ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

Save this PDF as:
Size: px
Start display at page:

Download "ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC"

Transcription

1 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical Uiversity of Ukraie Kiev Polytechic Istitute Pr. Pobedy.37, 356, Kiev, Ukraie 1 Abstract. I this paper we suggest a ew approach to desig of the adaptive etwork safety cotrol mechaisms. This approach is based o the fuzzy logic theory ad allows to formalize both quatitative ad qualitative parameters of the etwork safety system. Also it is suggested a algorithm for desig of the model for the adaptive etwork safety cotrol mechaism with safety fuctioal requiremets formalizatio o the fuzzy logic. Keywords: etwork, adaptive safety cotrol, security level, fuzzy logic. Itroductio The moder computer etworks are rather complex systems with the ext mai compoets: the hardware uits, the commuicatio liks, the etwork software ad the special supportig software tools. The developmet of the etwork techologies is cause that the reliability ad the safety of etwork resources become more ad more importat, especially for the etworks where are processig, accumulatig, trasferrig ad storig the data that must be secured. Nowadays, there is a set of ew arisig problems for the etwork safety assurace, that should be solved immediately. The etwork security mechaisms require the additioal hardware/software resources ad, cosequetly, they take additioal time for the iformatio processig i etwork. [1] Thus, the icreasig of the etwork security level causes the volume icreasig of service data, trasmitted ad processed i the etworks, so the etwork performace o the user s iformatio processig will decrease. O the other had, geerally there is o ecessity to provide the etwork safety o the maximum level costatly. I those periods of time, whe the etwork processes the less importat data, it is quite possible to lower the etwork security level, that will result i decreasig of the service iformatio volume ad will icrease the etwork performace o the user s data processig. Thus, the optimal way is to use the special mechaism for the etwork safety 413 cotrol, which will be adaptively determie the required etwork security level for the certai period, ad will icrease the efficiecy of the etwork fuctioig. So, the safety cotrol i the moder computer etworks requires a adjustable security mechaism that rus i a real-time mode. Such mechaism is adaptive cotrol of the etwork safety, that is based o the adaptive chagig of the etwork security level. The moder mechaisms for the adaptive etwork safety cotrol The realizatio of the adaptive etwork safety cotrol cocept is based o the adaptive cotrol meas that cotai the followig compoets: tools for the security level aalysis; tools for the attacks detectio; tools for the adaptatio; cotrol tools. The tools for the security level aalysis realize a evaluatio of the required security level accordig to the importace of the data that are processig i this period. The tools for the attacks detectio perform the revealig of the suspicious actios i the computer etworks. The adaptatio tools determie the required etworks security level for the certai period depedig o the processig iformatio importace. The cotrol tools coordiate the fuctioig of all compoets of the adaptive safety cotrol system for the computer etwork.

2 Thus, the adaptive cotrol system is complex cotrol mechaism that esures the required security level depedig o the processig iformatio importace i the real-time mode. The approaches to the adaptive etwork safety cotrol mechaisms desig At the preset time, there are two mai approaches to desig of the adaptive etwork safety cotrol: [2] 1. mechaisms that based o patters model; 2. mechaisms that based o the idetifier. We suggest to realize the adaptive safety cotrol mechaism o the patters model approach, ad as patters model there are the safety profiles, i.e. parameters of the etwork safety cofiguratio. The adaptive etwork safety cotrol system forms the safety profiles records o the experimetal data about the etwork security tools. [3, 4] The structure of the adaptive etwork safety cotrol system with the safety profiles records is show o fig. 1. Aalysis of etwork security parameters y c Adaptatio tools Δ Network security tools y r Safety profiles records Settig of required etwork safety parameters Figure 1. The adaptive etwork safety cotrol system with the safety profiles records. Let us cosider the specifics of this system fuctioig. Whe the etwork safety parameters are costat, there is o error of regulatio: Δ =y c y r =, ad the adaptatio mechaism is i a sleepig mode. If the etwork safety parameters are chaged (as reactio to variatio of the security level of the processig iformatio), there is a error of regulatio: Δ =y c y r, the adaptatio mechaism is lauched ad the parameters of etwork security system are chaged to the required values. So the goal of the adaptatio mechaism is to reduce the error of regulatio to zero (Δ ). The safety profiles records As it was metioed before, the safety profile is a set of the etwork security parameters, that determie the required etwork safety level. The profiles are geerated o the criteria for the iformatio security evaluatio. [5,6] The fuctioal criteria for the etwork security level 414

