A dynamic resource allocation decision model for IT security

Size: px
Start display at page:

Download "A dynamic resource allocation decision model for IT security"

Transcription

1 A dynamc resource allocaon decson model for IT secury Lof Hajjem 1, Salah Benabdallah 2, Fouad Ben Abdelazz 3 1 Graduae Suden, Insu Supéreur de Geson (ISG), Unversy of Tuns, Tuns, Tunsa (lof.hajjem@gmal.com) 2 Drecor of Insu Supéreur des Eudes Technologques en Communcaons de Tuns (Ise Com), Tuns, Tunsa (sba@supcom.rnu.n) 3 Professor, College of Engneerng, Amercan Unversy of Sharjah, Sharjah, Uned Arab Emraes. (fabdelazz@aus.edu) ABSTRACT Today, wh he connued growh n usng nformaon and communcaon echnologes (ICT) for busness purposes, busness organzaons become ncreasngly dependen on her nformaon sysems. Thus, hey need o proec hem from he dfferen aacks eplong her vulnerables. To do so, he organzaon has o use secury echnologes, whch may be proacve or reacve ones. Each secury echnology has a relave cos and addresses specfc vulnerables. Therefore, he organzaon has o pu n place he approprae secury echnologes se ha mnmzes he nformaon sysem s vulnerables wh a mnmal cos. Ths b-objecve problem wll be consdered as a resources allocaon problem (RAP) where secury echnologes represen he resources o be allocaed. However, he se of vulnerables may change, perodcally, wh he connual appearance of new ones. Therefore, he secury echnologes se should be fleble o face hese changes, n real me, and he problem becomes a dynamc one. In hs paper, we propose a harmony search based algorhm o solve he b-objecve dynamc resource allocaon decson model. Ths approach was compared o a genec algorhm and provded good resuls. Keywords: Dynamc resource allocaon, IT secury, Harmony search, Mulobjecve opmzaon 1. INTRODUCTION Securng he nformaon sysem s an mporan ask for an organzaon. In fac, he connued growh n usng nformaon and communcaon echnologes (ICT) for busness purposes makes busness organzaons ncreasngly dependen on her nformaon sysems. Any successful aack wll cause a serous loss of daa, servces, asses, busness operaons, ec. [7]. These aacks, whch can be made by nernal or eernal enes, eplo he vulnerables ha may es n he nformaon sysem. To face hese aacks, he organzaon has o overcome he nformaon sysem s vulnerables usng secury echnologes. Each one of he secury echnologes addresses specfc vulnerables. Therefore, he organzaon has o pu n place he approprae se of secury echnologes ha mnmzes he vulnerables of he nformaon sysem. Ths problem can be saed as a resource allocaon problem (RAP). A RAP s he process of allocang resources among varous projecs or busness uns wh a mamum prof and a mnmum cos [1]. In he proposed model, he secury echnologes represen he resources o be allocaed o he nformaon sysem o overcome s vulnerables. However, he se of vulnerables may change perodcally wh he connual appearance of new ones. Therefore, he se of secury echnologes needs o be fleble o face hese changes. Thus, he problem, here, becomes a dynamc one, as he se of mplaned secury echnologes should be redefned n real me o face he new vulnerables appearng n he nformaon sysem. As a resul, he suded problem wll be saed as a dynamc resource allocaon problem (DRA). In addon, n hs problem we have o consder he cos of each secury echnology. Thus, he organzaon wans o mnmze he overall cos of he secury echnologes used o secure s nformaon sysem. The problem becomes a b-objecve one, where we have, o mnmze he number of vulnerables n he nformaon sysem wh he mnmum cos. Ths paper wll be saed as follows: he problem of nformaon sysem secury wll be descrbed, n he frs secon. Ne, n secon 3, he problem of IT secury, saed as a b-objecve dynamc resource allocaon problem, wll be defned and formulaed. Then, he harmony search approach wll be presened. Secon 5 wll be devoed o he adapaon of wo resoluon approaches, he harmony search algorhm and he genec algorhm. And n he las secon, a comparson of he wo approaches s descrbed. The paper fnshes by a concluson. 2. INFORMATION SYSTEM SECURITY 2.1 Why securng nformaon sysems?

2 The connued growh n he use of nformaon echnologes for busness purposes makes busness organzaons ncreasngly dependen on her nformaon sysems. In fac, he evoluon of nework echnologes perms an easy communcaon beween dfferen parners, ndependenly of her locaons. The communcaon may epose he parner s nformaon asses o dangerous hreas ha eplo he nformaon sysem vulnerables. An nformaon asse s defned as anyhng of value o he organzaon. I can be eher angble or nangble. Tangble asses nclude physcal nfrasrucure (such as servers and nework nfrasrucure) and sofware elemens of he nformaon sysem. Inangble asses nclude busness or oher dgal nformaon of value o he organzaon (such as bankng ransacons, neres calculaons, produc-developmen plans and specfcaons), organzaon knowledge, company repuaon and he nellecual propery sored whn he organzaonal sysem [7]. As can be seen, he asses are of grea mporance for he organzaon. However, hey are eposed o mulple hreas ha can be eher naural dsasers or human acs. The hreas caused by human can be non-malcous (e.g., mssng secury paches, openng a malcous emal, ec.) or malcous ones (e.g., hef, loss or desrucon of an organzaonal asse, unauhorzed access o he nework servces, nfecon wh malcous code, nsder hreas, hackers, errorss, ec.). Therefore, he organzaons need o secure her nformaon sysem agans he hreas ha may eplo a large number of vulnerables. In fac, s repored ha he secury research communy denfes and publshes on an average of 40 new secury vulnerables per week on varous producs, from operang sysems, daabases, applcaons o even neworkng devces [2]. Anoher sudy of he Compuer Emergency Response Team/Coordnaon Cener (CERT/CC) ndcaes ha he number of found vulnerables was from 345 o 5990 n he decade of [5]. Due o he large number of vulnerables, he number of aacks s growng n an mmeasurable way. In fac, he number of evens repored o CERT/CC was 2573 n In 2003, was n an asonshng number of secury ncdens. 2.2 Informaon secury echnologes Securng he nformaon sysems becomes a prory for he organzaons. In fac, any successful aack on he nformaon sysem and s evenual crash could resul n a serous loss of daa, servces and busness operaons. Therefore, he organzaons need o proec her nformaon sysems agans he evenual aacks ha may occur. To do so, hey need o use effcen nformaon secury echnologes ha perm he proecon of nformaon and mnmze he rsk of eposng o unauhorzed pares. There are wo famles of secury echnologes, proacve and reacve ones. A proacve nformaon secury echnology s a echnque ha akes prevenave measures n a bd o secure daa or resources before a secury breach can occur [8] (e.g. crypography, dgal sgnaure, vrual prvae nework, ec.). Whereas, a reacve nformaon secury echnology performs prevenve measures n a bd o secure daa or resources as soon as a secury breach s deeced [8] (e.g. frewalls, passwords, nruson deecon sysems, ec.). Each one of he secury echnologes addresses specfc vulnerables and has a relave cos. Thus, he organzaon has o pu n place he approprae se of secury echnologes ha mnmzes he nformaon sysem s vulnerables wh he mnmum cos, whch becomes a bg dlemma for. In fac, accordng o he Deparmen of Trade and Indusry (DTI) 2006 survey he average s around 4 o 5% of he organzaon s IT budge beng spen on secury soluons [7]. In hs paper, he problem of securng nformaon sysems wll be saed as a B-objecve Dynamc Resource Allocaon Problem. Ths decson model wll be defned, n he ne secon, and s mahemacal formulaon wll be descrbed. 3.1 Problem defnon 3. DECISION MODEL The problem of securng nformaon sysems wll be suded, n hs paper, as a RAP where he secury echnologes represen he se of resources. The problem can be saed as follows: Le V be he se of vulnerables of an nformaon sysem where: 1, f vulnerably s used by he nformaon sysem V of he organzaon, 0, Oherwse. Le S be a se of M secury echnologes ha may be pu n place by an organzaon where: S j 1, f secury js used by he nformaon sysem of he organzaon, 0, Oherwse. Each secury echnology s j has an assocaed cos C j. And le SV be he secury/vulnerably mar such ha: 1, f vulnerably s covered by secury j, SV [, j] 0, Oherwse. The problem, here, s o fnd he se of secury echnologes ha mnmzes he number of vulnerables of he nformaon sysem wh he mnmal cos. Ths problem wll be suded as a b-objecve one where we

