A Study on Autonomous Cooperation between Things in Web of Things

Size: px
Start display at page:

Download "A Study on Autonomous Cooperation between Things in Web of Things"

Transcription

1 A Study on Autonomous Coopertion etween Things in We of Things Jehk Yu, Hyunjoong Kng, Hyo-Chn Bng, MyungNm Be 2 Electronics nd Telecommunictions Reserch Institute, 38 Gjeongno, Yuseong-gu, Dejeon, , Kore {dzzng, knghj, ngs, mne}@etri.re.kr Astrct. Recently, the Internet of Things hs minly focused on estlishing connectivity in vriety of chllenging nd constrined network environments, nd the next logicl step will e focusing on the ppliction lyer on top network connectivity. We of Things plys criticl role in enling smrt things s eing first-clss citizens of the We. In this pper, we proposed we roker model on We of Thing tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, the model proposed ws so designed s to gurntee the mximum reliility y minimizing the informtion loss in mjor devices nd services. Keywords: Internet of Things, We of Things, Clssifiction of things, Device coopertion nd non-coopertion, We roker. Introduction The Internet of Things (IoT) is novel prdigm tht is rpidly gining ground in the scenrio of modern wireless telecommunictions. The sic ide of this concept is the pervsive presence round us of vriety of things or ojects such s Rdio- Frequency IDentifiction (RFID) tgs, sensors, ctutors, moile phones, etc. which, through unique ddressing schemes, re le to interct with ech other nd cooperte with their neighors to rech common gols [], [2]. With the generlity of the We, the Internet of Things is on the verge of experiencing mssive evolution. Indeed, strting from n Internet of nerly one hundred million computers, the We now turns to e n Internet of nerly 50 illions of things [3] presging trnsition from n Internet of Things to We of Things (). Some inititives re lredy offering things s We resources either coupling RFID reders to We sed infrstructure [3] or y directly inding We protocols onto physicl electronic crds prticipting in providing profusion of new, oject-enled, pplictions nd even the mens to msh them up together. Nevertheless, while pving the wy to novel pplictions through proves of concept, First uthor, 2 Corresponding uthor. SUComS 203, ASTL Vol. 26, pp. - 6, 203 SERSC 203

2 Proceedings, The 4th Interntionl Conference on Security-enriched Urn Computing nd Smrt Grid prcticl use of the We of Things () in lrge-scle deployment scheme still needs to e strengthened. We of Things plys criticl role in enling smrt things s eing first-clss citizens of the We. In this wy, we tools nd techniques cn e directly pplied to the rel world [4]. Gme Theory is discipline imed t modeling situtions in which decision mkers hve to mke specific ctions tht hve mutul, possily conflicting, nd consequences. Since then, the pplictions of gme re found in economics, politics, computer science, psychology nd sociology. In 950, John Nsh proved tht finite gmes lwys hve n equilirium point, t which ll plyers choose ctions which re est for them when given their opponents choices [5], [6]. In coopertive gme theory, the pyoffs of ech potentil group, or colition, cn e otined y the coopertion of its memers. On the other hnd, non-coopertive gme theory is concerned with the nlysis of the strtegic choices, the detils of the ordering nd the timing of plyers choices, which nd importnt to determine the outcome of gme. However, the relity is tht there is no efficient nd utonomous collortive technology etween things or services in we roker, which is core of. In this pper, we proposed we roker model on We of Thing tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, this model cn perform n efficient informtion opertion nd collortion etween devices through the coopertion etween unconstrined devices nd the coopertion etween constrined devices nd gtewys. It is expected tht the utonomous coopertion etween such devices will e ctively utilized in constructing environment. To stisfy this, gme theory of Nsh rgining solution (NBS) method y introducing system opertion nd performnce ws ttempting to mximize. In ddition, the model proposed ws so designed s to gurntee the mximum reliility y minimizing the informtion loss in mjor things or services. This pper is orgnized s follows. In Section 2, descries relted work nd the coopertive gme theory. In Section 3, the proposed coopertion model etween devise in We of Things is presented. Finlly, Section 4 discusses the conclusions nd future reserch directions. 2 Relted Work 2. The We of Things With the pulic interest of Internet of Things, the next logicl step will focus on the ppliction lyer on top of network connectivity, prticulrly We of Things. Tody, more nd more devices re uiquitously running round us. Trditionl communiction schemes mke use of heterogeneous protocols, softwre nd user interfces, mking hrd devices interction. Users would like to esily ccess pulic devices, whtever their implementtion choices [4]. In the pper, this glol devices interconnection is clled the Internet of Things. This does not refer to ny technology 2

