SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA
|
|
- Julia Warren
- 8 years ago
- Views:
Transcription
1 Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE) Publishd by Intrnational Organization of IOTPE ISSN IJTPE Journal Sptmbr 015 Issu 4 Volum 7 Numbr 3 Pags 47-5 SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA M.I. Mihailscu 1 S.L. Nita 1. Information Tchnology and Communications Dpartmnt, Univrsity of South-East Europ LUMINA, Bucharst, Romania, mihmariusiulian@gmail.com. Computr Scinc Dpartmnt, Univrsity of Bucharst, Bucharst, Romania, stfanialordanani@gmail.com Abstract- In this articl w hav dcidd to covr th most important trnds and challngs from softwar nginring and cryptography filds by prsnting som important rsults achivd alrady (as stat-of-th-art). W will propos som nw rsarch dirctions, which ar absolutly ncssary to b covrd and focusd on if w want to mov to cloud computing nvironmnt and using big data. Du to ths rsarch dirctions, w hav figur out that if w don t hav a multi-disciplinary rsarch activity basd on ths two dirctions, th actual tchnologis, such as cloud computing and big data, will b in dp buckt and thy will bcom uslss. Th mntiond tchnologis, rprsnts th pak of th spar, in which w can actually say that w hav a rsarch work to do. Kywords: Cryptography, Chaos-Basd Cryptography, Fully Homomorphic Encryption, Sarchabl Encryption, Cloud Computing, Big Data. I. INTRODUCTION Cloud computing rprsnts th dlivry procss of computing srvics ovr th Intrnt. Cloud srvics giv th possibility to individuals and businsss to us softwar and hardwar which ar managd by third partis at locations that can b accssd rmotly. Exampls of cloud srvics onlin fil storag, social ntworking sits, wbmail, and onlin businss applications [10]. Th cloud computing giv th possibility to accss information and computr rsourcs from any location whr a ntwork connction is availabl. Cloud computing provids a shard pool of rsourcs, including data storag spac, ntworks, computr procssing powr, and spcializd corporat and usr applications [10]. Th following dfinition of cloud computing has bn dvlopd by th U.S. National Institut of Standards and Tchnology (NIST): Cloud computing is a modl for nabling convnint, on-dmand ntwork accss to a shard pool of configurabl computing rsourcs (.g., ntworks, srvrs, storag, applications, and srvics) that can b rapidly provisiond and rlasd with minimal managmnt ffort or srvic providr intraction. This cloud modl promots availability and is composd of fiv ssntial charactristics, thr srvic modls, and four dploymnt modls [11]. W ar facing to on of th most problm from nowadays and which will hav a strong impact on th futur of ncryptd sarch. Encryptd sarch is a vry snsitiv subjct from many aspcts and it bcoms an important problm in scurity and cryptography. From my point of viw, this aspct is happning bcaus of a combination of thr things: - Sarching rprsnt th main way of accssing th data. - Outsourcing is winning mor and mor faith to third partis. - Th trust in ths third partis is limitd, and th rasons ar obvious. Now, sarching ovr ncryptd data is of intrst for many othr sub-filds of computr scinc, such as cryptography, privacy, databass) but also w can find applications in govrnmnts and industry. A-priori sarching on ncryptd data could sound impossibl and vn contradictory; thr ar svral ways of doing it. Som mthods ar practical, som of thm ar mor scur, and som of thm ar mor functional and/or flxibl. In 001, for th first tim th problm of sarching on ncryptd data was proposd and takn into considration by Song, Wagnr, and Prrig [1]. Th authors dscrib a st of schms for th mntiond problm and provid proofs of scurity for th proposd crypto systms. Th schms proposd by thm ar focusd on: - Th schm is provably scur []; - Qury isolation for sarchs is providd; - Controlld sarching for th untrustd srvr is providd; - Hiddn quris. Bsid th advantags providd abov, thir schms ar vry fficint and practical. Th algorithms dvlopd by thm ar simpl to undrstand and to implmnt, and also ar vry fast. 47