3 have o: (1) Mnmze he number of vulnerables a any me perod, (2) Mnmze he oal cos of he secury echnologes o be used. In addon, he problem wll be suded dynamcally n order o be able o overcome he new vulnerables ha may appear, a each me. In fac, he organzaon needs o adap he se of mplaned secury echnologes, n real me, o he dfferen crcumsances ha may happen o he nformaon sysem, and wh he mnmal cos. 3.2 Mahemacal formulaon The problem of securng nformaon sysems consss on fndng he opmal combnaon of secury echnologes ha mnmzes he nformaon sysem s vulnerables, wh he mnmal cos. As defned n he las paragraph, s a b-objecve problem ha wll be saed as dynamc resource allocaon problem. Le R be he se of resdual vulnerables, where r s calculaed as follows: f v = 0 hen r = 0 f v = 1 and j s j = 1 and SV [, j] = 1, hen r = 0. f v = 1 and SV [, j] = 0 j s j = 1, hen r = 1. Where he frs condon ndcaes ha f vulnerably v s no presen n he organzaon s nformaon sysem (v =0) hen s no a resdual vulnerably. The second one sgnfes ha f vulnerably v s presen n he organzaon s nformaon sysem (v =1) and here ess a secury echnology s j used by he organzaon ha addresses hen s no a resdual vulnerably (r = 0). And he las equaon sgnfes ha f vulnerably v s presen n he organzaon s nformaon sysem (v =1) and here s no used secury echnology s j addressng hen s a resdual vulnerably (r =1). Therefore, he problem can be formulaed as follows: Subjec o Mn N ( ) r, 1,..., T R n v 1 (1) MnC ( S) C ( S ) c * s (2) n n j 1 qm qm, m 1,..., M, (3) f ( R 1, IS, S 1) IS 1 (4) r 0,1, 1,..., nv, 1,..., T (5) s j 0,1, j 1,..., ns, 1,..., T (6) Where n v and n s are he numbers of vulnerables and secury echnologes, respecvely. T represens he number of me perods. R s he se of resdual vulnerables a me perod. IS s he se of mplaned secury echnologes. And, S s he se of secury j j echnologes ha may be used by he organzaon. In hs formulaon, equaons (1) represen he objecve funcons of mnmzng he se of resdual vulnerables a each me perod. Ne, equaon (2) s he objecve funcon of mnmzng he overall cos of he secury echnologes. Then, equaons (3) are he resources sasfacon consrans. Fnally, equaon (4) ndcaes ha he se of mplaned secury echnologes a he (+1) h me perod s a funcon of he se of resdual vulnerables a he ( + 1) h me perod (R +1 ), he se of mplaned secury echnologes a he () h me perod (IS ), and he se of secury echnologes ha may be used by he organzaon a he (+1) h me perod (S T+1). For hs problem, a new me perod has o be consdered where a leas a new vulnerably s deeced n he organzaon s nformaon sysem. Ths problem was no well-suded n he leraure and few approaches were developed for some oher problems close o. Among hem, we can noe a genec algorhm ha was proposed o solve he sac b-objecve resource allocaon problem [4]. In addon, some mercs for quanfyng an ICT secury nvesmen are descrbed n [7]. 4. HARMONY SEARCH ALGORITHM 4.1 Algorhm descrpon The harmony search (HS) algorhm s developed o mae he muscan behavor ryng o mprove s muscal harmony pracce afer pracce usng he se of he pches played by each nsrumen. Ths process can be compared o he one of opmzng an objecve funcon eraon by eraon usng he values assgned for decson varables [6]. The HS algorhm ncludes fve seps: parameers nalzaon, he harmony memory (HM) nalzaon, he new harmony mprovsaon, he harmony memory updae and he check of ermnaon creron [3]. 4.2 Sep 1: Parameers nalzaon In hs sep, he opmzaon problem s specfed: Mnmze (or Mamze) f(); X, =1, 2,, N where: f() s an objecve funcon s he soluon vecor composed of decson varables X s he se of possble values for decson varable X = { (1), (2),..., (K)} for dscree varables N s he number of decson varables K s he number of possble values for each dscree varable The algorhm parameers are also specfed durng hs sep such as: The harmony memory sze(hms): s he number of soluon n he memory

4 The harmony memory consderng rae (HMCR); 0 HMCR 1; hs ypcal values range from 0.7 o 0.99 The pch adjusmen rae (PAR); 0 PAR 1; hs seleced values range s from 0.1 o 0.5 Improvsaons number or objecve funcons number 4.3 Sep 2: Harmony memory nalzaon Durng hs sep, HMS soluons are randomly generaed o form he harmony memory. Each decson varable () selecs a value from s correspondng ls (X). Then he fness values are calculaed for he generaed soluons (equaon 7) f( ) f( ) (7) HMS 1 HMS 1 HMS 1 HMS 1 HMS-1... f( ) 1 HMS HMS HMS HMS HMS... f( ) Sep 3: New harmony mprovsaon In hs sep, a new harmony vecor s generaed from he HM based on memory consderaons, pch adjusmens, and randomzaon, as shown n equaon 8: X, Where, HMCR (harmony memory consderaon rae) s he probably of choosng a value from he soluons sored n he HM. Whle (1- HMCR) s he probably of randomly choosng one feasble value from he se of all possble values for he correspondng decson varable. Whle mprovsng he new harmony, each value chosen from HM s eamned o deermne wheher should be pch-adjused. Ths procedure uses he PAR parameer ha ses he rae of adjusmen for he pch chosen from he HM as follows: 1 2 HMS ',,..., wh probably HMCR ' (8) ', wh probably (1- HMCR) Yes, wh probably PAR, Pch adjusng decson for ' (9) No, wh probably (1- PAR). The value of (1 - PAR) ses he rae of dong nohng. If he pch adjusmen decson for s YES, s replaced as follow: (10) where bw s an arbrary dsance bandwdh and rand() s a random number beween 0 and 1 or beween -1 and Sep 4: Harmony memory updae If he new harmony vecor s beer han he wors harmony n he HM, judged n erms of he objecve funcon value, he new harmony s ncluded n he HM and he esng wors harmony s ecluded from he HM. 4.6 Sep 5: Termnaon creron check If he soppng creron s sasfed, compuaon s ermnaed. Oherwse, Seps 3 and 4 are repeaed. The soppng crera may be eher mamum number of mprovsaons or a mamum number of eraon whou mprovemen of he soluon. 5. RESOLUTION APPROACHES To solve he problem of securng, n real me, an nformaon sysem agans he dfferen aacks ha may happen, wo mea-heurscs were developed, a harmony search algorhm and genec algorhm. These wo approaches are composed of wo phases, he sac and he dynamc one. The sac phase s appled for he nal sysem sae (=0). And he dynamc one s appled o face he new vulnerables ha may be found n he sysem. I should ake no consderaon he curren secury plan and he new secury echnologes ha may appear. 5.1 Harmony search algorhm The proposed HS algorhm for he sac phase can be descrbed as follows: Sep1. Parameers nalzaon: The mprovsaons number s equal o 2, as he suded problem s a bobjecve one. In addon, he harmony memory wll conan he non-domnaed soluons and s sze (HMS) wll be se o 50. The raes HMCR and PAR wll be se o 95% and 30%, respecvely. Sep2. Harmony memory nalzaon: In hs sep, 50 dfferen soluons wll be randomly generaed. The soluons generaon process wll be as follows: he secury echnologes wll be randomly seleced one by one unl a consrucon-soppng creron s verfed,.e. he oal cos eceeds a value Cma or he number of resdual vulnerables becomes less han a bound Nvmn. In order o ge a beer soluon qualy, a secury echnology s added only f covers a leas a resdual vulnerably. In addon, and whle generang he HM a new secury/vulnerably mar, noed SV wll be