3 A Study on Autonomous Coopertion etween Things in We of Things nor ny network structure, ut only to the ide of interconnecting ojects s well s we interconnect computers with the Internet. Use of the We s the pltform hosting nd exposing connected ojects, cn e explined y multiple technologicl nd usiness enefits, few of which including deployment, high vilility nd verstility, use of stndrdized communiction protocols nd the ecosystem creted thnks to We 2.0 prdigm. A thing ecomes Internet-enled if it is ssocited with networking cpility, which uniquely identifies it on the Internet (refer to Fig. ()). Tody, devices such s sensors, street lights, electric meters, nd ccess crds re lredy networked nd ccessed on the Internet; even IP-connected pcemkers re used to monitor the helth of ptients [7]. A thing ecomes We-enled when it is ugmented with We server (refer to Fig. ()) so tht it cn expose its functionl nd non-functionl cpilities on the We through HTTP. Reserchers hve lredy successfully emedded tiny We servers on resource-constrined things, mking We-enled things relity. Definitely, there is scope for REST in the re of We services, dvnces in REST sed We service rchitectures is propgting the strction of physicl things s services on the We. This trend gives rise to the possiilities of wrpping things in the physicl world s We services (refer to Fig. (c)). THING THING THING WEB SERCIVE SOAP/ REST INTERNET CONNECTION INTERNET CONNECTION WEB SERVER HTTP INTERNET CONNECTION WEB SERVER HTTP () Internet Enled Thing () We Enled Thing Fig.. Connecting things on the We (c) Thing s We Service 2.2 A Survey of Gme Theory Gme Theory is discipline imed t modeling situtions in which decision mkers hve to mke specific ctions tht hve mutul, possily conflicting, nd consequences. John Von Neumnn nd O. Morgenstern hve developed clssicl theory of two-person zero-sum gmes in their ook [5] Theory of Gmes nd Economic Behvior. Since then, the pplictions of Gme re found in economics, politics, computer science, psychology nd sociology. In 950, John Nsh proved tht finite gmes lwys hve n equilirium point, t which ll plyers choose ctions which re est for them when given their opponents choices [6]. In the 950s nd 960s, Gme Theory ws extended nd developed theoreticlly nd pplied to prolems of wr nd politics. Since the 970s, it hs creted revolution in economic theory. Moreover, it hs found pplictions in sociology nd psychology, nd found links with evolution nd iology. At the end of the 990s, Gme Theory hs een used in the design of uctions for llocting rights to the use of the electromgnetic spectrum nds to the moile telecommunictions industry. 3

4 Proceedings, The 4th Interntionl Conference on Security-enriched Urn Computing nd Smrt Grid The rgining prolem of the coopertive gme theory cn e descried s follows [6], [8]. Let k =,2,..., K e the set of plyers, nd S e closed nd K convex suset of R to represent the set of fesile pyoff lloctions tht the plyers cn get if they ll work together. Let U e the miniml pyoff k -person i rgining prolem. Given the cooperte things, we cn prove tht our prolem is two-person rgining prolem. First, we use S to represent the set of fesile pyoff lloctions for user i, i.e., S _ i { ( ) } i = U i U i = U i p i, m, n, m 0, n 0, m + n. () Then, the set of fesile pyoff lloctions tht the two plyers cn get when they work together is S { U = ( U, U ) U S, U }. (2) = S From the definition of the rgining prolem, we know tht S should e close 2 nd convex suset of R. Since it is ovious tht S is closed, we only need to prove tht S is convex, which mens for ny 0 θ, if U = ( U, U ) S nd 2 U ( U, U ), θ U + ( - θ ) U S. By simple derivtion, we cn get = S 2 θ U LW θ U M f γ α β + (, ) + ( - ) = [ ( )( - - ) ( ) ] (3) 2 p where α = θ m + ( - θ ) m, nd β = θ n - ( - θ ) n. Becuse m, m, n, n 0, m + n, +, Thus, ( ) θ U m n nd 0 θ, it is esy to derive - θ U = + S α 0, β 0, + β. f γ AF α (4). We cn lso prove y the sme method tht θ U + ( - θ ) U = S. Therefore, θ U + ( - θ ) U S, nd S is convex. This wy, we hve proved tht the gme etween users in our system is indeed two-person rgining prolem. β 3 The utonomous coopertion model etween things in In coopertive gme theory, when nlyzing the k-person rgining prolem, the coopertive solution should stisfy four xioms i.e., fesiility, preto efficiency, symmetry, invrince to liner trnsformtion, nd independence of irrelevnt lterntives. In this pper, we proposed to mximize system-wide performnce using Nsh rgining solution (NBS). Nsh showed tht there exists unique solution f stisfying the xioms of the ove, nd it tkes the following form * * ( ) ( ) ( )( ). u, v = f S, d = mx u - d v - d 2 ( u, v ) S (5) 4

