Software Trustworthiness Static Measurement Model and the Tool

Size: px
Start display at page:

Download "Software Trustworthiness Static Measurement Model and the Tool"

Transcription

1 Avalable onlne at vol. 13, no. 7, November 2017, pp DOI: /jpe p Software Trustworthness Statc Measurement Model and the Tool Yan L, Zhqang Wu, Yxang Chen* Shangha Key Laboratory of Trustworthy Computng, East Chna Normal Unversty, Shangha, 20062, Chna Abstract Software trustworthness has become one of the promnent studes n software qualty assurance, n whch the trustworthness measurement s the prmary topc. Compared wth the method to evaluate the software development process, we measure to what extent the entty of software better fts users requrement. In ths paper, we propose a bottom-up method of software trustworthness measurement based on the source code. Frst, for the trustworthness measurement of attrbutes, a comprehensve model s proposed. Second, the valdty and stablty of the model are verfed by Monte Carlo smulaton. Fnally, the proposed method s developed based on the open source statc detecton tool for Cppcheck, whch forms the software trustworthness statc measurement tool for TSMT. Keywords: software trustworthness; trustworthness measurement; cppcheck (Submtted on July 25, 2017; Revsed on August 30, 2017; Accepted on September 15, 2017) (Ths paper was presented at the Thrd Internatonal Symposum on System and Software Relablty.) 2017 Totem Publsher, Inc. All rghts reserved. 1. Introducton Due to the gradual expanson of software, software defects are growng and software qualty s dffcult to predct and control. The avalablty and trustworthness of key doman applcaton are especally dffcult to guarantee for software. These are the mportant problems n the feld of embedded system and put forward hgher requrements for the software trustworthness [4]. How to ensure software trustworthness s the core and dffcult scentfc problem n software engneerng feld [11]. To solve ths problem, we frst need to solve the relevant work about how to measure the software trustworthness. Amng at the problems of hgh complexty, large scale and uncertan demand for the feld of embedded system, Me [7] puts forward a method to compute the trustworthness of the attrbute based on the agng problem of trusted evdence, and constructs the trusted evaluaton system of the CPS (Cyber-Physcal Systems) n combnaton wth the weght dstrbuton to construct method for software trustworthness. Y Huang [2] puts forward a trustworthness method based on evdence reasonng for embedded software. Snce trustworthness metrcs s supported by related evdence, the theory of trustworthness evaluaton based on evdence s unversally recognzed n the process of software development. C-language programs commonly used n the feld of embedded system, ths paper puts forward a statc measurement model of software trustworthness based on untrusted evdence. We put forward the defnton of the untrusted evdence. Accordng to the dfferent data types for the untrusted evdence, we come up wth a dfferent model of the trustworthness rank metrc, whch corresponds to the trusted attrbute, and the number of the untrusted evdence of the attrbute n the CWE (Common Weakness Enumeraton) flaws storehouse. The attrbute s classfed by a trusted level, and then a metrc model s presented based on the untrusted evdence. The valdty and stablty of the model are verfed by Monte Carlo smulaton. In ths paper, the software metrcs tool TSMT based on Cppcheck s desgned and mplemented, whch can call Cppcheck to nspect the program. The extended nterface based on Cppcheck provdes the custom rules on the bass of the * Correspondng author. E-mal address: yxchen@se.ecnu.edu.cn