5 consruced. I wll presen for each secury echnology he vulnerables ha covered, effecvely n he sysem. Tha s, for any secury echnology chosen n he consrucon process, he vulnerables ha were covered by wll be recorded. Sep3. New harmony mprovsaon: In hs sep, a new harmony s generaed based on he HMCR and PAR raes. The generaon process can be descrbed as follows: A resdual vulnerably s randomly seleced and accordng o he HMCR value, a secury echnology wll be chosen eher from SV or from SV,.e: SV', wh probably HMCR ' s seleced from (11) SV, wh probably (1- HMCR) Then, each me a secury echnology s seleced from SV, a pch adjusmen s performed wh a probably PAR. I consss on selecng a secury echnology from he ones ha was no appled for he curren vulnerables and f does no es, he selecon wll be done among he ones addressng he curren vulnerably. Sep4. Harmony memory updae: The generaed soluon wll be added o he HM f s no domnaed by any esng soluon. In addon, f s added o he HM, all he soluons domnaed by he new soluon wll be elmnaed. Sep5. Termnaon creron check: The Seps 3 and 4 are repeaed unl here s no mprovemen of he HM for 50 successve eraons. And he soluons of he HM wll consue he se of non-domnaed soluons. I conans he soluons ha can be adaped o he curren nformaon sysem. The proposed HS for he dynamc phase dffers from he one of he sac phase n Sep2, he harmony memory nalzaon. In fac, he process of generang he 50 dfferen nal soluons can be descrbed as follows: 40 soluons wll be generaed by randomly selecng one from he se of non-domnaed soluons, o whch oher secury echnologes are added unl he consruconsoppng crera s sasfed. The 10 remanng soluons are generaed randomly as descrbed n Sep2, n order o make a beer dversy n he search space. 5.2 Genec algorhm: The genec algorhm s a well-known mea-heursc ha was appled o a wde varey of sngle and mulobjecve opmzaon problems. I s characerzed of 2 man operaors, he crossover and he muaon operaors. The crossover operaor s appled o generae chldren from a par of parens seleced from he curren populaon. Each paren conrbues by a poron of s genec make-up o each chld. And he muaon operaor randomly changes a ny amoun of genec nformaon n each chld. The sac phase of he proposed genec algorhm can be descrbed as follows: An nal populaon of 50 soluons s generaed, smlarly o he HS algorhm (refer o Sep2). Then, wh a probably of 90%, a wo pon crossover operaor s appled o wo randomly seleced soluons from he populaon, o ge wo chldren. If he consrucon-soppng creron s no sasfed for a chld, he consrucon process wll connue n he same way of he consrucng he nal populaon process. Ne, wh a probably of 10%, he muaon operaor s appled o each chld. I consss on elmnang one of he secury echnology used by he soluon and connue he consrucon process by he remanng secury echnologes. Fnally, a chld s added o he populaon f s no domnaed by any esng soluon and f s added, all he soluons domnaed by wll be elmnaed. Ths process sops f here s no mprovemen of he populaon for 50 successve eraons. The fnal populaon wll consue he se of non-domnaed soluons. The dynamc phase s dencal o he one of he HS algorhm. 6. COMPUTATIONAL RESULTS In hs secon, he performances of he wo approaches are verfed for dfferen problem szes. To do so, he quales of non-domnaed soluons generaed by he wo echnques for dfferen nsances are evaluaed accordng o he C merc (coverage of wo ses) ha can be defned as follows [9]: Le A, B be wo non-domnaed soluons ses. The measure C maps he ordered par (A, B) no he range [0, 1]: b B/ aa: a domnaesb C ( A, B) (12) Ths merc calculaes, for a non-domnaed soluons se B, he percenage of soluons ha are domnaed by a leas a soluon of he non-domnaed soluons se A. When esng he wo approaches, s supposed ha here are, nally, 25 vulnerables and 40 secury echnologes, where each secury echnology addresses specfc vulnerables (he SV mar). Then, n each me perod new vulnerables and secury echnologes are added o he sysem and he SV mar s updaed. I s supposed ha a new vulnerably can be covered by an esng secury echnology or by a new one. In addon, a cos mar s generaed n such a way ha more s he number of covered vulnerables by a secury echnology, hgher s s relave cos. And fnally, s B

6 supposed ha oal cos allowed (Cma) s and he number of resdual vulnerables (Nvmn) should no be more han 3. The wo algorhms are eecued for 11 me perods and he resuls of he comparson are summarzed n Table1, where he row T represens he me perods. The row Sze s a par (secury, vulnerably) gvng he number of he secury echnologes ha may be used by he organzaon and he number of nformaon sysem s vulnerables. The column C(HS,GA) presens he frequency by whch he oucome of genec algorhm s domnaed by soluons generaed by he HS algorhm. The column C(GA,HS) gves he frequency by whch he oucome of he HS algorhm s domnaed by soluons generae by he GA. And he row Common Soluons gves he number of smlar soluons found by he wo algorhms. To deal he nformaon gven by able1 we ake as eample he me perod 1. There are 35 vulnerables n he nformaon sysem and he organzaon has o selec s secury plan among 55 secury echnologes. The resuls generaed by he 2 algorhms ndcae ha 33% of he soluons generaed by he GA are domnaed by a leas a soluon generaed by he HS algorhm. Whereas, here s no soluon generaed by he HS algorhm domnaed by he non-domnaed soluons of he GA. And here are 2 common soluons generaed by he wo algorhms. The resuls presened n Table1 ndcae ha he HS algorhm generaes n mos mes beer resuls han he GA. In fac, among he 11 me perods, he C measure value was n he favor of he HS algorhm for 8 mes agans once for he GA and 2 equales. Table1: Comparson of he wo approaches n erm of C measure values Tme Common Sze C(HS,GA) C(GA,HS) perod Soluons 0 (25, 40) 25% 0% 3 1 (35, 55) 33% 0% 2 2 (45, 70) 75% 25% 0 3 (55, 85) 50% 0% 2 4 (65, 100) 0% 0% 4 5 (75, 115) 0% 50% 2 6 (85, 130) 50% 0% 2 7 (95, 145) 100% 0% 0 8 (105, 160) 75% 25% 0 9 (115, 175) 50% 0% 2 10 (125, 190) 50% 50% 0 model n order o proec, n real me, he organzaons from he aacks frequenly occurrng. To solve hs problem, a harmony search algorhm and a genec algorhm were proposed. A comparson of he wo approaches, accordng o he C measure was esablshed. I ndcaes ha he HS algorhm gves beer resuls n mos me perods of he opmzaon process. REFERENCES [1] Ch-Mng, L. And Msuo G. Mulobjecve resource allocaon problem by mulsage decson-based hybrd genec algorhm, Appled Mahemacs and Compuaon, Vol. 187, No. 2, pp , [2] Eschelbeck, G., The Laws of Vulnerables: Whch secury vulnerables really maer?, Informaon Secury Techncal Repor., Vol. 10, No. 4, pp , [3] Geem, Z.W., Km, J.H., and Loganahan, G.V. A new heursc opmzaon algorhm: harmony search, Smulaon, Vol. 76, No. 2, pp , [4] Gupa, M., Rees, J., Chaurved, A., and Ch, J. Machng nformaon secury vulnerables o organzaonal secury profles: a genec algorhm approach, Decson Suppor Sysems, Vol. 41, No. 6, pp , [5] La, Y. and Hsa, P. Usng he vulnerably nformaon of compuer sysems o mprove he nework secury, Compuer Communcaons, Vol. 30, No. 9, pp , [6] Lee, K.S., and Geem, Z.W. A new srucural opmzaon mehod based on he harmony search algorhm, Compuers and Srucures, Vol. 82, No. 9-10, pp , [7] Rok, B., and Borka, J. B. Towards a sandard approach for quanfyng an ICT secury nvesmen, Compuer Sandards & Inerfaces, Vol. 30, No. 4, pp , [8] Vener H. S., and Eloff J. H. P., A aonomy for nformaon secury echnologes, Compuers & Secury, Vol. 22, No. 4, pp , [9] Zzler, E., Evoluonary Algorhms for Mulobjecve Opmzaon: Mehods and Applcaons, PhD hess, Swss Federal Insue of Technology, Zurch, CONCLUSION In hs paper, he problem of securng nformaon sysems was suded as b-objecve problem where we have o mnmze he nformaon sysem s vulnerables wh a mnmum cos. Ths problem was defned and formulaed as a dynamc resource allocaon decson

