A Fair Non-repudiation Protocol without TTP on Conic Curve over Ring

Size: px
Start display at page:

Download "A Fair Non-repudiation Protocol without TTP on Conic Curve over Ring"

Transcription

1 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z 1 L Zhahu, Fa Ka, 3 L Hu, 4 Zheg Ya 1State Key Laboratory of Itegrated Servce Networs,Xda Uversty,X'a710071, Shaax, Cha, Xa Yag Noral Uversty, Xa Yag Cha lzhahu75@16co State Key Laboratory of Itegrated Servce Networs,Xda Uversty,X'a710071, Shaax, Cha, fa@alxdaeduc 3State Key Laboratory of Itegrated Servce Networs,Xda Uversty,X'a710071, Shaax, Cha, fa@alxdaeduc 4Xa Yag Noral Uversty, Xa Yag Cha, zhegya005@16co bstract I vew of the shortcog of coutato -robablstc o-reudato rotocol wthout trusted thrd arty (TTP), a ew far o-reudato rotocol wthout TTP o coc curve s ut foreword ths aer I ths rotocol, we ot oly solved the usafe ad ufar robles for the strog coutg ower of ooste art, but also reduce the forato exchage agreeets fro +1 tes to 3 tes Thus t has a hgh effcecy I addto, t s coletely free fro deedece o the TTP, ad the rorty of ay arty ot exsts, whch achevetruly faress ad abusefree ad ore securty Keywords: Keywords; Coc Curve; buse Free; Far No-Reudato; Trusted Thrd Party 1 Itroducto Wth the extesve alcato of e-coerce, eole have bee able to carry out a varety of tradg actvtes through the etwor However, artes volved the trasacto the vrtual etwor are hardly to ow each other, let aloe utual trust Therefore, how to have a secure electroc trasacto uder ths dstrust evroet o the teret s a dffcult ad sgfcace roble of the reset study But the tradtoal etwor securty servces such as essage ecryto ad authetcato ca ot fully satsfy ts securty eeds, a ew etwor securty far o-reudato of forato trasfer rotocol gradually atteto has bee ad, ad t has a rad develoet recet years The so-called far o-reudato rotocol eas that the seder ust receve the evdece of the recet to receve ths forato ad the recever ca also have the evdece of the seder to sed ths forato at the ed of the agreeet That s both sdes ca ot be deed to artcate ths forato exchage I geeral, far ad o-reudato rotocol s to establsh based o the ublc ey ad dgtal sgature techology There are aly two tyes [ 1] : TTP (trusted thrd arty) rotocol ad wthout TTP rotocol og TTP rotocols, there are followg categores: (1)Ile TTP [ ] That s the trusted thrd arty artcates each trassso of forato the agreeet, whch wll brg a greater burde to the etwor,ad affect the effcecy of the leetato of the agreeet; [3,4] ()Ole TTP lthough TTP artcates each agreeet, t does ot artcate each [5,6] trassso order to allevate soe of the etwor load (3)Offle TTP : TTP usually does ot [7,8] artcate a agreeet oly whe there s a dsute (4)Trasaret TTP :It ca ot see whether the TTP artcate ths agreeet fro the forato obtaed ad evdece receved Obvously, fro above we ca see whether agreeet ca roceed soothly or ot rely o TTP Therefore, oce TTP s attaced, the safety of the agreeet wll be threateed So the wthout dvaces forato Sceces ad Servce Sceces(ISS) Volue4, Nuber18, Oct 01 do: /ISSvol4ssue