3 evaluatio accordig to ISO 1548: The commo criteria for iformatio techology security evaluatio are the ext: FAU:security audit, FCO: commuicatio, FCS:cryptographic support, FDP:user data protectio, FIA:idetificatio ad autheticatio, FMT: security maagemet, FPR:privacy, FPT:protectio of the TSF, FRU:resource utilizatio, FTA:TOE access, FTP: trusted path/chaels. [7] Besides the fuctioal criteria, the stadard ISO 1548 also defies the criteria for the safety guaratee, that allow to evaluate a correctess of the safety services realizatio, such as: ACM:cofiguratio maagemet, ADO:delivery ad operatio, ADV: developmet, AGD: guidace documets, ALC: life cycle support, ATE: tests, AVA: vulerability assessmet. Thus, the criteria for the etwork safety evaluatio are the set of quatitative ad qualitative requiremets to the security mechaisms. The adaptive etwork safety cotrol mechaism ca be effectively realized oly o the complete iformatio o the security system parameters. [8,9,1] Thus, the realizatio of the adaptive etwork safety cotrol requires to take ito cosideratio ot oly quatitative, but also qualitative criteria for the etwork safety. Accordig to the above metioed requiremets, we suggest to use the theory of fuzzy logic ad fuzzy sets for the adaptive etwork safety cotrol mechaisms realizatio. The algorithm for the adaptive etwork safety cotrol o the fuzzy logic Nowadays, there are o ay discrete algorithms that operate simultaeously with qualitative ad quatitative parameters to receive the determied result. The fuctioal (qualitative) criteria for the etwork security level evaluatio ca ot be adequately formalized without the fuzzy logic approach. The fuzzy logic theory allows formalize the decisios support eve i the o-uiform multi-dimesioal eviromet. [11] The descriptio of the etworks safety parameters usig the fuzzy logic theory allows 415 effectively to formalize ad to aalyze ot oly quatitative, but also the qualitative safety etwork parameters by represetatio them as x A= {x,μ A (x)}, where {x,μ A (x)} is pair of compoets (sigleto), that cosists from a elemet x ad its proximity degree μ A (x) to set. [12,13] We suggest to use the liguistic variables for the fuctioal criteria formalizatio for the etwork security level evaluatio. Geerally, the liguistic variable ca be characterized by a set of compoets: <x, T, D> where x is the ame of liguistic variable, T - its term-set or set of its possible values, D - the rage of these values. [14] The cocept of the etwork cotrol mechaism desig o the fuzzy logic based o the sythesis of the experimets plaig theory ad the fuzzy sets theory. The fuctioal criteria for the etwork security level evaluatio (for example, kowledge ad experiece of the experts) are formalized as polyomial: Y = β + βi i + i= 1 u, j= 1 β ju j u, (1) where Y the depeded liguistic variable, β i right fuzzy coefficiet, - the ame of liguistic variable, j u. The productive rules for the etwork security level evaluatio o the fuctioal criteria are i the implicative form "If, the, else ", ad the set of productive rules forms a orthogoal 2 -matrix, where is factors dimesio. We suggest the algorithm for desig of the progostic model for the adaptive etwork safety cotrol mechaism o the safety fuctioal requiremets formalizatio i the multi-dimesioal space. The suggested algorithm is realized i the followig steps: 1. The factors determiatio for the etwork safety cotrol mechaisms. 2. The opposite scale ad the terms for each factors delimitatio. 3. The geeratio of the matrix with the fuctioal criteria for the etwork security level evaluatio.

