Defending Mechanisms for Protecting Power Systems against Intelligent Attacks
|
|
- Beverly Lewis
- 5 years ago
- Views:
Transcription
1 efendng Mechanm for Protectng Power Sytem agant Intellgent ttack Longfe We, mr Haan Moghada, dtya Sundararaan and rf I. Sarwat epartment of Electrcal and Computer Engneerng Florda Internatonal Unverty Mam, Florda and btract - The power ytem form the backbone of a modern ocety, and t ecurty of paramount mportance to naton economy. However, the power ytem vulnerable to ntellgent attack by attacker who have enough knowledge of how the power ytem operated, montored and controlled. Th paper propoe a game theoretc approach to explore and evaluate tratege for the defender to protect the power ytem agant uch ntellgent attack. Frt, a rk aement preented to quantfy the phycal mpact nflcted by attack. Baed upon the reult of the rk aement, th paper repreent the nteracton between the attacker and the defender by extendng the current zero-um game model to more generalzed game model for dvere aumpton concernng the attacker motvaton. The attacker and defender equlbrum tratege are attaned by olvng thee game model. In addton, a numercal llutraton demontrated to warrant the theoretcal outcome. Keyword: Power ytem ecurty, ntellgent attack, rk aement, game theory. I. INTROUCTION HE power ytem one of the crucal nfratructure that Tnfluence any naton economy and progre, and t ha alway been a hgh prorty target for phycal antagont attack. If the attacker ha enough experte n the workng behavor of the power ytem operaton, montorng and control, the attack could deny large part of the vctmzed country helplely acce to bulk ytem power for not ut week but even month. For ntance, the Calforna electrcal power ubtaton attack [] n prl 203 by undentfed gunmen dd not lead to power outage, but undercored the vulnerablty of the power ytem. Buldng upon the clafcaton of cyber-attack on the power ytem documented n [2], attack on power ytem can be clafed nto the Intellgent ttack and the Brute-Force ttack accordng to the attacker avalable reource ncludng manpower, technology, fund, etc. n ntellgent attacker, typcally a corporate adverary or a natonal opponent, ha hgh a kllet and experte on the power ytem operaton, montorng and control, and poee enough reource ncludng manpower, technology, and fund to take acton. Thu, h detroy target generally the vtal node or component of the ytem, and t could trgger a cataclymc phycal damage, whch ometme too expenve to repar. On the contrary, n Brute-Force ttack cenaro, the attacker uually not qute famlar wth the entre power ytem, or ha no ample reource to take an effectve attack acton. Owng to th, the phycal damage caued by a brute-force attacker wll not be the ame a that of an ntellgent one. Th paper am to nvetgate further on the Intellgent ttack due to t hgh level mpact over the Brute-Force ttack. Rk ement form the frt tep of an attack-defene problem. It defned a the proce of dentfyng the rk to power ytem and determnng the lkelhood of occurrence, the reultng mpact, and the addtonal afeguard that mtgate th mpact [3]. However, mot of the recent rk aement tandard uch a S/NZS ISO 3000:2009 [4] nclude general prncple and gudelne, but lttle about the mathematcal repreentaton of the probablty of a ucceful attack and the reultng phycal damage. Th paper propoe a mathematcal rk aement model that nvolve the mulaton of the unerved load due to a ucceful attack, and the computaton of the probablty of that ucceful attack conderng lmted avalablty of reource to both the attacker and the defender. Takng the calculated rk a an nput parameter, game theory provde an analytcal method to model the nteracton between the attacker and the defender, ntead of ut conderng the decon-makng proce of the defender. The two-player zero-um game model wa frt preented by Holmgren et al. [5] to compute Nah equlbrum tratege for the defender to protect the phycal nfratructure of the power ytem agant attack. In order to protect the power ytem communcaton network, a Nah equlbrum obtaned from the two-player zero-um tatc game model between an ntentonal attacker and a fuon-baed defender wa ntroduced and tuded by Chen et al. [6], the reult of whch were employed to evaluate the performance of defene mechanm. In thee paper, the attacker expected gan aumed a to be equal to the defender expected lo. However, n realty, wth dfferent aumpton about the nature of the attacker and h avalable reource, the attacker motvaton and gan can be much dfferent. Thu, th paper conder dfferent attacker /5/$ IEEE 2
2 motvaton, and preent a generalzed gen-um game model. The extng method and algorthm for fndng the Nah equlbrum of the propoed game model can be dvded nto two categore: () algorthm that determne all Nah equlbrum, uch a the Support Enumeraton algorthm [7] - [9]; (2) algorthm that fnd a ample Nah equlbrum, for ntance, the Lemke-Howon algorthm [], [2], Mxed- Integer Programmng [3] - [5]. The followng content of the paper are tructured a follow. Secton II propoe a rk aement technology and the generalzed two-player game model. Whle Secton III exemplfe the mulaton tudy of a numercal cae tudy, Secton IV draw the concluon of th paper. II. GME MOEL BETWEEN TTCKER N EFENER power ytem can be abtracted a a graph G: = ( V, E) a hown n Fg.. The vertex et V repreent N V = V node n the graph G, for example, generaton plant, tranformer, ubtaton devce, and cutomer. The edge et E contan N E = E edge correpondng to tranmon lne. Thu, the total number of element (vertce and edge) of the power ytem needed to be protected agant attack NS = NV + N. E Preventon, mtgaton, repone, recovery and learnng compre the dfferent phae n the protecton cheme of power ytem agant attack [6]. The cope of th paper lmted to the preventve acton undertaken by the ytem admntrator, takng nto conderaton h lmted upply of reource to execute h ntended acton that nclude manpower, technologe, fund, etc. Thee preventve acton can be defned a the reource allocaton on N S element of the power ytem to reduce the lkelhood of an attack or avod an attack. On the contrary, the attacker attend to detroy the power ytem through launchng an attack on a combnaton of element of the power ytem. The attacker target vared wth dfferent ze accordng to h avalable reource. brute-force attacker can only break one tranmon lne or ome ngnfcant element of the power ytem, whle an ntellgent one can dable everal prme element, whch lead to a huge unerved load for the cutomer of the ytem. The attacker and defender tratege about the lmted reource dtrbuton are ntroduced through mathematcal model n followng part.. ttacker Stratege ume that the power ytem compoed of N S element, and that the attacker ha lmted reource, denoted by S, whch contan manpower, technologe, fund, etc. Thu, the attacker ha a et of tratege, defned a of N element, and each trategy a, =,, N ndcate one way of allocatng h lmted reource on N S element to attack the power ytem: Fg.. Example of power ytem graph. a = {,...,,..., } (),,, N S NS, = S = (2) where 0 S,, =,..., N S, repreent the quantty of the reource that the attacker trategy a nvet on attackng the element of the power ytem. Th paper exhbt a conderaton of vewng the attacker choce a a mxed trategy but not a pure one. Hence, t can be defned a a probablty dtrbuton on the trategy et : T p = [Pr{ a = a},..., Pr{ a = a},...,pr{ a = a }] (3) N = N Pr{ a = a} = (4) where 0 Pr{ a = a }, =,..., N, denote the probablty that the attacker chooe the trategy a. B. efender Stratege The defender, ut lke the attacker, left wth a lmted upply of reource defned by S, to protect N S element of the power ytem agant attack. The defender trategy et contan N tratege, and each trategy d, =,, N condton one method to dtrbute h lmted reource for protectng N S element of the power ytem: d = {,...,,..., } (5),,, N S NS = S, (6) = where 0 S,, =,..., N S, tand for the amount of the reource that the defender trategy d nvet on protectng the element of the power ytem. Th paper regard the defender trategy a a mxed one too, defned by a probablty dtrbuton on : T p = [Pr{ d = d },...,Pr{ d = d },...,Pr{ d = d }] (7) N 3
