Anti Fraud Services Founding Member Associate Member of..

Size: px
Start display at page:

Download "Anti Fraud Services Founding Member Associate Member of.."

Transcription

1 Ati Fraud Services Foudig Member Associate Member of..

2 Ati Fraud Overview BTS prides itself o its developmet ad deploymet of its Ati-Fraud services. Its Fraud prevetio services provide a seamless fraud solutio by combiig early detectio of fraud activities ad real-time blockig of traffic to maximize rapid respose. It reuires prior aalysis to systematically moitor customer activity, busiess relatioships ad o-et trasactios or processes. Whe suspicious traffic is detected ad meets the thresholds established, the system will dyamically cofigure the SBC to stop or degrade the traffic withi miutes. The real-time detectio protects reveue losses by collectig data o a rage of actioable metrics which is stored i a database. This iformatio is aalyzed to provide real-time feed of curret threats ad traffic patters. The process geerates alarms, otificatios, historical aalysis, real-time traffic reports ad segmeted data for greater precise measuremets. It s time to fight fraud together BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 2

3 Detectio & Prevetio Platform BTS Fraud Detectio Services provides operators a strategic advatage eeded to stop mobile fraud. Our experiece ad prove results to stop SIM Box fraud ad other mobile fraud techiues, has provided BTS with a soudig track record & experiece for customers to realize the assurace of a secure etwork. Operators worldwide are experiecig reveue loss, high customer chur ad degraded customer uality of experiece due to advaces i mobile fraud. BTS platform combats the followig fraud techiues: SIM Box Elimiatio Iteratioal Reveue Share Fraud (IRSF) Prepaid Chargig Abuse Iter-Market Bypass Fraud Tromboig (Reverse Bypass Fraud) These fraud actios decrease customer chur rate & geerates immediate reveue icrease whe a fraud operatio is shut dow BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 3

4 Security Services Telecoms Fraud prevetio services reuires prior aalysis to systematically moitor customer activity, busiess relatioships ad o-et trasactios or processes. BTS is recogized worldwide for its leadership i the fight agaist fraud i the telecoms sector. Wherever BTS s ati-fraud service has bee implemeted, the discoectio of fraudulet lies traslates ito a icrease i the volume of legal calls ad a subseuet icrease i reveues for local operators ad govermets. I a cocise approach combiig iovative detectio techologies ad multilateral collaboratio, BTS s Fraud Maagemet Departmet works closely with all stakeholders to couter curret ad ew fraudulet patters. Network Security Audit Patter aalysis Risk Idex creatio Classificatio i traffic flows Real-Time Traffic Aalisys Call Batteries with itelliget routig CDR exchage program SIMbox locatio BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 4

5 Network Security Audit BTS has ivested i Research ad Developmet kow-how i creatig the prevetive tools ad services eeded to idetify ad combat these fraudulet practices. The Network Security Audit helps Wholesale Fraud Maagers to face the challeges icludig FAS (False Aswer Supervisio) Bypass, Arbitrage, Traffic Pumpig, Tromboig ad more. It also assists the Wholesale Fraud Maagemet uit whe hadlig disputes betwee carriers resultig from fraud which reuires access to detail traffic iformatio. Through BTS s Network Security Audit, a process of o-itrusive auditig most of which is doe without the eed for MNO s techical staff or facility access. BTS will review ad aalyze the customer s etwork security profile. BTS will traslate the complex techical data ito clear busiess risk statemets, eable the leadership team to make the appropriate busiess decisios ad follow GSMA stadard etwork security. Phase 1: Short Aalysis Iitial Network Security Profile Assessmet & Report Phase 2: Coect with Network Departmet Techical Review & Advaced Network Security Audit Phase 3: O-goig Audits ad Veificatios Verificatio Audit & Security Risk Mitigatios BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 5

6 BTS Ati-Fraud Alarms Alarms soud whe icreases i traffic volumes to destiatios outside the customer s ormal traffic patter are detected. Alarms soud whe detectio of a 10% icrease i call duratio from calls received by customer is reached. Alarms soud whe o average whe more tha 10% of a customer s call experieces a 50% icrease withi the hour over the average ACD measuremet. ANI s DNI Criteria Whe repeated ANI appears with low ASR comig from the same supplier. Whe ANI ad/or DNI umbers are repeated more tha 4 times i a hour with a duratio higher tha 8 miutes. Duplicated calls usig the same umber for origiatio ad termiatio of a call. ANIs & DNIs registerig more tha 60 miutes withi a 3 hour period. Supplier Detectio Alarm Warig System Suppliers registerig higher statistics over pre-defied parameters for a give destiatio as compared to others. Suppliers that cotiuously are repeat offeders to the aalysis metioed above. BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 6