2 1102 Yan L, Zhqang Wu, and Yxang Chen orgnal nspecton rules, so that the tool can detect more untrusted evdence. The tool mplements the model proposed n ths paper, and perfects the software trustworthness metrc system based on the untrusted evdence. The rest of the paper s organzed as follows. Secton 2 manly ntroduces the untrusted evdence and ts trusted analyss method, whch lays the foundaton for the attrbute trustworthness measurement. Secton 3 ntroduces a knd of metrc model for trustworthness attrbute based on trusted and untrusted evdence, and weghts the exstng metrc model for software trustworthness based on attrbute, and verfes the valdty of the model by smulaton. Secton 4 ntroduces metrc tool for the software trustworthness called TSMT based on Cppcheck. The last secton presents the conclusons and looks forward to the next research work. 2. Untrusted Evdence 2.1. Defnton of untrusted Evdence In ths paper, we use the defnton of software trustworthness n lterature [3]. Accordng to the defnton, we get the defnton of untrustworthness from the reverse thnkng. Software untrustworthness refers to devatng from the user s expectatons for the dynamc behavor and result of the software system, or cannot provde contnuous servce when sufferng from nterference [5]. Untrusted evdence refers to a program element or program unt hdden n the source code that leads to software untrustworthness, as shown n the sx-tuple: Evdence = < Descrpton, Type, Property, T-Value,T-Level,Attrbutes > In the above sx-tuple, Descrpton s the descrpton of the evdence; Type s the data of the evdence; Property ndcates the trustworthness of the evdence to be satsfed; T-value ndcates the measure value of the untrusted evdence; T-level represents the level of trustworthness for evdence; Attrbutes ndcates a trusted attrbute that represents the effect of evdence. The program elements and the program unts n the defnton refer to the relevant defntons n [9]. It s beleved that program elements are varables, constants, data types, algorthmc expressons, logcal expressons, empty statements, assgnment statements, sequental statements, condtonal statements, crcular statements, and declaratons of varables. The effect of untrusted evdence on software trustworthness can be decomposed nto one or more trusted attrbutes. Accordng to the lst of the program elements, program unts and attrbutes correspondng to the work of Tao et al. [10]. We construct the correspondng relatonal table of attrbutes related to each pece of untrusted evdence n Table 1. Table 1. Untrusted evdence wth attrbutes for correspondng lst Untrusted evdence Trustworthness attrbute Improper UI Functonalty, Mantanablty Improper break Functonalty, Relablty Data overflow Functonalty, Survvablty Dvson by zero Functonalty, Relablty Dmenson unty Functonalty, Mantanablty Logcal error Functonalty, Mantanablty Improper process schedulng Functonalty, Relablty Hgh complexty Relablty, Mantanablty Lack annotaton Mantanablty A set of untrusted evdence may affect a number of software propertes at the same tme, and we only gve the trustworthy evdence to affect the man attrbutes. Users can expand on the bass of actual needs Classfcaton Our goal s based on the mpact of untrusted evdence for software. Accordng to the extent to whch the software s affected by untrusted evdence, we dvde the trustworthy level of the untrusted evdence from hgh to low. When the trustworthness level become much hgher, t s more dffculty to mprove. Therefore, the hgher the trustworthness level, the much strcter the quantty and nfluence degree of the untrusted evdence s requred. So we propose a classfcaton model of untrusted evdence. In the gradng model of untrusted evdence, classfcaton range s not equal. It approxmates the rato of gold dvson to decrease when we ncrease the value nterval of a trusted level from the lowest. The dvson contents are shown n Table 2. The method of calculatng the rato of gold dvson s as follows.

3 Software Trustworthness Statc Measurement Model and the Tool Trusted Analyss Model ) / , ( 5 1) / , ( 5 1) / , ( 5 1) / Table 2. The classfcaton of trustworthness of untrusted evdence Trustworthness Level Defnton Trustworthness Degree V Totally trustworthy 1.0 IV Trustworthy 0.95 III Partally trustworthy 0.85 II None trustworthy 0.70 I Software cannot run or run ncorrectly 0.45 There are many types of untrusted evdence n the procedure, and a sngle trustworthness analyss method can hardly cover all the untrusted evdence. Therefore, the data types of the untrusted evdence are dvded nto two knds: the Boolean type (represented by "B"), the numerc type (expressed n "D"). The measure dstrbuton of Boolean untrusted evdence s a dscrete dstrbuton, and t's only 2 measures to "1" or "0". Generally, the "0" ndcates that the untrusted evdence does not satsfy the trustworthness, and the "1" ndcates that the untrusted evdence satsfes the trustworthy nature. When the untrusted evdence satsfes the trustworthy nature, the procedure statement represented by the evdence s trustworthness. So the measure value of the untrusted evdence s 1, and the level of the untrusted evdence s the maxmum level whch can be obtaned by the type of the change. The procedural statement represented by the evdence s not trustworthness when the untrusted evdence doesn t satsfy the trustworthy nature. So the measure value of the untrusted evdence s 0, and the untrusted evdence s Grade I. The maxmum level here s not necessarly the maxmum level n a herarchy, but the maxmum degree of trustworthness that the evdence of untrustworthness can acheve. An example of untrusted evdence show " f-else statements do not match " the form of Table 3. Table 3. Untrusted evdence " f-else statements do not match " sample Descrpton Type Property T-Value T-Level Attrbute If-else statement msmatch B Whether the condtonal Combnaton statement matches 0 3 functonal The model s used to denote the level of Boolean untrusted evdence. 1, f Evdence. Performance Evdence. Property T Value 0, f Evdence. Performance Evdence. Property hghest _ level, f T value 1 T Level I, f T value 0 The value of numercal model of untrusted evdence s number, whch can be contnuous or dscrete. We dvde nto dfferent grades n the metrcal value range correspondng dfferent nterval. For example, what's the complexty about loop n the untrusted evdence. Accordng to MACCABA, [6] propose the relatonshp between the cyclomatc complexty and error; we dvde the value range of the cyclc complexty n Table 4. We gve an example for untrusted evdence n Table 5 f the complexty of the loop s 20. In ths example, although the metrc s dvded nto four ntervals, f the trustworthness of the complexty s level IV and also satsfes the V-level defnton, the trustworthness of untrusted evdence s stll level IV. Table 4. Relatonshp between cyclc complexty and error rate Complexty of loop Error rate Trusted level % IV % III >50 40% II >100 60% I