3 N Pr{ d = d} = (8) = where 0 Pr{ d = d }, =,..., N, denote the probablty that the defender adopt the trategy d. C. ttacker and efender Reward In the fght between the attacker and the defender, both of them acheve reward. In order to quantfy ther reward, th paper propoe a rk aement technology that nclude: () the probablty of a ucceful attack, and (2) the reultng power ytem mpact etmated by load unerved a a conequence of a ucceful attack. The probablty of a ucceful attack on the element, =,..., NS of the power ytem, denoted by p = f(, ), depend on the reource dtrbuton tratege of both the attacker and defender. Th probablty ncreae wth an ncrement n the attacker reource nveted on the element, but nverely related to the defender reource nveted. Th paper adopt the probablty n [7] defned a follow: p = (9) c+ c2 + where c and c2 are potve contant and vared wth dfferent mportance of the element. If the attacker target of the trategy a a combnaton of element of the power ytem, denoted by T, and the defender chooe the trategy d, the probablty of a ucceful attack on all target element of the power ytem obtaned by: Pad, = p ( p) (0) T T Th paper etmate the phycal mpact after a ucceful attack of dablng all target element by the load unerved P lo for the cutomer of the power ytem. The power ytem ued a a model to run optmal load heddng mulaton [8] to determne the load unerved P lo under dfferent attack cenaro. Thu, the defender reward the negatve of the cot of the expected total load unerved due to the attack, a hown below: R ( ad, ) = EP { ( ad, )} = P P () lo a, d lo fferent from the defender, an attacker motvaton mght not alway be to maxmze the negatve conequence of the event. Intead, the obectve of the attack can be to trke a ymbolc demontraton, or to root a problem not too catatrophc but hazardou enough to acheve a pychologcal effect on the vctm, lke the pread of fear and anxety. Baed on the precedng dcuon, th paper adopt two type of the attacker-reward functon baed on the paper [2]: the frt the Wort Cae Reward defned by: R ( ad, ) = EP { lo ( ad, )} (2) whch denote the attacker obectve to make the mot of the expected total load unerved due to an attack trategy a and defene trategy d ; and the econd the Probablty- Baed Reward, defned a: R ( ad, ) = PE { {P lo ( ad, )} > P0 } (3) whch gnfe the attacker attemptng to maxmze the probablty that the load unerved P lo over a certan magntude P 0.. Game Model and Equlbrum Statege Baed upon the etablhment of the attacker and the defender tratege and reward, th paper formulate the nteracton between the attacker and the defender n the power ytem ecurty problem a a two-player game model Γ= : (, R,, R ), where = { a,..., a N } repreent the attacker trategy pace, = { d,..., d N } degnate the defender trategy pace, R = [ R ( a, d )] N N ymbolze the attacker reward functon correpondng to the attack trategy a and defenve trategy d, and R = [ R ( a, d )] N N denote the defender reward functon conformng to the attack trategy a and the defenve trategy d. Th propoton tructured upon the etablhment of the tratege dentfed prevouly for both the attacker and the defender. ume that both the attacker and the defender are unclear about each other tratege, and the defender trategy mplemented before the attacker acton. Thu, correpondng to attacker dfferent motvaton, th paper clafe the game model Γ nto two varete: ) Zero-Sum Game Model In th model, the attacker take the Wort-Cae Reward functon. Thu, R + R = E{ P ( a, d)} + E{ P ( a, d)} (4) lo The condton where the attacker attempt to maxmze the total expected damage whle the defender tre to mnmze the ame can be tranlated nto the followng optmzaton problem: lo max{mn{ EP { ( ad, )}}} (5) lo p p Thu, the optmal attack and defene tratege can be obtaned by olvng the optmzaton problem. 2) Gen-Sum Game Model Bearng n mnd the attacker probablty-baed reward functon, the game model between the attacker and the defender develop nto a fnte, two-player gen-um noncooperatve game, hortly known a a Bmatrx Game. The 4
4 Lemke-Howon algorthm [] epoued here to fnd a Nah equlbrum of the Bmatrx Game for the defender to afeguard the power ytem. Let p* and p * be the mxed tratege of the attacker and defender repectvely. Thu, the mxed trategy par ( p*, p * ) a Nah equlbrum of game Γ (R, R ) f and only f: N, p > 0 ( R p ) = max( R p ) (6) where * * * k k * * * k k N, p > 0 ( R p ) = max( R p ) (7) ( p ) denote the lkelhood of the attacker (defender) p * * to take a trategy ( ). Nah [0] proved that, n above mxed tratege, any game wth a fnte et of player and a fnte et of tratege ha a Nah equlbrum. Thu, the zero-um game model ha an unque Nah equlbrum, whle the gen-um game model ha at leat one Nah equlbrum. III. SIMULTION STUY The mulaton tudy dvded nto three tep. The frt tep nvolve the electon of the attacker and the defender reource dtrbuton tratege. To keep the mulaton tudy numercally mple, th paper defne only four attacker tratege and four defender tratege, but the propoed game model applcable to any fnte tratege tuaton. Secondly, buldng upon thee tratege, th paper mulate the phycal load unerved due to ucceful attack through the optmal load heddng technology on the power ytem, calculate the probablty of each ucceful attack, and quantfe the rk faced by the power ytem. The thrd and ultmate tep deal wth takng thee quantfed rk a nput nto the oluton algorthm n order to acqure optmal attack and defene tratege. mall cale power grd wth three generator and x tranmon lne ha been ntroduced, repreented by Fg. 2, ued a the tet model to run optmal load heddng mulaton that conclude the load unerved after ucceful attack. In addton, the coeffcent of the power ytem are gven n Table I.. Stratege of the ttacker and efender ue to the lmted phycal mpact nflcted by attack on one ngle element, th paper focue on a ere of attack tratege targetng at two element, a clearly hown n Table II whch alo lt the load unerved when the attack ucceed. ccordng to the clafcaton n Secton I, attack 3-6 are called a Intellgent ttack, whch have evere phycal mpact on the power ytem, whle attack and 2 are clafed nto Brute-Force ttack, whch hardly have mpact on the ytem. Th paper only conder four Intellgent ttack contanng attack 3 to 6. In th paper, defender and attacker reource, whch nclude manpower, technology, and fund, are meaured by unt. Fg. 2. Sx-bu ytem wth three generator and x tranmon lne. TBLE I. COEFFIECIENTS OF THE SIX-BUS TEST SYSTEM PRMETERS OF THE TEST SYSTEM VLUE Generator G Capacty (MW) 0~00 Generator G2 Capacty (MW) 0~50 Generator G3 Capacty (MW) Tranmon Lne Thermal Capacty Lmt(MW) TBLE II. LO UNSERVE UE TO TTCKS 0~50 00 TTCK NO. TTCK STRTEGY LO UNSERVE (MW) G and Lne 0 2 Lne 2 and Lne G3 and Lne Lne 5 and Lne G and G2 G2 and G ume that attacker ha 6 unt reource, and defender ha 9 unt reource. In order to enure that Nah Equlbrum ext, the dtrbuton of reource dcrete, and the mallet nvetment unt. ttack tratege are choen a follow: ttack trategy : 3 unt reource for detroyng G; 3 unt reource for damagng Lne 2. ttack trategy 2: 3 unt reource for detroyng Lne 5; 3 unt reource for damagng Lne 6. ttack trategy 3: 3 unt reource for detroyng G; 3 unt reource for damagng G2. ttack trategy 4: 3 unt reource for detroyng G; 3 unt reource for damagng G3. efene tratege can be elected n four way, predomnantly all-element-focued, generator-focued, and two other type of tranmon lne-focued. efene trategy : unt reource for defendng each of 9 element of the power ytem. efene trategy 2: 3 unt reource for defendng each of 3 generator of the power ytem. 5