2 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya TTP far agreeet s eeded to be ut foreword to solve ths roble, t's advatage s that both ca avod etwor cogesto, ad also avod the agreeet deedet o the credblty of TTP I 1999, arowtch ad Roggea roosed a relatvely erfect -robablstc o-reudato rotocol wthout TTP [ 9] Whe the agreeet eds, the robablty ether arty recevg the evdece of other arty volved the exchage of forato or ot s 1 However, the artes volved the forato exchage s ueual ths rotocol Recever have ore oortutes (deedg o the coutg ower of the recet)to deceve the seder That s the recever obtaed the evdece of seder rather tha retur hs havg receved forato ad evdece, thereby uderg the faress of the agreeet We call t rorty recever o-reudato rotocol The author of [10] [9] referece has ade soe roveets for the rotocol roosed referece ad ut foreword a rorty seder o-reudato rotocol, whch s seder have ore oortutes(deedg o the coutg ower of the seder)to deceve the recever He roosed a cosultato wthout TTP far o-reudato of forato exchage rotocol uder the ters of coutg ower However, the above two rotocol are also ufar for hoest arty The dshoest arty has a chace to cheat the ooste arty usg hs strog coutg ower I vew of the defect of the coutg ower, a ew far o-reudato rotocol wthout TTP o coc curve s roosed ths aer, whch overcoes the shortcog etoed above, ad ths rotocol, the agreeet eed oly three tes forato exchage, therefore, coared wth the rotocol referece, ths schee has hgh coutg effcecy [9,10] Itroducto ad aalyss of rotocols referece 1)Protocol -Probablstc o-reudato rotocol wthout TTP [ 9] Suose wats to sed a essage to B, She frst selects a rado uber as her rvate ey, ad uses to ecryt ad get the cher text c E(, ), the she radoly selects a uber (ths ca be chose accordg to the geoetrc dstrbuto, ad ee t cofdetalty for B ) ad 1 detcally dstrbuted deedet rado varables r, where r ust be the sae order of agtude wth t the begg of agreeet, seds the cher text c ad corresodg evdece EOO to B t the sae te, B ust retur the evdece EOR to deotg that he has receved c The ssues 1 rado varables r ad corresodg evdece EOO(, ) evdece EOR (, ) to B a certa orderfter B receves the uber r, he has to retur the to deotg that he has receved r Else, wll ot sed ext r to B ad terrut the rotocol Fally, seds the ad evdece EOO (, ) to B B ca ot dstgush betwee ad r as he do't ow, so he stll returs the evdece EOR (, ) fter receves the EOR (, ), she eds the trassso of forato Whle B wats for a erod of te ad coutes D(, c) Thus, at the ed of the agreeet, both sdes get the ecessary evdece So ths rotocol satsfes o-reudato reureets [10] ) Protocol-Far ad o-reudato of forato exchage agreeet Whe eed to sed a essage to B, She frst selects a rado uber as her rvate ey, ad uses to ecryt ad get the cher text c, c E(, ), the she seds the c ad the sgature for c to B B returs the evdece deotg that he has receved c after he receves the forato fro The seds the to B Whle B receves the, he coutes EOR as the evdece he has receved, ad radoly chooses 1ubers r, where r should be the sae order of agtude wth EOR The he seds these 1 rado ubers r to a certa order fter receves the r, she coutes H ( r, ), where H () s a crytograhy hash fucto, 90

3 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya ad she seds the sgature for r ad H ( r, ) to B If B dd ot receve the above-etoed resose a erod of te, he wll sto the later sedg Fally, B sed the EOR to Whle ca't dstgush betwee EOR ad r, so he stll sed the sgature for EOR ad H ( EOR, ) fter B receves the sgature, he eds ths agreeet 3) Securty aalyss of rotocol of above rotocols I rotocol [ 9], although B dd't ow the value of, he ca guess t Suose he guess that the value of s ' Thus oce he receves the r ', he would ot sed the receve evdece EOR ' ssue the robablty that B guesses out the value of s, the the robablty of B havg receved the ad corresodg evdece fro whle dd't receve the evdece of B havg receved s That s the robablty that faress of agreeet s udered s, ad oce the faress of agreeet s udered, t ay be oly the seder to have a loss I addto, f B have a strog coutg ower, he ca also use ore drect ad effectve attac He ca use r set by to decryt the cher text c If the decryto s successful( r ), B would ot sed hs accetace evdece to Of course, order to revet ths, ca set a deadletherefore, the securty of agreeet s based o the assuto f B ca coleted the decryto calculato the deadle So the recever has a hgher rorty the securty of agreeet [10] Slarly, the seder rotocol also has chace to cheat B through guessg the value of or decrytg the chertext, whch ca acheve to deceve other art ad uderg the faress of agreeet lthough B ca ae a better choce of for that s a sall uber, t s stll ossble to threat the faress for the agreeet ars Furtherore, the larger the value of s, the ore securty the rotocol s, but t eas that eed ore forato teracto for both artes To solve the above robles, a ew far o-reudato rotocol wthout TTP s roosed ths aer, whch overcoes the defects o the coutg ower, ad the uber of rotocol teracto ca be coleted for oly three tes So coared to the above two rotocol ad t has a hgh effcecy roveets 3The Coc Curve over Rg Z Let Z be a odular rg, the defto of coc curve C over rg Z s defed as the [11] set of all solutos of the followg cogruece euato referece :, Where curve over rg y ax bx(od ) (1), are two large dfferet re ubers, ( a, ) ( b, ) 1, that s the coc Z ca be deoted as the followg set: C {( x, y) y ax bx(od )} [11] Obvously ( 0,0) C The author of referece has defed the addto rule betwee ots of C, ad roved that ( C, ) s a fte bela grou Ths aes t ossble to establsh the ublc-ey crytograhc rotocols ad dgtal sgatures over the coc curve Fro the [1] addto oerato rule, the author of referece has roved that there are certa coutatoal advatages for addto oerato betwee ot ad ot ultlcato o coc curve coared wth the corresodg oerato o elltc curve So t s very coveet to acheve the sgature rotocol establshed o coc curve I recet years, the alcato of coc curve crytograhy has 91