4 1104 Yan L, Zhqang Wu, and Yxang Chen Table 5. Untrusted evdence " complexty of loop " sample Descrpton Type Property T-Value T-Level Attrbute Complexty of Loop s 20 D Whether complexty of Loop s hgh 20 3 Relablty Mantanablty Ths s the model to represent the grade judgment of the numercal type of untrusted evdence. T-Value correspondng nterval level, f T value fallswthnnterval T Level T Valueloweradjacent nterval level, f T value notnany nterval hghest_level, f T-value better than all nterval optmal values Note: The hghest_value here s not the hghest level of untrustworthness, but the hghest level of evdence of untrustworthness The statstc of the evdence of CWE CWE (Common weakness enumeraton) s a software communty project desgned to create a software flaw enumeraton class to better understand software bugs and create automated tools to dentfy, fx, and prevent such defects. For common software flaws, the CWE organzed a lst of more than 1500 dfferent vulnerablty samples n the real world, and form an artcle for PLOVER [1] to publc use. From ths artcle, we sorted out 25 knds of software flaws and ncluded 258 flaws entry. The defect refers to the software code n the error or vulnerable to vulnerable weaknesses, and belongs to the category of untrusted evdence. Accordng to the detaled descrpton of PLOVER, each type of software flaws s mapped to software attrbutes, and the correspondng untrusted evdence s gven. Accordng to the data of untrusted evdence, we respectvely gve model of untrusted evdence classfcaton. Fnally, we apply the model of untrusted evdence to flaws lbrary of the CWE. We gve a relatonal table of trustworthness attrbute for each CWE flaw n Table 6. Table 6. Relatonal table of trusted attrbute for each CWE flaw Sort Descrpton Trustworthness attrbute BUFF Buffer overflow Functonalty, Relablty, Survvablty SVM Structure problems Functonalty, Mantanablty, Survvablty SPEC Specal element ssues Functonalty, Mantanablty SPECM Operatonal problems of Functonalty, Relablty, Mantanablty specal elements PATH Traversal problems of path Functonalty, Mantanablty CCC Normatve problems of code Functonalty, Relablty, Mantanablty INFO Informaton management Functonalty, Mantanablty, Survvablty RACE Resource competton Functonalty, Relablty, Survvablty PPA Authorty problems Survvablty HAND Error handler Functonalty, Relablty, Survvablty UI Desgn problems Relablty, Survvablty INT Error nteractons Functonalty, Relablty, Survvablty INIT Intalzaton errors Functonalty, Relablty RES Resource management Functonalty, Relablty, Survvablty problems NUM Numerc problems Functonalty, Relablty, Survvablty AUTHENT Authorzaton problems Relablty, Mantanablty, Survvablty CRYPTO Encrypton errors Relablty, Survvablty RAND Random and predctve Relablty, Survvablty problems ERS Excepton handng problems Functonalty, Relablty VER Data verfcaton problems Relablty, Survvablty ATTMIT Attack defense problems Relablty, Survvablty MAID Change errors of mmutable Functonalty, Relablty, Survvablty data MAL Inserton of vcous codes Functonalty, Relablty, Survvablty CONT Senstve data problems Relablty, Survvablty MISC Other problems Functonalty, Relablty, Survvablty Mantanablty Fgure 1 gves the number of untrusted evdence for each software flaw category, the horzontal axs n Englsh abbrevaton for each category of software flaws, the number of weaknesses contaned n the vertcal shaft for each flaw category, or the number of untrusted evdence.