5 efene trategy 3: 2 unt reource for defendng lne -3; unt reource for defendng lne 4-6. efene trategy 4: 2 unt reource for defendng lne 4-6; unt reource for defendng lne -2. B. Rk ement In the mulaton, the probablty of a ucceful attack on the tranmon lne, where =,..6, of the power ytem, gven by: p = + + where denote the reource that the attacker devoted to the lne, denote the reource that the defender nveted on the ame lne. However, the probablty of a ucceful attack on the generator, =,..3, of the power ytem, defned a: 2 p = where denote the reource captalzed by the attacker on the generator, and denote the reource deployed by the defender on the ame generator. Founded on the dcuon overhead, Table III provde the probablty of a ucceful attack under the varou nteracton between the attacker and the defender. Table IV preent the correpondng calculated rk that defned by the product of the probablty of a ucceful attack and the unerved load. C. Equlbrum Stratege The quantfed rk form a the nput parameter to th algorthm. Fg. 3(a) how the equlbrum mxed tratege of the zero-um game model for the cae when the attacker target aume a wort-cae cenaro whch maxmze the expected unerved load. Fg. 3(b) depct the equlbrum mxed tratege of the gen-um game model for the cae where the attacker obectve baed on probablty that am to maxmze the probablty of the expected unerved load beyond a threhold. For th example, the threhold ha been et to 0MW. Fg. 3 ndcate that the defender equlbrum trategy vare wth dfferent game model, and the defender mut adapt h tratege to the type of attack he want to focu on. For four dfferent threhold that are MW, 20MW, 40MW and 60MW, the Fg. 4(a)-(d) preent the equlbrum mxed tratege for the attacker and the defender for the cae of the attacker mxed probablty-baed target. Fg. 4 eentally draw a fne lne on the threhold that govern the attacker and the defender electon of the avalable tratege. TBLE III. PROBBILITY OF SUCCESSFUL TTCK STRTEGY EFENER % 8.00% 5.00% 22.50% % 56.25% 4.06% 6.25% % 5.76% 36.00% 36.00% % 5.76% 36.00% 36.00% ttacker TBLE IV. RISK SSESSMENT STRTEGY EFENER ttacker (a) (b) Fg. 3. ttacker and efender optmal tratege accrodng to dfferent game model. (a) (c) (d) Fg. 4. ttacker and efender optmal tratege coorepondng to dfferent threhold n the attacker probablty-baed target. (b) 6
6 IV. CONCLUSION Intellgent attack hoted by an attacker famlar wth the operaton, montorng and control of the power ytem are the maor focu of th paper. ucceful ntellgent attack would caue an enormou phycal damage to the power ytem. In order to quantfy the damage, a rk aement technology brefly explaned. Th technology dffer from the rk management tandard uch a S/NZS ISO 3000:2009 [4] n the manner that t employ mathematc method to quantfy the rk baed on the probablty of a ucceful attack and the expected unerved load. To effectvely analyze the nteracton between the attacker and the defender, two game model baed on the rk aement have been propoed. ample tet power grd ha been ued to llutrate the gnfcance of the propoed game theoretc framework whch can be ued to explore and evaluate the tratege to defend the power ytem agant ntellgent attack. The numercal example how that, conderng attacker wth dfferent purpoe, defender hould take correpondng defene tratege. CKNOWLEGMENT The preent tudy wa upported by the Natonal Scence Foundaton enttled Toward Secure Networked Cyber- Phycal Sytem: Theoretc Framework wth Bounded Ratonalty under Grant No REFERENCES [] R.. Serrano and E. Halper, Sophtcated but low-tech power grd attack baffle authorte, Lo ngele Tme, Feb [2] S. Sddharth, M. Govndarau and C. C. Lu, Rk naly of Coordnated Cyber ttack on Power Grd, Control and Optmzaton Method for Electrcal Smart Grd. Power Electronc and Power Sytem, vol. 3, pp , 202. [3] NIST, Gloary of Key Informaton Securty Term, Feb. 20. [4] M. Letch, ISO 3000:2009 The new nternatonal tandard on rk management, Rk nal., vol. 30, no. 6, pp , 200. [5]. J. Holmgren, E. Jenelu, and J. Wetn, Evaluatng Stratege for defendng electrcal power networkd agant antagontc attack, IEEE Tranacton on Power Sytem, vol. 22, no., Feb [6] P. -Y. Chen, S. M. Cheng, and K. -C. Chen, Smart ttack n Smart Grd Communcaton Network, IEEE Commun. Mag., vol. 50, no. 8, pp , 202. [7] R. B. Myeron, Game Theory: naly of Conflct, Harvard Unverty Pre, Cambrdge, M, 99. [8] Y. Shoham and K. Leyton-Brown, Multagent Sytem: lgorthmc, Game-Theoretc, and Logcal Foundaton, Cambrdge, U.K.: Cambrdge Unv. Pre, [9] B. von Stengel, Equlbrum computaton for two-player game n trategc and extenve form, lgorthmc Game Theory, Cambrdge Unverty Pre, pp , [0] J. F. Nah, Non-cooperatve game, nnal of Math, vol. 54, pp , 95. [] C. E. Lemke and J. T. Howon, Equlbrum pont of bmatrx game, Socety for Indutral and ppled Mathematc, vol. 2, no. 4, pp , 964. [2] V. ggarwal, On the generaton of all equlbrum pont for bmatrx game through the Lemke-Howon algorthm, Mathematcal Programmng, vol. 4, pp , 973. [3] N. Nan, T. Roughgarden, E. Tardo, and V.V. Vazran, lgorthmc game theory, Cambrge Unverty Pre, [4]. M. Colman, Game theory and t applcaton: n the ocal and bologcal cence, Pychology Pre, 203. [5] T. Sandholm,. Glpn, and V. Contzer, Mxed-ntegerprogrammng method for fndng nah equlbra, In Proceedng of the 20th Natonal Conference on rtfcal Intellgence, pp , Jul [6] C.-W. Ten, C.-C. Lu, and G. Manmaran, Vulnerablty aement of cyberecurty for SC ytem, IEEE Tran. Power Syt., vol. 23, no. 4, pp , Nov [7] Z. Jan, L. Sh, L. Yao, and B. Maoud, Electrcal Grd Vulnerablty ement under ttack-efene Scenaro Baed on Game Theroy, In Power and Energy Engneerng Conference (PPEEC), pp. -5, 203. [8]. Pnar, J. Meza, V. onde, and B. Leeutre, Optmzaton Stratege for the Vulnerablty naly of the Electrc Power Grd, n SIM J. Optm, vol. 20, no. 4, pp ,
Generation of Multi-View Video Using a Fusion Camera System for 3D Displays
E.-K. Lee and Y.-S. Ho: Generaton of Mult-Vew VdeoUng a Fuon Camera Sytem for 3D Dplay 2797 Generaton of Mult-Vew Vdeo Ung a Fuon Camera Sytem for 3D Dplay Eun-Kyung Lee and Yo-Sung Ho, Senor Member, IEEE
More informationHigh Speed 128-bit BCD Adder Architecture Using CLA
Hgh Speed 128-bt BCD Archtecture Usng CLA J.S.V.Sa Prasanth 1, Y.Yamn Dev 2 PG Student [VLSI&ES], Dept. of ECE, Swamy Vvekananda Engneerng College, Kalavara, Andhrapradesh, Inda 1 Assstant Professor, Dept.
