A dynamic resource allocation decision model for IT security
|
|
- Avice Gallagher
- 5 years ago
- Views:
Transcription
1 A dynamc resource allocaon decson model for IT secury Lof Hajjem 1, Salah Benabdallah 2, Fouad Ben Abdelazz 3 1 Graduae Suden, Insu Supéreur de Geson (ISG), Unversy of Tuns, Tuns, Tunsa (lof.hajjem@gmal.com) 2 Drecor of Insu Supéreur des Eudes Technologques en Communcaons de Tuns (Ise Com), Tuns, Tunsa (sba@supcom.rnu.n) 3 Professor, College of Engneerng, Amercan Unversy of Sharjah, Sharjah, Uned Arab Emraes. (fabdelazz@aus.edu) ABSTRACT Today, wh he connued growh n usng nformaon and communcaon echnologes (ICT) for busness purposes, busness organzaons become ncreasngly dependen on her nformaon sysems. Thus, hey need o proec hem from he dfferen aacks eplong her vulnerables. To do so, he organzaon has o use secury echnologes, whch may be proacve or reacve ones. Each secury echnology has a relave cos and addresses specfc vulnerables. Therefore, he organzaon has o pu n place he approprae secury echnologes se ha mnmzes he nformaon sysem s vulnerables wh a mnmal cos. Ths b-objecve problem wll be consdered as a resources allocaon problem (RAP) where secury echnologes represen he resources o be allocaed. However, he se of vulnerables may change, perodcally, wh he connual appearance of new ones. Therefore, he secury echnologes se should be fleble o face hese changes, n real me, and he problem becomes a dynamc one. In hs paper, we propose a harmony search based algorhm o solve he b-objecve dynamc resource allocaon decson model. Ths approach was compared o a genec algorhm and provded good resuls. Keywords: Dynamc resource allocaon, IT secury, Harmony search, Mulobjecve opmzaon 1. INTRODUCTION Securng he nformaon sysem s an mporan ask for an organzaon. In fac, he connued growh n usng nformaon and communcaon echnologes (ICT) for busness purposes makes busness organzaons ncreasngly dependen on her nformaon sysems. Any successful aack wll cause a serous loss of daa, servces, asses, busness operaons, ec. [7]. These aacks, whch can be made by nernal or eernal enes, eplo he vulnerables ha may es n he nformaon sysem. To face hese aacks, he organzaon has o overcome he nformaon sysem s vulnerables usng secury echnologes. Each one of he secury echnologes addresses specfc vulnerables. Therefore, he organzaon has o pu n place he approprae se of secury echnologes ha mnmzes he vulnerables of he nformaon sysem. Ths problem can be saed as a resource allocaon problem (RAP). A RAP s he process of allocang resources among varous projecs or busness uns wh a mamum prof and a mnmum cos [1]. In he proposed model, he secury echnologes represen he resources o be allocaed o he nformaon sysem o overcome s vulnerables. However, he se of vulnerables may change perodcally wh he connual appearance of new ones. Therefore, he se of secury echnologes needs o be fleble o face hese changes. Thus, he problem, here, becomes a dynamc one, as he se of mplaned secury echnologes should be redefned n real me o face he new vulnerables appearng n he nformaon sysem. As a resul, he suded problem wll be saed as a dynamc resource allocaon problem (DRA). In addon, n hs problem we have o consder he cos of each secury echnology. Thus, he organzaon wans o mnmze he overall cos of he secury echnologes used o secure s nformaon sysem. The problem becomes a b-objecve one, where we have, o mnmze he number of vulnerables n he nformaon sysem wh he mnmum cos. Ths paper wll be saed as follows: he problem of nformaon sysem secury wll be descrbed, n he frs secon. Ne, n secon 3, he problem of IT secury, saed as a b-objecve dynamc resource allocaon problem, wll be defned and formulaed. Then, he harmony search approach wll be presened. Secon 5 wll be devoed o he adapaon of wo resoluon approaches, he harmony search algorhm and he genec algorhm. And n he las secon, a comparson of he wo approaches s descrbed. The paper fnshes by a concluson. 2. INFORMATION SYSTEM SECURITY 2.1 Why securng nformaon sysems?
2 The connued growh n he use of nformaon echnologes for busness purposes makes busness organzaons ncreasngly dependen on her nformaon sysems. In fac, he evoluon of nework echnologes perms an easy communcaon beween dfferen parners, ndependenly of her locaons. The communcaon may epose he parner s nformaon asses o dangerous hreas ha eplo he nformaon sysem vulnerables. An nformaon asse s defned as anyhng of value o he organzaon. I can be eher angble or nangble. Tangble asses nclude physcal nfrasrucure (such as servers and nework nfrasrucure) and sofware elemens of he nformaon sysem. Inangble asses nclude busness or oher dgal nformaon of value o he organzaon (such as bankng ransacons, neres calculaons, produc-developmen plans and specfcaons), organzaon knowledge, company repuaon and he nellecual propery sored whn he organzaonal sysem [7]. As can be seen, he asses are of grea mporance for he organzaon. However, hey are eposed o mulple hreas ha can be eher naural dsasers or human acs. The hreas caused by human can be non-malcous (e.g., mssng secury paches, openng a malcous emal, ec.) or malcous ones (e.g., hef, loss or desrucon of an organzaonal asse, unauhorzed access o he nework servces, nfecon wh malcous code, nsder hreas, hackers, errorss, ec.). Therefore, he organzaons need o secure her nformaon sysem agans he hreas ha may eplo a large number of vulnerables. In fac, s repored ha he secury research communy denfes and publshes on an average of 40 new secury vulnerables per week on varous producs, from operang sysems, daabases, applcaons o even neworkng devces [2]. Anoher sudy of he Compuer Emergency Response Team/Coordnaon Cener (CERT/CC) ndcaes ha he number of found vulnerables was from 345 o 5990 n he decade of [5]. Due o he large number of vulnerables, he number of aacks s growng n an mmeasurable way. In fac, he number of evens repored o CERT/CC was 2573 n In 2003, was n an asonshng number of secury ncdens. 