2 A. Charactristics Th charactristics of cloud computing ar basd ondmand slf-srvic, broad ntwork accss, rsourc pooling, rapid lasticity and masurd srvic. Ondmand slf-srvic is rprsntd by th customrs (usually organizations) that can rqust and administrat thir own rsourcs usd in computing. Broad ntwork accss giv th possibility for th srvics to b offrd ovr th Intrnt or privat ntworks. Poold rsourcs mans that customrs ar abl to draw from a pool of computing rsourcs, usually in data cntrs plac in othr location (rmotly). Srvics ar scald largr or smallr; and us of a srvic which is masurd and customrs ar billd according with th plans. B. Srvic Modls [10] Th cloud computing srvic modls ar Softwar-asa-Srvic (SaaS), Platform-as-a-Srvic (PaaS) and Infrastructur-as-a-Srvic (IaaS). In a Softwar-as-a- Srvic modl, a pr-mad application, along with any rquird softwar, oprating systm, hardwar, and ntwork ar providd. In PaaS, an oprating systm, hardwar, and ntwork ar providd, and th customr installs or dvlops its own softwar and applications. Th IaaS modl provids only th hardwar and ntwork; th customr installs or dvlops its own oprating systms, softwar and applications. C. Dploymnt of Cloud Srvics [10] Cloud srvics ar typically mad availabl via a privat cloud, community cloud, public cloud or hybrid cloud. Gnrally spaking, srvics providd by a public cloud ar offrd ovr th Intrnt and ar ownd and opratd by a cloud providr. Som xampls includ srvics aimd at th gnral public, such as onlin photo storag srvics, -mail srvics, or social ntworking sits. Howvr, srvics for ntrpriss can also b offrd in a public cloud. In a privat cloud, th cloud infrastructur is opratd solly for a spcific organization, and is managd by th organization or a third party. In a community cloud, th srvic is shard by svral organizations and mad availabl only to thos groups. Th infrastructur may b ownd and opratd by th organizations or by a cloud srvic providr. II. CLOUD COMPUTING AND ITS IMPORTANCE As w can obsrv, th nds of th markt ar vry important whn w try to fix som pattrns rgarding th ncssitis and to find th right pattrns and solutions for ntrpriss and not only. Th markt around Googl, AWS, and Microsoft will bcom mor and mor convrgnc. Th ntrpriss that wish to mov in public clouds, thy hav to dal with ths thr companis. In th forsabl futur, th mntiond companis ar placing thir tchnology bts on cloud computing. Anybody, bsids of Googl, AWS, and Microsoft, will hav to obtain a small pic from th markt and hold it as long as possibl. Th privat cloud only, will fac a fall if thy will not mrg with public clouds. In this way, aftr th mrging procss is don, a nw hybrid or multi-cloud(s) is born. In th nxt fw yars, th companis that will focus on privat clouds will fall substantially. Anothr important aspct is that th nw providrs which offr public accss on cloud will hav to find vry fast a nich. Th markt is highly dominatd by som playrs who ar willing to spnd billions on rsarch and dvlopmnt, and markting. Startups ar focusing on nw and mrging cloud tchnology. Th sam pattrn will b obsrvd around data storag srvics, analytics srvics, Intrnt of Things (IoT), and othr nw tchnologis. Rgarding th Intrnt of Things (IoT) [8], w hav covrd som important aspcts which ar important to tak into considration whn w ar facing with this concpt. Th papr is cas study for biomtrics tchnologis and Larning applications. In Figur 1 w can obsrv that 58% is charactrizd by a top-lin growth and th collaboration among mploys, and thr is also 56% for th supply chain, thr aras on which th ntrpriss xpct cloud computing to hav a hug impact in th following thr yars. Also w can s th volution in thr yars (lightblu lin), and th top-lin growth will hav th most powrful volution, around 58%, and also an important rol will b playd by collaboration with mploys, around 58%. Figur 1. Evolution of th impact of cloud on businss, from today and in thr yars [1] A. Softwar Dvloping in Cloud Computing Agil Dvlopmnt is th bst way (mthod) to us whn w want to dvlop softwar for cloud computing. Cloud computing and virtualization tchnologis crat an asy way for agil dvlopmnt tams to combin 48