5 Software Trustworthness Statc Measurement Model and the Tool Comprehensve Trustworthness Metrc Model 3.1. Model Fgure 1. The dstrbute of the untrusted for the correspondng flaws In the prevous Natonal Fund project, we make a deep research on the software trustworthness metrc model. A trustworthy metrc model based on program slcng complexty can be wdely appled to software entty wth clear code. However, ths model s only for the trustworthness of the evaluaton of the program, not consderng the mpact of untrusted evdence on the program. Therefore, we propose a comprehensve and trustworthy metrc model about attrbute based on the orgnal model. The man dea of the model s that trustworthness of the software entty s determned by the trustworthy nature of the mplementaton and the evdence of the untrustworthy n the procedure. Frst of all, the dfferent degree about trustworthness mpacts overall trustworthness for software trustworthness. So, trustworthy measure of software trustworthness s classfed as dfferent level n Table 7. Accordng to the actual stuaton, the mnmum attrbute level s 0.45, so t s necessary to ensure that the trustworthness of each attrbute s kept at a good level to ensure that the software s trustworthy. Table 7. Software trustworthy attrbute dvson Degree Trustworthness range No mpact >0.95 Lttle mpact Moderate mpact Serous mpact No run <0.45 Consderng the nfluence of the untrusted evdence on the trustworthness attrbute, our comprehensve model meets the followng crtera and trustworthy attrbute of satsfy: 0 1. T y The trustworthness of attrbutes ncreases when the trustworthness of untrusted evdence ncreases. T y T y a represents the trustworthness of attrbute of y, and 0 T y a represents the trustworthness of every untrusted evdence. The attrbute trustworthness decreases when the number of untrusted evdence ncreases. (1) T y n 0 (2) n represents the number of untrusted evdence of n the y. Accordng to the second rule, t represents the greater the number of untrusted evdence and the lower the trustworthness attrbute. By the classfcaton of trustworthness attrbute, trustworthness of attrbute s reduced to a lower

6 1106 Yan L, Zhqang Wu, and Yxang Chen level, whch should contan more untrusted evdence by the classfcaton of trustworthness attrbute. The dfference between levels ncreases gradually, and the dfference between levels of untrusted evdence ncreases gradually. Therefore, we requre the number of as the ndependent varable, and the U y represents dependent varable. The curve of the U y wth the n n s roughly as shown n Fgure 2. the horzontal axs represents the number of untrusted evdence; the vertcal axs represents the trustworthness attrbute. The relatonshp functon of trustworthness attrbute and the number of untrusted evdence can be obtaned as follow. U y n e (3) Among them, the s the nfluence factor for the attrbute of th, and the value range s (0; 1]; n represents the number of untrusted evdence that affect the attrbute of th n the program. Fgure 2. The relatonshp shows between trustworthness attrbute and the number of untrusted evdence We take 4 values from the range of get the change curve as shown n Fgure 3. to smulate the relatonshp between the dfferent trustworthness attrbutes. We Fgure 3. The dfferent show the relaton curve of the correspondng attrbute and the number of the untrusted evdence From the above Fgure 3, the greater the nfluence of the untrusted evdence on the trustworthness attrbute, the faster the trustworthness of the attrbute s reduced wth the ncreasng of the number of the untrusted evdence. It s assumed that each untrusted evdence has the same effect on the program, ncludng the dfferent attrbutes of the same number of untrusted evdence, and the smaller the weght of the property whose trustworthness decreases faster. Therefore, the nfluence factor for λ of the untrusted evdence to trustworthness attrbute s nversely related to the attrbute weght for α, and the relaton s expressed as follow. k (4) Among them, α represents the weght of th, and the k ndcates that the nfluence factor parameter of the untrusted evdence to the attrbute about th.