7 A robocall is a self-geerated phoe call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. BTS has: Access to hudreds of suppliers. Market itelligece to kow where the traffic is. Pricig aalysis of suspicious routes to sell below market price. Usig this iformatio, test systems are cofigured to detect illegal routes. Robocall Detectio Calls ca be geerated to a BTS gateway istalled o the cliet facilities. The customer must provide the SIM cards to BTS for testig. BTS will geerate calls to the cliet SIM cards. BTS will preset daily reports ad aalysis about the geerated calls. Geerated calls from the cliet will be routed to the destiy etwork via BTS. CDRs Exchage to the cliet etwork. Use of market itelligece to idetify the origi of this fraudulet traffic. BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 7

8 CDRs exchage: Robocall Detectio (Phases) BTS ca provide all CDRs calls to the cliet etwork i a secure FTP (SFTP) o a daily basis for the customer to cotrast with their records ad idetify illegal calls. Alteratively, the customer ca provide all (atioal ad iteratioal) BTS daily CDRs ad idetify which of the calls that passed through the etwork of BTS were illegal. Phase 1: Traffic Geeratio Batteries geeratio calls via TeleCop Dyamic routig alteratig carriers Geerated traffics i differet backgrouds Usig LCR for routig calls battery Phase 2: Maual Call Dialig Creatig a tuel for geeratio of maual calls Calls ca be geerated by the cliet, simulatig origi USA / Spai ad accessig all termiatio offers. Phase 3: Data Collectio Aalysis Collectio of geerated calls, CDRs of all tests. CDRs delivery to the cliet for his aalysis.. Iformatio Aalysis ANI ad / or Route / Carrier / Natioal or Iteratioal Reports delivery about geerated traffic, carriers used, rates offered BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 8

9 Real-Time Traffic Aalysis BTS has developed prove skills i idetifyig solutios that help combat fraud worldwide. Together after cosultatio, solutios are customized to fit the mobile phoe operators uiue reuiremets i order to attai the highest customer satisfactio. BTS has extesive experiece workig with PTT s, MO s, MVNO s, Carriers ad govermets combatig the fraud ecosystem. ANALYZE We work with MNOs to support Call Data Records (CDRs) data collectio ad provide aalysis usig CDRs ad Test Call detectios. Gather data Look for patters Calculate locatio estimate BTS provides optioal data collectio DEFFINE PATTERN Several idicators are cosidered as iputs to the classificatio algorithm A ad B umbers ALOC ad ASR Date ad time of the calls IP media address Codecs Call hold (for 3-way callig) BLOCK Calls ca be routed to recordigs, dowgrade uality or block callers Provide fidigs to authorities to support takedow. Ivestigatio report Authority cosultatio Authorities shutdow fraud operatios BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 9

10 SIM BOX Locatio More tha 60% of iteratioal calls termiate o mobile etworks. Ed to ed VoIP calls accouts for more tha 20% of global voice traffic of witch 70% of iteratioal VoIP calls are estimated to be routed via SIM boxes. The BTS SIM Box Locator service aims to detect the fraud related MSISDNs ad prevet them from beig used for further bypass activity. By cotractig to the BTS SIM Box Locator service, oe is able to detect, defed ad deter bypass activity. The detectio is doe by usig a sophisticated test call applicatio which ca simulate iteratioal calls from aroud the world. The results are traced via a probe istalled i the cliet s etwork ad immediate aalysis of results is reported back to the cliet. The cliet ca defed itself from the MSISDNs idetified o its etwork by blockig them thus prevetig them from cotiued use for bypass activities. We help customers to idetify SIM Boxes termiatig traffic to the etwork illegally via fixed, mobile etwork callig cards or through VoIP routes. The service is desiged to cotiuously moitor the fraudulet actios ad will adapt detectio methods to evetually deter SIM box operatios. The Real Time Detectio solutio idetifies SIM boxes o a real time basis ad shares relevat records effectively, so that oe ca cut correspodig SIM cards immediately. Guaratees stop of reveue losses with very limited iput from cliets staff SIM boxes are detected withi miutes ad reported i real time BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 10

11 Cotact Us MIAMI - USA 2620 SW 27 Aveue. FL Tel MADRID - SPAIN Serrao, º 85 2º Derecha Tel ZARAGOZA - SPAIN Josefa Amar y Borbo 10, P 3º Tel ROME ITALY Via Ippolito Nievo, Rome Tel SINGAPORE 11 Collyer Quay, Level 17, #1728, Tel BUENOS AIRES - ARGENTINA Pacheco de Melo 2095, P 4º C1126AAE CABA Tel Marketig@bts.io BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 11

12 Thak you

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Mindmapping: A General Purpose (Test) Planning Tool

Mindmapping: A General Purpose (Test) Planning Tool W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage

More information

Data Warehousing. Paper

Data Warehousing. Paper Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial

More information

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Anti-addiction System Development Based on Android Smartphone. Xiafu Pan

Anti-addiction System Development Based on Android Smartphone. Xiafu Pan 3rd Iteratioal Coferece o Materials Egieerig, Maufacturig Techology ad Cotrol (ICMEMTC 2016) Ati-addictio System Developmet Based o Adroid Smartphoe Xiafu Pa Haia Vocatioal College of Political Sciece

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

Building Your Security Operations Center and Taking it to the Next Level

Building Your Security Operations Center and Taking it to the Next Level Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Complete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel.

