,
PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
Use of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
Method of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
Applying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises
Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:
An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship
Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
ASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]
An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration
International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration
International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process
IMECS 2008 9-2 March 2008 Hong Kong Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process Kevin K.F. Yuen* Henry C.W. au Abstract This paper proposes a fuzzy Analytic Hierarchy
Performance Evaluation of Machine Learning Techniques using Software Cost Drivers
Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise
An Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
An Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach
An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)
How To Get A Loan From A Bank For Free
Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,
Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
The Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
Managing Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]
Searching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
arxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
Optimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu [email protected] Departent of Coputer
Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
Online Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
- 265 - Part C. Property and Casualty Insurance Companies
Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses
Markovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy
Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,
AUC Optimization vs. Error Rate Minimization
AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC
Software Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
Efficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
An improved TF-IDF approach for text classification *
Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: [email protected] An iproved TF-IDF approach for text classification
Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during
Preference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]
( C) CLASS 10. TEMPERATURE AND ATOMS
CLASS 10. EMPERAURE AND AOMS 10.1. INRODUCION Boyle s understanding of the pressure-volue relationship for gases occurred in the late 1600 s. he relationships between volue and teperature, and between
Local Area Network Management
Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area
Construction Economics & Finance. Module 3 Lecture-1
Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset
SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008
SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting
Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
Real Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES
Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,
Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates
National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE
Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS
Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE
Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
Quality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
High Performance Chinese/English Mixed OCR with Character Level Language Identification
2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,
The Velocities of Gas Molecules
he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes
Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,
A Multi-Core Pipelined Architecture for Parallel Computing
Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,
CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:
CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized
An online sulfur monitoring system can improve process balance sheets
Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental
A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
6. Time (or Space) Series Analysis
ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,
130: Rule-based Expert Systems. Ajith Abraham Oklahoma State University, Stillwater, OK, USA 1 PROBLEM SOLVING USING HEURISTICS
: Rule-based Expert Systes Ajith Abraha Oklahoa State University, Stillwater, OK, USA Proble Solving Using Heuristics 99 What are Rule-based Systes? 9 Inference Engine in Rule-based Systes 9 Expert Syste
COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES
COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,
Automatic Name-Face Alignment to Enable Cross-Media News Retrieval
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Autoatic ae-face Alignent to Enable Cross-Media ews Retrieval Yueie Zhang*, Wei Wu*, Yang Li*, Cheng Jin*, Xiangyang
Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
Implementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
Image restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]
Presentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search
VEHICULAR 2014 : The Third International Conference on Advances in Vehicular Systes, Technologies and Applications Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracing Systes Using Fast Orthogonal
HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:
HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:
Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM
Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating
Equivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects
Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux
Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance
Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 [email protected] www.ene.ud.edu/escml/obsolescence.ht October 28, 21
An Application Research on the Workflow-based Large-scale Hospital Information System Integration
106 JOURNAL OF COMPUTERS, VOL. 6, NO. 1, JANUARY 2011 An Application Research on the Workflow-based Large-scale Hospital Inforation Syste Integration Yang Guojun School of Coputer, Neijiang Noral University,
Resource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
A decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process
African Journal of Business Manageent Vol. 4(3), pp. 339-349, March 00 Available online at http://www.acadeicjournals.org/ajbm ISSN 993-833 00 Acadeic Journals Full Length Research Paper A decision odel
How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