4 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya [14,15,16,17] ade a great roveet It s clear that fro the Chese reader theory we ca get the soluto set of cogruece euato s eual to the oe of followg cogruece euatos: y y ax ax bx(od ) bx(od ) So every soluto ot ( x, y) C ca be uuely rereseted as, ], where [ [, ] [( x, y ),( x, y )], C, C x x (od ), y y (od ), x x (od ), y y (od ) Fro ths relato, we ca defe the order of That s the followg result: Theory: Let C, defe the lest teger uber such that 0(od ) as the order of, ad deote t as O ( ) For ay ot C,there s a uuely ot C [, ] corresodece to C C So t's order s Lc [ O( ), O( )] Corollary: Let, where, are two large dfferet re ubers such that a a 1, ad 1 r, 1 s, where r, s are also odd re ubers So the order of C s N rs Pc a ot G C, whch order s N rs Such ot s defed as the basc ot of Thus the set C S { 0, G,G, ( N 1) G} s a subgrou of C Dscrete roble S : Gve two dfferet ots, N S, t s hard to coute a teger Z such that N a a The ebeddg algorth of latext : Let, 1, For a latext, 0 ad ( a, ) 1 Let x b b (od ), y (od ), a a The ot P ) ( x, y ) s the ebeddg ot of coc curve Decryto algorth s y x ( (od ) RS sgature schee o coc curve over rg Z : Select teger 1 e N ad ( e, ) 1, ad calculate ed (od N ), The oe, a, b, e, ad ee, N 1, d, N secret Let be a la text, ad P () be the ebeddg ot coc 9

5 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya curve Coute Q ( s, t) dp( ) the the sgature s ( P ( ), Q) Verfcato algorth: Verfy(P(), Q) acceto, P() Verfy(P(), Q) = rejecto, else = eq 4 Far No-Reudato Protocol wthout TTP o Coc Curve over Rg Z 41 Setu of syste araeter (1)ssue that ad B are the artcats of the exchage of forato Frst, select a fx coc curve C over rg Z, where, are two large dfferet re ubers such that a a 1, ad 1 r, 1 s, where r, s are also odd re ubers Let G * be a basc ot of C H () : C a, s a crytograhc hash fucto radoly selects a teger uber ( Z N d, ( d, ) 1, ad coutes Q d G ; She oes N, a, b, G, H, Q, ad ees,, d, N secret B also selects a teger uber 0 d B satsfed QB d BG 0(od ), the he taes d B as hs rvate ey,ad QB as hs ublc ey 4 Far No-Reudato Protocol Suose eeds to have a forato exchage agreeet wth B frst ebeds her essage to C, ad get a ot,ad geerates a testa T The she coutes T ' TG, Secod, she selects a teger uber adt such that (, N ) ( t, N ) 1 at rado ad coutes l 1(od N) Fally, use to ecryt as followg:, ( T t) G, ( d t) H ( ) The seds (,,, T ) to B The rocess of agreeet s show as table below: B (,,, T ) B ' 对 (,, ) T 的 签 名 B l, T B t, s B ' t B r The detaled forato exchage agreeet s descrbed as follows: 1) B :,,, T ; ) fter B receves,,, T, he frst checs whether G H ( ) H ( ) Q T ' Reject t ad terrut the agreeet or as to resed f t s't eual Otherwse, he also selects a rado uber t " ad coutes h t" G ( x h, y h ), h1 xh, h H ( ) d B xh ) G T ', ad seds h, ) to ( h 1 93