3 multipl nvironmnts basd on dvlopmnt, tst and production. Ths nvironmnts ar combind with othr cloud srvics, a vry important aspct which nd to b takn into considration. In th followings, w prsnt six important ways in which cloud computing and virtualization tchnologis nhanc agil softwar dvlopmnt. 1. Cloud computing givs an unlimitd numbr of tsting and staging srvrs.. Th Agil dvlopmnt bcoms a truly paralll activity. 3. Innovation and xprimntation ar ncouragd. 4. Th Dlivry and continuous intgration is nhancs. 5. W hav mor dvlopmnt platforms and xtrnal srvics bcom mor and mor availabl. 6. Cod branching and mrging bcoms vry asy to us. B. Scurity in Cloud Computing This topic is a vry important on. Whn w wish to hav a scur cloud, scurity bcoms a snsibl discussion which nds to giv th right focusing. Th favorit topic in this ara is homomorphic ncryption or fully homomorphic ncryption (FHE). FHE is a form of ncryption which giv th possibility for computations to b carrid out on th ciphrtxt, in this way by gnrating an ncryptd rsult which, whn is dcryptd, matchs th rsult of oprations prformd on th plaintxt [1]. Bcaus of th dsign, th homomorphic schms ar mallabl [], a proprty of som spcific cryptographic algorithms. W say that an algorithm is mallabl is it is possibl for an advrsary to transform th ciphr txt into anothr ciphr txt which dcrypts to a rlatd plaintxt. W suppos, givn an ncryption of a spcific plaintxt mssag, it is obvious to gnrat anothr ciphr txt which dcrypts to f (mssag), for a known function f, without ncssarily knowing or larning mssag. Som xampls of mallabl cryptosystms nd to b listd bcaus rprsnts th foundation and th main ntry point of th homomorphic ncryption schms and rsarch that can b usd in cloud computing in ordr to assur th scurity of th data. In a stram ciphr, th ciphrtxt is gnratd by using (xclusiv or) on th plaintxt and a psudorandom stram which is basd on a scrt ky k, as. Th advrsary is abl to E mssag mssag S k construct th ncryption of mssag t for any t, as E mssag t mssag t S k E mssag t. In RSA cryptosystm, th plaintxt mssag is ncryptd as Emssag mssag mod n n,, whr rprsnt th public ky. Starting from ciphrtxt, th advrsary is abl to construct th ncryption of mssag.t for any t, as. mod mod. E mssag t n mt n E mssag t. In ElGamal cryptosystm, th plaintxt mssag is b b ncryptd using E mssag g, mssag. A, whr ga, rprsnt th public ky. Starting from this ciphrtxt c t c 1,. t. mssag c c 1,, th advrsary is abl to comput which rprsnt a valid ncryption of, for any t. In 005, w ar facing with a nw concpt, calld non-mallabl, introducd by Mar Fisclin [3], an ability charactristic to th systm to kp thir non-mallabl proprty whil giving som xtra powr to th advrsary in ordr to choos a nw public ky, a ky that is rprsntd by a function basd on th original public ky. So, in this cas, th advrsary shouldn t b abl to com up with a ciphr txt whos undrlying plaintxt is in connction with th original mssag which also tak into considration th public kys. Starting from th algorithms mntiond abov, now w ar rady to go furthr with th volution of th scurity mchanisms usd in cloud computing. First modrn tchniqu that is usd in cloud computing is crypto cloud computing [5] which is usd in ordr to assur th scurity of th customr s data which rlis on th scurity of srvic from th cloud computing