4 4. The geeratio of the liguistic variables for the formalizatio of the qualitative iformatio o the etwork safety. 5. The formig of factors polyomial for the fuctioal criteria formalizatio o the etwork safety: Y = β + βi i + i= 1 u, j= 1 β ju j u, (2) where j u. 6. The aalysis of the errors i the etwork safety cotrol mechaism fuctioig. 7. The evaluatio of the weights of the polyomial coefficiets for the fuctioal safety parameters formalizatio. 8. The adequacy aalysis of the formed polyomial to the adaptive etwork safety cotrol system. 9. The adequacy aalysis of the formed model for the etwork safety cotrol mechaism. 1. The accuracy aalysis of the formed model by the Fisher s criterio: F = S S < crit 2 r / 2 b F table (3) Thus, we suggest the approach to desig of the etwork safety cotrol mechaism model o the sythesis of the experimets plaig theory ad the fuzzy sets theory, ad also o the formalizatio of the fuctioal requiremets to the etwork safety. The decisios o the etwork safety cotrol are geeratig usig the progostic model of the adaptive etwork safety cotrol mechaisms ad the results of the precise solutios of the fuzzy equatios. Accordig to Zadeh s expasio priciple the fuzzy umber is the solutio of the fuzzy equatio F(, A 1,, A ) B, if t: F 1 (t) =, [ μ (x), μ (a1),..., μ (a)], μf( t) = sup mi A A F(,A,..., A ) = t 1 (4) where F(, A 1,, A ) - the value of the fuzzy fuctio from the fuzzy argumets, A 1,, A, B - kow fuzzy argumets, - ukow fuzzy argumets, μ F (t) the proximity degree of to set of argumets В. The value of fuzzy fuctio F ( 1, 2,, ) from the fuzzy argumets 1, 2,, is the fuzzy set with proximity degree fuctio μ F (t): sup mi [ μ (x), μ (a1),..., μ (a)] μf(t ) = F( 1,..., ) t 1 r = F(t ) = The aalysis of the etwork security mechaisms parameters (5) We have performed the parameters aalysis of the etwork security mechaisms of two types: first type is security mechaisms with the fixed security level, secod type is security mechaisms based o the adaptive safety cotrol approach. The results of this aalysis are show o Fig.2. ad Fig.3. Fig.2 shows, that the etwork security level i the security mechaism of the first type remais costat for the all period, ad for the safety guaratee of the processig data this level should be maximum high (1%). As a cosequece, the amout of computatioal operatios for the data security, which depeds o the etwork security level, also is o the maximal values costatly. (Fig. 3) The etwork security level i the security mechaisms of the secod type (o the adaptive safety cotrol approach) is chaged depedig o the required safety level for the data that are processig at the certai momet. So, it is rather frequetly appears that the etwork security level is less tha its the maximum possible value. I result, the amout of computatioal operatios for the data security also is chaged, ad the average amout of the computatioal operatios for data security is less tha for the security mechaism of the first type (Fig. 3). Thus, the performace of the user s data processig i computer etworks with the iformatio security systems based o the adaptive safety cotrol mechaism is reduced less, tha i the etworks that use the usual iformatio security mechaisms with the fixed security level. Therefore, the usig of the suggested approach to the iformatio security mechaism desig is effective. A A. 416

5 Network securitу level,% First type security mechaisms Secod type (adaptive) security mechaisms Time, h Figure 2. The etwork security level variatio i the time for two types of the security mechaisms. 1 9 Amout of computatioal operatio for data security, % First type security mechaisms Secod type (adaptive) security mechaisms Average operatios amout for adaptive security mechaisms Time, h Figure 3. The variatio i time of the computer operatios amout for data security for two types of the security mechaisms 417