6 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya 3) fter receves h, ), she also checs whether h Q h Q H ( ) G T ' ( h 1 1 B B ( l, T to B Reject t ad terrut the agreeet f t s't eual Otherwse, she seds ) 4) fter B receves l, T ), he coutes T " T G If T ' T", he radoly selects a teger ( uber r, ad coutes s ( r l) G t d B H (s) The he seds ( t, s) to 5)fter receves ( t, s), she checs whether tg QBH (s),if so, she coutes ( d l) G s t', ad seds t ' to B 6)fter B receves t ', he checs whether rg Q t' If so, he seds r to 7)Oce receves the r, she coutes ( r l) G s' ad checs f s s' (od ) If so, she eds the agreeet Else, she ass B to resed B wats for a whle, he uses l to decryt through coutg decryto algorth over coc curve to obta the essage 5 Securty alyss of greeet l The he uses I ths secto, we aly aalyze the securty ad effcecy of ths agreeet Fro above agreeet, we ca see that there are roertes of u-forgeablty,faress, o-reudato ths agreeet 51 Ths agreeet s o-reudato I ste1, uses the rado uber teger to ecryt the essage by her rvate ey d So oce B receves the sgature, he ca use the ublc ey, ad sg the chertext Q of to covce that the sgature he receved s deed set by Thus ca't dey t I ste, B gves a resose to sgature set by So ca also verfy that B has deed receved the chertext accordg to ths resose Therefore B ca't dey that he has receved the chertext as well I ste4, order to obta the evdece of sedg decryto ey l fro, B uses a rado teger uber to sg decryto ey l Because ca't covce whether B has receved l by usg the verfcato fucto ste4, she ust gve a resose to ths sgature Whe B s sure that l s deed the decryto ey set by, he taes the rado uber r as hs resose to I ste7, ca use r to covce that B has deed receve the decryto ey Therefore, at the ed of agreeet, both sdes obta the corresodg evdece, whch deotes ether art s o-reudato ths agreeet 5 Ths agreeet s far to both sdes B ust retur hs sgature for the chertext, else ca't sed the decryto ey to h t the sae te, ust resod to a sgature for l, else B also ca ot sed r to her as well Of cause, there s aother case that B dd't sed r or sed aother uber r ' to I frst case, although ca ot covce whether B has receved the decryto ey, B wats to use the verfcato fucto ste4-ste6 to affr that l s deed set by he ust rovde rado uber r to arbtrator The subts ( t, s) to the arbtrator receved the ste5 Therefore the arbtrator ca use the ublc ey of B ad r to covce that ( t, s) s set by B by checg S rg lg If so, the arbtrator ca deduce that B has receve the decryto ey l Else, B also has o evdece that the l s set by So, t s that ether both art ca get the corresodg evdece or ca't obta t For secod case, ca chec whether the uber r ' s the exact oe ste7 Slarly, ca't dey he has receved the uber r as the ( t, s) s the evdece of recet of decryto ey l of B Thus for the above t does't destroy the faress to both sdes ay case 94