5 A Study on Autonomous Coopertion etween Things in We of Things The solution to the following mximiztion prolem is then given y N α i u,..., u = f S, d = mx ( u - d ). (6) N i i ( u, v ) S i = * * ( ) ( ) In this pper, we proposed we roker model on tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of NBS coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, this model cn perform n efficient informtion opertion nd collortion etween devices through the coopertion etween unconstrined devices nd the coopertion etween constrined devices nd gtewys. In this pper, we proposed devices coopertion system in We roker is composed of four modules: Applictions Service Lyer RESTful Interfce Service Profile Mngement Service Mngement Service Profile Repository Service Profile Service Control Service Composition Device Lyer Device Mngement Device ID Mngement Device Control Device Coopertion sed on NBS Device # Device #2 Device #3 Device #N Constrined Things Unconstrined Things Fig. 2. The utonomous coopertion model etween things in ) Service Profile Mngement module stores the profile informtion of ll services provided through roker. Minly the type of service, service provider informtion, such s the service nme is stored. Service control lock nd service composition lock serch or through the Service is utilized when comined. 2) Service Mngement module runs the ctul service, serch, registrtion nd deletion is performed. In ddition, the ppliction to request the services of roker in the to get the first module. In ddition, service composition lock y two or more existing services to provide new services to crete nd perform the role. 3) Device ID Mngement module stores the physicl device IDs s well s the gent IDs elonging to those devices. It lso stores su-network types nd service loction informtion. 5

6 Proceedings, The 4th Interntionl Conference on Security-enriched Urn Computing nd Smrt Grid 4) As function to mnge the resources of ctul devices, Device Mngement module contins the privilege informtion of control, registrtion, deletion, ccess nd execution for the devices. It lso includes device coopertion lock using NBS of gme theory in order to perform utonomous coopertion etween devices. 4 Conclusion nd future work In this pper, we proposed we roker model on We of Thing tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, this model cn perform n efficient informtion opertion nd collortion etween devices through the coopertion etween unconstrined devices nd the coopertion etween constrined devices nd gtewys. It is expected tht the utonomous coopertion etween such devices will e ctively utilized in constructing environment. In this pper, in order to stisfy, gme theory of Nsh rgining solution (NBS) method y introducing system opertion nd performnce ws ttempting to mximize. For the future work, we re plnning to develop prototype system sed on the proposed mechnism for things nd pplictions coopertion in We roker. Acknowledgments. This work ws supported y Electronics nd Telecommunictions Reserch Institute (ETRI) grnt funded y the Kore government [3ZC30, Development of USN/ Convergence Pltform for Internet of Relity Service Provision]. References. Atzori, L., Ier, A., Morito, G.: The Internet of Things: A survey. J Computer Networks. 54, 5, (200) 2. Chenzhou, Y., Shen, W.J., Sun, W., Hu, G., Sun, X.Z.: Active Linked Dt for Humn Centric Semntic We of Things. In: 202 IEEE Interntionl Conference on Green Computing nd Communictions, pp (202) 3. Christophe, B.: Semntic Profiles to Model the "We of Things". In: 20 Seventh Interntionl Conference on Semntics, Knowledge nd Grid, pp (20) 4. Duquennoy, S., Grimud, G., Vndewlle, J. J.: The We of Things: Interconnecting Devices with High Usility nd Performnce. In: Interntionl Conference on Emedded Softwre nd Systems, pp (2009) 5. Neumn, J.V., Morgenstern, O.: Theory of Gmes nd Economic Behvior, Princeton University Press, (947) 6. Slly, H.A., Rfie, M.: A survey of Gme Theory using Evolutionry Algorithms. In: 200 Interntionl Symposium in Informtion Technology, pp (200) 7. Mthew, S.S., Atif, Y., Sheng, Q.Z., Mmr, Z.: We of Things: Description, Discovery nd Integrtion. In: 20 Interntionl Conference on Internet of Things nd 4th Interntionl Conference on Cyer, Physicl nd Socil Computing, pp (20) 8. Rsmusen, E.: Gmes nd Informtion. Blckwell, Oxford, U.K. (989) 6