2.2 Informaon secury echnologes Securng he nformaon sysems becomes a prory for he organzaons. In fac, any successful aack on he nformaon sysem and s evenual crash could resul n a serous loss of daa, servces and busness operaons. Therefore, he organzaons need o proec her nformaon sysems agans he evenual aacks ha may occur. To do so, hey need o use effcen nformaon secury echnologes ha perm he proecon of nformaon and mnmze he rsk of eposng o unauhorzed pares. There are wo famles of secury echnologes, proacve and reacve ones. A proacve nformaon secury echnology s a echnque ha akes prevenave measures n a bd o secure daa or resources before a secury breach can occur [8] (e.g. crypography, dgal sgnaure, vrual prvae nework, ec.). Whereas, a reacve nformaon secury echnology performs prevenve measures n a bd o secure daa or resources as soon as a secury breach s deeced [8] (e.g. frewalls, passwords, nruson deecon sysems, ec.). Each one of he secury echnologes addresses specfc vulnerables and has a relave cos. Thus, he organzaon has o pu n place he approprae se of secury echnologes ha mnmzes he nformaon sysem s vulnerables wh he mnmum cos, whch becomes a bg dlemma for. In fac, accordng o he Deparmen of Trade and Indusry (DTI) 2006 survey he average s around 4 o 5% of he organzaon s IT budge beng spen on secury soluons [7]. In hs paper, he problem of securng nformaon sysems wll be saed as a B-objecve Dynamc Resource Allocaon Problem. Ths decson model wll be defned, n he ne secon, and s mahemacal formulaon wll be descrbed. 3.1 Problem defnon 3. DECISION MODEL The problem of securng nformaon sysems wll be suded, n hs paper, as a RAP where he secury echnologes represen he se of resources. The problem can be saed as follows: Le V be he se of vulnerables of an nformaon sysem where: 1, f vulnerably s used by he nformaon sysem V of he organzaon, 0, Oherwse. Le S be a se of M secury echnologes ha may be pu n place by an organzaon where: S j 1, f secury js used by he nformaon sysem of he organzaon, 0, Oherwse. Each secury echnology s j has an assocaed cos C j. And le SV be he secury/vulnerably mar such ha: 1, f vulnerably s covered by secury j, SV [, j] 0, Oherwse. The problem, here, s o fnd he se of secury echnologes ha mnmzes he number of vulnerables of he nformaon sysem wh he mnmal cos. Ths problem wll be suded as a b-objecve one where we
3 have o: (1) Mnmze he number of vulnerables a any me perod, (2) Mnmze he oal cos of he secury echnologes o be used. In addon, he problem wll be suded dynamcally n order o be able o overcome he new vulnerables ha may appear, a each me. In fac, he organzaon needs o adap he se of mplaned secury echnologes, n real me, o he dfferen crcumsances ha may happen o he nformaon sysem, and wh he mnmal cos. 3.2 Mahemacal formulaon The problem of securng nformaon sysems consss on fndng he opmal combnaon of secury echnologes ha mnmzes he nformaon sysem s vulnerables, wh he mnmal cos. As defned n he las paragraph, s a b-objecve problem ha wll be saed as dynamc resource allocaon problem. Le R be he se of resdual vulnerables, where r s calculaed as follows: f v = 0 hen r = 0 f v = 1 and j s j = 1 and SV [, j] = 1, hen r = 0. f v = 1 and SV [, j] = 0 j s j = 1, hen r = 1. Where he frs condon ndcaes ha f vulnerably v s no presen n he organzaon s nformaon sysem (v =0) hen s no a resdual vulnerably. The second one sgnfes ha f vulnerably v s presen n he organzaon s nformaon sysem (v =1) and here ess a secury echnology s j used by he organzaon ha addresses hen s no a resdual vulnerably (r = 0). And he las equaon sgnfes ha f vulnerably v s presen n he organzaon s nformaon sysem (v =1) and here s no used secury echnology s j addressng hen s a resdual vulnerably (r =1). Therefore, he problem can be formulaed as follows: Subjec o Mn N ( ) r, 1,..., T R n v 1 (1) MnC ( S) C ( S ) c * s (2) n n j 1 qm qm, m 1,..., M, (3) f ( R 1, IS, S 1) IS 1 (4) r 0,1, 1,..., nv, 1,..., T (5) s j 0,1, j 1,..., ns, 1,..., T (6) Where n v and n s are he numbers of vulnerables and secury echnologes, respecvely. T represens he number of me perods. R s he se of resdual vulnerables a me perod. IS s he se of mplaned secury echnologes. And, S s he se of secury j j echnologes ha may be used by he organzaon. In hs formulaon, equaons (1) represen he objecve funcons of mnmzng he se of resdual vulnerables a each me perod. Ne, equaon (2) s he objecve funcon of mnmzng he overall cos of he secury echnologes. Then, equaons (3) are he resources sasfacon consrans. Fnally, equaon (4) ndcaes ha he se of mplaned secury echnologes a he (+1) h me perod s a funcon of he se of resdual vulnerables a he ( + 1) h me perod (R +1 ), he se of mplaned secury echnologes a he () h me perod (IS ), and he se of secury echnologes ha may be used by he organzaon a he (+1) h me perod (S T+1). For hs problem, a new me perod has o be consdered where a leas a new vulnerably s deeced n he organzaon s nformaon sysem. Ths problem was no well-suded n he leraure and few approaches were developed for some oher problems close o. Among hem, we can noe a genec algorhm ha was proposed o solve he sac b-objecve resource allocaon problem [4]. In addon, some mercs for quanfyng an ICT secury nvesmen are descrbed n [7]. 4. HARMONY SEARCH ALGORITHM 4.1 Algorhm descrpon The harmony search (HS) algorhm s developed o mae he muscan behavor ryng o mprove s muscal harmony pracce afer pracce usng he se of he pches played by each nsrumen. Ths process can be compared o he one of opmzng an objecve funcon eraon by eraon usng he values assgned for decson varables [6]. The HS algorhm ncludes fve seps: parameers nalzaon, he harmony memory (HM) nalzaon, he new harmony mprovsaon, he harmony memory updae and he check of ermnaon creron [3]. 4.2 Sep 1: Parameers nalzaon In hs sep, he opmzaon problem s specfed: Mnmze (or Mamze) f(); X, =1, 2,, N where: f() s an objecve funcon s he soluon vecor composed of decson varables X s he se of possble values for decson varable X = { (1), (2),..., (K)} for dscree varables N s he number of decson varables K s he number of possble values for each dscree varable The algorhm parameers are also specfed durng hs sep such as: The harmony memory sze(hms): s he number of soluon n he memory