V.Abramov - FURTHER ANALYSIS OF CONFIDENCE INTERVALS FOR LARGE CLIENT/SERVER COMPUTER NETWORKS

V.Abramov - FURTHER ANALYSIS OF CONFIDENCE INTERVALS FOR LARGE CLIENT/SERVER COMPUTER NETWORKS R&RATA # Vol.) 8, March FURTHER AALYSIS OF COFIDECE ITERVALS FOR LARGE CLIET/SERVER COMPUTER ETWORKS Vyacheslav Abramov School of Mahemacal Scences, Monash Unversy, Buldng 8, Level 4, Clayon Campus, Wellngon

More information

Robustness Experiments with Two Variance Components

Robustness Experiments with Two Variance Components Naonal Insue of Sandards and Technology (NIST) Informaon Technology Laboraory (ITL) Sascal Engneerng Dvson (SED) Robusness Expermens wh Two Varance Componens by Ana Ivelsse Avlés avles@ns.gov Conference

More information

EEL 6266 Power System Operation and Control. Chapter 5 Unit Commitment

EEL 6266 Power System Operation and Control. Chapter 5 Unit Commitment EEL 6266 Power Sysem Operaon and Conrol Chaper 5 Un Commmen Dynamc programmng chef advanage over enumeraon schemes s he reducon n he dmensonaly of he problem n a src prory order scheme, here are only N

More information

Variants of Pegasos. December 11, 2009

Variants of Pegasos. December 11, 2009 Inroducon Varans of Pegasos SooWoong Ryu bshboy@sanford.edu December, 009 Youngsoo Cho yc344@sanford.edu Developng a new SVM algorhm s ongong research opc. Among many exng SVM algorhms, we wll focus on

More information

Graduate Macroeconomics 2 Problem set 5. - Solutions

Graduate Macroeconomics 2 Problem set 5. - Solutions Graduae Macroeconomcs 2 Problem se. - Soluons Queson 1 To answer hs queson we need he frms frs order condons and he equaon ha deermnes he number of frms n equlbrum. The frms frs order condons are: F K

More information

J i-1 i. J i i+1. Numerical integration of the diffusion equation (I) Finite difference method. Spatial Discretization. Internal nodes.

J i-1 i. J i i+1. Numerical integration of the diffusion equation (I) Finite difference method. Spatial Discretization. Internal nodes. umercal negraon of he dffuson equaon (I) Fne dfference mehod. Spaal screaon. Inernal nodes. R L V For hermal conducon le s dscree he spaal doman no small fne spans, =,,: Balance of parcles for an nernal

More information

Modeling and Solving of Multi-Product Inventory Lot-Sizing with Supplier Selection under Quantity Discounts

Modeling and Solving of Multi-Product Inventory Lot-Sizing with Supplier Selection under Quantity Discounts nernaonal ournal of Appled Engneerng Research SSN 0973-4562 Volume 13, Number 10 (2018) pp. 8708-8713 Modelng and Solvng of Mul-Produc nvenory Lo-Szng wh Suppler Selecon under Quany Dscouns Naapa anchanaruangrong

More information

Cubic Bezier Homotopy Function for Solving Exponential Equations

Cubic Bezier Homotopy Function for Solving Exponential Equations Penerb Journal of Advanced Research n Compung and Applcaons ISSN (onlne: 46-97 Vol. 4, No.. Pages -8, 6 omoopy Funcon for Solvng Eponenal Equaons S. S. Raml *,,. Mohamad Nor,a, N. S. Saharzan,b and M.

More information

In the complete model, these slopes are ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL. (! i+1 -! i ) + [(!") i+1,q - [(!

In the complete model, these slopes are ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL. (! i+1 -! i ) + [(!) i+1,q - [(! ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL The frs hng o es n wo-way ANOVA: Is here neracon? "No neracon" means: The man effecs model would f. Ths n urn means: In he neracon plo (wh A on he horzonal

More information

Genetic Algorithm in Parameter Estimation of Nonlinear Dynamic Systems

Genetic Algorithm in Parameter Estimation of Nonlinear Dynamic Systems Genec Algorhm n Parameer Esmaon of Nonlnear Dynamc Sysems E. Paeraks manos@egnaa.ee.auh.gr V. Perds perds@vergna.eng.auh.gr Ah. ehagas kehagas@egnaa.ee.auh.gr hp://skron.conrol.ee.auh.gr/kehagas/ndex.hm

More information

Dynamic Team Decision Theory. EECS 558 Project Shrutivandana Sharma and David Shuman December 10, 2005

Dynamic Team Decision Theory. EECS 558 Project Shrutivandana Sharma and David Shuman December 10, 2005 Dynamc Team Decson Theory EECS 558 Proec Shruvandana Sharma and Davd Shuman December 0, 005 Oulne Inroducon o Team Decson Theory Decomposon of he Dynamc Team Decson Problem Equvalence of Sac and Dynamc

More information

Online Supplement for Dynamic Multi-Technology. Production-Inventory Problem with Emissions Trading

Online Supplement for Dynamic Multi-Technology. Production-Inventory Problem with Emissions Trading Onlne Supplemen for Dynamc Mul-Technology Producon-Invenory Problem wh Emssons Tradng by We Zhang Zhongsheng Hua Yu Xa and Baofeng Huo Proof of Lemma For any ( qr ) Θ s easy o verfy ha he lnear programmng

More information

( ) () we define the interaction representation by the unitary transformation () = ()

( ) () we define the interaction representation by the unitary transformation () = () Hgher Order Perurbaon Theory Mchael Fowler 3/7/6 The neracon Represenaon Recall ha n he frs par of hs course sequence, we dscussed he chrödnger and Hesenberg represenaons of quanum mechancs here n he chrödnger

More information

New M-Estimator Objective Function. in Simultaneous Equations Model. (A Comparative Study)

New M-Estimator Objective Function. in Simultaneous Equations Model. (A Comparative Study) Inernaonal Mahemacal Forum, Vol. 8, 3, no., 7 - HIKARI Ld, www.m-hkar.com hp://dx.do.org/.988/mf.3.3488 New M-Esmaor Objecve Funcon n Smulaneous Equaons Model (A Comparave Sudy) Ahmed H. Youssef Professor

More information

THE PREDICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS

THE PREDICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS THE PREICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS INTROUCTION The wo dmensonal paral dfferenal equaons of second order can be used for he smulaon of compeve envronmen n busness The arcle presens he

More information

GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS. Youngwoo Ahn and Kitae Kim

GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS. Youngwoo Ahn and Kitae Kim Korean J. Mah. 19 (2011), No. 3, pp. 263 272 GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS Youngwoo Ahn and Kae Km Absrac. In he paper [1], an explc correspondence beween ceran

More information

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 4

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 4 CS434a/54a: Paern Recognon Prof. Olga Veksler Lecure 4 Oulne Normal Random Varable Properes Dscrmnan funcons Why Normal Random Varables? Analycally racable Works well when observaon comes form a corruped

More information

Solution in semi infinite diffusion couples (error function analysis)

Solution in semi infinite diffusion couples (error function analysis) Soluon n sem nfne dffuson couples (error funcon analyss) Le us consder now he sem nfne dffuson couple of wo blocks wh concenraon of and I means ha, n a A- bnary sysem, s bondng beween wo blocks made of

More information

Lecture VI Regression

Lecture VI Regression Lecure VI Regresson (Lnear Mehods for Regresson) Conens: Lnear Mehods for Regresson Leas Squares, Gauss Markov heorem Recursve Leas Squares Lecure VI: MLSC - Dr. Sehu Vjayakumar Lnear Regresson Model M

More information

Reactive Methods to Solve the Berth AllocationProblem with Stochastic Arrival and Handling Times

Reactive Methods to Solve the Berth AllocationProblem with Stochastic Arrival and Handling Times Reacve Mehods o Solve he Berh AllocaonProblem wh Sochasc Arrval and Handlng Tmes Nsh Umang* Mchel Berlare* * TRANSP-OR, Ecole Polyechnque Fédérale de Lausanne Frs Workshop on Large Scale Opmzaon November

More information

January Examinations 2012

January Examinations 2012 Page of 5 EC79 January Examnaons No. of Pages: 5 No. of Quesons: 8 Subjec ECONOMICS (POSTGRADUATE) Tle of Paper EC79 QUANTITATIVE METHODS FOR BUSINESS AND FINANCE Tme Allowed Two Hours ( hours) Insrucons

More information

Attribute Reduction Algorithm Based on Discernibility Matrix with Algebraic Method GAO Jing1,a, Ma Hui1, Han Zhidong2,b