More informationUtility-Based Multiagent Coalition Formation with Incomplete Information and Time Constraints *
Utlty-Baed Multagent Coalton Formaton wth Incomplete Informaton and Tme Contrant * Leen-Kat Soh Computer Scence and Engneerng Department Unverty of Nebraa Lncoln, Nebraa loh@ce.unl.edu Abtract - In th
More informationExperimental Testing and Model Validation for Ocean Wave Energy Harvesting Buoys
Expermental Tetng and Model Valdaton for Ocean Wave Energy Harvetng Buoy Dougla A. Gemme 1, Steven P. Baten 1, Raymond B. Sepe, Jr. 1, John Montgomery 2, Stephan T. Grll 2, Annette Grll 2 1 Electro Standard
More informationTeacher Resource for Unit 1 Lesson 1: Linear Models Refresher
Tme Frame: 3-4 Da Math 3 Unt Leon S-ID.6, 7, S-IC. Math Practce 2, 3, 4 Teacher Reource for Unt Leon : Lnear Model Refreher Math Content Standard: S-ID.6, 7, S-IC. S.ID.6 Repreent data on two quanttatve
More informationInvestigating Reinforcement Learning in Multiagent Coalition Formation
Investgatng Renforcement Learnng n Multagent Coalton Formaton Xn L and Leen-Kat Soh Department of Computer Scence and Engneerng Unversty of Nebrasa-Lncoln 115 Ferguson Hall, Lncoln, NE 66588-0115 {xnl,
More informationEvaluation of a Center Pivot Variable Rate Irrigation System
Evaluaton of a Center Pvot Varable Rate Irrgaton System Ruxu Su Danel K. Fsher USDA-ARS Crop Producton Systems Research Unt, Stonevlle, Msssspp Abstrat: Unformty of water dstrbuton of a varable rate center
More informationEngineering Analysis of Implementing Pedestrian Scramble Crossing at Traffic Junctions in Singapore
Engneerng Analyss of Implementng Pedestran Scramble Crossng at Traffc Junctons n Sngapore Dr. Lm Wee Chuan Eldn Department of Chemcal & Bomolecular Engneerng, Natonal Unversty of Sngapore, 4 Engneerng
More informationEnglish Premier League (EPL) Soccer Matches Prediction using An Adaptive Neuro-Fuzzy Inference System (ANFIS) for
Englsh Premer League (EPL) Soccer Matches Predcton usng An Adaptve Neuro-Fuzzy Inference System (ANFIS) for Amadn, F. I 1 and Ob, J.C. 2 Department of Computer Scence, Unversty of Benn, Benn Cty. Ngera.
More informationCS 2750 Machine Learning. Lecture 4. Density estimation. CS 2750 Machine Learning. Announcements
CS 75 Machne Learnng Lecture 4 ensty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 539 Sennott Square CS 75 Machne Learnng Announcements Homework ue on Wednesday before the class Reports: hand n before the
More informationEvolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals
Internatonal Journal on Marne Navgaton and Safety of Sea Transportaton Volume 6 Number 3 September 2012 Evolutonary Sets of Safe Shp Trajectores: Evaluaton of Indvduals R. Szlapczynsk Gdansk Unversty of
More informationIEEE TRANSACTIONS ON SMART GRID, VOL. 7, NO. 2, MARCH
IEEE TRANSACTIONS ON SMART GRID, VOL. 7, NO. 2, MARCH 2016 937 How Geo-Dstrbuted Data Centers Do Demand Response: A Game-Theoretc Approach Nguyen H. Tran, Member, IEEE, Da H. Tran, Shaole Ren, Member,
More informationA PROBABILITY BASED APPROACH FOR THE ALLOCATION OF PLAYER DRAFT SELECTIONS IN AUSTRALIAN RULES
Journal of Sports Scence and Medcne (2006) 5, 509-516 http://www.jssm.org Research artcle The 8th Australasan Conference on Mathematcs and Computers n Sport, 3-5 July 2006, Queensland, Australa A PROBABILITY
More informationEquilibrium or Simple Rule at Wimbledon? An Empirical Study
Equlbrum or Smple Rule at Wmbledon? An Emprcal Study Shh-Hsun Hsu, Chen-Yng Huang and Cheng-Tao Tang Revson: March 2004 Abstract We follow Walker and Wooders (200) emprcal analyss to collect and study
More informationDETECTION AND REFACTORING OF BAD SMELL
Internatonal Journal of Software Engneerng & Applcatons (IJSEA), Vol.4, No.5, September 2013 DETECTION AND REFACTORING OF BAD SMELL CAUSED BY LARGE SCALE Jang Dexun 1, Ma Pejun 2, Su Xaohong 3, Wang Tantan
More informationImpact of Intelligence on Target-Hardening Decisions
CREATE Research Archve Publshed Artcles & Papers 5--29 Impact of Intellgence on Target-Hardenng Decsons Vck M. Ber Unversty of Wsconsn Madson, ber@engr.wsc.edu Chen Wang Unversty of Wsconsn - Madson, cwang37@wsc.edu
More informationHow Geo-distributed Data Centers Do Demand Response: A Game-Theoretic Approach
IEEE TRANSACTIONS ON SMART GRIDS 1 How Geo-dstrbuted Data Centers Do Demand Response: A Game-Theoretc Approach Nguyen H. Tran, Member, IEEE, Da H. Tran, Shaole Ren, Member, IEEE, Zhu Han, Fellow, IEEE,
More informationTHE STATE OIL AND GAS BOARD OF MISSISSIPPI ORDER. This day this cause came on to be heard on the petition
BLED FOR RECORD J Jf\H 6 1978 OIL AND GAS BOARD Clyde R. Davs, State Ol & Gas Supervsor THE STATE OIL AND GAS BOARD OF MISSISSIPPI ^ DOCKET NO. 251-77-56 ORDER NO. ORDER Ths day ths cause came on to be
More informationAvailability assessment of a raw gas re-injection plant for the production of oil and gas. Carlo Michelassi, Giacomo Monaci
16 th IMEKO TC4 Symposum Explorng New Fronters of Instrumentaton and Methods for Electrcal and Electronc Measurements Avalablty assessment of a raw gas re-njecton plant for the producton of ol and gas
More informationRisk analysis of natural gas pipeline
Rsk analyss of natural gas ppelne Y.-D. Jo 1, K.-S. Park 1, J. W. Ko, & B. J. Ahn 3 1 Insttute of Gas Safety Technology, Korea Gas Safety Corporaton, South Korea Department of Chemcal Engneerng, Kwangwoon
More informationOPTIMAL LINE-UPS FOR A YOUTH SOCCER LEAGUE TEAM. Robert M. Saltzman, San Francisco State University
OPTIMAL LINE-UPS FOR A YOUTH SOCCER LEAGUE TEAM Robert M. Saltzman, San Francsco State Unversty ABSTRACT Coaches n some dvsons of the Amercan Youth Soccer Organzaton (AYSO) are asked to fll out ther team
More informationDRAFT FOR PUBLIC CONSULTATION INTERCONNECTION AGREEMENT v.2.0 FOR IP KULATA/SIDIROKASTRO DEFINITIONS, BUSINESS RULES, EXCEPTIONAL EVENT
RAFT FOR PUBLIC CONSULTATION INTERCONNECTION AGREEMENT v.2.0 FOR IP KULATA/SIIROKASTRO EFINITIONS, BUSINESS RULES, EXCEPTIONAL EVENT ARTICLE 1: EFINITIONS All terms of the INTERCONNECTION AGREEMENT shall
More informationInternational Journal of Engineering and Technology, Vol. 8, No. 5, October Model Systems. Yang Jianjun and Li Wenjin