4 The harmony memory consderng rae (HMCR); 0 HMCR 1; hs ypcal values range from 0.7 o 0.99 The pch adjusmen rae (PAR); 0 PAR 1; hs seleced values range s from 0.1 o 0.5 Improvsaons number or objecve funcons number 4.3 Sep 2: Harmony memory nalzaon Durng hs sep, HMS soluons are randomly generaed o form he harmony memory. Each decson varable () selecs a value from s correspondng ls (X). Then he fness values are calculaed for he generaed soluons (equaon 7) f( ) f( ) (7) HMS 1 HMS 1 HMS 1 HMS 1 HMS-1... f( ) 1 HMS HMS HMS HMS HMS... f( ) Sep 3: New harmony mprovsaon In hs sep, a new harmony vecor s generaed from he HM based on memory consderaons, pch adjusmens, and randomzaon, as shown n equaon 8: X, Where, HMCR (harmony memory consderaon rae) s he probably of choosng a value from he soluons sored n he HM. Whle (1- HMCR) s he probably of randomly choosng one feasble value from he se of all possble values for he correspondng decson varable. Whle mprovsng he new harmony, each value chosen from HM s eamned o deermne wheher should be pch-adjused. Ths procedure uses he PAR parameer ha ses he rae of adjusmen for he pch chosen from he HM as follows: 1 2 HMS ',,..., wh probably HMCR ' (8) ', wh probably (1- HMCR) Yes, wh probably PAR, Pch adjusng decson for ' (9) No, wh probably (1- PAR). The value of (1 - PAR) ses he rae of dong nohng. If he pch adjusmen decson for s YES, s replaced as follow: (10) where bw s an arbrary dsance bandwdh and rand() s a random number beween 0 and 1 or beween -1 and Sep 4: Harmony memory updae If he new harmony vecor s beer han he wors harmony n he HM, judged n erms of he objecve funcon value, he new harmony s ncluded n he HM and he esng wors harmony s ecluded from he HM. 4.6 Sep 5: Termnaon creron check If he soppng creron s sasfed, compuaon s ermnaed. Oherwse, Seps 3 and 4 are repeaed. The soppng crera may be eher mamum number of mprovsaons or a mamum number of eraon whou mprovemen of he soluon. 5. RESOLUTION APPROACHES To solve he problem of securng, n real me, an nformaon sysem agans he dfferen aacks ha may happen, wo mea-heurscs were developed, a harmony search algorhm and genec algorhm. These wo approaches are composed of wo phases, he sac and he dynamc one. The sac phase s appled for he nal sysem sae (=0). And he dynamc one s appled o face he new vulnerables ha may be found n he sysem. I should ake no consderaon he curren secury plan and he new secury echnologes ha may appear. 5.1 Harmony search algorhm The proposed HS algorhm for he sac phase can be descrbed as follows: Sep1. Parameers nalzaon: The mprovsaons number s equal o 2, as he suded problem s a bobjecve one. In addon, he harmony memory wll conan he non-domnaed soluons and s sze (HMS) wll be se o 50. The raes HMCR and PAR wll be se o 95% and 30%, respecvely. Sep2. Harmony memory nalzaon: In hs sep, 50 dfferen soluons wll be randomly generaed. The soluons generaon process wll be as follows: he secury echnologes wll be randomly seleced one by one unl a consrucon-soppng creron s verfed,.e. he oal cos eceeds a value Cma or he number of resdual vulnerables becomes less han a bound Nvmn. In order o ge a beer soluon qualy, a secury echnology s added only f covers a leas a resdual vulnerably. In addon, and whle generang he HM a new secury/vulnerably mar, noed SV wll be
5 consruced. I wll presen for each secury echnology he vulnerables ha covered, effecvely n he sysem. Tha s, for any secury echnology chosen n he consrucon process, he vulnerables ha were covered by wll be recorded. Sep3. New harmony mprovsaon: In hs sep, a new harmony s generaed based on he HMCR and PAR raes. The generaon process can be descrbed as follows: A resdual vulnerably s randomly seleced and accordng o he HMCR value, a secury echnology wll be chosen eher from SV or from SV,.e: SV', wh probably HMCR ' s seleced from (11) SV, wh probably (1- HMCR) Then, each me a secury echnology s seleced from SV, a pch adjusmen s performed wh a probably PAR. I consss on selecng a secury echnology from he ones ha was no appled for he curren vulnerables and f does no es, he selecon wll be done among he ones addressng he curren vulnerably. Sep4. Harmony memory updae: The generaed soluon wll be added o he HM f s no domnaed by any esng soluon. In addon, f s added o he HM, all he soluons domnaed by he new soluon wll be elmnaed. Sep5. Termnaon creron check: The Seps 3 and 4 are repeaed unl here s no mprovemen of he HM for 50 successve eraons. And he soluons of he HM wll consue he se of non-domnaed soluons. I conans he soluons ha can be adaped o he curren nformaon sysem. The proposed HS for he dynamc phase dffers from he one of he sac phase n Sep2, he harmony memory nalzaon. In fac, he process of generang he 50 dfferen nal soluons can be descrbed as follows: 40 soluons wll be generaed by randomly selecng one from he se of non-domnaed soluons, o whch oher secury echnologes are added unl he consruconsoppng crera s sasfed. The 10 remanng soluons are generaed randomly as descrbed n Sep2, n order o make a beer dversy n he search space. 5.2 Genec algorhm: The genec algorhm s a well-known mea-heursc ha was appled o a wde varey of sngle and mulobjecve opmzaon problems. I s characerzed of 2 man operaors, he crossover and he muaon operaors. The crossover operaor s appled o generae chldren from a par of parens seleced from he curren populaon. Each paren conrbues by a poron of s genec make-up o each chld. And he muaon operaor randomly changes a ny amoun of genec nformaon n each chld. The sac phase of he proposed genec algorhm can be descrbed as follows: An nal populaon of 50 soluons s generaed, smlarly o he HS algorhm (refer o Sep2). Then, wh a probably of 90%, a wo pon crossover operaor s appled o wo randomly seleced soluons from he populaon, o ge wo chldren. If he consrucon-soppng creron s no sasfed for a chld, he consrucon process wll connue n he same way of he consrucng he nal populaon process. Ne, wh a probably of 10%, he muaon operaor s appled o each chld. I consss on elmnang one of he secury echnology used by he soluon and connue he consrucon process by he remanng secury echnologes. Fnally, a chld s added o he populaon f s no domnaed by any esng soluon and f s added, all he soluons domnaed by wll be elmnaed. Ths process sops f here s no mprovemen of he populaon for 50 successve eraons. The fnal populaon wll consue he se of non-domnaed soluons. The dynamc phase s dencal o he one of he HS algorhm. 6. COMPUTATIONAL RESULTS In hs secon, he performances of he wo approaches are verfed for dfferen problem szes. To do so, he quales of non-domnaed soluons generaed by he wo echnques for dfferen nsances are evaluaed accordng o he C merc (coverage of wo ses) ha can be defned as follows [9]: Le A, B be wo non-domnaed soluons ses. The measure C maps he ordered par (A, B) no he range [0, 1]: b B/ aa: a domnaesb C ( A, B) (12) Ths merc calculaes, for a non-domnaed soluons se B, he percenage of soluons ha are domnaed by a leas a soluon of he non-domnaed soluons se A. When esng he wo approaches, s supposed ha here are, nally, 25 vulnerables and 40 secury echnologes, where each secury echnology addresses specfc vulnerables (he SV mar). Then, n each me perod new vulnerables and secury echnologes are added o he sysem and he SV mar s updaed. I s supposed ha a new vulnerably can be covered by an esng secury echnology or by a new one. In addon, a cos mar s generaed n such a way ha more s he number of covered vulnerables by a secury echnology, hgher s s relave cos. And fnally, s B