Attribute Reduction Algorithm Based on Discernibility Matrix with Algebraic Method GAO Jing1,a, Ma Hui1, Han Zhidong2,b Inernaonal Indusral Informacs and Compuer Engneerng Conference (IIICEC 05) Arbue educon Algorhm Based on Dscernbly Marx wh Algebrac Mehod GAO Jng,a, Ma Hu, Han Zhdong,b Informaon School, Capal Unversy

More information

MANY real-world applications (e.g. production

MANY real-world applications (e.g. production Barebones Parcle Swarm for Ineger Programmng Problems Mahamed G. H. Omran, Andres Engelbrech and Ayed Salman Absrac The performance of wo recen varans of Parcle Swarm Opmzaon (PSO) when appled o Ineger

More information

PARTICLE SWARM OPTIMIZATION BASED ON BOTTLENECK MACHINE FOR JOBSHOP SCHEDULING

PARTICLE SWARM OPTIMIZATION BASED ON BOTTLENECK MACHINE FOR JOBSHOP SCHEDULING Proceedng 7 h Inernaonal Semnar on Indusral Engneerng and Managemen PARTICLE SWARM OPTIMIZATION BASED ON BOTTLENECK MACHINE FOR JOBSHOP SCHEDULING Rahm Mauldya Indusral Engneerng Deparmen, Indusral Engneerng

More information

CS 268: Packet Scheduling

CS 268: Packet Scheduling Pace Schedulng Decde when and wha pace o send on oupu ln - Usually mplemened a oupu nerface CS 68: Pace Schedulng flow Ion Soca March 9, 004 Classfer flow flow n Buffer managemen Scheduler soca@cs.bereley.edu

More information

UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 2017 EXAMINATION

UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 2017 EXAMINATION INTERNATIONAL TRADE T. J. KEHOE UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 27 EXAMINATION Please answer wo of he hree quesons. You can consul class noes, workng papers, and arcles whle you are workng on he

More information

Using Aggregation to Construct Periodic Policies for Routing Jobs to Parallel Servers with Deterministic Service Times

Using Aggregation to Construct Periodic Policies for Routing Jobs to Parallel Servers with Deterministic Service Times Usng Aggregaon o Consruc Perodc Polces for Roung Jobs o Parallel Servers wh Deermnsc Servce Tmes Jeffrey W. errmann A. James Clark School of Engneerng 2181 Marn all Unversy of Maryland College Park, MD

More information

Single-loop System Reliability-Based Design & Topology Optimization (SRBDO/SRBTO): A Matrix-based System Reliability (MSR) Method

Single-loop System Reliability-Based Design & Topology Optimization (SRBDO/SRBTO): A Matrix-based System Reliability (MSR) Method 10 h US Naonal Congress on Compuaonal Mechancs Columbus, Oho 16-19, 2009 Sngle-loop Sysem Relably-Based Desgn & Topology Opmzaon (SRBDO/SRBTO): A Marx-based Sysem Relably (MSR) Mehod Tam Nguyen, Junho

More information

Lecture 6: Learning for Control (Generalised Linear Regression)

Lecture 6: Learning for Control (Generalised Linear Regression) Lecure 6: Learnng for Conrol (Generalsed Lnear Regresson) Conens: Lnear Mehods for Regresson Leas Squares, Gauss Markov heorem Recursve Leas Squares Lecure 6: RLSC - Prof. Sehu Vjayakumar Lnear Regresson

More information

(,,, ) (,,, ). In addition, there are three other consumers, -2, -1, and 0. Consumer -2 has the utility function

(,,, ) (,,, ). In addition, there are three other consumers, -2, -1, and 0. Consumer -2 has the utility function MACROECONOMIC THEORY T J KEHOE ECON 87 SPRING 5 PROBLEM SET # Conder an overlappng generaon economy le ha n queon 5 on problem e n whch conumer lve for perod The uly funcon of he conumer born n perod,

More information

PARTICLE SWARM OPTIMIZATION FOR INTERACTIVE FUZZY MULTIOBJECTIVE NONLINEAR PROGRAMMING. T. Matsui, M. Sakawa, K. Kato, T. Uno and K.

PARTICLE SWARM OPTIMIZATION FOR INTERACTIVE FUZZY MULTIOBJECTIVE NONLINEAR PROGRAMMING. T. Matsui, M. Sakawa, K. Kato, T. Uno and K. Scenae Mahemacae Japoncae Onlne, e-2008, 1 13 1 PARTICLE SWARM OPTIMIZATION FOR INTERACTIVE FUZZY MULTIOBJECTIVE NONLINEAR PROGRAMMING T. Masu, M. Sakawa, K. Kao, T. Uno and K. Tamada Receved February

More information

On One Analytic Method of. Constructing Program Controls

On One Analytic Method of. Constructing Program Controls Appled Mahemacal Scences, Vol. 9, 05, no. 8, 409-407 HIKARI Ld, www.m-hkar.com hp://dx.do.org/0.988/ams.05.54349 On One Analyc Mehod of Consrucng Program Conrols A. N. Kvko, S. V. Chsyakov and Yu. E. Balyna

More information

TSS = SST + SSE An orthogonal partition of the total SS

TSS = SST + SSE An orthogonal partition of the total SS ANOVA: Topc 4. Orhogonal conrass [ST&D p. 183] H 0 : µ 1 = µ =... = µ H 1 : The mean of a leas one reamen group s dfferen To es hs hypohess, a basc ANOVA allocaes he varaon among reamen means (SST) equally

More information

Outline. Probabilistic Model Learning. Probabilistic Model Learning. Probabilistic Model for Time-series Data: Hidden Markov Model

Outline. Probabilistic Model Learning. Probabilistic Model Learning. Probabilistic Model for Time-series Data: Hidden Markov Model Probablsc Model for Tme-seres Daa: Hdden Markov Model Hrosh Mamsuka Bonformacs Cener Kyoo Unversy Oulne Three Problems for probablsc models n machne learnng. Compung lkelhood 2. Learnng 3. Parsng (predcon

More information

[ ] 2. [ ]3 + (Δx i + Δx i 1 ) / 2. Δx i-1 Δx i Δx i+1. TPG4160 Reservoir Simulation 2018 Lecture note 3. page 1 of 5

[ ] 2. [ ]3 + (Δx i + Δx i 1 ) / 2. Δx i-1 Δx i Δx i+1. TPG4160 Reservoir Simulation 2018 Lecture note 3. page 1 of 5 TPG460 Reservor Smulaon 08 page of 5 DISCRETIZATIO OF THE FOW EQUATIOS As we already have seen, fne dfference appromaons of he paral dervaves appearng n he flow equaons may be obaned from Taylor seres

More information

Econ107 Applied Econometrics Topic 5: Specification: Choosing Independent Variables (Studenmund, Chapter 6)

Econ107 Applied Econometrics Topic 5: Specification: Choosing Independent Variables (Studenmund, Chapter 6) Econ7 Appled Economercs Topc 5: Specfcaon: Choosng Independen Varables (Sudenmund, Chaper 6 Specfcaon errors ha we wll deal wh: wrong ndependen varable; wrong funconal form. Ths lecure deals wh wrong ndependen

More information

Performance Analysis for a Network having Standby Redundant Unit with Waiting in Repair

Performance Analysis for a Network having Standby Redundant Unit with Waiting in Repair TECHNI Inernaonal Journal of Compung Scence Communcaon Technologes VOL.5 NO. July 22 (ISSN 974-3375 erformance nalyss for a Nework havng Sby edundan Un wh ang n epar Jendra Sngh 2 abns orwal 2 Deparmen

More information

HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD

HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Journal of Appled Mahemacs and Compuaonal Mechancs 3, (), 45-5 HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Sansław Kukla, Urszula Sedlecka Insue of Mahemacs,

More information

ISSN MIT Publications

ISSN MIT Publications MIT Inernaonal Journal of Elecrcal and Insrumenaon Engneerng Vol. 1, No. 2, Aug 2011, pp 93-98 93 ISSN 2230-7656 MIT Publcaons A New Approach for Solvng Economc Load Dspach Problem Ansh Ahmad Dep. of Elecrcal