Internatonal Journal of Engneerng and Technology, Vol. 8, No. 5, October 2016 1 Relablty Optmzaton Desgn of Submarne Free-Runnng Model Systems Yang Janjun and L Wenjn Abstract Wth regard to the relablty
More informationNonlinear Risk Optimization Approach to Gas Lift Allocation Optimization
pubs.acs.org/iecr Nonlnear Rsk Optmzaton Approach to Gas Lft Allocaton Optmzaton Mahd Khshvand and Ehsan Khamehch* Faculty of Petroleum Engneerng, Amrkabr Unversty of Technology, Tehran, Iran ABSTRACT:
More informationA comparison study on the deck house shape of high speed planing crafts for air resistance reduction
csnak, 2014 Int. J. Nav. Archt. Ocean Eng. (2014) 6:867~875 http://dx.do.org/10.2478/ijnaoe-2013-0218 pissn: 2092-6782, eissn: 2092-6790 A comparson study on the deck house shape of hgh speed planng crafts
More informationComparative Deterministic and Probabilistic Analysis of Two Unsaturated Soil Slope Models after Rainfall Infiltration
Jordan Journal of Cvl Engneerng, Volume 11, No. 1, 2017 Comparatve Determnstc and Probablstc Analyss of Two Unsaturated Sol Slope Models after Ranfall Infltraton Manoj Kr. Sahs 1) and Partha Pratm Bswas
More informationTransportation Research Forum
Transportaton Research Forum On the Impact of HOT Lane Tollng Strateges on Total Traffc Level Author(s): Sohel Sbdar and Mansoureh Jehan Source: Journal of the Transportaton Research Forum, Vol. 48, No.
More informationInternational Journal of Industrial Engineering Computations
Internatonal Journal of Industral Engneerng Computatons 2 (20) 93 202 Contents lsts avalable at GrowngScence Internatonal Journal of Industral Engneerng Computatons homepage: wwwgrowngscencecom/ec A mult-obectve
More informationOptimization for Bus Stop Design Based on Cellular Automaton Traffic Model
Modern Tranportation Volume 6, 2017, PP.1-7 Optimization for Bu Stop Deign Baed on Cellular Automaton Traffic Model Liankui Zhang 1, Chengyou Cui 1 1. Department of Technology Economic and Management,
More informationNumerical Study of Occupants Evacuation from a Room for Requirements in Codes
Numercal Study of Occupants Evacuaton from a Room for Requrements n Codes HL MU JH SUN Unversty of Scence and Technology of Chna State Key Laboratory of Fre Scence Hefe 2300326, CHINA muhl@mal.ustc.edu.cn
More informationCoordination in CPG and its Application on Bipedal Walking
Coordination in CPG and it Application on Bipedal Walking Weiwei Huang Department of Mechanical Engineering National Univerity of Singapore Singapore 96 huangweiwei@nu.edu.g Chee-Meng Chew Department of
More informationReduced drift, high accuracy stable carbon isotope ratio measurements using a reference gas with the Picarro 13 CO 2 G2101-i gas analyzer
Reduced drft, hgh accuracy stable carbon sotope rato measurements usng a reference gas wth the Pcarro 13 CO 2 G2101- gas analyzer Chrs Rella, Ph.D. Drector of Research & Development Pcarro, Inc., Sunnyvale,
More informationAerator Performance in Reducing Phenomenon of Cavitation in Supercritical Flow in Steep Channel Bed
Engneerng Internatonal Conference UNNES Conservaton 13 Proceedng Aerator Performance n Reducng Phenomenon of Cavtaton n Supercrtcal Flow n Steep Channel Bed Yer Sutopo 1, Bud Wgnyosukarto, Istarto, dan
More informationMechanical Engineering Journal
56789 Bulletn of the JSME Mechancal Engneerng Journal Vol., o., 6 Measurement of three-dmensonal orentaton of golf club head wth one camera Wataru KIMIZUKA* and Masahde OUKI* * DULOP SPORTS CO. LTD. Waknohama-cho
More informationInvestigation on Rudder Hydrodynamics for 470 Class Yacht
Proceedngs Investgaton on Rudder Hydrodynamcs for 470 Class Yacht She Ln 1,, Yong Ma, *, Wetao Zheng, Song Zhang 1,, Xaoshan Le 1, and Yangyng He 1, 1 Graduate School of Wuhan Sports Unversty, Wuhan 430079,
More informationBETHANY TAX INCREMENT FINANCING DISTRICT NO. 1 NOTICE OF TWO PUBLIC HEARINGS
BETHANY TAX NCREMENT FNANCNG DSTRCT NO. 1 NOTCE OF TWO PUBLC HEARNGS On December 12, 2017 at 7:00 P.M., at Bethany Cty Hall, 6700 N.W. 36th Street, Bethany, Oklahoma, the Cty Councl of the Cty of Bethany
More informationMethodology for ACT WorkKeys as a Predictor of Worker Productivity
Methodology for ACT WorkKeys as a Predctor of Worker Productvty The analyss examned the predctve potental of ACT WorkKeys wth regard to two elements. The frst s tme to employment. People takng WorkKeys
More informationLSSVM Model for Penetration Depth Detection in Underwater Arc Welding Process
ISS 1746-7659, England, UK Journal of Informaton and Computng Scence Vol. 5, o. 4, 2010, pp. 271-278 LSSVM Model for Penetraton Depth Detecton n Underwater Arc Weldng Process WeMn Zhang 1, 2, GuoRong Wang
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(5): Research Article
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 204, 6(5): 520-526 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Dgtal Electrcal Resstance Tomography System and ts Expermental
More informationUnified optimal power flow model for AC/DC grids integrated with natural gas systems considering gas-supply uncertainties
J. Mod. Power Syst. Clean Energy https://do.org/10.1007/s40565-018-0404-6 Unfed optmal power flow model for AC/DC grds ntegrated wth natural gas systems consderng gas-supply uncertantes Jale FAN 1, Xaoyang
More informationSchool of Civil Engineering, Shandong University, Jinan , China
2017 Internatonal Conference on Energy, Power and Envronmental Engneerng (ICEPEE 2017) ISBN: 978-1-60595-456-1 Evaluaton on Sustanable Utlzaton of Water Resources n Shandong Provnce Based on Water Footprnt
More informationAn Enforcement-Coalition Model: Fishermen and Authorities forming Coalitions. Lone Grønbæk Kronbak Marko Lindroos
An Enforcement-Coalton Model: Fshermen and Authortes formng Coaltons Lone Grønbæ Kronba Maro Lndroos December 003 All rghts reserved. No part of ths WORKING PAPER may be used or reproduced n any manner
More informationMass Spectrometry. Fundamental GC-MS. GC-MS Interfaces
Mass Spectrometry Fundamental GC-MS GC-MS Interfaces Wherever you see ths symbol, t s mportant to access the on-lne course as there s nteractve materal that cannot be fully shown n ths reference manual.