7 Software Trustworthness Statc Measurement Model and the Tool 1107 The above analyss obtans the relatonshp between λ and α from the trustworthy relatonshp for curves of all attrbutes, and then s determned the range of k by studyng the trustworthness of the attrbute. Frstly, we convert the trustworthy attrbutes for calculaton model as follow: U y 1 k n e (5) Assumng weghts of attrbute about the α are known, and when the k takes dfferent values, the trustworthy degree of the same property changes as shown n Fgure 4. Fgure 4. The dfferent k show the curve of trustworthy degree of the attrbute From the above Fgure 4, wth the decrease of value of the k, the trend of trustworthy degree of attrbute becomes slow down and gets closer to the lnear relaton. For the same untrusted evdence, wth a greater value of the k, the trustworthy degree becomes lower. If we want to acheve the same trustworthy level, when value of the k ncreases, the untrusted evdence wll be reduced Smulaton and Analyss For the model proposed n ths paper, a large number of examples need to be valdated, n whch the acquston of untrusted evdence s a dffcult problem n the process of verfcaton n software, so we use a large number of data smulatons to smulate the number of untrusted evdence of each attrbute, the results can be used to observe the stablty of the model. Monte Carlo smulaton s a method to study ts dstrbuton characterstcs by settng up a stochastc process, generatng tme seres teratvely, and calculatng parameter estmates and statstcs [8]. Mathematc s a scentfc computng software that combnes numercal and symbolc computng engnes, graphcs systems, programmng languages, and text systems that are good for advanced connectons wth other applcatons. The smulaton parameters and results are descrbed n detal below. The number of y s 4, and the evaluaton value of each attrbute s 1, namely: y (0, 1]; The weght of the attrbute s α : α 1 = 0.294, α 2 = 0.382, α 3 = 0.169, α 4 = 0.155; The weghts of the trustworthy elements and the untrusted elements n the attrbute are set to 0.5; We use as the basc unt, and randomly generate 100,000 sets of data to smulate the model n the [0, 1] nterval of the cumulatve number of occurrences (n the graph by pont), and the smulaton statement s as follows: The smulaton results show the Fgure 5. The horzontal axs represents the software s trustworthness, and the number of tmes the vertcal shaft represents the trustworthness attrbute.

8 1108 Yan L, Zhqang Wu, and Yxang Chen Fgure 5. Model smulatons The results of the smulaton under the condton of dfferent untrusted evdence show that wth the decrease of the untrusted evdence n the attrbute, the software trustworthness s ncreasng and the number of the untrusted evdence n each attrbute need to be strctly controlled. In addton, the shape of the smulaton dagram s smlar to the normal dstrbuton, whch shows the stablty of the model. 4. Software Trustworthness Tool Based on the models and methods mentoned above, we developed a statc predctve software relablty tools based on Cppcheck TSMT. The tool realzes the evaluaton of untrusted evdence, trustworthness attrbute and software trustworthness n code, and provdes the mprovement method whle detectng the untrusted evdence. Ths tool embodes the avalablty of source code orented software trustworthy metrcs. Cppcheck s developed to use the C++ language, provdng a varety of types of error to check for C++, and ts checkponts nvolve ponters, arrays, memory, and problems n functons. Selectng Cppcheck as the bass for ths tool s based on the fact that Cppcheck s an open-source tool, opens the user extenson nterface, and makes t easy for developers to embed custom rules nto Cppcheck. Fnally, we can customze the personalzed nspecton tools. We ntroduce the TSMT tool that expands the nspecton rules n Cppcheck to enable t to detect more untrusted evdence. So, t supplements measurement system of software trustworthness based on untrusted evdence. It s shown n Fgure 6 as follow. Fgure 6. Usecase of TSMT The tool body can be dvded nto three parts: user, metrc tool, and Cppcheck. In addton to provdng a user-frendly GUI n Fgure 7, TSMT provdes executable fle for Cppcheck.exe that can be executed at the command-lne prompt, and users can get the results of the check drectly usng the command lne. The trusted metrcs tool nvokes cmd.exe background executon Cppcheck to get executon results. The specfc mplementaton enters the Cppcheck command n the specfed text box through the button call cmd.exe to execute the command n the text box, reads the result from the command lne through the StreamReader class, and drectly dsplays t n another text box. Cppcheck can be dversfed by adjustng the parameters, ntroducng the feature nto the trusted Metrcs tool, and gettng a varety of results by enterng related commands n the specfed text box.