providrs, howvr, th currnt structur of cloud computing srvic that ar providd by indpndnt oprators. Crypto Cloud Computing (CCC) rprsnts on of th nwst scur cloud computing architctur. Using CCC w hav protction of information scurity at th systm lvl, and th usrs ar allowd to accss shard srvics in a convnint way and also accuratly. Th architctur is abl to: 1. Protcts individual s connction with th rst of world.. Th prsonal privacy is protctd without any dlay of th xchanging information. Th mthod, on which CCC is basd, is known as Quantum Dirct Ky (QDC) [4]. QDC rprsnt a st of asymmtric offlin mchanism, vrything rgarding th ntitis will go public and th privat ky pair is attachd to thir ID. Each ntity will hav his own privat ky and th ntity will hav also a public ky gnrator in ordr to gnrat any public ky. In th followings, w will prsnt how DTron Inc. dscribs th algorithm bhind th systm. QDK functions ar usd by gnrating a pair of public and privat ky from two public and scrt sd matrics M p (public) and M (scrt). Th Ky Managmnt s M s Cntr (KMC) is th singl ownr of and it is always offlin. Th privat ky is gnratd using th KMC basd on th us s ID: Kycs gs ( ID, Ms ) (1) Th public is gnratd any usr which us a known ID: Ky g ( ID, M ) () CP p p C. Homomorphic Encrption Th scond modrn tchniqu is rprsntd by homomorphic ncryption [6]. Hr ar facing with two catgoris of homomorphic cryptosystms, such as partially homomorphic cryptosystms (PHC) and fully homomorphic ncryption (FHE). 49
4 In PHC, w hav som strong xampls which ar absolutly ncssary to know and to undrstand. Thy rprsnt th main cor of framworks, such as cloud computing architctur and QDK. In th following xampls, th E (mssag) dnot th ncryption function of th mssag. C.1. First Exampl Unpaddd RSA In cas that th RSA public ky is modulus mssag and xponnt, thn th ncryption of th mssag is givn by mod E mssag mssag m. Th homomorphic proprty is thn 1 1 E mssag. E mssag mssag mssag mod m 1 1 mssag mssag mod m E mssag. mssag. C.. Scond Exampl ElGamal Whn w dal with ElGamal cryptosystm, in a cyclic group G of ordr q with gnrator g, if th public ky is rprsntd as G, q, g, h, whr h g x, and x rprsnt th scrt ky, thn th ncryption of th r r mssag is E mssag g, mssag. h random r 0,, q1., for som Th homomorphic proprty r1 r1 bcoms E mssag1 E mssag g mssag1 h.,.. 1 r r r 1 r r 1 r. g, m. h g, mssag. mssag h E mssag mssag 1. C.3. Third Exampl Goldwassr-Micali In Goldwassr-Micali cryptosystm, if th public ky is rprsntd by th modulus m and a quadratic nonrsidu x, thn th ncryption of a bit is, whr r0,, m 1. Th homomorphic proprty is thn b1 b b1b E bit1. E bit x r1 x r x r1 r E bit1. bit, whr. dnots addition modulo. In FHE th computation ar don on som oprations ovr th ciphrtxts, such as additions, multiplications, quadratic functions, tc). If a cryptosystm which supports arbitrary computation on th ciphr txts is known as fully homomorphic ncryption (FHE) and is vry powrful. On of th most important xampls in this dirction is rprsntd by th Gntry s cryptosystm, proposd by Craig Gntry, which is using lattic-basd cryptography. Th author dscribd th first plausibl construction for a fully homomorphic ncryption schm. Th schm proposd by Gntry, supports both addition and multiplication oprations on ciphr txts, from which is possibl to dvlop and build circuits for prforming arbitrary computation. bit E bit x r mod m Anothr xampl is rprsntd by th cryptosystm ovr th intgrs, proposd in 010 by Martn van Dijk, Craig Gntry, Shai Halvi and Vinod Vaikuntanathan. Th schm uss many of th tools of Gntry s schm, but dos not rquir idal lattics. This schm uss intgrs. III. BIG DATA Big data is a compound trm for data sts so larg and complx whr th classic applications ar not th right ons that ar abl to procss th data. Nw challngs includ analysis, captur, data curation, sarch, sharing, storag, transfr, visualization, and