Complete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel. Complete Security Solutios with the Latest Techology ad Law Eforcemet Experieced Persoel www.smartsecuritypros.com ( 3 0 1 ) 9 5 5-9 7 8 2 SPECIAL FEATURES Our Remote Guard VSaaS video surveillace equipmet

More information

150 Internet Exchange Points And Beyond!

150 Internet Exchange Points And Beyond! 150 Iteret Exchage Poits Ad Beyod! HKNOG 2018 Hog Kog Walt Wolly, Director Itercoectio Strategy Hurricae Electric AS6939 Who is Walt Wolly? Hurricae Electric AS6939 4 years Amazo AS16509 4 years Director

More information

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

What are Information Systems?

What are Information Systems? Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),

More information

Innovative. Pharma-Tech Process Services is a high-energy, schedule-driven, technical service provider. Our innovative consulting services cover

Innovative. Pharma-Tech Process Services is a high-energy, schedule-driven, technical service provider. Our innovative consulting services cover Iovative S o l u t i o s Pharma-Tech Process Services is a high-eergy, schedule-drive, techical service provider. Our iovative cosultig services cover Commissioig, Validatio ad Costructio Period Services

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

EDICOM has an undertaking with clients to comply with three key variables that guarantee the service quality:

EDICOM has an undertaking with clients to comply with three key variables that guarantee the service quality: EDICOM, Service Level Agreemet Terms ad Coditios www.edicomgroup.com EDICOM has a udertakig with cliets to comply with three key variables that guaratee the service quality: AVAILABILITY of the EDICOM

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

The Implementation of the National Probation Service Information Systems Strategy

The Implementation of the National Probation Service Information Systems Strategy Home Office The Implemetatio of the Natioal Probatio Service Iformatio Systems Strategy REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 401 Sessio 2000-2001: 26 April 2001 LONDON: The Statioery Office

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

100 Internet Exchange Points And Beyond!

100 Internet Exchange Points And Beyond! 100 Iteret Exchage Poits Ad Beyod! April 2016 LACNIC 25 Havaa Cuba Walt Wolly, Director Itercoectio Strategy Hurricae Electric AS6939 Who is Walt Wolly? Hurricae Electric AS6939 2 years Amazo AS16509 4

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Intelligent Systems in Retail. Powered by Windows Embedded

Intelligent Systems in Retail. Powered by Windows Embedded Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

SCAN INSPECT TRACK SOLVE

SCAN INSPECT TRACK SOLVE SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

FIRST-QUARTER 2017 REVENUES

FIRST-QUARTER 2017 REVENUES PRESS RELEASE Paris, May 18, 2017 FIRST-QUARTER 2017 REVENUES First-quarter reveues up almost 7% to 1,224 millio 300,000 ew ladlie ad mobile subscribers durig the quarter Frace's leadig recruiter of mobile

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

STRATEGIC. alliances & Services

STRATEGIC. alliances & Services STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Continuity Logic Frontline Live

Continuity Logic Frontline Live September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

THIRD-QUARTER 2017 REVENUES

THIRD-QUARTER 2017 REVENUES PRESS RELEASE Paris, November 16, 2017 THIRD-QUARTER 2017 REVENUES Reveues up 6.6% year o year for the first ie moths of 2017, comig i at 3,710 millio 250,000 ew mobile subscribers durig the quarter the

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Application Notes for configuring Agent AG Headsets from Corporate Telecommunications with Avaya one-x Communicator using a USB 2.0 Chord Issue 1.

Application Notes for configuring Agent AG Headsets from Corporate Telecommunications with Avaya one-x Communicator using a USB 2.0 Chord Issue 1. Avaya Solutio & Iteroperability Test Lab Applicatio Notes for cofigurig Aget AG Headsets from Corporate Telecommuicatios with Avaya oe-x Commuicator usig a USB 2.0 Chord Issue 1.0 Abstract These Applicatio

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch

More information

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Windows Server 2008 R2 networking

Windows Server 2008 R2 networking Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced

More information

Oracle Process Manufacturing

Oracle Process Manufacturing Oracle Process Maufacturig Product Developmet Recipe API User s Guide Release 11i Part No. A97387-04 Jauary 2005 Oracle Process Maufacturig Product Developmet Recipe API User s Guide, Release 11i Part