6 Coclusio The realizatio of the etwork security mechaism o the adaptive safety cotrol approach allows flexibly determie the etwork security level, required for the certai period. I result, the average losses of the etwork performace for the user s data processig, that are ivoked by realizatio of the security mechaism, will be reduced. The efficiecy of the etwork security system with the adaptive safety mechaism ca be icreased usig the fuzzy logic. This approach allows, i particular, to formalize the fuctioal criteria for the etworks security level ad to aalyze the complete iformatio o the etwork security parameters. Refereces [1] Tolly K. (22) High-Speed Security. The Tolly Group. [2] Zhdaov A.A., Ryadovikov A.V. (2) Neuro Models i the Autoomous Adaptive Cotrol Method//Optical Memory ad Neural Network, Vol. 9, No 2, - pp [3] Guide for Productio of Protectio Profiles ad Security Targets. (2) ISO/JTC1/ SC27/N2449. DRAFT v.9. [4] Cotrolled Access Protectio Profile. (1999) Versio 1.d. U.S. Iformatio Systems Security Orgaizatio. U.S. Natioal Security Agecy. [5] Lee A. (21) Certificate Issuig ad Maagemet Compoets Family of Protectio Profiles. Versio 1.. U.S. Natioal Security Agecy, October 31. [6] Evaluatio Methodology for the Commo Criteria for Iformatio Techology Security Evaluatio. (22) versio 1.1a, 19 April. [7] Stadard ISO 1548: The commo criteria for iformatio techology security evaluatio. ISO Stadards Bookshop. [8] Iformatio techology Security techiques Protectio Profile registratio procedures. (21) ISO/IEC 15292:21. [9] Stoeburer G. (21) CSPP-OS - COTS Security Protectio Profile - Operatig Systems. Draft Versio U.S. Departmet of Commerce, NIST, February 5. [1] Sherida M., Sohmer E., Varum R. (2) A Goal VPN Protectio Profile For Protectig Sesitive Iformatio. Release 2.. // U.S. Natioal Security Agecy, 1 July. [11]. Babuska, R. (1998) Fuzzy Modelig for Cotrol. Bosto: Kluwer Academic Publishers 215 p. [12] Rotshtei A., ad Katefikov D. (1998). Idetificatio of No-Liear Objects by Fuzzy Kowledge Bases.// Cyberetics ad System Aalysis, N 5 (34). pp [13] Negevitsky M. (22) Artificial itelligece: a guide to itelliget systems. Addiso-Wesley, NY. 325 p. [14] Nesteruk G. Ph., ad Kupriyaov M. C. (23) Neural-fuzzy systems with fuzzy liks // Proc. of the VI-th It. Coferece SCM 23. St.-Petersburg, v.1. - pp

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Cantilever Beam Experiment

Cantilever Beam Experiment Mechaical Egieerig Departmet Uiversity of Massachusetts Lowell Catilever Beam Experimet Backgroud A disk drive maufacturer is redesigig several disk drive armature mechaisms. This is the result of evaluatio

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1184-1190. Research Article

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1184-1190. Research Article Available olie www.ocpr.com Joural of Chemical ad Pharmaceutical Research, 15, 7(3):1184-119 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 Iformatio systems' buildig of small ad medium eterprises

More information

Supply Chain Management

Supply Chain Management Supply Chai Maagemet LOA Uiversity October 9, 205 Distributio D Distributio Authorized to Departmet of Defese ad U.S. DoD Cotractors Oly Aim High Fly - Fight - Wi Who am I? Dr. William A Cuigham PhD Ecoomics

More information

EVALUATION OF THE EFFECTIVENESS OF THE QUALITY MANAGEMENT SYSTEM OF THE SERVICE ENTERPRISE

EVALUATION OF THE EFFECTIVENESS OF THE QUALITY MANAGEMENT SYSTEM OF THE SERVICE ENTERPRISE EVALUATION OF THE EFFECTIVENESS OF THE QUALITY MANAGEMENT SYSTEM OF THE SERVICE ENTERPRISE Rimatas Zajarskas, Juozas Ruževičius 2 Vilius Uiversity, Lithuaia, rimatas.zajarskas@gmail.com 2 Vilius Uiversity,

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

The Canadian Council of Professional Engineers

The Canadian Council of Professional Engineers The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig

More information

HCL Dynamic Spiking Protocol

HCL Dynamic Spiking Protocol ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

A Flexible Web-Based Publication Database

A Flexible Web-Based Publication Database A Flexible Web-Based Publicatio Database Karl Riedlig ad Siegfried Selberherr 2 Istitute of Sesor ad Actuator Systems 2 Istitute for Microelectroics Techische Uiversität Wie Gusshausstrasse 27-29 A-040

More information

LEASE-PURCHASE DECISION

LEASE-PURCHASE DECISION Public Procuremet Practice STANDARD The decisio to lease or purchase should be cosidered o a case-by case evaluatio of comparative costs ad other factors. 1 Procuremet should coduct a cost/ beefit aalysis

More information

Supply Chain Management

Supply Chain Management Supply Chai Maagemet Douglas M. Lambert, Ph.D. The Raymod E. Maso Chaired Professor ad Director, The Global Supply Chai Forum Supply Chai Maagemet is NOT a New Name for Logistics The Begiig of Wisdom Is

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Leveraging CMMI framework for Engineering Services