6 supposed ha oal cos allowed (Cma) s and he number of resdual vulnerables (Nvmn) should no be more han 3. The wo algorhms are eecued for 11 me perods and he resuls of he comparson are summarzed n Table1, where he row T represens he me perods. The row Sze s a par (secury, vulnerably) gvng he number of he secury echnologes ha may be used by he organzaon and he number of nformaon sysem s vulnerables. The column C(HS,GA) presens he frequency by whch he oucome of genec algorhm s domnaed by soluons generaed by he HS algorhm. The column C(GA,HS) gves he frequency by whch he oucome of he HS algorhm s domnaed by soluons generae by he GA. And he row Common Soluons gves he number of smlar soluons found by he wo algorhms. To deal he nformaon gven by able1 we ake as eample he me perod 1. There are 35 vulnerables n he nformaon sysem and he organzaon has o selec s secury plan among 55 secury echnologes. The resuls generaed by he 2 algorhms ndcae ha 33% of he soluons generaed by he GA are domnaed by a leas a soluon generaed by he HS algorhm. Whereas, here s no soluon generaed by he HS algorhm domnaed by he non-domnaed soluons of he GA. And here are 2 common soluons generaed by he wo algorhms. The resuls presened n Table1 ndcae ha he HS algorhm generaes n mos mes beer resuls han he GA. In fac, among he 11 me perods, he C measure value was n he favor of he HS algorhm for 8 mes agans once for he GA and 2 equales. Table1: Comparson of he wo approaches n erm of C measure values Tme Common Sze C(HS,GA) C(GA,HS) perod Soluons 0 (25, 40) 25% 0% 3 1 (35, 55) 33% 0% 2 2 (45, 70) 75% 25% 0 3 (55, 85) 50% 0% 2 4 (65, 100) 0% 0% 4 5 (75, 115) 0% 50% 2 6 (85, 130) 50% 0% 2 7 (95, 145) 100% 0% 0 8 (105, 160) 75% 25% 0 9 (115, 175) 50% 0% 2 10 (125, 190) 50% 50% 0 model n order o proec, n real me, he organzaons from he aacks frequenly occurrng. To solve hs problem, a harmony search algorhm and a genec algorhm were proposed. A comparson of he wo approaches, accordng o he C measure was esablshed. I ndcaes ha he HS algorhm gves beer resuls n mos me perods of he opmzaon process. REFERENCES [1] Ch-Mng, L. And Msuo G. Mulobjecve resource allocaon problem by mulsage decson-based hybrd genec algorhm, Appled Mahemacs and Compuaon, Vol. 187, No. 2, pp , [2] Eschelbeck, G., The Laws of Vulnerables: Whch secury vulnerables really maer?, Informaon Secury Techncal Repor., Vol. 10, No. 4, pp , [3] Geem, Z.W., Km, J.H., and Loganahan, G.V. A new heursc opmzaon algorhm: harmony search, Smulaon, Vol. 76, No. 2, pp , [4] Gupa, M., Rees, J., Chaurved, A., and Ch, J. Machng nformaon secury vulnerables o organzaonal secury profles: a genec algorhm approach, Decson Suppor Sysems, Vol. 41, No. 6, pp , [5] La, Y. and Hsa, P. Usng he vulnerably nformaon of compuer sysems o mprove he nework secury, Compuer Communcaons, Vol. 30, No. 9, pp , [6] Lee, K.S., and Geem, Z.W. A new srucural opmzaon mehod based on he harmony search algorhm, Compuers and Srucures, Vol. 82, No. 9-10, pp , [7] Rok, B., and Borka, J. B. Towards a sandard approach for quanfyng an ICT secury nvesmen, Compuer Sandards & Inerfaces, Vol. 30, No. 4, pp , [8] Vener H. S., and Eloff J. H. P., A aonomy for nformaon secury echnologes, Compuers & Secury, Vol. 22, No. 4, pp , [9] Zzler, E., Evoluonary Algorhms for Mulobjecve Opmzaon: Mehods and Applcaons, PhD hess, Swss Federal Insue of Technology, Zurch, CONCLUSION In hs paper, he problem of securng nformaon sysems was suded as b-objecve problem where we have o mnmze he nformaon sysem s vulnerables wh a mnmum cos. Ths problem was defned and formulaed as a dynamc resource allocaon decson
V.Abramov - FURTHER ANALYSIS OF CONFIDENCE INTERVALS FOR LARGE CLIENT/SERVER COMPUTER NETWORKS
R&RATA # Vol.) 8, March FURTHER AALYSIS OF COFIDECE ITERVALS FOR LARGE CLIET/SERVER COMPUTER ETWORKS Vyacheslav Abramov School of Mahemacal Scences, Monash Unversy, Buldng 8, Level 4, Clayon Campus, Wellngon
More informationRobustness Experiments with Two Variance Components
Naonal Insue of Sandards and Technology (NIST) Informaon Technology Laboraory (ITL) Sascal Engneerng Dvson (SED) Robusness Expermens wh Two Varance Componens by Ana Ivelsse Avlés avles@ns.gov Conference
More informationEEL 6266 Power System Operation and Control. Chapter 5 Unit Commitment
EEL 6266 Power Sysem Operaon and Conrol Chaper 5 Un Commmen Dynamc programmng chef advanage over enumeraon schemes s he reducon n he dmensonaly of he problem n a src prory order scheme, here are only N
More informationVariants of Pegasos. December 11, 2009
Inroducon Varans of Pegasos SooWoong Ryu bshboy@sanford.edu December, 009 Youngsoo Cho yc344@sanford.edu Developng a new SVM algorhm s ongong research opc. Among many exng SVM algorhms, we wll focus on
More informationGraduate Macroeconomics 2 Problem set 5. - Solutions
Graduae Macroeconomcs 2 Problem se. - Soluons Queson 1 To answer hs queson we need he frms frs order condons and he equaon ha deermnes he number of frms n equlbrum. The frms frs order condons are: F K
More informationJ i-1 i. J i i+1. Numerical integration of the diffusion equation (I) Finite difference method. Spatial Discretization. Internal nodes.
umercal negraon of he dffuson equaon (I) Fne dfference mehod. Spaal screaon. Inernal nodes. R L V For hermal conducon le s dscree he spaal doman no small fne spans, =,,: Balance of parcles for an nernal
More informationModeling and Solving of Multi-Product Inventory Lot-Sizing with Supplier Selection under Quantity Discounts
nernaonal ournal of Appled Engneerng Research SSN 0973-4562 Volume 13, Number 10 (2018) pp. 8708-8713 Modelng and Solvng of Mul-Produc nvenory Lo-Szng wh Suppler Selecon under Quany Dscouns Naapa anchanaruangrong
More informationCubic Bezier Homotopy Function for Solving Exponential Equations
Penerb Journal of Advanced Research n Compung and Applcaons ISSN (onlne: 46-97 Vol. 4, No.. Pages -8, 6 omoopy Funcon for Solvng Eponenal Equaons S. S. Raml *,,. Mohamad Nor,a, N. S. Saharzan,b and M.
More informationIn the complete model, these slopes are ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL. (! i+1 -! i ) + [(!") i+1,q - [(!
ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL The frs hng o es n wo-way ANOVA: Is here neracon? "No neracon" means: The man effecs model would f. Ths n urn means: In he neracon plo (wh A on he horzonal
More informationGenetic Algorithm in Parameter Estimation of Nonlinear Dynamic Systems
Genec Algorhm n Parameer Esmaon of Nonlnear Dynamc Sysems E. Paeraks manos@egnaa.ee.auh.gr V. Perds perds@vergna.eng.auh.gr Ah. ehagas kehagas@egnaa.ee.auh.gr hp://skron.conrol.ee.auh.gr/kehagas/ndex.hm
More informationDynamic Team Decision Theory. EECS 558 Project Shrutivandana Sharma and David Shuman December 10, 2005
Dynamc Team Decson Theory EECS 558 Proec Shruvandana Sharma and Davd Shuman December 0, 005 Oulne Inroducon o Team Decson Theory Decomposon of he Dynamc Team Decson Problem Equvalence of Sac and Dynamc
More informationOnline Supplement for Dynamic Multi-Technology. Production-Inventory Problem with Emissions Trading
Onlne Supplemen for Dynamc Mul-Technology Producon-Invenory Problem wh Emssons Tradng by We Zhang Zhongsheng Hua Yu Xa and Baofeng Huo Proof of Lemma For any ( qr ) Θ s easy o verfy ha he lnear programmng
More information( ) () we define the interaction representation by the unitary transformation () = ()
Hgher Order Perurbaon Theory Mchael Fowler 3/7/6 The neracon Represenaon Recall ha n he frs par of hs course sequence, we dscussed he chrödnger and Hesenberg represenaons of quanum mechancs here n he chrödnger
More informationNew M-Estimator Objective Function. in Simultaneous Equations Model. (A Comparative Study)
Inernaonal Mahemacal Forum, Vol. 8, 3, no., 7 - HIKARI Ld, www.m-hkar.com hp://dx.do.org/.988/mf.3.3488 New M-Esmaor Objecve Funcon n Smulaneous Equaons Model (A Comparave Sudy) Ahmed H. Youssef Professor
More informationTHE PREDICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS
THE PREICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS INTROUCTION The wo dmensonal paral dfferenal equaons of second order can be used for he smulaon of compeve envronmen n busness The arcle presens he
More informationGENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS. Youngwoo Ahn and Kitae Kim
Korean J. Mah. 19 (2011), No. 3, pp. 263 272 GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS Youngwoo Ahn and Kae Km Absrac. In he paper [1], an explc correspondence beween ceran
More informationCS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 4
CS434a/54a: Paern Recognon Prof. Olga Veksler Lecure 4 Oulne Normal Random Varable Properes Dscrmnan funcons Why Normal Random Varables? Analycally racable Works well when observaon comes form a corruped
More informationSolution in semi infinite diffusion couples (error function analysis)
Soluon n sem nfne dffuson couples (error funcon analyss) Le us consder now he sem nfne dffuson couple of wo blocks wh concenraon of and I means ha, n a A- bnary sysem, s bondng beween wo blocks made of
More informationLecture VI Regression
Lecure VI Regresson (Lnear Mehods for Regresson) Conens: Lnear Mehods for Regresson Leas Squares, Gauss Markov heorem Recursve Leas Squares Lecure VI: MLSC - Dr. Sehu Vjayakumar Lnear Regresson Model M
More informationReactive Methods to Solve the Berth AllocationProblem with Stochastic Arrival and Handling Times
Reacve Mehods o Solve he Berh AllocaonProblem wh Sochasc Arrval and Handlng Tmes Nsh Umang* Mchel Berlare* * TRANSP-OR, Ecole Polyechnque Fédérale de Lausanne Frs Workshop on Large Scale Opmzaon November
More informationJanuary Examinations 2012
Page of 5 EC79 January Examnaons No. of Pages: 5 No. of Quesons: 8 Subjec ECONOMICS (POSTGRADUATE) Tle of Paper EC79 QUANTITATIVE METHODS FOR BUSINESS AND FINANCE Tme Allowed Two Hours ( hours) Insrucons
More informationAttribute Reduction Algorithm Based on Discernibility Matrix with Algebraic Method GAO Jing1,a, Ma Hui1, Han Zhidong2,b
Inernaonal Indusral Informacs and Compuer Engneerng Conference (IIICEC 05) Arbue educon Algorhm Based on Dscernbly Marx wh Algebrac Mehod GAO Jng,a, Ma Hu, Han Zhdong,b Informaon School, Capal Unversy
More informationMANY real-world applications (e.g. production
Barebones Parcle Swarm for Ineger Programmng Problems Mahamed G. H. Omran, Andres Engelbrech and Ayed Salman Absrac The performance of wo recen varans of Parcle Swarm Opmzaon (PSO) when appled o Ineger
More informationPARTICLE SWARM OPTIMIZATION BASED ON BOTTLENECK MACHINE FOR JOBSHOP SCHEDULING
Proceedng 7 h Inernaonal Semnar on Indusral Engneerng and Managemen PARTICLE SWARM OPTIMIZATION BASED ON BOTTLENECK MACHINE FOR JOBSHOP SCHEDULING Rahm Mauldya Indusral Engneerng Deparmen, Indusral Engneerng
More informationCS 268: Packet Scheduling
Pace Schedulng Decde when and wha pace o send on oupu ln - Usually mplemened a oupu nerface CS 68: Pace Schedulng flow Ion Soca March 9, 004 Classfer flow flow n Buffer managemen Scheduler soca@cs.bereley.edu
More informationUNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 2017 EXAMINATION
INTERNATIONAL TRADE T. J. KEHOE UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 27 EXAMINATION Please answer wo of he hree quesons. You can consul class noes, workng papers, and arcles whle you are workng on he
More informationUsing Aggregation to Construct Periodic Policies for Routing Jobs to Parallel Servers with Deterministic Service Times
Usng Aggregaon o Consruc Perodc Polces for Roung Jobs o Parallel Servers wh Deermnsc Servce Tmes Jeffrey W. errmann A. James Clark School of Engneerng 2181 Marn all Unversy of Maryland College Park, MD
More informationSingle-loop System Reliability-Based Design & Topology Optimization (SRBDO/SRBTO): A Matrix-based System Reliability (MSR) Method
10 h US Naonal Congress on Compuaonal Mechancs Columbus, Oho 16-19, 2009 Sngle-loop Sysem Relably-Based Desgn & Topology Opmzaon (SRBDO/SRBTO): A Marx-based Sysem Relably (MSR) Mehod Tam Nguyen, Junho
More informationLecture 6: Learning for Control (Generalised Linear Regression)
Lecure 6: Learnng for Conrol (Generalsed Lnear Regresson) Conens: Lnear Mehods for Regresson Leas Squares, Gauss Markov heorem Recursve Leas Squares Lecure 6: RLSC - Prof. Sehu Vjayakumar Lnear Regresson
More information(,,, ) (,,, ). In addition, there are three other consumers, -2, -1, and 0. Consumer -2 has the utility function
MACROECONOMIC THEORY T J KEHOE ECON 87 SPRING 5 PROBLEM SET # Conder an overlappng generaon economy le ha n queon 5 on problem e n whch conumer lve for perod The uly funcon of he conumer born n perod,
More informationPARTICLE SWARM OPTIMIZATION FOR INTERACTIVE FUZZY MULTIOBJECTIVE NONLINEAR PROGRAMMING. T. Matsui, M. Sakawa, K. Kato, T. Uno and K.