information privacy. Big data can b dscribd by th following charactristics (w will not go into dp for ach charactristic, bcaus is not th purpos of th articl): - Volum - Varity - Vlocity - Variability - Vracity - Complxity In [7] is prsntd a survy for scuring data analytics in th cloud. On of th most important challng on which will stop in this work is rprsntd by scurity, information privacy, by focusing on sarchabl symmtric ncryption (SSE). A SSE schm is corrct if th protocol usd for sarch rturns th (currnt) corrct rsults for th kyword that is bgin sarchd, xcpt th ( DB w ) ngligibl probability. In ordr to simplify th formalism w will ignor th cas whn a clint will attmpt to add a fil with an xisting idntifir or dlt/dit with an idntifir which is not prsnt in DB. Th protocols that alrady xist can handl ths situations in a clan mannr. Lt s s an xampl of algorithm usd in this dirction. Dfinition: Suppos w hav, which rprsnt a dynamic Stup, Sarch, Updat SSE schm and rprsnt a lakag functions. Lt s start from two algorithms A and S, w dfin som gams Ral A paramtr, and A. Ral A λ, whr rprsnt th scurity AS, Idal ( ) as following: A 1 choos DB. Th gam will run K, EDB Stup DB and will giv EDB to A. So, A will rpat rqusts to ngag in th protocols for Sarch and/or Updat. This is happning whn A picks a clint input as ntry. In ordr to rspond, th gam will runs th Sarch or Updat protocols with th input from th clint K, in and th srvr input EDB and will rciv a transcript to A (th srvr w supposd to b dtrministic). So, A will rturn a bit that th gam uss as its own output. 50
5 B. Idal A 1 A, S λ EDB S L DB will choos DB. Th gam will run and will giv EDB to A. In this cas th A will rpat th rqusts to ngag in th Sarch or Updat protocols. This will tak plac whn A picks a as clint input in. In ordr to rspond, th gam will giv as output of to. This is takn plac whn will L in S outputs a simulatd transcript which is passd to A. So, A will rturn a bit which is usd by th fam as his own output. In ordr to dmonstrat that is L-scur against adaptiv attacks for any advrsaris for A, thr will b an algorithm, S, that xist in such way that Pr Ral 1 Pr Idal 1 ng A A, S In [9] w find mor dtails about th mntiond algorithm. In [13] th authors discuss about a st of algorithms such as Zrnik and support vctor machin (SVM) in ordr to dtct th moving targts. This xampl rprsnts a vry intrsting cas study for data which can b stord and mad thm availabl to subscribrs through a big data nvironmnt. Anothr intrsting aspct prsntd in th mntiond articl rfrs to rconstructing binary imag, a nic xampl of using Zrnik momnts in ordr to find th most suitabl paramtrs whn thy ar compard with th original imag. This ida can b usd in combination with [16] in ordr to crat a strong authntication mchanism. Th authntication mchanism is basd on fac rcognition and an analysis is strongly rcommndd bfor th authntication procss is xcutd. IV. CONCLUSIONS By prsnting th main trnds and challngs in cloud computing and big data, w can say that w fulfill our goal to covr th most important tchnologis and algorithms from softwar nginring and cryptography that can b applid. Our incursion in cloud computing and big data w will not stop hr. Our rsarch will b conductd in ordr to optimiz and to find th bst ways to dvlop softwar and cryptographic algorithms for th mntiond nvironmnts. Cloud computing offrs bnfits for organizations and individuals. Thr ar also privacy and scurity concrns. If you ar considring a cloud srvic, you should think about how your prsonal information, and that of your customrs, can bst b protctd. Carfully rviw th trms of srvic or contracts, and challng th providr to mt your nds [10]. Th prsntd articl addrsss som important aspcts which ar ncssary to b tak into considration whn w will hav softwar applications which will work