Leveraging CMMI framework for Engineering Services White Paper Leveragig CMMI framework for Egieerig Services Today, most OEMs adopt global product developmet leveragig global parters to respod to demads of global markets faster ad to realize competitive

More information

Chapter 1 INTRODUCTION TO MAINTENANCE AND REPLACEMENT MODELS

Chapter 1 INTRODUCTION TO MAINTENANCE AND REPLACEMENT MODELS 1 Chapter 1 INTRODUCTION TO MAINTENANCE AND REPLACEMENT MODELS 2 Chapter 1 INTRODUCTION TO MAINTENANCE AND REPLACEMENT MODELS 1.0 MAINTENANCE Maiteace is a routie ad recurrig activity of keepig a particular

More information

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

A Software System for Optimal Virtualization of a Server Farm 1

A Software System for Optimal Virtualization of a Server Farm 1 БЪЛГАРСКА АКАДЕМИЯ НА НАУКИТЕ BULGARIAN ACADEMY OF SCIENCES ПРОБЛЕМИ НА ТЕХНИЧЕСКАТА КИБЕРНЕТИКА И РОБОТИКАТА, 60 PROBLEMS OF ENGINEERING CYBERNETICS AND ROBOTICS, 60 София 2009 Sofia A Software System

More information

76 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 9 - NUMBER 1 - YEAR 2011 ISSN: 1690-4524

76 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 9 - NUMBER 1 - YEAR 2011 ISSN: 1690-4524 The Fuzzy ad Compartmet System Cocept for the Commuicatio System takig accout of the Hadicapped situatio M asahiroaruga DepartmetofHuma ad Iformatio Sciece,School ofiformatio Sciecead Techology,TokaiUiversity

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

RUT - development handbook 1.3 The Spiral Model v 4.0

RUT - development handbook 1.3 The Spiral Model v 4.0 2007-01-16 LiTH RUT - developmet hadbook 1.3 The Spiral Model v 4.0 Fredrik Herbertsso ABSTRACT The idea behid the spiral model is to do system developmet icremetally while usig aother developmet model,

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

Agency Relationship Optimizer

Agency Relationship Optimizer Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

Risk Factors Assessment for Software Development Project Based on Fuzzy Decision Making

Risk Factors Assessment for Software Development Project Based on Fuzzy Decision Making Factors Assessmet for Software Developmet Proect Based o Fuzzy Decisio Makig Shih-Tog Lu ad Shih-Heg Yu Abstract This study ivestigates ad idetifies the assessmet factors i software developmet proect risk

More information

Bond Valuation I. What is a bond? Cash Flows of A Typical Bond. Bond Valuation. Coupon Rate and Current Yield. Cash Flows of A Typical Bond

Bond Valuation I. What is a bond? Cash Flows of A Typical Bond. Bond Valuation. Coupon Rate and Current Yield. Cash Flows of A Typical Bond What is a bod? Bod Valuatio I Bod is a I.O.U. Bod is a borrowig agreemet Bod issuers borrow moey from bod holders Bod is a fixed-icome security that typically pays periodic coupo paymets, ad a pricipal

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15 AdaLab AdaLab Adaptive Automated Scietific Laboratory (AdaLab) Adaptive Machies i Complex Eviromets Start Date: 1.4.15 Scietific Backgroud The Cocept of a Robot Scietist Computer systems capable of origiatig

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

FortiGuard Fortinet s Global Security Research and Protection

FortiGuard Fortinet s Global Security Research and Protection SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft

More information

COMPUTING EFFICIENCY METRICS FOR SYNERGIC INTELLIGENT TRANSPORTATION SYSTEMS

COMPUTING EFFICIENCY METRICS FOR SYNERGIC INTELLIGENT TRANSPORTATION SYSTEMS Trasport ad Teleuicatio Vol, No 4, 200 Trasport ad Teleuicatio, 200, Volume, No 4, 66 74 Trasport ad Teleuicatio Istitute, Lomoosova, Riga, LV-09, Latvia COMPUTING EFFICIENCY METRICS FOR SYNERGIC INTELLIGENT

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

MTO-MTS Production Systems in Supply Chains

MTO-MTS Production Systems in Supply Chains NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