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

2 Workload and duration of the Program 3 Courses 4 Types of course units and number of participants

2 Workload and duration of the Program 3 Courses 4 Types of course units and number of participants The English version of the consolidted curriculum for the "Bchelor Progrm in Mngement nd Economics" is not leglly inding nd is for informtionl purposes only. The leglly inding text which regultes the different

More information

Tool Support for Feature-Oriented Software Development

Tool Support for Feature-Oriented Software Development Tool Support for Feture-Oriented Softwre Development FetureIDE: An Eclipse-Bsed Approch Thoms Leich leich@iti.cs.unimgdeurg.de Sven Apel pel@iti.cs.unimgdeurg.de Lur Mrnitz mrnitz@cs.unimgdeurg.de ABSTRACT

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

Blackbaud The Raiser s Edge

Blackbaud The Raiser s Edge Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014 Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming Reserch of Flow Alloction Optimiztion in Hybrid Softwre Defined Netwo Bsed on Bi-level Progrmming Abstrct Lulu Zho, Mingchun Zheng b School of Shndong Norml Univeity, Shndong 250014, Chin fryrlnc@163.com,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Innovative and applied research on big data platforms of smart heritage

Innovative and applied research on big data platforms of smart heritage Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge

More information

In addition, the following elements form an integral part of the Agency strike prevention plan:

In addition, the following elements form an integral part of the Agency strike prevention plan: UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes

More information

IFC3 India-Android Application Development

IFC3 India-Android Application Development IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Curriculum for the Master Program in Business Education at the University of Innsbruck School of Management

Curriculum for the Master Program in Business Education at the University of Innsbruck School of Management The English version of the curriculum for the Mster Progrm in Business Eduction is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished in the University

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

HP Application Lifecycle Management

HP Application Lifecycle Management HP Appliction Lifecycle Mngement Softwre Version: 11.00 Tutoril Document Relese Dte: Novemer 2010 Softwre Relese Dte: Novemer 2010 Legl Notices Wrrnty The only wrrnties for HP products nd services re set

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Advanced Baseline and Release Management. Ed Taekema

Advanced Baseline and Release Management. Ed Taekema Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

QoS Framework for SIP Signalling

QoS Framework for SIP Signalling QoS Frmework for SIP Signlling Alexnder A. Kist nd Richrd J. Hrris RMIT University Melourne BOX 2476V, Victori 3001, Austrli Emil: kist@ieee.org, richrd@ctt.rmit.edu.u ABSTRACT The Session Initition Protocol

More information

Intellio Video System 25

Intellio Video System 25 Intellio Video System 3 Video mngement softwre Min fetures streming Developed for Intellio smrtcmers Multi-megpixel network video recording Amplitude sed udio recording Monitoring 2 30 cmers per worksttion

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Learner-oriented distance education supporting service system model and applied research

Learner-oriented distance education supporting service system model and applied research SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

Curriculum for the Master Program in Strategic Management at the University of Innsbruck School of Management

Curriculum for the Master Program in Strategic Management at the University of Innsbruck School of Management The English version of the curriculum for the Mster Progrm in Strtegic Mngement is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished in the University

More information

Combined Liability Insurance. Information and Communication Technology Proposal form

Combined Liability Insurance. Information and Communication Technology Proposal form Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y

More information

2 Admission requirements 3 Duration of the program 4 Courses 5 Types of course units and number of participants

2 Admission requirements 3 Duration of the program 4 Courses 5 Types of course units and number of participants The English version of the curriculum for the Mster Progrm in Bnking nd Finnce is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished in the University

More information

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Facilitating Rapid Analysis and Decision Making in the Analytical Lab. Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

How To Improve Network Performance

How To Improve Network Performance Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network