More information

APOC #232 Capacity Planning for Fault-Tolerant All-Optical Network

APOC #232 Capacity Planning for Fault-Tolerant All-Optical Network APOC #232 Capacy Plannng for Faul-Toleran All-Opcal Nework Mchael Kwok-Shng Ho and Kwok-wa Cheung Deparmen of Informaon ngneerng The Chnese Unversy of Hong Kong Shan, N.T., Hong Kong SAR, Chna -mal: kwcheung@e.cuhk.edu.hk

More information

FTCS Solution to the Heat Equation

FTCS Solution to the Heat Equation FTCS Soluon o he Hea Equaon ME 448/548 Noes Gerald Reckenwald Porland Sae Unversy Deparmen of Mechancal Engneerng gerry@pdxedu ME 448/548: FTCS Soluon o he Hea Equaon Overvew Use he forward fne d erence

More information

Dual Population-Based Incremental Learning for Problem Optimization in Dynamic Environments

Dual Population-Based Incremental Learning for Problem Optimization in Dynamic Environments Dual Populaon-Based Incremenal Learnng for Problem Opmzaon n Dynamc Envronmens hengxang Yang, Xn Yao In recen years here s a growng neres n he research of evoluonary algorhms for dynamc opmzaon problems

More information

John Geweke a and Gianni Amisano b a Departments of Economics and Statistics, University of Iowa, USA b European Central Bank, Frankfurt, Germany

John Geweke a and Gianni Amisano b a Departments of Economics and Statistics, University of Iowa, USA b European Central Bank, Frankfurt, Germany Herarchcal Markov Normal Mxure models wh Applcaons o Fnancal Asse Reurns Appendx: Proofs of Theorems and Condonal Poseror Dsrbuons John Geweke a and Gann Amsano b a Deparmens of Economcs and Sascs, Unversy

More information

The Dynamic Programming Models for Inventory Control System with Time-varying Demand

The Dynamic Programming Models for Inventory Control System with Time-varying Demand The Dynamc Programmng Models for Invenory Conrol Sysem wh Tme-varyng Demand Truong Hong Trnh (Correspondng auhor) The Unversy of Danang, Unversy of Economcs, Venam Tel: 84-236-352-5459 E-mal: rnh.h@due.edu.vn

More information

Chapter 6: AC Circuits

Chapter 6: AC Circuits Chaper 6: AC Crcus Chaper 6: Oulne Phasors and he AC Seady Sae AC Crcus A sable, lnear crcu operang n he seady sae wh snusodal excaon (.e., snusodal seady sae. Complee response forced response naural response.

More information

Comb Filters. Comb Filters

Comb Filters. Comb Filters The smple flers dscussed so far are characered eher by a sngle passband and/or a sngle sopband There are applcaons where flers wh mulple passbands and sopbands are requred Thecomb fler s an example of

More information

Lecture 11 SVM cont

Lecture 11 SVM cont Lecure SVM con. 0 008 Wha we have done so far We have esalshed ha we wan o fnd a lnear decson oundary whose margn s he larges We know how o measure he margn of a lnear decson oundary Tha s: he mnmum geomerc

More information

A Novel Iron Loss Reduction Technique for Distribution Transformers. Based on a Combined Genetic Algorithm - Neural Network Approach

A Novel Iron Loss Reduction Technique for Distribution Transformers. Based on a Combined Genetic Algorithm - Neural Network Approach A Novel Iron Loss Reducon Technque for Dsrbuon Transformers Based on a Combned Genec Algorhm - Neural Nework Approach Palvos S. Georglaks Nkolaos D. Doulams Anasasos D. Doulams Nkos D. Hazargyrou and Sefanos

More information

Including the ordinary differential of distance with time as velocity makes a system of ordinary differential equations.

Including the ordinary differential of distance with time as velocity makes a system of ordinary differential equations. Soluons o Ordnary Derenal Equaons An ordnary derenal equaon has only one ndependen varable. A sysem o ordnary derenal equaons consss o several derenal equaons each wh he same ndependen varable. An eample

More information

WiH Wei He

WiH Wei He Sysem Idenfcaon of onlnear Sae-Space Space Baery odels WH We He wehe@calce.umd.edu Advsor: Dr. Chaochao Chen Deparmen of echancal Engneerng Unversy of aryland, College Par 1 Unversy of aryland Bacground

More information

Dual Approximate Dynamic Programming for Large Scale Hydro Valleys

Dual Approximate Dynamic Programming for Large Scale Hydro Valleys Dual Approxmae Dynamc Programmng for Large Scale Hydro Valleys Perre Carpener and Jean-Phlppe Chanceler 1 ENSTA ParsTech and ENPC ParsTech CMM Workshop, January 2016 1 Jon work wh J.-C. Alas, suppored

More information

An introduction to Support Vector Machine

An introduction to Support Vector Machine An nroducon o Suppor Vecor Machne 報告者 : 黃立德 References: Smon Haykn, "Neural Neworks: a comprehensve foundaon, second edon, 999, Chaper 2,6 Nello Chrsann, John Shawe-Tayer, An Inroducon o Suppor Vecor Machnes,

More information

CHAPTER 10: LINEAR DISCRIMINATION

CHAPTER 10: LINEAR DISCRIMINATION CHAPER : LINEAR DISCRIMINAION Dscrmnan-based Classfcaon 3 In classfcaon h K classes (C,C,, C k ) We defned dscrmnan funcon g j (), j=,,,k hen gven an es eample, e chose (predced) s class label as C f g

More information

Probabilistic Power Distribution Planning Using Multi-Objective Harmony Search Algorithm

Probabilistic Power Distribution Planning Using Multi-Objective Harmony Search Algorithm Journal of Operaon and Auomaon n Power Engneerng Vol. 6, No. 1, Jun. 2018, Pages: 111-125 hp://joape.uma.ac.r Probablsc Power Dsrbuon Plannng Usng Mul-Objecve Harmony Search Algorhm A. Rasgou 1, J. Moshagh

More information

Bayes rule for a classification problem INF Discriminant functions for the normal density. Euclidean distance. Mahalanobis distance

Bayes rule for a classification problem INF Discriminant functions for the normal density. Euclidean distance. Mahalanobis distance INF 43 3.. Repeon Anne Solberg (anne@f.uo.no Bayes rule for a classfcaon problem Suppose we have J, =,...J classes. s he class label for a pxel, and x s he observed feaure vecor. We can use Bayes rule

More information

Optimal environmental charges under imperfect compliance

Optimal environmental charges under imperfect compliance ISSN 1 746-7233, England, UK World Journal of Modellng and Smulaon Vol. 4 (28) No. 2, pp. 131-139 Opmal envronmenal charges under mperfec complance Dajn Lu 1, Ya Wang 2 Tazhou Insue of Scence and Technology,

More information

Effective Task Scheduling and Dynamic Resource Optimization based on Heuristic Algorithms in Cloud Computing Environment

Effective Task Scheduling and Dynamic Resource Optimization based on Heuristic Algorithms in Cloud Computing Environment KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL 11, NO 12, Dec 2017 5780 Copyrgh c2017 KSII Effecve Task Schedulng and Dynamc Resource Opmzaon based on Heursc Algorhms n Cloud Compung Envronmen

More information

A Novel Discrete Differential Evolution Algoritnm for Task Scheduling in Heterogeneous Computing Systems

A Novel Discrete Differential Evolution Algoritnm for Task Scheduling in Heterogeneous Computing Systems Proceedngs of he 2009 IEEE Inernaonal Conference on Sysems, Man, and Cybernecs San Anono, TX, USA - Ocober 2009 A Novel Dscree Dfferenal Evoluon Algornm for Task Schedulng n Heerogeneous Compung Sysems

More information

The Finite Element Method for the Analysis of Non-Linear and Dynamic Systems

The Finite Element Method for the Analysis of Non-Linear and Dynamic Systems Swss Federal Insue of Page 1 The Fne Elemen Mehod for he Analyss of Non-Lnear and Dynamc Sysems Prof. Dr. Mchael Havbro Faber Dr. Nebojsa Mojslovc Swss Federal Insue of ETH Zurch, Swzerland Mehod of Fne

More information

Let s treat the problem of the response of a system to an applied external force. Again,

Let s treat the problem of the response of a system to an applied external force. Again, Page 33 QUANTUM LNEAR RESPONSE FUNCTON Le s rea he problem of he response of a sysem o an appled exernal force. Agan, H() H f () A H + V () Exernal agen acng on nernal varable Hamlonan for equlbrum sysem

More information

Li An-Ping. Beijing , P.R.China

Li An-Ping. Beijing , P.R.China A New Type of Cpher: DICING_csb L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Absrac: In hs paper, we wll propose a new ype of cpher named DICING_csb, whch s derved from our prevous sream cpher DICING.