7 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya 53 U-forgeablty Fro the above agreeet, we ca see that sgature,, T, ste1 cotas s ' rvate ey ad a rado uber t, ad ( h, h 1 ) s clude of B' s rvate ey ad a rado uber t ' ste ad ste4, so ayoe ca't forge a vald sgature whch satsfed the verfcato fucto uder the codto of uow of the I addto, by usg the te sta to bd wth the sged essage every agreeet ca resst the relay the essage attac Furtherore, f a adversary wats to dsguse as or B to ru the agreeet wth other arter though tercetg the sgature forato, he ust ow the ecryto ey of ad rvate ey of both sdes But t s hard to coute ecryto ey by use decryto ey l based o the dffcult roble of large uber factorzato Slly, t s also hard to coute d ad d B based o the dffcult roble of dscrete logarth over coc curve So ths agreeet s secure o these two dffcult robles 6 Edg I vew of the shortcog of coutg ower the robablstc o-reudato rotocol wthout TTP, a o-robablstc o-reudato rotocol wthout TTP over coc curve s roosed ths aer It s ot oly feasble to cheat ooste art through hs strog coutg ower for ay art but also acheved to reduce the tes of forato exchage to a u So t has hgher effcecy coarg wth the rotocols wth the oe of referece [9,10] cowledget: Ths wor was suorted by Natural Scece Foudato of Shaax Provce (009JQ1009) ad the Scece Research Foudato of Educato Deartet of Shaax Provce (09JK803) ad Scece Foudato of Xa Yag Noral Uversty(11XSY K305) 7 Refereces [1] Steve Kree, Olver arowtch, Jayg zhou, tesve survey of far o-reudato Protocols [J], Couter Coucato,00, 5(17): [13]Haso T ad Day J, aagg the Electroc Lbrary: a Practcal Gude for Iforato Professoals, 4 th ed Lodo: Bower-Saur, 51 55,1998 [] T Coffey, P Sadha, No- reudato wth adatory roof recet [J], Couter Coucato Revew, 6(1):6 17,1996 [3] N Zhag, Q Sh, chevg No- reudato of recet [J], The Couter Joural, 39(10): , 1996 [4] J Zhou, D Golla, far No- reudato rotocol [], IEEE Syosu o Securty ad Prvacy [C], Oalad, Calfoa, US: IEEE Couter Securty Press,55 61,1996 [5] oa Schuter, Wader, Otstc rotocols for far exchage [ ] T atsuot o( Ed ) C, Coferece o Couter ad Coucatos Securty [ C ], Zurch, Swtzerlad: C Press,8 17, 1997 [6] Scal, Certfed E alwth vsble ost offces [ ], RS 1997 coferece[ C ]Vacouver, BC, Caada, [7] J Zhou, D Golla, effcet o-reudato rotocol [], Proceedgs of Socety Press [C], Slver Srg, D, 16 13, 1997 [8] J Zhou, R Deg, F Bao, Evoluto of far o-reudato wth TTP [ ],CISP:Iforato Securty ad Prvacy: ustralasa Coferece, Lecture Notes Couter Scece[C], Srger, Berl, 58 69, 1999 [9] O arowtch, Y Roggea, Probablstc o-reudato wthout trusted thrd arty [ ], Secod Coferece o Securty Coucat o Net wors' 99 [C ], al, Italy, 5 36, 1999 [10] XIONG Ya, ZHNG Wechao,IO Fuyou,WNG Xgfu, Far No-Reudato Protocol wthout TTP Based o Etty's Coutg Power, Chese Joural of Electrocs Vol34No ,

8 Far No-reudato Protocol wthout TTP o Coc Curve over Rg Z L Zhahu, Fa Ka, 3L Hu, Zheg Ya [11] Su Q, Zhu We yu, Wag Bao, The Coc Curves over Z ad Publc-Key Crytosyste Protocol, Joural of Schua Uversty (Natural Scece Edto), 4(3): , 005 [1] L Hagyu, The Scalar ultlcato of Pots o a Coc over Fte Felds, Iforato Securty ad Coucatos Prvacy,8, 64 69, 007 [13] Wag Bao, Fag Yg jue, L Hoggag, QV Sgature Protocol o Coc Curve over Rg Z,Scece Cha, Vol 39, No : 1 17, 009 [14] L Zhahu, Fa Ka, L Hu, Cocurret Sgature Protocol o Coc Curve over Rg Z,011 Iteratoal Coferece o Electrocs Coucatos ad Cotrol, Vol 1, , 011 [15] Fa Wuyg, L Xagxue, Zhe Yafe, Dgtal Sgature d ultile Sgature Schee Based O Coc Curve, Couter lcatos ad Software, Vol17 No 7 5 7, 010 [16] LU Youl, DU Wezhag, ultle grade roxy ultbld sgature schee based o coc curves over Z, Couter Egeerg ad lcatos, 46(13),11 114, 010 [17] Pa Ru, WNG Lju, LI Xu, LI Duadua, Dgtal Sgature Based o Coc Curve over Eseste Rg, Couter Egeerg, Vol36 No6,169 17, 010 [18] a Ju, "Research of Electroc Busess Securty Based O Publc Key Ecryto ethods", IJCT, Vol 4, No, 50-57, 01 [19] Jahog Zhag, xu, Zhb Su, Xua Su, "O the Securty of Short IDbased Grou Sgature Schee", JDCT, Vol 5, No, 34-39,

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

How do bookmakers (or FdJ 1 ) ALWAYS manage to win?