More informationPlanning of production and utility systems under unit performance degradation and alternative resource-constrained cleaning policies
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 Plannng of producton and utlty systems under unt performance degradaton
More informationA Prediction of Reliability of Suction Valve in Reciprocating Compressor
Purdue Unversty Purdue e-pubs nternatonal Compressor Engneerng Conference School of Mechancal Engneerng 1996 A Predcton of Relablty of Sucton Valve n Recprocatng Compressor W. H. You Samsung Electroncs
More informationNEUTRAL AND OFFENSIVE ZONE TEAM PLAY
JACQUES MARTIN ASSOCIATE COACH QUEBEC NORDIQUES NEUTRAL AND OFFENSIVE ZONE TEAM PLAY Attack Optons: The topc of attack optons really s the applcaton of the "read and react" dea. Players on the attack have
More informationPatient Health Care Analysis based on ANFIS Sugeno Model
Internatonal Journal of Computer Trends and Technology (IJCTT) volume 7 Number 4 Nov 204 Patent Health Care nalyss based on NFIS Sugeno Model Maylvaganan M #, Rajeswar K *2 # ssocate Professor & Dept.of
More informationADDITIONAL INSTRUCTIONS FOR ISU SYNCHRONIZED SKATING TECHNICAL CONTROLLERS AND TECHNICAL SPECIALISTS
A ADDITIONAL INSTRUCTIONS FOR ISU SYNCHRONIZED SKATING TECHNICAL CONTROLLERS AND TECHNICAL SPECIALISTS DIFFICULTY GROUPS OF FEATURES 1 DEFINITIONS: Change of Rotaton: Refers to TURNS or LINKING STEPS rotatng
More informationM.H.Ahn, K.J.Lee Korea Advance Institute of Science and Technology 335 Gwahak-ro, Yuseong-gu, Daejeon , Republic of Korea
The Methodology on Exposure Dose Evaluaton Modelng Related to Arbtrary Accdent n the Temporary Storage Faclty for Low and Intermedate Level Waste - 9133 M.H.Ahn, K.J.Lee Korea Advance Insttute of Scence
More informationgenerator's nameplate - Datasheet generator's nameplate - Datasheet
Åpen informajon Foweb: Wind plant parameter (2018-11) Englih verion of 'Foweb: Data for produkjonanlegg vindkraftverk parameterveileder' (page 1 of 7) www.tatnett.no/foweb Diclaimer: Thi document i an
More informationDynamic Analysis of the Discharge Valve of the Rotary Compressor
Purdue Unversty Purdue e-pubs Internatonal Compressor Engneerng Conference School of Mechancal Engneerng 8 Dynamc Analyss of the Dscharge Valve of the Rotary Compressor Bo Huang Shangha Htach Electrcal
More informationA Double Oracle Algorithm for Zero-Sum Security Games. Graphs, Manish Jain, Dmytro Korzhyk, Ondřej Vaněk, Vincent Conitzer,
A Double Oracle Algorithm for Zero-Sum Security Game on Graph Manih Jain, Dmytro Korzhyk, Ondřej Vaněk +, Vincent Conitzer, Michal Pěchouček +, Milind Tambe Computer Science Department, Univerity of Southern
More informationDevelopment of Accident Modification Factors for Rural Frontage Road Segments in Texas
Development of Accdent Modfcaton Factors for Rural Frontage Road Segments n Texas Domnque Lord* Zachry Department of Cvl Engneerng & Center for Transportaton Safety Texas Transportaton Insttute Texas A&M
More informationBlockholder Voting. Heski Bar-Isaac and Joel Shapiro University of Toronto and University of Oxford. March 2017
Blockholder Votng Hesk Bar-Isaac and Joel Shapro Unversty of Toronto and Unversty of Oxford March 2017 Abstract By ntroducng a shareholder wth many votes (a blockholder to a standard model of votng, we
More informationJIMAR ANNUAL REPORT FOR FY 2001 (Project ) Project Title: Analyzing the Technical and Economic Structure of Hawaii s Pelagic Fishery
1 JIMAR ANNUAL REPORT FOR FY 2001 (Project 653540) P.I. Name: PngSun Leung, Khem Sharma and Sam Pooley Project Research Assstant: Naresh Pradhan Project Ttle: Analyzng the Techncal and Economc Structure
More informationCOMPARATIVE ANALYSIS OF WAVE WEATHER WINDOWS IN OPERATION AND MAINTENANCE OF OFFSHORE WIND FARMS AT HSINCHU AND CHANGHUA, TAIWAN
Journal of Marne Scence and Technology, Vol. 5, No. 5, pp. 563-570 (07) 563 DOI: 0.69/JMST-07-0703- COMPARATIVE ANALYSIS OF WAVE WEATHER WINDOWS IN OPERATION AND MAINTENANCE OF OFFSHORE WIND FARMS AT HSINCHU
More informationreviewed paper Public transport travel time simulation Tomáš CHLEBNICAN, Jiří CTYROKY, Marek ZDERADICKA
reviewed paper Public tranport travel time imulation Tomáš CHLEBNICAN, Jiří CTYROKY, Marek ZDERADICKA (Mgr. Jiří ČTYROKÝ, Útvar rozvoje hl. m. Prahy, Vyšehradká 57, Prague, 18 00, ctyroky@urm.mepnet.cz)
More informationA New Single Transferable Vote Method and its Axiomatic Justification
A New Sngle Tranferable ote Metho an t Axomatc utfcaton Fua Alekerov ab* Alexaner Karpov a a Natonal Reearch Unverty Hgher School of conomc 2 Myantkaya tr. Mocow Rua; b Ruan Acaemy of Scence Inttute of
More informationA Study of Ocean Waves at Fisherman s Wharf, Victoria Harbour
A Study of Ocean Wave at Fiherman Wharf, Victoria Harbour David B. Fiel, Jianhua Jiang and Dave Billenne ASL Environmental Science Inc., 1986 Mill Rd., Sidney, BC, V8L 5Y3, Canada, Phone Number (250) 656-0177
More informationSustainability Enhancement under Uncertainty: A Monte Carlo Based Simulation and System Optimization Method
Sustanablty Enhancement under Uncertanty: A Monte Carlo Based Smulaton and System Optmzaton Method Zheng Lu and Ynlun Huang* Department of Chemcal Engneerng and Materals Scence Wayne State Unversty, Detrot,
More informationFirst digit of chosen number Frequency (f i ) Total 100
1 4. ANALYSING FREQUENCY TABLES Categorcal (nomnal) data are usually summarzed n requency tables. Contnuous numercal data may also be grouped nto ntervals and the requency o observatons n each nterval
More informationCERTIFICATE OF ANALYSIS
n cooperaton wth the WG Alumnum of the Commttee of Chemt of GDB CERTIFICATE OF ANALYSIS ER -EB313 Alg3 Certfed Value Certfed value 1) Uncertanty 2) Element a fracton n % S 0.363 ± 0.007 Fe 0.391 ± 0.003
More informationPeace Economics, Peace Science and Public Policy
Peace Economcs, Peace Scence and Publc Polcy Volume 17, Issue 1 2011 Artcle 1 Lone Wolf Terrorsm Peter J. Phllps Unversty of Southern Queensland, phllpsp@usq.edu.au Copyrght c 2011 Berkeley Electronc Press.