More information

M. Y. Adamu Mathematical Sciences Programme, AbubakarTafawaBalewa University, Bauchi, Nigeria

M. Y. Adamu Mathematical Sciences Programme, AbubakarTafawaBalewa University, Bauchi, Nigeria IOSR Journal of Mahemacs (IOSR-JM e-issn: 78-578, p-issn: 9-765X. Volume 0, Issue 4 Ver. IV (Jul-Aug. 04, PP 40-44 Mulple SolonSoluons for a (+-dmensonalhroa-sasuma shallow waer wave equaon UsngPanlevé-Bӓclund

More information

ABSTRACT. KEYWORDS Hybrid, Genetic Algorithm, Shipping, Dispatching, Vehicle, Time Windows INTRODUCTION

ABSTRACT. KEYWORDS Hybrid, Genetic Algorithm, Shipping, Dispatching, Vehicle, Time Windows INTRODUCTION A HYBRID GENETIC ALGORITH FOR A DYNAIC INBOUND ORDERING AND SHIPPING AND OUTBOUND DISPATCHING PROBLE WITH HETEROGENEOUS VEHICLE TYPES AND DELIVERY TIE WINDOWS by Byung Soo Km, Woon-Seek Lee, and Young-Seok

More information

Testing a new idea to solve the P = NP problem with mathematical induction

Testing a new idea to solve the P = NP problem with mathematical induction Tesng a new dea o solve he P = NP problem wh mahemacal nducon Bacground P and NP are wo classes (ses) of languages n Compuer Scence An open problem s wheher P = NP Ths paper ess a new dea o compare he

More information

Math 128b Project. Jude Yuen

Math 128b Project. Jude Yuen Mah 8b Proec Jude Yuen . Inroducon Le { Z } be a sequence of observed ndependen vecor varables. If he elemens of Z have a on normal dsrbuon hen { Z } has a mean vecor Z and a varancecovarance marx z. Geomercally

More information

The preemptive resource-constrained project scheduling problem subject to due dates and preemption penalties: An integer programming approach

The preemptive resource-constrained project scheduling problem subject to due dates and preemption penalties: An integer programming approach Journal of Indusral Engneerng 1 (008) 35-39 The preempve resource-consraned projec schedulng problem subjec o due daes and preempon penales An neger programmng approach B. Afshar Nadjaf Deparmen of Indusral

More information

Computing Relevance, Similarity: The Vector Space Model

Computing Relevance, Similarity: The Vector Space Model Compung Relevance, Smlary: The Vecor Space Model Based on Larson and Hears s sldes a UC-Bereley hp://.sms.bereley.edu/courses/s0/f00/ aabase Managemen Sysems, R. Ramarshnan ocumen Vecors v ocumens are

More information

Ordinary Differential Equations in Neuroscience with Matlab examples. Aim 1- Gain understanding of how to set up and solve ODE s

Ordinary Differential Equations in Neuroscience with Matlab examples. Aim 1- Gain understanding of how to set up and solve ODE s Ordnary Dfferenal Equaons n Neuroscence wh Malab eamples. Am - Gan undersandng of how o se up and solve ODE s Am Undersand how o se up an solve a smple eample of he Hebb rule n D Our goal a end of class

More information

GMAW Welding Optimization Using Genetic Algorithms

GMAW Welding Optimization Using Genetic Algorithms D. S. Correa e al D. S. Correa, C. V. Gonçalves, Sebasão S. C. Junor and V. A. Ferrares Federal Unversy of Uberlânda Faculy of Mechancal Engneerng Av. João Naves de Ávla,.11 38400-90 Uberlânda, MG. Brazl

More information

CH.3. COMPATIBILITY EQUATIONS. Continuum Mechanics Course (MMC) - ETSECCPB - UPC

CH.3. COMPATIBILITY EQUATIONS. Continuum Mechanics Course (MMC) - ETSECCPB - UPC CH.3. COMPATIBILITY EQUATIONS Connuum Mechancs Course (MMC) - ETSECCPB - UPC Overvew Compably Condons Compably Equaons of a Poenal Vecor Feld Compably Condons for Infnesmal Srans Inegraon of he Infnesmal

More information

Relative controllability of nonlinear systems with delays in control

Relative controllability of nonlinear systems with delays in control Relave conrollably o nonlnear sysems wh delays n conrol Jerzy Klamka Insue o Conrol Engneerng, Slesan Techncal Unversy, 44- Glwce, Poland. phone/ax : 48 32 37227, {jklamka}@a.polsl.glwce.pl Keywor: Conrollably.

More information

Existence and Uniqueness Results for Random Impulsive Integro-Differential Equation

Existence and Uniqueness Results for Random Impulsive Integro-Differential Equation Global Journal of Pure and Appled Mahemacs. ISSN 973-768 Volume 4, Number 6 (8), pp. 89-87 Research Inda Publcaons hp://www.rpublcaon.com Exsence and Unqueness Resuls for Random Impulsve Inegro-Dfferenal

More information

Efficient Asynchronous Channel Hopping Design for Cognitive Radio Networks

Efficient Asynchronous Channel Hopping Design for Cognitive Radio Networks Effcen Asynchronous Channel Hoppng Desgn for Cognve Rado Neworks Chh-Mn Chao, Chen-Yu Hsu, and Yun-ng Lng Absrac In a cognve rado nework (CRN), a necessary condon for nodes o communcae wh each oher s ha

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5h Inernaonal onference on Advanced Desgn and Manufacurng Engneerng (IADME 5 The Falure Rae Expermenal Sudy of Specal N Machne Tool hunshan He, a, *, La Pan,b and Bng Hu 3,c,,3 ollege of Mechancal and

More information

Advanced Machine Learning & Perception

Advanced Machine Learning & Perception Advanced Machne Learnng & Percepon Insrucor: Tony Jebara SVM Feaure & Kernel Selecon SVM Eensons Feaure Selecon (Flerng and Wrappng) SVM Feaure Selecon SVM Kernel Selecon SVM Eensons Classfcaon Feaure/Kernel

More information

Evolutionary Algorithms for Multi-Criterion Optimization: A Survey

Evolutionary Algorithms for Multi-Criterion Optimization: A Survey Inernaonal Journal of Compung & Informaon Scences Vol. 2, No., Aprl 2004 38 Evoluonary Algorhms for Mul-Creron Opmzaon: A Survey Ashsh Ghosh Machne Inellgence Un, Indan Sascal Insue, Kolkaa-08, Inda. Sachdananda

More information

Meta-Heuristic Optimization techniques in power systems

Meta-Heuristic Optimization techniques in power systems Proceedngs of he 2nd IASME / WSEAS Inernaonal Conference on Energy & Envronmen (EE07), Pororoz, Slovena, May 15-17, 2007 163 Mea-Heursc Opmzaon echnques n power sysems Vlachos Arsds Deparmen of Informacs

More information

Fall 2010 Graduate Course on Dynamic Learning

Fall 2010 Graduate Course on Dynamic Learning Fall 200 Graduae Course on Dynamc Learnng Chaper 4: Parcle Flers Sepember 27, 200 Byoung-Tak Zhang School of Compuer Scence and Engneerng & Cognve Scence and Bran Scence Programs Seoul aonal Unversy hp://b.snu.ac.kr/~bzhang/

More information

Clustering (Bishop ch 9)

Clustering (Bishop ch 9) Cluserng (Bshop ch 9) Reference: Daa Mnng by Margare Dunham (a slde source) 1 Cluserng Cluserng s unsupervsed learnng, here are no class labels Wan o fnd groups of smlar nsances Ofen use a dsance measure

More information

Constrained-Storage Variable-Branch Neural Tree for. Classification

Constrained-Storage Variable-Branch Neural Tree for. Classification Consraned-Sorage Varable-Branch Neural Tree for Classfcaon Shueng-Ben Yang Deparmen of Dgal Conen of Applcaon and Managemen Wenzao Ursulne Unversy of Languages 900 Mnsu s oad Kaohsng 807, Tawan. Tel :

More information

Computational results on new staff scheduling benchmark instances

Computational results on new staff scheduling benchmark instances TECHNICAL REPORT Compuaonal resuls on new saff shedulng enhmark nsanes Tm Curos Rong Qu ASAP Researh Group Shool of Compuer Sene Unersy of Nongham NG8 1BB Nongham UK Frs pulshed onlne: 19-Sep-2014 las

More information

Data Collection Definitions of Variables - Conceptualize vs Operationalize Sample Selection Criteria Source of Data Consistency of Data

Data Collection Definitions of Variables - Conceptualize vs Operationalize Sample Selection Criteria Source of Data Consistency of Data Apply Sascs and Economercs n Fnancal Research Obj. of Sudy & Hypoheses Tesng From framework objecves of sudy are needed o clarfy, hen, n research mehodology he hypoheses esng are saed, ncludng esng mehods.