SIP Threats Detection System

SIP Threats Detection System SIP Threats Detectio System MIROSLAV VOZNAK, FILIP REZAC Departmet of Telecommuicatios VSB Techical Uiversity of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.vozak@vsb.cz, filip.rezac@vsb.cz

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Neolane Reporting. Neolane v6.1

Neolane Reporting. Neolane v6.1 Neolae Reportig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of

More information

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS STRATEGIC OUTCOMES PRACTICE TECHNICAL ADVISORY BULLETIN February 2011 FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS www.willis.com Natioal Fire Protectio Associatio (NFPA) #25 a mai

More information

AN INTELLIGENT MODEL FOR SALES AND INVENTORY MANAGEMENT

AN INTELLIGENT MODEL FOR SALES AND INVENTORY MANAGEMENT AN INTELLIGENT MODEL FOR SALES AND INVENTORY MANAGEMENT SYLVANUS O. ANIGBOGU, Ph.D. Associate Professor of Computer Sciece Departmet of Computer Sciece, Namdi Azikiwe Uiversity, Awka, Aambra State, 420001,

More information

Bio-Plex Manager Software

Bio-Plex Manager Software Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable

More information

Vulnerability test system for SIP network elements

Vulnerability test system for SIP network elements Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic

More information

THE ROLE OF BUSINESS INTELLIGENCE IN DECISION PROCESS MODELING

THE ROLE OF BUSINESS INTELLIGENCE IN DECISION PROCESS MODELING EJAE 2015, 12(2): 44-52 ISSN 2406-2588 UDK: 005.311.6 005.941 DOI: 10.5937/ejae12-8230 Origial paper/origiali auči rad THE ROLE OF BUSINESS INTELLIGENCE IN DECISION PROCESS MODELING Višja Istrat 1 *, Saja

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

Document Control Solutions

Document Control Solutions Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS

More information

Prof. Dr. Liggesmeyer, 2. Fault Tree Analysis (DIN 25424, IEC 61025) Reliability Block Diagrams (IEC 61078)

Prof. Dr. Liggesmeyer, 2. Fault Tree Analysis (DIN 25424, IEC 61025) Reliability Block Diagrams (IEC 61078) (icherheit ud Zuverlässigkeit eigebetteter ysteme) afety ad Reliability Aalysis Models: Overview Classificatio of afety / Reliability Aalysis Techiques Focused Property afety, Reliability, Availability...

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Design and Implementation of a Publication Database for the Vienna University of Technology

Design and Implementation of a Publication Database for the Vienna University of Technology Desig ad Implemetatio of a Publicatio Database for the Viea Uiversity of Techology Karl Riedlig Istitute of Idustrial Electroics ad Material Sciece, TU Wie, A-040 Viea karl.riedlig@tuwie.ac.at Abstract:

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information

Wells Fargo Insurance Services Claim Consulting Capabilities

Wells Fargo Insurance Services Claim Consulting Capabilities Wells Fargo Isurace Services Claim Cosultig Capabilities Claim Cosultig Claims are a uwelcome part of America busiess. I a recet survey coducted by Fulbright & Jaworski L.L.P., large U.S. compaies face

More information

AP Calculus AB 2006 Scoring Guidelines Form B

AP Calculus AB 2006 Scoring Guidelines Form B AP Calculus AB 6 Scorig Guidelies Form B The College Board: Coectig Studets to College Success The College Board is a ot-for-profit membership associatio whose missio is to coect studets to college success

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

e-trader user guide Introduction

e-trader user guide Introduction User guide e-trader user guide Itroductio At UK Geeral our aim is to provide you with the best possible propositio for you ad your customers. We believe i offerig brokers a choice of how they trade with

More information

Business Rules-Driven SOA. A Framework for Multi-Tenant Cloud Computing

Business Rules-Driven SOA. A Framework for Multi-Tenant Cloud Computing Lect. Phd. Liviu Gabriel CRETU / SPRERS evet Traiig o software services, Timisoara, Romaia, 6-10 dec 2010 www.feaa.uaic.ro Busiess Rules-Drive SOA. A Framework for Multi-Teat Cloud Computig Lect. Ph.D.