Scenae Mahemacae Japoncae Onlne, e-2008, 1 13 1 PARTICLE SWARM OPTIMIZATION FOR INTERACTIVE FUZZY MULTIOBJECTIVE NONLINEAR PROGRAMMING T. Masu, M. Sakawa, K. Kao, T. Uno and K. Tamada Receved February
More informationOn One Analytic Method of. Constructing Program Controls
Appled Mahemacal Scences, Vol. 9, 05, no. 8, 409-407 HIKARI Ld, www.m-hkar.com hp://dx.do.org/0.988/ams.05.54349 On One Analyc Mehod of Consrucng Program Conrols A. N. Kvko, S. V. Chsyakov and Yu. E. Balyna
More informationTSS = SST + SSE An orthogonal partition of the total SS
ANOVA: Topc 4. Orhogonal conrass [ST&D p. 183] H 0 : µ 1 = µ =... = µ H 1 : The mean of a leas one reamen group s dfferen To es hs hypohess, a basc ANOVA allocaes he varaon among reamen means (SST) equally
More informationOutline. Probabilistic Model Learning. Probabilistic Model Learning. Probabilistic Model for Time-series Data: Hidden Markov Model
Probablsc Model for Tme-seres Daa: Hdden Markov Model Hrosh Mamsuka Bonformacs Cener Kyoo Unversy Oulne Three Problems for probablsc models n machne learnng. Compung lkelhood 2. Learnng 3. Parsng (predcon
More information[ ] 2. [ ]3 + (Δx i + Δx i 1 ) / 2. Δx i-1 Δx i Δx i+1. TPG4160 Reservoir Simulation 2018 Lecture note 3. page 1 of 5
TPG460 Reservor Smulaon 08 page of 5 DISCRETIZATIO OF THE FOW EQUATIOS As we already have seen, fne dfference appromaons of he paral dervaves appearng n he flow equaons may be obaned from Taylor seres
More informationEcon107 Applied Econometrics Topic 5: Specification: Choosing Independent Variables (Studenmund, Chapter 6)
Econ7 Appled Economercs Topc 5: Specfcaon: Choosng Independen Varables (Sudenmund, Chaper 6 Specfcaon errors ha we wll deal wh: wrong ndependen varable; wrong funconal form. Ths lecure deals wh wrong ndependen
More informationPerformance Analysis for a Network having Standby Redundant Unit with Waiting in Repair
TECHNI Inernaonal Journal of Compung Scence Communcaon Technologes VOL.5 NO. July 22 (ISSN 974-3375 erformance nalyss for a Nework havng Sby edundan Un wh ang n epar Jendra Sngh 2 abns orwal 2 Deparmen
More informationHEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD
Journal of Appled Mahemacs and Compuaonal Mechancs 3, (), 45-5 HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Sansław Kukla, Urszula Sedlecka Insue of Mahemacs,
More informationISSN MIT Publications
MIT Inernaonal Journal of Elecrcal and Insrumenaon Engneerng Vol. 1, No. 2, Aug 2011, pp 93-98 93 ISSN 2230-7656 MIT Publcaons A New Approach for Solvng Economc Load Dspach Problem Ansh Ahmad Dep. of Elecrcal
More informationAPOC #232 Capacity Planning for Fault-Tolerant All-Optical Network
APOC #232 Capacy Plannng for Faul-Toleran All-Opcal Nework Mchael Kwok-Shng Ho and Kwok-wa Cheung Deparmen of Informaon ngneerng The Chnese Unversy of Hong Kong Shan, N.T., Hong Kong SAR, Chna -mal: kwcheung@e.cuhk.edu.hk
More informationFTCS Solution to the Heat Equation
FTCS Soluon o he Hea Equaon ME 448/548 Noes Gerald Reckenwald Porland Sae Unversy Deparmen of Mechancal Engneerng gerry@pdxedu ME 448/548: FTCS Soluon o he Hea Equaon Overvew Use he forward fne d erence
More informationDual Population-Based Incremental Learning for Problem Optimization in Dynamic Environments
Dual Populaon-Based Incremenal Learnng for Problem Opmzaon n Dynamc Envronmens hengxang Yang, Xn Yao In recen years here s a growng neres n he research of evoluonary algorhms for dynamc opmzaon problems
More informationJohn Geweke a and Gianni Amisano b a Departments of Economics and Statistics, University of Iowa, USA b European Central Bank, Frankfurt, Germany
Herarchcal Markov Normal Mxure models wh Applcaons o Fnancal Asse Reurns Appendx: Proofs of Theorems and Condonal Poseror Dsrbuons John Geweke a and Gann Amsano b a Deparmens of Economcs and Sascs, Unversy
More informationThe Dynamic Programming Models for Inventory Control System with Time-varying Demand
The Dynamc Programmng Models for Invenory Conrol Sysem wh Tme-varyng Demand Truong Hong Trnh (Correspondng auhor) The Unversy of Danang, Unversy of Economcs, Venam Tel: 84-236-352-5459 E-mal: rnh.h@due.edu.vn
More informationChapter 6: AC Circuits
Chaper 6: AC Crcus Chaper 6: Oulne Phasors and he AC Seady Sae AC Crcus A sable, lnear crcu operang n he seady sae wh snusodal excaon (.e., snusodal seady sae. Complee response forced response naural response.
More informationComb Filters. Comb Filters
The smple flers dscussed so far are characered eher by a sngle passband and/or a sngle sopband There are applcaons where flers wh mulple passbands and sopbands are requred Thecomb fler s an example of
More informationLecture 11 SVM cont
Lecure SVM con. 0 008 Wha we have done so far We have esalshed ha we wan o fnd a lnear decson oundary whose margn s he larges We know how o measure he margn of a lnear decson oundary Tha s: he mnmum geomerc
More informationA Novel Iron Loss Reduction Technique for Distribution Transformers. Based on a Combined Genetic Algorithm - Neural Network Approach
A Novel Iron Loss Reducon Technque for Dsrbuon Transformers Based on a Combned Genec Algorhm - Neural Nework Approach Palvos S. Georglaks Nkolaos D. Doulams Anasasos D. Doulams Nkos D. Hazargyrou and Sefanos
More informationIncluding the ordinary differential of distance with time as velocity makes a system of ordinary differential equations.
Soluons o Ordnary Derenal Equaons An ordnary derenal equaon has only one ndependen varable. A sysem o ordnary derenal equaons consss o several derenal equaons each wh he same ndependen varable. An eample
More informationWiH Wei He
Sysem Idenfcaon of onlnear Sae-Space Space Baery odels WH We He wehe@calce.umd.edu Advsor: Dr. Chaochao Chen Deparmen of echancal Engneerng Unversy of aryland, College Par 1 Unversy of aryland Bacground
More informationDual Approximate Dynamic Programming for Large Scale Hydro Valleys
Dual Approxmae Dynamc Programmng for Large Scale Hydro Valleys Perre Carpener and Jean-Phlppe Chanceler 1 ENSTA ParsTech and ENPC ParsTech CMM Workshop, January 2016 1 Jon work wh J.-C. Alas, suppored
More informationAn introduction to Support Vector Machine
An nroducon o Suppor Vecor Machne 報告者 : 黃立德 References: Smon Haykn, "Neural Neworks: a comprehensve foundaon, second edon, 999, Chaper 2,6 Nello Chrsann, John Shawe-Tayer, An Inroducon o Suppor Vecor Machnes,
More informationCHAPTER 10: LINEAR DISCRIMINATION
CHAPER : LINEAR DISCRIMINAION Dscrmnan-based Classfcaon 3 In classfcaon h K classes (C,C,, C k ) We defned dscrmnan funcon g j (), j=,,,k hen gven an es eample, e chose (predced) s class label as C f g
More informationProbabilistic Power Distribution Planning Using Multi-Objective Harmony Search Algorithm
Journal of Operaon and Auomaon n Power Engneerng Vol. 6, No. 1, Jun. 2018, Pages: 111-125 hp://joape.uma.ac.r Probablsc Power Dsrbuon Plannng Usng Mul-Objecve Harmony Search Algorhm A. Rasgou 1, J. Moshagh
More informationBayes rule for a classification problem INF Discriminant functions for the normal density. Euclidean distance. Mahalanobis distance
INF 43 3.. Repeon Anne Solberg (anne@f.uo.no Bayes rule for a classfcaon problem Suppose we have J, =,...J classes. s he class label for a pxel, and x s he observed feaure vecor. We can use Bayes rule
More informationOptimal environmental charges under imperfect compliance
ISSN 1 746-7233, England, UK World Journal of Modellng and Smulaon Vol. 4 (28) No. 2, pp. 131-139 Opmal envronmenal charges under mperfec complance Dajn Lu 1, Ya Wang 2 Tazhou Insue of Scence and Technology,
More informationEffective Task Scheduling and Dynamic Resource Optimization based on Heuristic Algorithms in Cloud Computing Environment
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL 11, NO 12, Dec 2017 5780 Copyrgh c2017 KSII Effecve Task Schedulng and Dynamc Resource Opmzaon based on Heursc Algorhms n Cloud Compung Envronmen
More informationA Novel Discrete Differential Evolution Algoritnm for Task Scheduling in Heterogeneous Computing Systems
Proceedngs of he 2009 IEEE Inernaonal Conference on Sysems, Man, and Cybernecs San Anono, TX, USA - Ocober 2009 A Novel Dscree Dfferenal Evoluon Algornm for Task Schedulng n Heerogeneous Compung Sysems
More informationThe Finite Element Method for the Analysis of Non-Linear and Dynamic Systems
Swss Federal Insue of Page 1 The Fne Elemen Mehod for he Analyss of Non-Lnear and Dynamc Sysems Prof. Dr. Mchael Havbro Faber Dr. Nebojsa Mojslovc Swss Federal Insue of ETH Zurch, Swzerland Mehod of Fne
More informationLet s treat the problem of the response of a system to an applied external force. Again,
Page 33 QUANTUM LNEAR RESPONSE FUNCTON Le s rea he problem of he response of a sysem o an appled exernal force. Agan, H() H f () A H + V () Exernal agen acng on nernal varable Hamlonan for equlbrum sysem
More informationLi An-Ping. Beijing , P.R.China
A New Type of Cpher: DICING_csb L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Absrac: In hs paper, we wll propose a new ype of cpher named DICING_csb, whch s derved from our prevous sream cpher DICING.