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation eea les-sig-bricks 1 Loop Emulatio Service Protocols over ATM Eea LES-SIG-Bricks is a complete implemetatio of the Loop Emulatio Service usig AAL2 stadard (AF-VMOA-0145.000) protocols. Eea LES-SIG-Bricks

More information

Transforming Railroad Asset Management: Going Smart with Predictive Maintenance

Transforming Railroad Asset Management: Going Smart with Predictive Maintenance Trasformig Railroad Asset Maagemet: Goig Smart with Predictive Maiteace Abstract As oe of the most asset-itesive idustries i the world, the rail idustry ivests early 20% of its reveue i asset maiteace

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV. Easy Fit CCTV Rage Did you kow that houses with CCTV are 90% less likely to be burgled? Itroducig the ew Easy Fit rage of CCTV. Whether it s your home or your busiess, havig extra security ca help you

More information

PayMobile. Features Overview

PayMobile. Features Overview PayMobile Features Overview PayMobile Features & Services Subscriber Beefits Immediate oboardig, coveiet ed-user experiece, stimulatio Aget Maagemet Beefits Structure your sales force, supervise, act,

More information

Going Mobile with. SYSPRO Espresso

Going Mobile with. SYSPRO Espresso Goig Mobile with SYSPRO Espresso SYSPRO Espresso offers the opportuity for you to brig your busiess ito the 21 st Cetury, takig advatage of mobile techology. www.syspro.com Ulock the world with SYSPRO

More information

How Asigra Cloud Backup Protects Your Network

How Asigra Cloud Backup Protects Your Network Recovery is Everythig How Asigra Cloud Backup Protects Your Network Preseted by: Cloud Backup for Healthcare Asigra Advatages Key Asigra Cloud Backup Features Protectio for your Whole Network The 3 Levels

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Chapter 3 DB-Gateways

Chapter 3 DB-Gateways Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 3 DB-Gateways Outlie Couplig DBMS ad programmig laguages approaches requiremets

More information

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework Shieldig Eterprises from Evolvig Cyber Attacks with a Digital Security Framework Abstract As the IT ladscape evolves, cyber threat actors also mature i respose developig ew techiques to compromise the

More information

THIRD-QUARTER 2016 REVENUES

THIRD-QUARTER 2016 REVENUES PRESS RELEASE Paris, November 16, 2016 THIRD-QUARTER 2016 REVENUES Some 400,000 ew ladlie ad mobile subscribers durig the quarter Free was oce agai Frace's leadig recruiter of mobile subscribers, with

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT

DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 20, Volume 4, No. 2, pp. 59-525 DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT Maish Arora & M. Syamala Devi 2 Traditioal

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

BEA WebLogic Commerce Server. Registration and User Processing Package

BEA WebLogic Commerce Server. Registration and User Processing Package BEA WebLogic Commerce Server Registratio ad User Processig Package BEA WebLogic Commerce Server 3.2 Documet Editio 3.2 December 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

State of Mobile Payments. Tom Zalewski Aikon Consulting Dallas, TX

State of Mobile Payments. Tom Zalewski Aikon Consulting Dallas, TX State of Mobile Paymets Tom Zalewski Aiko Cosultig Dallas, TX Ageda Mobile Paymets, The ad Now Itroductio of NFC for Mobile Paymets Some Key Fidigs Requiremets ad Resultig Ecosystem Provisioig ad Life

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

Goals of this Lecture Activity Diagram Example

Goals of this Lecture Activity Diagram Example Goals of this Lecture Activity Diagram Example Object-Orieted Aalysis ad Desig - Fall 998 Preset a example activity diagram Ð Relate to requiremets, use cases, ad class diagrams Also, respod to a questio

More information

Outline. A Probabilistic Deduplication, Record Linkage and Geocoding System. Data cleaning and standardisation (2)

Outline. A Probabilistic Deduplication, Record Linkage and Geocoding System. Data cleaning and standardisation (2) Outlie A Probabilistic Deduplicatio, Record Likage ad Geocodig System Peter Christe ad Tim Churches Data Miig Group, Australia Natioal Uiversity Cetre for Epidemiology ad Research, New South Wales Departmet

More information

Getting the Most out of IoT with an Effective Data Lifecycle Management Strategy

Getting the Most out of IoT with an Effective Data Lifecycle Management Strategy Gettig the Most out of IoT with a Effective Data Lifecycle Maagemet Strategy Abstract The Iteret of Thigs (IoT) is a rapidly evolvig techology, ad like ay other techology, it ca pose challeges with respect

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Strengthening Privacy Protection with the European General Data Protection Regulation

Strengthening Privacy Protection with the European General Data Protection Regulation Stregtheig Privacy Protectio with the Europea Geeral Data Protectio Regulatio Abstract The expoetial growth of digital data has led to a substatial icrease i data breaches. To meet the privacy cocers of

More information