More information

A Software Reliability Growth Model for Three-Tier Client Server System

A Software Reliability Growth Model for Three-Tier Client Server System 2 Iteratioal Joural of Computer Applicatios (975 8887) A Software Reliability Growth Model for Three-Tier Cliet Server System Pradeep Kumar Iformatio Techology Departmet ABES Egieerig College, Ghaziabad

More information

Safety Requirements engineering and Proof of implementation

Safety Requirements engineering and Proof of implementation Presetatio to DVClub commuity October 20 th 2015 Safety Requiremets egieerig ad Proof of implemetatio Test ad Verificatio Solutios Deliverig Tailored Solutios for Hardware Verificatio ad Software Testig

More information

BaanERP (Grieg) The BEMIS V Cookbook (Structure, master data, and configuration of BEMIS V)

BaanERP (Grieg) The BEMIS V Cookbook (Structure, master data, and configuration of BEMIS V) BaaERP (Grieg) The BEMIS V Cookbook (Structure, master data, ad cofiguratio of BEMIS V) A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

Securing your business

Securing your business Iteratioal Chamber of Commerce The world busiess orgaizatio Securig your busiess A compaio for small or etrepreeurial compaies to the 2002 OECD Guidelies for the security of etworks ad iformatio systems:

More information

Trading rule extraction in stock market using the rough set approach

Trading rule extraction in stock market using the rough set approach Tradig rule extractio i stock market usig the rough set approach Kyoug-jae Kim *, Ji-youg Huh * ad Igoo Ha Abstract I this paper, we propose the rough set approach to extract tradig rules able to discrimiate

More information

Review: Classification Outline

Review: Classification Outline Data Miig CS 341, Sprig 2007 Decisio Trees Neural etworks Review: Lecture 6: Classificatio issues, regressio, bayesia classificatio Pretice Hall 2 Data Miig Core Techiques Classificatio Clusterig Associatio

More information

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization Ira. J. Chem. Chem. Eg. Vol. 6, No., 007 Sesitivity Aalysis of Water Floodig Optimizatio by Dyamic Optimizatio Gharesheiklou, Ali Asghar* + ; Mousavi-Dehghai, Sayed Ali Research Istitute of Petroleum Idustry

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Baan Finance Accounts Payable

Baan Finance Accounts Payable Baa Fiace Accouts Payable Module Procedure UP035A US Documetiformatio Documet Documet code : UP035A US Documet group : User Documetatio Documet title : Accouts Payable Applicatio/Package : Baa Fiace Editio

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

Assessment of the Board

Assessment of the Board Audit Committee Istitute Sposored by KPMG Assessmet of the Board Whe usig a facilitator, care eeds to be take if the idividual is i some way coflicted due to the closeess of their relatioship with the

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Composable Tools For Network Discovery and Security Analysis

Composable Tools For Network Discovery and Security Analysis Composable Tools For Network Discovery ad Security Aalysis Giovai Viga Fredrik Valeur Jigyu Zhou Richard A. Kemmerer Reliable Software Group Departmet of Computer Sciece Uiversity of Califoria Sata Barbara

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Agricultural & Agri-Business Grant Opportunities. Presented By: Connie Miner Grant Consultant

Agricultural & Agri-Business Grant Opportunities. Presented By: Connie Miner Grant Consultant Agricultural & Agri-Busiess Grat Opportuities Preseted By: Coie Mier Grat Cosultat NYS Dept. of Agriculture & Markets: Overview of eligibility requiremets: Agricultural & Farmlad Protectio Boards Erie

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers FUEL / VEHICLE TRACKING UNIT GPS trackig ad fuel moitorig solutio providers fuel moitorig ow olie.. Fu ckig el Tra ow o lie www.fueltracksidia.com 20 Chael GPS Receiver GSM/GPRS Commuicatio PRODUCT FEATURES

More information

Neolane Leads. Neolane v6.1

Neolane Leads. Neolane v6.1 Neolae Leads Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of this

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Page 1. Real Options for Engineering Systems. What are we up to? Today s agenda. J1: Real Options for Engineering Systems. Richard de Neufville

Page 1. Real Options for Engineering Systems. What are we up to? Today s agenda. J1: Real Options for Engineering Systems. Richard de Neufville Real Optios for Egieerig Systems J: Real Optios for Egieerig Systems By (MIT) Stefa Scholtes (CU) Course website: http://msl.mit.edu/cmi/ardet_2002 Stefa Scholtes Judge Istitute of Maagemet, CU Slide What

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information