How do bookmakers (or FdJ 1 ) ALWAYS manage to win? How do bookakers (or FdJ ALWAYS aage to w? Itroducto otatos & varables Bookaker's beeft eected value 4 4 Bookaker's strateges5 4 The hoest bookaker 6 4 "real lfe" bookaker 6 4 La FdJ 8 5 How ca we estate

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment , pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Measuring the Quality of Credit Scoring Models

Measuring the Quality of Credit Scoring Models Measur the Qualty of Credt cor Models Mart Řezáč Dept. of Matheatcs ad tatstcs, Faculty of cece, Masaryk Uversty CCC XI, Edurh Auust 009 Cotet. Itroducto 3. Good/ad clet defto 4 3. Measur the qualty 6

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

MDM 4U PRACTICE EXAMINATION

MDM 4U PRACTICE EXAMINATION MDM 4U RCTICE EXMINTION Ths s a ractce eam. It does ot cover all the materal ths course ad should ot be the oly revew that you do rearato for your fal eam. Your eam may cota questos that do ot aear o ths

More information

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

De-Duplication Scheduling Strategy in Real-Time Data Warehouse

De-Duplication Scheduling Strategy in Real-Time Data Warehouse Sed Orders for Reprts to reprts@bethascece.ae he Ope Cyberetcs & Systecs Joural, 25, 9, 37-43 37 Ope Access De-Duplcato Schedulg Strategy Real-e Data Warehouse Hu Lu, Je Sog 2,*, JBoWu 2, ad Yu-B Bao 3

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

Developing a Fuzzy Search Engine Based on Fuzzy Ontology and Semantic Search

Developing a Fuzzy Search Engine Based on Fuzzy Ontology and Semantic Search 0 IEEE Iteratoal Coferece o Fuzzy Systes Jue 7-30, 0, Tape, Tawa Developg a Fuzzy Search Ege Based o Fuzzy Otology ad Seatc Search Le-Fu La Chao-Ch Wu Pe-Yg L Dept. of Coputer Scece ad Iforato Egeerg Natoal

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Load and Resistance Factor Design (LRFD)

Load and Resistance Factor Design (LRFD) 53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

CSSE463: Image Recognition Day 27

CSSE463: Image Recognition Day 27 CSSE463: Image Recogto Da 27 Ths week Toda: Alcatos of PCA Suda ght: roject las ad relm work due Questos? Prcal Comoets Aalss weght grth c ( )( ) ( )( ( )( ) ) heght sze Gve a set of samles, fd the drecto(s)

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Load Balancing via Random Local Search in Closed and Open systems

Load Balancing via Random Local Search in Closed and Open systems Load Balacg va Rado Local Search Closed ad Ope systes A. Gaesh Dept. of Matheatcs Uversty of Brstol, UK a.gaesh@brstol.ac.u A. Proutere Mcrosoft Research Cabrdge, UK aproute@crosoft.co S. Llethal Stats

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Redundant Virtual Machine Placement for Fault-tolerant Consolidated Server Clusters

Redundant Virtual Machine Placement for Fault-tolerant Consolidated Server Clusters Redudt Vrtul Mche Plceet for Fult-tolert Cosoldted Server Clusters Fuo Mchd, Mshro Kwto d Yoshhru Meo Servce Pltfors Reserch Lbortores, NEC Cororto 753, Shoube, Nkhr-ku, Kwsk, Kgw 2-8666, J {h-chd@b, -kwto@,

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Project 3 Weight analysis

Project 3 Weight analysis The Faculty of Power ad Aeroautcal Egeerg Arcraft Desg Departet Project 3 Weght aalyss Ths project cossts of two parts. Frst part cludes fuselage teror (cockpt) coceptual desg. Secod part cludes etoed

More information

Polyphase Filters. Section 12.4 Porat 1/39

Polyphase Filters. Section 12.4 Porat 1/39 Polyphase Flters Secto.4 Porat /39 .4 Polyphase Flters Polyphase s a way of dog saplg-rate coverso that leads to very effcet pleetatos. But ore tha that, t leads to very geeral vewpots that are useful

More information

A Comparative Study for Email Classification

A Comparative Study for Email Classification A Coparatve Study for Eal Classfcato Seogwook You ad Des McLeod Uversty of Souther Calfora, Los Ageles, CA 90089 USA Abstract - Eal has becoe oe of the fastest ad ost ecoocal fors of coucato. However,