9 Software Trustworthness Statc Measurement Model and the Tool 1109 Fgure 7. Man Vew The tool mplements nternal call Cppcheck to check the program. The extended nterface provded by Cppcheck add custom rule to check on the bass of the orgnal nspecton rules, and allow the tool to detect more untrusted evdence. Webbench s a pressure test tool for webste and uses C language development, t ncludes 600 lnes of C. We make trustworthy measurement for webbench.c about the man fle for ths tool. When adjustng the rules, we clck on rght-hand functon for check and open the nterface shown n Fgure 8. It enters the Cppcheck executon statement n the text box and dsplays the results n the text box below. If you do not understand the Cppcheck command and you can clck the button for help. The man vew shows untrusted evdence n the dsplayed error lsts n Fgure 9. Fgure 8. check of Cppcheck Fgure 9. Lsts of untrusted evdence It analyses ten untrusted evdence by detectng and showng that these untrusted evdence belong to procedural normatve problem. These problems don t mpact the program short term for runnng software. But there are secure rsks, such as f-else msmatch problem, whch may be attacked and affect the mantanablty of the program. The untrusted evdence s detected n source code, although t wll affect trustworthness of the program. It belongs to lttle mpact and the program s relatvely trustworthness. 5. Conclusons In ths paper, the software trustworthness evaluaton s through the detecton of untrusted evdence n software source code. Because the characterstcs of software source code are easly accessble and the generalty of embedded software s commonly used n C language development, ths work can be appled to the research of the trustworthness of embedded software. In the future, we need to perfect the trustworthy metrc model and verfcaton by the formal method to enhance the persuason. Second, to mprove the trustworthness of the measurement tool and acheve a hgher automatc degree of software trustworthness metrc, t s necessary to mprove the tool.

10 1110 Yan L, Zhqang Wu, and Yxang Chen References 1. S. Chrstey, Prelmnary Lst of Vulnerablty Examples for Researchers, Y. Huang, X. He, J. Wang, and Z. Le, An Evaluaton Method Orented to the Comprehensve Credblty of Smulaton Data Source Based on Evdence Theory, vol. 5, no. 2, R. Jang, A Trustworthness Evaluaton Method for Software Archtectures Based on the Prncple of Maxmum Entropy (Pome) and the Grey Decson-makng Method (Gdmm), Entropy, vol. 16, no. 9, pp , K. Lu, Overvew on Major Research Plan of Trustworthy Software, Bulletn of Natonal Natural Scence Foundaton of Chna, Y. L and Y. Chen, A Measurement Model for Trustworthy Software Based on Trusted Evdences, n Internatonal Symposum on System and Software Relablty, 2017, pp T. J. Mccabe, A Complexty Measure, IEEE Transactons on Software Engneerng, vol. SE-2, no. 4, pp , M. Rong, A Model for CPS Software System Trustworthness Evaluaton Based on Attrbutes Classfyng, A. F. Sela, Smulaton and the Monte Carlo Method, Technometrcs, vol. 24, no. 2, pp , K. Shbata, K. Rnsaka, and T. Doh, Metrcs-based Software Relablty Models Usng Non-homogeneous Posson Processes, n Internatonal Symposum on Software Relablty Engneerng, 2006, pp H. Tao and Y. Chen, A New Metrc Model for Trustworthness of Softwares, Kluwer Academc Publshers, H. Tao and Y. Chen, A Metrc Model for Trustworthness of Softwares, n Ieee/wc/acm Internatonal Jont Conference on Web Intellgence and Intellgent Agent Technology, 2009, pp

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

Research on Categorization of Animation Effect Based on Data Mining

Research on Categorization of Animation Effect Based on Data Mining MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status

Implementation Naïve Bayes Algorithm for Student Classification Based on Graduation Status Internatonal Journal of Appled Busness and Informaton Systems ISSN: 2597-8993 Vol 1, No 2, September 2017, pp. 6-12 6 Implementaton Naïve Bayes Algorthm for Student Classfcaton Based on Graduaton Status

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers 62626262621 Journal of Uncertan Systems Vol.5, No.1, pp.62-71, 211 Onlne at: www.us.org.u A Smple and Effcent Goal Programmng Model for Computng of Fuzzy Lnear Regresson Parameters wth Consderng Outlers

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

MATHEMATICS FORM ONE SCHEME OF WORK 2004

MATHEMATICS FORM ONE SCHEME OF WORK 2004 MATHEMATICS FORM ONE SCHEME OF WORK 2004 WEEK TOPICS/SUBTOPICS LEARNING OBJECTIVES LEARNING OUTCOMES VALUES CREATIVE & CRITICAL THINKING 1 WHOLE NUMBER Students wll be able to: GENERICS 1 1.1 Concept of

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Random Variables and Probability Distributions

Random Variables and Probability Distributions Random Varables and Probablty Dstrbutons Some Prelmnary Informaton Scales on Measurement IE231 - Lecture Notes 5 Mar 14, 2017 Nomnal scale: These are categorcal values that has no relatonshp of order or

More information