More informationM. Y. Adamu Mathematical Sciences Programme, AbubakarTafawaBalewa University, Bauchi, Nigeria
IOSR Journal of Mahemacs (IOSR-JM e-issn: 78-578, p-issn: 9-765X. Volume 0, Issue 4 Ver. IV (Jul-Aug. 04, PP 40-44 Mulple SolonSoluons for a (+-dmensonalhroa-sasuma shallow waer wave equaon UsngPanlevé-Bӓclund
More informationABSTRACT. KEYWORDS Hybrid, Genetic Algorithm, Shipping, Dispatching, Vehicle, Time Windows INTRODUCTION
A HYBRID GENETIC ALGORITH FOR A DYNAIC INBOUND ORDERING AND SHIPPING AND OUTBOUND DISPATCHING PROBLE WITH HETEROGENEOUS VEHICLE TYPES AND DELIVERY TIE WINDOWS by Byung Soo Km, Woon-Seek Lee, and Young-Seok
More informationTesting a new idea to solve the P = NP problem with mathematical induction
Tesng a new dea o solve he P = NP problem wh mahemacal nducon Bacground P and NP are wo classes (ses) of languages n Compuer Scence An open problem s wheher P = NP Ths paper ess a new dea o compare he
More informationMath 128b Project. Jude Yuen
Mah 8b Proec Jude Yuen . Inroducon Le { Z } be a sequence of observed ndependen vecor varables. If he elemens of Z have a on normal dsrbuon hen { Z } has a mean vecor Z and a varancecovarance marx z. Geomercally
More informationThe preemptive resource-constrained project scheduling problem subject to due dates and preemption penalties: An integer programming approach
Journal of Indusral Engneerng 1 (008) 35-39 The preempve resource-consraned projec schedulng problem subjec o due daes and preempon penales An neger programmng approach B. Afshar Nadjaf Deparmen of Indusral
More informationComputing Relevance, Similarity: The Vector Space Model
Compung Relevance, Smlary: The Vecor Space Model Based on Larson and Hears s sldes a UC-Bereley hp://.sms.bereley.edu/courses/s0/f00/ aabase Managemen Sysems, R. Ramarshnan ocumen Vecors v ocumens are
More informationOrdinary Differential Equations in Neuroscience with Matlab examples. Aim 1- Gain understanding of how to set up and solve ODE s
Ordnary Dfferenal Equaons n Neuroscence wh Malab eamples. Am - Gan undersandng of how o se up and solve ODE s Am Undersand how o se up an solve a smple eample of he Hebb rule n D Our goal a end of class
More informationGMAW Welding Optimization Using Genetic Algorithms
D. S. Correa e al D. S. Correa, C. V. Gonçalves, Sebasão S. C. Junor and V. A. Ferrares Federal Unversy of Uberlânda Faculy of Mechancal Engneerng Av. João Naves de Ávla,.11 38400-90 Uberlânda, MG. Brazl
More informationCH.3. COMPATIBILITY EQUATIONS. Continuum Mechanics Course (MMC) - ETSECCPB - UPC
CH.3. COMPATIBILITY EQUATIONS Connuum Mechancs Course (MMC) - ETSECCPB - UPC Overvew Compably Condons Compably Equaons of a Poenal Vecor Feld Compably Condons for Infnesmal Srans Inegraon of he Infnesmal
More informationRelative controllability of nonlinear systems with delays in control
Relave conrollably o nonlnear sysems wh delays n conrol Jerzy Klamka Insue o Conrol Engneerng, Slesan Techncal Unversy, 44- Glwce, Poland. phone/ax : 48 32 37227, {jklamka}@a.polsl.glwce.pl Keywor: Conrollably.
More informationExistence and Uniqueness Results for Random Impulsive Integro-Differential Equation
Global Journal of Pure and Appled Mahemacs. ISSN 973-768 Volume 4, Number 6 (8), pp. 89-87 Research Inda Publcaons hp://www.rpublcaon.com Exsence and Unqueness Resuls for Random Impulsve Inegro-Dfferenal
More informationEfficient Asynchronous Channel Hopping Design for Cognitive Radio Networks
Effcen Asynchronous Channel Hoppng Desgn for Cognve Rado Neworks Chh-Mn Chao, Chen-Yu Hsu, and Yun-ng Lng Absrac In a cognve rado nework (CRN), a necessary condon for nodes o communcae wh each oher s ha
More information5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)
5h Inernaonal onference on Advanced Desgn and Manufacurng Engneerng (IADME 5 The Falure Rae Expermenal Sudy of Specal N Machne Tool hunshan He, a, *, La Pan,b and Bng Hu 3,c,,3 ollege of Mechancal and
More informationAdvanced Machine Learning & Perception
Advanced Machne Learnng & Percepon Insrucor: Tony Jebara SVM Feaure & Kernel Selecon SVM Eensons Feaure Selecon (Flerng and Wrappng) SVM Feaure Selecon SVM Kernel Selecon SVM Eensons Classfcaon Feaure/Kernel
More informationEvolutionary Algorithms for Multi-Criterion Optimization: A Survey
Inernaonal Journal of Compung & Informaon Scences Vol. 2, No., Aprl 2004 38 Evoluonary Algorhms for Mul-Creron Opmzaon: A Survey Ashsh Ghosh Machne Inellgence Un, Indan Sascal Insue, Kolkaa-08, Inda. Sachdananda
More informationMeta-Heuristic Optimization techniques in power systems
Proceedngs of he 2nd IASME / WSEAS Inernaonal Conference on Energy & Envronmen (EE07), Pororoz, Slovena, May 15-17, 2007 163 Mea-Heursc Opmzaon echnques n power sysems Vlachos Arsds Deparmen of Informacs
More informationFall 2010 Graduate Course on Dynamic Learning
Fall 200 Graduae Course on Dynamc Learnng Chaper 4: Parcle Flers Sepember 27, 200 Byoung-Tak Zhang School of Compuer Scence and Engneerng & Cognve Scence and Bran Scence Programs Seoul aonal Unversy hp://b.snu.ac.kr/~bzhang/
More informationClustering (Bishop ch 9)
Cluserng (Bshop ch 9) Reference: Daa Mnng by Margare Dunham (a slde source) 1 Cluserng Cluserng s unsupervsed learnng, here are no class labels Wan o fnd groups of smlar nsances Ofen use a dsance measure
More informationConstrained-Storage Variable-Branch Neural Tree for. Classification
Consraned-Sorage Varable-Branch Neural Tree for Classfcaon Shueng-Ben Yang Deparmen of Dgal Conen of Applcaon and Managemen Wenzao Ursulne Unversy of Languages 900 Mnsu s oad Kaohsng 807, Tawan. Tel :
More informationComputational results on new staff scheduling benchmark instances
TECHNICAL REPORT Compuaonal resuls on new saff shedulng enhmark nsanes Tm Curos Rong Qu ASAP Researh Group Shool of Compuer Sene Unersy of Nongham NG8 1BB Nongham UK Frs pulshed onlne: 19-Sep-2014 las
More informationData Collection Definitions of Variables - Conceptualize vs Operationalize Sample Selection Criteria Source of Data Consistency of Data
Apply Sascs and Economercs n Fnancal Research Obj. of Sudy & Hypoheses Tesng From framework objecves of sudy are needed o clarfy, hen, n research mehodology he hypoheses esng are saed, ncludng esng mehods.