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo. ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

Secure PHR Access Control Scheme in Cloud Computing

Secure PHR Access Control Scheme in Cloud Computing Iteratoal Joural of Iformato ad Electrocs Egeerg, Vol 3, No 3, May 23 ecure PHR Access Cotrol cheme Cloud Computg Cha-Hu Lu, Tzer-Log Che, Ha-Yu L, Fog-Q L, Chh-Mg Lu, E-Pg Wu, Yu-Fag Chug, ad Tzer-hyog

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Political sustainability and the design of social q. insurance. Abstract

Political sustainability and the design of social q. insurance. Abstract Joural of Publc Ecoomcs 75 (000) 34 364 www.elsever.l/ locate/ ecobase Poltcal sustaablty ad the desg of socal q surace Georges Casamatta *, Helmuth Cremer, Perre Pesteau a, b c a GREMAQ, Uversty of Toulouse,

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Based on PSO cloud computing server points location searching

Based on PSO cloud computing server points location searching Iteratoa Worshop o Coud Coput ad Iforato Securty (CCIS 13) Based o PSO coud coput server pots ocato search Che Hua-sha Iforato Techooy Ceter Shaha Iteratoa Studes Uversty Shaha, cha, 1391641563 E-a: huasha@shsu.edu.c

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

A Fast Clustering Algorithm to Cluster Very Large Categorical Data Sets in Data Mining

A Fast Clustering Algorithm to Cluster Very Large Categorical Data Sets in Data Mining A Fast Clusterg Algorth to Cluster Very Large Categorcal Data Sets Data Mg Zhexue Huag * Cooperatve Research Cetre for Advaced Coputatoal Systes CSIRO Matheatcal ad Iforato Sceces GPO Box 664, Caberra

More information

Efficient Statistics Based Framework for Network Intrusion Detection

Efficient Statistics Based Framework for Network Intrusion Detection Iteratoal Joural of Soft Coutg ad Egeerg (IJSCE) ISSN: 223-2307, Volue-3, Issue-, March 203 Effcet Statstcs Based Fraework for Network Itruso Detecto uo-che Lee, Zh-Ju Hsu, L Lu Astract Due to the growg

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Public Auditing Based on Homomorphic Hash Function in

Public Auditing Based on Homomorphic Hash Function in Publc Audtg Bsed o Homomorhc Hsh Fucto Secure Cloud Storge Shufe NIU, Cfe Wg, Xo DU Publc Audtg Bsed o Homomorhc Hsh Fucto Secure Cloud Storge Shufe NIU, Cfe Wg, 3 Xo DU, College of Comuter Scece d Egeerg,

More information

Session 4: Descriptive statistics and exporting Stata results

Session 4: Descriptive statistics and exporting Stata results Itrduct t Stata Jrd Muñz (UAB) Sess 4: Descrptve statstcs ad exprtg Stata results I ths sess we are gg t wrk wth descrptve statstcs Stata. Frst, we preset a shrt trduct t the very basc statstcal ctets

More information

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal

More information

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia.

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia. Math 40 Lecture 24 Autes Facal Mathematcs How ready do you feel for the quz o Frday: A) Brg t o B) I wll be by Frday C) I eed aother week D) I eed aother moth Aa NoraEvas 403 Kerchof AaNEvas@vrga.edu http://people.vrga.edu/~as5k/

More information

Multi-Channel Pricing for Financial Services

Multi-Channel Pricing for Financial Services 0-7695-435-9/0 $7.00 (c) 00 IEEE Proceedgs of the 35th Aual Hawa Iteratoal Coferece o yste ceces (HIC-35 0) 0-7695-435-9/0 $7.00 00 IEEE Proceedgs of the 35th Hawa Iteratoal Coferece o yste ceces - 00

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Sequences and Series

Sequences and Series Secto 9. Sequeces d Seres You c thk of sequece s fucto whose dom s the set of postve tegers. f ( ), f (), f (),... f ( ),... Defto of Sequece A fte sequece s fucto whose dom s the set of postve tegers.

More information

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes Covero of No-Lear Stregth Evelope to Geeralzed Hoek-Brow Evelope Itroducto The power curve crtero commoly ued lmt-equlbrum lope tablty aaly to defe a o-lear tregth evelope (relatohp betwee hear tre, τ,

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information