More informationComprehensive evaluation research of volleyball players athletic ability based on Fuzzy mathematical model
ISSN : 0974-7435 Volume 10 Issue 3 Comprehensve evaluaton research of volleyball players athletc ablty based on Fuzzy mathematcal model Shangbn L, Peyu Zhao, Yngshuang Lu, Lxn Wu* Physcal Educaton Department,
More informationFace Sketch-photo Synthesis under Multi-dictionary Sparse Representation Framework
011 Sxth Internatonal Conference on Image and Grahc Face Sketch-hoto Synthe under Mult-dctonary Sare Rereentaton Framework Nannan Wang, Xnbo Gao School of Electronc Engneerng Xdan Unverty X an, P. R. Chna
More informationSuperconducting Nanowire Single- Photon Detection System
TM Superconductng Nanowre Sngle- Photon Detecton System Installaton and Operaton Manual January 26, 2017 Quantum Opus, LLC 45211 Helm Street Plymouth, MI 48170-6023 USA 1-269-248-1004 General Informaton
More informationPeak Field Approximation of Shock Wave Overpressure Based on Sparse Data
Peak Feld Approxmaton of Shock Wave Overpressure Based on Sparse Data Yongl Zhang, Taln Han, Yuqun Chen, Enku Zhang, and Xuan Lu Abstract To obtan the shock wave feld dstrbuton, two knds of calber weapons
More informationThe impact of foreign players on international football performance
MPRA Munch Personal RePEc Archve The mpact of foregn players on nternatonal football performance Orhan Karaca Ekonomst Magazne, Research Department October 008 Onlne at http://mpra.ub.un-muenchen.de/11064/
More informationVISCOUS FLOW FIELDS INDUCED BY A BREAKING SOLITARY WAVE OVER A SHELF
Journal of Marne Scence and echnolog, Vol. 3, No. 6, pp. 855-863 (05) 855 DOI: 0.69/JMS-05-060- VISCOUS FLOW FIELDS INDUCED BY A BREAKING SOLIARY WAVE OVER A SHELF Chng-Jer Huang,, Yen-sen Ln, and Chun-Yuan
More informationRADIAL STIFFNESS OF A BICYCLE WHEEL AN ANALYTICAL STUDY
ADIAL TIFFE OF A BICYCLE WHEEL - A AALYTICAL TUDY José aría ínguez Dpto. de Físca Aplcada II Facultad de Cenca y Tecnología Unversdad del País Vasco Aptdo. 644 488 Blbao PAI Emal: osemara.mnguez@ehu.es
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
Ths document s downloaded from DR-NTU, Nanyang Technologcal Unversty Lbrary, Sngapore. Ttle capacty analyss usng smulaton Author(s) Ctaton Huang, Shell Yng; Hsu, Wen Jng; He, Yuxong; Song, Tancheng; De
More informationAalborg Universitet. Published in: 9th ewtec Publication date: Document Version Publisher's PDF, also known as Version of record
Aalborg Unverstet Predctablty of the Power Output of Three Wave Energy Technologes n the Dansh orth Sea Chozas, Jula Fernandez; Jensen,. E. Helstrup; Sørensen, H. C.; Kofoed, Jens Peter; Kabuth, Alna Krstn
More informationResearch and Application of Work Roll Contour Technology on Thin Gauge Stainless Steel in Hot Rolling
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Mechancal Engneerng Journal, 215, 9, 111-116 111 Open Access Research and Applcaton of Work Roll Contour Technology on Thn Gauge Stanless Steel
More informationEvaluating the Effectiveness of Price and Yield Risk Management Products in Reducing. Revenue Risk for Southeastern Crop Producers * Todd D.
Evaluatng the Effectveness of Prce and Yeld Rsk Management Products n Reducng Revenue Rsk for Southeastern Crop Producers * Todd D. Davs ** Abstract A non-parametrc smulaton model ncorporatng prce and
More informationRCBC Newsletter. September Richmond County Baseball Club. Inside this issue: Johnny Ray Memorial Classic. RCBC on You Tube
September 2016 Rchmond County Baseball Club 1400 Travs Ave. Staten Island, NY 10314 RCBC Newsletter If you have any nterestng nfo or news you would lke ncluded n a future newsletter, please emal to jm@rcbclub.com.