More information

Approximate Analytic Solution of (2+1) - Dimensional Zakharov-Kuznetsov(Zk) Equations Using Homotopy

Approximate Analytic Solution of (2+1) - Dimensional Zakharov-Kuznetsov(Zk) Equations Using Homotopy Arcle Inernaonal Journal of Modern Mahemacal Scences, 4, (): - Inernaonal Journal of Modern Mahemacal Scences Journal homepage: www.modernscenfcpress.com/journals/jmms.aspx ISSN: 66-86X Florda, USA Approxmae

More information

Time-interval analysis of β decay. V. Horvat and J. C. Hardy

Time-interval analysis of β decay. V. Horvat and J. C. Hardy Tme-nerval analyss of β decay V. Horva and J. C. Hardy Work on he even analyss of β decay [1] connued and resuled n he developmen of a novel mehod of bea-decay me-nerval analyss ha produces hghly accurae

More information

Density Matrix Description of NMR BCMB/CHEM 8190

Density Matrix Description of NMR BCMB/CHEM 8190 Densy Marx Descrpon of NMR BCMBCHEM 89 Operaors n Marx Noaon Alernae approach o second order specra: ask abou x magnezaon nsead of energes and ranson probables. If we say wh one bass se, properes vary

More information

Robust and Accurate Cancer Classification with Gene Expression Profiling

Robust and Accurate Cancer Classification with Gene Expression Profiling Robus and Accurae Cancer Classfcaon wh Gene Expresson Proflng (Compuaonal ysems Bology, 2005) Auhor: Hafeng L, Keshu Zhang, ao Jang Oulne Background LDA (lnear dscrmnan analyss) and small sample sze problem

More information

Theoretical Analysis of Biogeography Based Optimization Aijun ZHU1,2,3 a, Cong HU1,3, Chuanpei XU1,3, Zhi Li1,3

Theoretical Analysis of Biogeography Based Optimization Aijun ZHU1,2,3 a, Cong HU1,3, Chuanpei XU1,3, Zhi Li1,3 6h Inernaonal Conference on Machnery, Maerals, Envronmen, Boechnology and Compuer (MMEBC 6) Theorecal Analyss of Bogeography Based Opmzaon Aun ZU,,3 a, Cong U,3, Chuanpe XU,3, Zh L,3 School of Elecronc

More information

Mechanics Physics 151

Mechanics Physics 151 Mechancs Physcs 5 Lecure 9 Hamlonan Equaons of Moon (Chaper 8) Wha We Dd Las Tme Consruced Hamlonan formalsm H ( q, p, ) = q p L( q, q, ) H p = q H q = p H = L Equvalen o Lagrangan formalsm Smpler, bu

More information

Learning Objectives. Self Organization Map. Hamming Distance(1/5) Introduction. Hamming Distance(3/5) Hamming Distance(2/5) 15/04/2015

Learning Objectives. Self Organization Map. Hamming Distance(1/5) Introduction. Hamming Distance(3/5) Hamming Distance(2/5) 15/04/2015 /4/ Learnng Objecves Self Organzaon Map Learnng whou Exaples. Inroducon. MAXNET 3. Cluserng 4. Feaure Map. Self-organzng Feaure Map 6. Concluson 38 Inroducon. Learnng whou exaples. Daa are npu o he syse

More information

The topology and signature of the regulatory interactions predict the expression pattern of the segment polarity genes in Drosophila m elanogaster

The topology and signature of the regulatory interactions predict the expression pattern of the segment polarity genes in Drosophila m elanogaster The opology and sgnaure of he regulaory neracons predc he expresson paern of he segmen polary genes n Drosophla m elanogaser Hans Ohmer and Réka Alber Deparmen of Mahemacs Unversy of Mnnesoa Complex bologcal

More information

Determining the Number of Games Needed to Guarantee an NHL Playoff Spot

Determining the Number of Games Needed to Guarantee an NHL Playoff Spot Deermnng he Number of Games Needed o Guaranee an NHL Playoff Spo Tyrel Russell and Peer van Bee Cheron School of Compuer Scence Unversy of Waerloo {crussel,vanbee}@uwaerloo.ca Absrac. Many spors fans nves

More information

Tight results for Next Fit and Worst Fit with resource augmentation

Tight results for Next Fit and Worst Fit with resource augmentation Tgh resuls for Nex F and Wors F wh resource augmenaon Joan Boyar Leah Epsen Asaf Levn Asrac I s well known ha he wo smple algorhms for he classc n packng prolem, NF and WF oh have an approxmaon rao of

More information

Mechanics Physics 151

Mechanics Physics 151 Mechancs Physcs 5 Lecure 9 Hamlonan Equaons of Moon (Chaper 8) Wha We Dd Las Tme Consruced Hamlonan formalsm Hqp (,,) = qp Lqq (,,) H p = q H q = p H L = Equvalen o Lagrangan formalsm Smpler, bu wce as

More information

FI 3103 Quantum Physics

FI 3103 Quantum Physics /9/4 FI 33 Quanum Physcs Aleander A. Iskandar Physcs of Magnesm and Phooncs Research Grou Insu Teknolog Bandung Basc Conces n Quanum Physcs Probably and Eecaon Value Hesenberg Uncerany Prncle Wave Funcon

More information

A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window

A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window A Deermnsc Algorhm for Summarzng Asynchronous Sreams over a Sldng ndow Cosas Busch Rensselaer Polyechnc Insue Srkana Trhapura Iowa Sae Unversy Oulne of Talk Inroducon Algorhm Analyss Tme C Daa sream: 3

More information

Density Matrix Description of NMR BCMB/CHEM 8190

Density Matrix Description of NMR BCMB/CHEM 8190 Densy Marx Descrpon of NMR BCMBCHEM 89 Operaors n Marx Noaon If we say wh one bass se, properes vary only because of changes n he coeffcens weghng each bass se funcon x = h< Ix > - hs s how we calculae

More information

A Principled Approach to MILP Modeling

A Principled Approach to MILP Modeling A Prncpled Approach o MILP Modelng John Hooer Carnege Mellon Unvers Augus 008 Slde Proposal MILP modelng s an ar, bu need no be unprncpled. Slde Proposal MILP modelng s an ar, bu need no be unprncpled.

More information

Multi-priority Online Scheduling with Cancellations

Multi-priority Online Scheduling with Cancellations Submed o Operaons Research manuscrp (Please, provde he manuscrp number!) Auhors are encouraged o subm new papers o INFORMS journals by means of a syle fle emplae, whch ncludes he journal le. However, use

More information

Notes on the stability of dynamic systems and the use of Eigen Values.

Notes on the stability of dynamic systems and the use of Eigen Values. Noes on he sabl of dnamc ssems and he use of Egen Values. Source: Macro II course noes, Dr. Davd Bessler s Tme Seres course noes, zarads (999) Ineremporal Macroeconomcs chaper 4 & Techncal ppend, and Hamlon

More information

e-journal Reliability: Theory& Applications No 2 (Vol.2) Vyacheslav Abramov

e-journal Reliability: Theory& Applications No 2 (Vol.2) Vyacheslav Abramov June 7 e-ournal Relably: Theory& Applcaons No (Vol. CONFIDENCE INTERVALS ASSOCIATED WITH PERFORMANCE ANALYSIS OF SYMMETRIC LARGE CLOSED CLIENT/SERVER COMPUTER NETWORKS Absrac Vyacheslav Abramov School

More information