More informationApproximate Analytic Solution of (2+1) - Dimensional Zakharov-Kuznetsov(Zk) Equations Using Homotopy
Arcle Inernaonal Journal of Modern Mahemacal Scences, 4, (): - Inernaonal Journal of Modern Mahemacal Scences Journal homepage: www.modernscenfcpress.com/journals/jmms.aspx ISSN: 66-86X Florda, USA Approxmae
More informationTime-interval analysis of β decay. V. Horvat and J. C. Hardy
Tme-nerval analyss of β decay V. Horva and J. C. Hardy Work on he even analyss of β decay [1] connued and resuled n he developmen of a novel mehod of bea-decay me-nerval analyss ha produces hghly accurae
More informationDensity Matrix Description of NMR BCMB/CHEM 8190
Densy Marx Descrpon of NMR BCMBCHEM 89 Operaors n Marx Noaon Alernae approach o second order specra: ask abou x magnezaon nsead of energes and ranson probables. If we say wh one bass se, properes vary
More informationRobust and Accurate Cancer Classification with Gene Expression Profiling
Robus and Accurae Cancer Classfcaon wh Gene Expresson Proflng (Compuaonal ysems Bology, 2005) Auhor: Hafeng L, Keshu Zhang, ao Jang Oulne Background LDA (lnear dscrmnan analyss) and small sample sze problem
More informationTheoretical Analysis of Biogeography Based Optimization Aijun ZHU1,2,3 a, Cong HU1,3, Chuanpei XU1,3, Zhi Li1,3
6h Inernaonal Conference on Machnery, Maerals, Envronmen, Boechnology and Compuer (MMEBC 6) Theorecal Analyss of Bogeography Based Opmzaon Aun ZU,,3 a, Cong U,3, Chuanpe XU,3, Zh L,3 School of Elecronc
More informationMechanics Physics 151
Mechancs Physcs 5 Lecure 9 Hamlonan Equaons of Moon (Chaper 8) Wha We Dd Las Tme Consruced Hamlonan formalsm H ( q, p, ) = q p L( q, q, ) H p = q H q = p H = L Equvalen o Lagrangan formalsm Smpler, bu
More informationLearning Objectives. Self Organization Map. Hamming Distance(1/5) Introduction. Hamming Distance(3/5) Hamming Distance(2/5) 15/04/2015
/4/ Learnng Objecves Self Organzaon Map Learnng whou Exaples. Inroducon. MAXNET 3. Cluserng 4. Feaure Map. Self-organzng Feaure Map 6. Concluson 38 Inroducon. Learnng whou exaples. Daa are npu o he syse
More informationThe topology and signature of the regulatory interactions predict the expression pattern of the segment polarity genes in Drosophila m elanogaster
The opology and sgnaure of he regulaory neracons predc he expresson paern of he segmen polary genes n Drosophla m elanogaser Hans Ohmer and Réka Alber Deparmen of Mahemacs Unversy of Mnnesoa Complex bologcal
More informationDetermining the Number of Games Needed to Guarantee an NHL Playoff Spot
Deermnng he Number of Games Needed o Guaranee an NHL Playoff Spo Tyrel Russell and Peer van Bee Cheron School of Compuer Scence Unversy of Waerloo {crussel,vanbee}@uwaerloo.ca Absrac. Many spors fans nves
More informationTight results for Next Fit and Worst Fit with resource augmentation
Tgh resuls for Nex F and Wors F wh resource augmenaon Joan Boyar Leah Epsen Asaf Levn Asrac I s well known ha he wo smple algorhms for he classc n packng prolem, NF and WF oh have an approxmaon rao of
More informationMechanics Physics 151
Mechancs Physcs 5 Lecure 9 Hamlonan Equaons of Moon (Chaper 8) Wha We Dd Las Tme Consruced Hamlonan formalsm Hqp (,,) = qp Lqq (,,) H p = q H q = p H L = Equvalen o Lagrangan formalsm Smpler, bu wce as
More informationFI 3103 Quantum Physics
/9/4 FI 33 Quanum Physcs Aleander A. Iskandar Physcs of Magnesm and Phooncs Research Grou Insu Teknolog Bandung Basc Conces n Quanum Physcs Probably and Eecaon Value Hesenberg Uncerany Prncle Wave Funcon
More informationA Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window
A Deermnsc Algorhm for Summarzng Asynchronous Sreams over a Sldng ndow Cosas Busch Rensselaer Polyechnc Insue Srkana Trhapura Iowa Sae Unversy Oulne of Talk Inroducon Algorhm Analyss Tme C Daa sream: 3
More informationDensity Matrix Description of NMR BCMB/CHEM 8190
Densy Marx Descrpon of NMR BCMBCHEM 89 Operaors n Marx Noaon If we say wh one bass se, properes vary only because of changes n he coeffcens weghng each bass se funcon x = h< Ix > - hs s how we calculae
More informationA Principled Approach to MILP Modeling
A Prncpled Approach o MILP Modelng John Hooer Carnege Mellon Unvers Augus 008 Slde Proposal MILP modelng s an ar, bu need no be unprncpled. Slde Proposal MILP modelng s an ar, bu need no be unprncpled.
More informationMulti-priority Online Scheduling with Cancellations
Submed o Operaons Research manuscrp (Please, provde he manuscrp number!) Auhors are encouraged o subm new papers o INFORMS journals by means of a syle fle emplae, whch ncludes he journal le. However, use
More informationNotes on the stability of dynamic systems and the use of Eigen Values.
Noes on he sabl of dnamc ssems and he use of Egen Values. Source: Macro II course noes, Dr. Davd Bessler s Tme Seres course noes, zarads (999) Ineremporal Macroeconomcs chaper 4 & Techncal ppend, and Hamlon
More informatione-journal Reliability: Theory& Applications No 2 (Vol.2) Vyacheslav Abramov
June 7 e-ournal Relably: Theory& Applcaons No (Vol. CONFIDENCE INTERVALS ASSOCIATED WITH PERFORMANCE ANALYSIS OF SYMMETRIC LARGE CLOSED CLIENT/SERVER COMPUTER NETWORKS Absrac Vyacheslav Abramov School
More information