More informationPERMIT TRADING AND STABILITY OF INTERNATIONAL CLIMATE AGREEMENTS 19. MICHAEL FINUS * University of Hagen and National University of Singapore
Journal of Appled Economcs. Vol IX, No. 1 (May 2006), 19-47 PERMIT TRADING AND STABILITY OF INTERNATIONAL CLIMATE AGREEMENTS 19 PERMIT TRADING AND STABILITY OF INTERNATIONAL CLIMATE AGREEMENTS JUAN-CARLOS
More informationPredicting Wave Transformation during Extreme Weather Conditions
Predctng Wave Transformaton durng Extreme Weather Condtons Josephus LOPEZ 1, Karlo Marko NARIO 1, Patrck Joshua ROMARES 1, Maro DE LEON, Ryuchro NISHI 3, Hosotan KAZUNORI 4 1 Bachelor of Scence n Cvl Engneerng
More informationMuscle drain versus brain gain in association football: technology transfer through
Muscle dran versus bran gan n assocaton football: technology transfer through player emgraton and manager mmgraton G. J. Allan a * and J. Moffat b a Correspondng Author: Department of Economcs, Sr Wllam
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(3): Research Article
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(3):326-332 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on comprehensve evaluaton model-based NBA schedule
More informationarxiv: v1 [cs.ne] 3 Jul 2017
Modelng preference tme n mddle dstance trathlons Iztok Fster, 1 Andres Iglesas, 2 Suash Deb, 3, 4 Dušan Fster, 5 and Iztok Fster Jr. 6 1 Unversty of Marbor, Faculty of Electrcal Engneerng and Computer
More informationOPTIMIZATION OF PRESSURE HULLS OF COMPOSITE MATERIALS
OPTIMIZATION OF PRESSURE HULLS OF COMPOSITE MATERIALS J.Franco a, A.Corz a*.a.peña b a Materal Composte Group. Unversdad de Cadz. Avda/Ramon Puyol s/n. 11205 Algecras (Span) *alcorz@caltech.es b Calpe
More informationITRS 2013 Silicon Platforms + Virtual Platforms = An explosion in SoC design by Gary Smith
ITRS 2013 Slcon Platforms + Vrtual Platforms = An exploson n SoC desgn by Gary Smth 2013 2013 Gary Gary Smth Smth EDA, EDA, Inc. Inc. All All Rghts Rghts Reserved. Reserved. 1 The Fve Desgn Constrants
More informationStructural Gate Decomposition for Depth-Optimal Technology Mapping in LUT-based FPGA
Structural Gate Decomposton for Depth-Optmal Technology Mappng n LUT-based FPGA Abstract Jason Cong and Yean-Yow Hwang Department of Computer Scence Unversty of Calforna, Los Angeles Los Angeles, CA 9004
More informationPneumatic level indicator Unitel
Pneumatc level ndcator Untel Reference ponter for easy consumpton montorng Zero correcton possble Page 28 pplcaton For contnuous level measurement n tanks contanng fuel ol, desel fuel and ranwater. For
More informationA NUMERICAL INVESTIGATION OF SHEET FLOW UNDER NON-BREAKING AND BREAKING WAVES. Abstract
Coatal Dynamc 2017 A NUMERICAL INVESTIGATION OF SHEET FLOW UNDER NON-BREAKING AND BREAKING WAVES Yeulwoo Km 1, Zhen Cheng 2, Tan-Jan Hu 1, Ryan S. Mera 1 and Jack A. Puleo Abtract An Euleran two-phae flow
More informationSustainability Profiling of Long-living Software Systems
Sustanablty Proflng of Long-lvng Software Systems Ahmed D Alharth, Mara Spchkova and Margaret Hamlton RMIT Unversty, Melbourne, Australa Emal: {ahmedalharth, maraspchkova,margarethamlton}@rmteduau Abstract
More informationApplications on openpdc platform at Washington State University
Applcatons on openpdc platform at Washngton State Unversty Chuanln Zhao Ebrahm Rezae Man V. Venkatasubramanan Washngton State Unversty Pullman WA WSU projects OMS - Oscllaton Montorng System Stand-alone
More informationStudy on coastal bridge under the action of extreme wave
Study on coastal brdge under the acton of extreme wave Bo Huang Bng Zhu Jawe Zhang School of Cvl Engneerng, Southwest Jaotong Unversty, Chengdu 610031, Chna Abstract In order to research the catastrophc
More informationM. Álvarez-Mozos a, F. Ferreira b, J.M. Alonso-Meijide c & A.A. Pinto d a Department of Statistics and Operations Research, Faculty of
Ths artcle was downloaded by: [b-on: Bbloteca do conhecmento onlne UP] On: 29 May 205, At: 02:46 Publsher: Taylor & Francs Informa Ltd Regstered n England and Wales Regstered Number: 072954 Regstered offce:
More information2011 SEG SEG San Antonio 2011 Annual Meeting 3377
Source-receiver pretack depth migration uing dreamlet Bangyu Wu *, Ru-han Wu and Jinghuai Gao Modeling and Imaging Laboratory, IGPP, Univerity of California, Santa Cruz Summary The dreamlet method add
More informationTerminating Head
Termnatng Head 58246-1 Instructon Sheet for MTA- 100 Receptacle Connectors 408-6929 Usng Dscrete Wre 07 APR 11 Locatng Pawl Feed Slde Tool Base Wre Inserter Adjuster (Inserton Rod) Mass Termnaton Assembly
More informationCoastal Engineering Technical Note
Coastal Engneerng Techncal Note CETN V-10 Even-Odd Functon Analyss of Shorelne Poston and Volume Change by Jule Dean RoSllt and Nchollls C. Kraus Purpose: To present the background and methodology for
More informationPower Generation Scheduling of Thermal Units Considering Gas Pipelines Constraints
World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:3, No:1, 29 ower Generaton Schedulng of Thermal Unts Consderng Gas pelnes Constrants Sara
More informationEvaluating Rent Dissipation in the Spanish Football Industry *
Evaluatng Rent Dsspaton n the Spansh Football Industry * Gudo Ascar Dp. d Economa Poltca e Metod Quanttatv Va S. Felce 5 27100 Pava, Italy Tel: (+39) 0382 506211 Fax: (+39) 0382 304226 gascar@eco.unpv.t
More informationLake Clarity Model: Development of Updated Algorithms to Define Particle Aggregation and Settling in Lake Tahoe
Lake Clarty Model: Development of Updated Algorthms to Defne Partcle Aggregaton and Settlng n Lake Tahoe Goloka B. Sahoo S. Geoffrey Schladow John E. Reuter Danel Nover Davd Jassby Lake Clarty Model Weather
More informationComparisons of Means for Estimating Sea States from an Advancing Large Container Ship
Downloaded from orbt.dtu.dk on: Jan 31, 18 Comparsons of Means for Estmatng Sea States from an Advancng Large Contaner Shp Nelsen, Ulrk Dam; Andersen, Ingrd Mare Vncent; Konng, Jos Publshed n: Proceedngs
More information2017 GIRLS CENTRAL DISTRICT PLAYER DEVELOPMENT GUIDE
2017 GIRLS CENTRAL DISTRICT PLAYER DEVELOPMENT GUIDE GENERAL OVERVIEW USA Hockey Grls Player Development Dstrct-Specfc Gude The USA Hockey Grls Player Development Dstrct-Specfc Gude outlnes the 2017 grls
More informationAalborg Universitet. Published in: 9th ewtec Publication date: Document Version Accepted author manuscript, peer reviewed version
Aalborg Unverstet Predctablty of the Power Output of Three Wave Energy Technologes n the Dansh orth Sea Chozas, Jula Fernandez; Jensen,. E. Helstrup; Sørensen, H. C.; Kofoed, Jens Peter; Kabuth, Alna Krstn
More informationSectoral Business Cycle Synchronization in the European Union *
Sectoral Busness Cycle Synchronzaton n the European Unon * Antóno Afonso, # $ Davde Furcer + January 2007 Abstract Ths paper analyses sectoral busness cycle synchronzaton n an enlarged European Unon usng
More informationDecomposition guide Technical report on decomposition
June 2013 Decomposton gude Techncal report on decomposton Erasmus MC Start date of project: 20 Aprl 2012 Duraton: 36 months 1 Table of contents Abstract... 4 Acknowledgements... 5 Introducton... 6 Part
More information