More information

Research Article An RFID-Based Tracing and Tracking System for the Fresh Vegetables Supply Chain

Research Article An RFID-Based Tracing and Tracking System for the Fresh Vegetables Supply Chain Interntionl Journl of Antenns nd Propgtion Volume 2013, Article ID 531364, 15 pges http://dx.doi.org/10.1155/2013/531364 Reserch Article An RFID-Bsed Trcing nd Trcking System for the Fresh Vegetbles Supply

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

Total Data Protection for Sensitive Data Wherever It May Flow

Total Data Protection for Sensitive Data Wherever It May Flow Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Allocation Strategies of Virtual Resources in Cloud-Computing Networks

Allocation Strategies of Virtual Resources in Cloud-Computing Networks RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journl of Systems nd Softwre xxx (2008) xxx xxx Contents lists ville t ScienceDirect The Journl of Systems nd Softwre journl homepge: www.elsevier.com/locte/jss Energy-efficient rel-time oject trcking

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

Applying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM)

Applying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM) Applying SDN/OpenFlow in Virtulized LTE to support Distriuted Moility Mngement (DMM) Mortez Krimzdeh, Luc Vltulin, Georgios Krginnis Deprtment of Computer Science nd the Electricl Engineering, University

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

European Convention on Certain International Aspects of Bankruptcy

European Convention on Certain International Aspects of Bankruptcy Europen Trety Series - No. 136 Europen Convention on Certin Interntionl Aspects of Bnkruptcy Istnul, 5.VI.1990 Premle The memer Sttes of the Council of Europe, signtories hereto, Considering tht the im

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones

Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones Wireless Wkeups Revisited: Energy Mngement for VoIP over Wi-Fi Smrtphones Yuvrj Agrwl, Rnveer Chndr,AlecWolmn, Prmvir Bhl, Kevin Chin, Rjesh Gupt Microsoft Reserch, Microsoft Corportion, University of

More information

Dynamic TDMA Slot Assignment in Ad Hoc Networks

Dynamic TDMA Slot Assignment in Ad Hoc Networks Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of

More information

Curriculum for the Master Program in Accounting, Auditing and Taxation at the University of Innsbruck School of Management

Curriculum for the Master Program in Accounting, Auditing and Taxation at the University of Innsbruck School of Management The English version of the curriculum for the Mster Progrm in Accounting, Auditing nd Txtion is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

Your duty, however, does not require disclosure of matter:

Your duty, however, does not require disclosure of matter: Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or

More information

Application of Analytical Hierarchy Process (AHP) Technique To Evaluate and Selecting Suppliers in an Effective Supply Chain

Application of Analytical Hierarchy Process (AHP) Technique To Evaluate and Selecting Suppliers in an Effective Supply Chain Appliction of Anlyticl Hierrchy Process (AHP) Technique To Evlute nd Selecting Suppliers in n Effective Supply Chin Shhroodi 1*, Kmbiz, Industril Mngement Deprtment, Islmic Azd University (Rsht Brnch),

More information

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF) ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems

More information

Linear Programming in Database

Linear Programming in Database 9 Liner Progrmming in Dtse Akir Kwguchi nd Andrew Ngel Deprtment of Computer Science, The City College of New York. New York, New York United Sttes of Americ Keywords: liner progrmming, simple method,

More information

Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines

Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines Lower Bound for Envy-Free nd Truthful Mespn Approximtion on Relted Mchines Lis Fleischer Zhenghui Wng July 14, 211 Abstrct We study problems of scheduling jobs on relted mchines so s to minimize the mespn

More information

ASG Techniques of Adaptivity

ASG Techniques of Adaptivity ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny

More information

Health Information Systems: evaluation and performance of a Help Desk

Health Information Systems: evaluation and performance of a Help Desk 536 Digitl Helthcre Empowering Europens R. Cornet et l. (Eds.) 2015 Europen Federtion for Medicl Informtics (EFMI). This rticle is published online with Open Access by IOS Press nd distributed under the

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19 Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

Reputation management for distributed service-oriented architectures

Reputation management for distributed service-oriented architectures Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive

More information

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl

More information

Industrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen

Industrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen Tutoril Industril informtion system security Prt 3 Stndrds for securing industril utomtion systems Mrtin Nedele, Dick Oyen Prt 2 of this three-prt tutoril on informtion system security in industril networks

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information