Performance Analysis Sample Clauses

Performance Analysis. (a) Portfolio Yield (Finance Charge Collections during the Due Period divided by Principal Receivables in the Trust as of the first day of the Due Period) ___________% (b) Charge-Offs (Charged-Off Amounts during the Due Period divided by Principal Receivables in the Trust as of the first day of the Due Period) ___________% (c) Recoveries (Recovered Amounts added as Additional Funds on the Distribution Date divided by Aggregate Investor Interest in the Trust as of the first day of the Due Period) ___________% (d) Investor Servicing Fee Percentage (weighted average of Investor Servicing Fees for Series 2002-5) ___________% (e) Weighted Average Certificate Rate (weighted average certificate rates for all Classes of Series 2002-5) ___________% (f) Series Excess Servicing Percentage (the sum of Series Finance Charge Collections, Investment Income and Recovered Amounts minus the sum of the Series Charged-Off Amount, the Investor Servicing Fee and the Certificate Interest divided by the Series Invested Amount) ___________%
Performance Analysis. Customer may not publish any benchmarking results or other performance analysis of the SIEMonster Technology; Provided, however, that if there is a conflict between the terms of an applicable Open Source Software License and these license terms, restrictions, and conditions, the Open Source Software License controls to the extent of the conflict.
Performance Analysis. Licensor may have provided a performance analysis of the Kaminario Software at your location (the “Kaminario Services Professional Analysis and Report”). Licensor has made reasonable commercial efforts to ensure the accuracy of the Kaminario Services Professional Analysis and Report, but you understand that the performance of the Kaminario Software may vary across a spectrum of factors, and that Licensor does not make any warranties regarding the content of Kaminario Services Professional Analysis and Report or the performance of the Kaminario Software. All of Licensor’s legal obligations, representations and warranties regarding the Kaminario Software and any implementation thereof are set forth solely in this Agreement and nothing in the Kaminario Services Professional Analysis and Report should be interpreted as providing any representations or warranties
Performance Analysis. ‌ We analyze the proposed solution in terms of the correctness, the security and the overall comparison with related solutions. For the security verification, we refer to [8,18–22] to evaluate session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that the proposed solution is safe when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks.
Performance Analysis. (a) Portfolio Yield (Finance Charge Collections during the Due Period divided by Principal Receivables in the Trust as of the first day of the Due Period) ___________%
Performance Analysis. In this chapter, the performance analysis of B-GKAP models is presented. First, we start with the complexity analysis of the system. This analysis includes two components: communication complexity and computational complexity. Key computation and dynamic group operations of two B-GKAP models are also explained. Later on, our simulation envi- ronment is described. In the simulation environment section, hardware and software compo- nents of our testing environment are detailed. In the simulation cases and results section, the performance results of the system are presented. This section includes the effects of Hyper- ledger Fabric Orderer parameters, performance comparison of B-GKAP versus conventional implementation, and finally performance comparison of B-GKAP1 and B-GKAP2 models.
Performance Analysis. Kaminario may have provided a performance analysis of the Kaminario Products at the location of the Purchaser (the “Kaminario Services Professional Analysis and Report”). Kaminario has made reasonable commercial efforts to ensure the accuracy of the Kaminario Services Professional Analysis and Report, but Purchaser understands that the performance of the Kaminario Products may vary across a spectrum of factors, and that Kaminario does not make any warranties regarding the content of Kaminario Services Professional Analysis and Report or the performance of the Kaminario Products. All of Kaminario’s legal obligations, representations and warranties regarding the Kaminario Products and any implementation thereof are set forth solely in this Agreement and nothing in the Kaminario Services Professional Analysis and Report should be interpreted as providing any representations or warranties.
Performance Analysis. For the scheme of [19], 𝑈𝑖 needs perform six ordinary hash operations, two scalar multiplication operations and one bilinear pairing operation. 𝐹𝑁𝑗 needs perform four ordinary hash operations, two scalar multiplication operations and one bilinear pairing operation. 𝐶𝑆 needs perform eleven ordinary hash operations, three scalar multiplication operations and one bilinear pairing operation. The total execution time of 𝑈𝑖 , 𝐹𝑁𝑗 and 𝐶𝑆 is 32.0766ms, 32.0764ms and 40.0831ms. For the scheme of [20], 𝑈𝑖 needs perform four ordinary hash operations and three scalar multiplication operations. Fog node 𝐹𝑁𝑗 needs perform four ordinary hash operations and four scalar multiplication operations. 𝐶𝑆 needs perform eleven ordinary hash operations and ten scalar multiplication operations. Therefore, the total execution time of 𝑈𝑖 , 𝐹𝑁𝑗 and 𝐶𝑆 is 24.0184ms, 32.0244ms and 80.0611ms. Scheme Ui (ms) EDj or FN j (ms) CS (ms) Our scheme 6Texp + 3Th + 2Thtp ≈ 11.3689 4Texp + 2Th + Thtp ≈ 7.5665 11Texp + 9Th + 2Thtp ≈ 7.5665 Jia’s scheme 2Tsm + 6Th + Tbp ≈ 32.0766 2Tsm + 4Th + Tbp ≈ 32.0764 3Tsm +11Th + Tbp ≈ 40.503 Ma’s scheme 3Tsm + 4Th ≈ 24.0184 4Tsm + 4Th ≈ 32.0244 10Tsm +11Th ≈ 80.0611 Scheme U i (bits) EDj or FN j (bits) CS (bits) Our scheme | G | +2 | Z | + | T |= 1376 6 | G | +4 | Z | +3 | T |= 6880 3 | G | +2 | Z | + | T |= 3424 Jia’s scheme | G | +4 | Z | + | T |= 1696 4 | G | +6 | Z | +3 | T |= 5152 | G | +4 | Z | + | T |= 1696 Ma’s scheme | G | +4 | Z | + | T |= 1696 6 | G | +6 | Z | +3 | T |= 7200 3 | G | +4 | Z | + | T |= 3744
Performance Analysis. X. Xxxxxxx provided by Xxxxx et al.[27], Odeluet al.[28], Liet al.[29] in the light of the computer costs and communication costs in relation to our proposed scheme. For the three methods stated above, we select a bilinear mapping e: G1 = G1 = G2. G1 is the cyclic additive group of primary order q produced by an elliptical courve E (Fp). G2 is the multiplicative primary order q group that is produced by an elliptic curve E (Fp). B. Computation Cost
Performance Analysis. The SRO program has proven to be a positive impact on public school campuses. The SRO program has provided the police department an open communication link with students, educators and citizens that have directly resulted in solving several crimes that might not have been solved. This new program would likewise be able to achieve such community policing enhancements. This would allow additional police services in the North Idaho College campus and Fort Grounds area of Coeur d’Alene. Hiring a police officer immediately gives us the benefit of training an officer for the transition of assigning an officer to the college as an SRO. In addition we would have the benefit of using that officer for patrol during the busy summer months. This new position is a benefit to the college and the City of Coeur d’Alene.