for tchnical and physical problms in lctrical nginring. Such xampls w hav sn in [13] and [14]. S (3) ACKNOWLEDGEMENTS W would lik to show our gratitud to Assoc. Prof. Adrian Btringh and Prof. Ion Sima for thir support and courag that thy giv it to us for writing this papr. In th nd w would lik to thank Dr. Cristian Kvorchian for his advics that h givs us in ths dirctions, for opning our minds and ncouraging us to xplor th nw challngs and rsarch dirctions in aras of cloud computing and big data. REFERENCES [1] Homomorphic Encryption, wiki/homomorphic_ncryption, 17 August 015. [] Mallability (Cryptography), org/wiki/mallability_%8cryptography%9, 10 Fbruary 015. [3] Compltly Non-mallabl Schms, Marc Fischlin, Automata, Languags and Programming, Lctur Nots in Computr Scinc, Vol. 3580, pp , 005. [4] F. Ladinois, DTron, Introducs its QDK Cryptosystm to Enabl Tru Trustd Idntity for th Cloud Era, Postd on Sptmbr 6, 01, [5] Crypto Cloud Computing, wiki/crypto_cloud_computing, 7 Dcmbr 014. [6] V. Vaikuntanathan, Computing Blindfoldd: Nw Dvlopmnts in Fully Homomorphic Encryption, [7] S. Yakoubov, V. Gadpally, N. Schar, E. Shn, A. Yrukhimovich, A Survy of Cryptographic Approachs to Scuring Big-Data Analytics in th Cloud, lpaprs/8.pdf. [8] P.V. Cornliu, M.M. Iulian, Intrnt of Things and its Rol in Biomtrics Tchnologis and Elarning Applications, 13th Intrnational Confrnc on Enginring of Modrn Elctric Systms (EMES), pp. 1-4, ISBN , INSPEC Accssion Numbr: , 11-1 Jun 015. [9] D. Cash, t al., Dynamic Sarchabl Encryption in Vry-Larg Databass: Data Structurs and Implmntation, dfault/fils/07_4_1.pdf. [10] V.C. Pau, M.I. Mihailscu, Introduction to Cloud Computing, d_51_cc_.pdf [11] NIST Cloud Dfinition, Vrsion 15, nist.gov/groups/sns/cloud-computing/. [1] 55% of Entrpriss Prdict Cloud Computing Will Enabl Nw Businss Modls in Thr Yars, 5-of-ntrpriss-prdict-cloud-computing-will-nablnw-businss-modls-in-thr-yars/. [13] E. Yakhti Fard, A. Amiri, Finding Spcific Targts Basd on Fuzzy Logic Using Zrnik Momnts and Support Vctor Machin, Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE), ISSN: , Issu 3, Vol. 7, No., pp , Jun
6 [14] S.H.R. Almohammad, M. Sanii, E. Mashhour, Rconfiguration of a Distribution Ntwork in a Rstructurd Powr Industry for Minimizing th Cost of Enrgy Loss Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE), ISSN: , Issu 3, Vol. 7, No., pp , Jun 015. [15] M.I. Mihailscu, Nw Enrollmnt Schm for Biomtric Tmplat Using Hash Chaos-Basd Cryptography, Elsvir - Procdia Enginring, ISSN: , Vol. 69, pp , 014. [16] M.I. Mihailscu, Rsarch on Biomtric Synthtic Facs, Indian Journal of Rsarch (PIJR), ISSN: , Vol., Issus 9, pp , Sptmbr 013. BIOGRAPHIES Marius Iulian Mihailscu was born in Bucharst, Romania, H rcivd two B.Sc., first B.Sc. dgr from Univrsity of Titu Maiorscu (Bucharst, Romania), scond B.Sc. from Univrsity of Southrn Dnmark (Odns, Dnmark) and th M.Sc. dgrs from Univrsity of Bucharst (Bucharst, Romania) and Military Tchnical Acadmy (Bucharst, Romania). H has Ph.D. dgr from Univrsity of Bucharst (Bucharst, Romania), all in Information Communication Tchnology, Computr Scinc, Computr Enginring, and Information Scurity, in 008, 009, 010, 011 and 014, rspctivly. Currntly, h is Lcturr of Information Tchnology and Communications at Univrsity of South- East Europ LUMINA (Bucharst, Romania). Stfania Lordana Nita was born in Bucharst, Romania, on January 10, H rcivd th B.Sc. in Mathmatics from Univrsity of Bucharst (Bucharst, Romania) in 013 and M.S.E. dgrs in Softwar Enginring in 016 (xpctd). Currntly, h is an Assistant Lcturr (associat) at Univrsity of Bucharst, Romania. Hr rsarch intrsts ar in th application of cryptography, programming languags and databass, cloud computing and big data, applid mathmatics, softwar dvlopmnt managmnt. 5
The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.
Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl
More informationA Project Management framework for Software Implementation Planning and Management
PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis Kith.Lancastr@LancastrStratgis.com Th goal of introducing nw tchnologis into your company
More informationArchitecture of the proposed standard
Architctur of th proposd standard Introduction Th goal of th nw standardisation projct is th dvlopmnt of a standard dscribing building srvics (.g.hvac) product catalogus basd on th xprincs mad with th
More information5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power
Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim
More informationKey Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg
Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly
More informationContinuity Cloud Virtual Firewall Guide
Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY
More informationAdverse Selection and Moral Hazard in a Model With 2 States of the World
Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,
More informationEcon 371: Answer Key for Problem Set 1 (Chapter 12-13)
con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc
More informationA Secure Web Services for Location Based Services in Wireless Networks*
A Scur Wb Srvics for Location Basd Srvics in Wirlss Ntworks* Minsoo L 1, Jintak Kim 1, Shyun Park 1, Jail L 2 and Sokla L 21 1 School of Elctrical and Elctronics Enginring, Chung-Ang Univrsity, 221, HukSuk-Dong,
More informationHardware Modules of the RSA Algorithm
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 11, No. 1, Fbruary 2014, 121-131 UDC: 004.3`142:621.394.14 DOI: 10.2298/SJEE140114011S Hardwar Moduls of th RSA Algorithm Vlibor Škobić 1, Branko Dokić 1,
More informationFree ACA SOLUTION (IRS 1094&1095 Reporting)
Fr ACA SOLUTION (IRS 1094&1095 Rporting) Th Insuranc Exchang (301) 279-1062 ACA Srvics Transmit IRS Form 1094 -C for mployrs Print & mail IRS Form 1095-C to mploys HR Assist 360 will gnrat th 1095 s for
More informationDeveloping Economies and Cloud Security: A Study of Africa Mathias Mujinga School of Computing, University of South Africa mujinm@unisa.ac.
Journal of Emrging Trnds in Computing and Information Scincs 2009-2012 CIS Journal. All rights rsrvd. Dvloping Economis and Cloud Scurity: A Study of Africa Mathias Mujinga School of Computing, Univrsity
More informationunion scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME!
union scholars YOU CAN CHANGE THE WORLD... program AND EARN MONEY FOR COLLEGE AT THE SAME TIME! AFSCME Unitd Ngro Collg Fund Harvard Univrsity Labor and Worklif Program APPLICATION DEADLINE: FEBRUARY 28
More informationFACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data
FACULTY SALARIES FALL 2004 NKU CUPA Data Compard To Publishd National Data May 2005 Fall 2004 NKU Faculty Salaris Compard To Fall 2004 Publishd CUPA Data In th fall 2004 Northrn Kntucky Univrsity was among
More informationRural and Remote Broadband Access: Issues and Solutions in Australia
Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity
More informationIBM Healthcare Home Care Monitoring
IBM Halthcar Hom Car Monitoring Sptmbr 30th, 2015 by Sal P. Causi, P. Eng. IBM Halthcar Businss Dvlopmnt Excutiv scausi@ca.ibm.com IBM Canada Cloud Computing Tigr Tam Homcar by dfinition 1. With a gnsis
More informationData Encryption and Decryption Using RSA Algorithm in a Network Environment
IJCSNS Intrnational Journal of Computr Scinc and Ntwork Scurity, VOL.13 No.7, July 2013 9 Data Encryption and Dcryption Using RSA Algorithm in a Ntwork Environmnt Nntaw Y. Goshw. Dpartmnt of Elctrical/Elctronics
More informationSci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131
Sci.Int.(Lahor),26(1),131-138,214 ISSN 113-5316; CODEN: SINTE 8 131 REQUIREMENT CHANGE MANAGEMENT IN AGILE OFFSHORE DEVELOPMENT (RCMAOD) 1 Suhail Kazi, 2 Muhammad Salman Bashir, 3 Muhammad Munwar Iqbal,
More informationREPORT' Meeting Date: April 19,201 2 Audit Committee
REPORT' Mting Dat: April 19,201 2 Audit Committ For Information DATE: March 21,2012 REPORT TITLE: FROM: Paul Wallis, CMA, CIA, CISA, Dirctor, Intrnal Audit OBJECTIVE To inform Audit Committ of th rsults
More informationAn Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore
Intrnational Journal of mrging Tchnology and dvancd nginring Wbsit: www.ijta.com (ISSN 2250-2459, Volum 2, Issu 4, pril 2012) n road outlin of Rdundant rray of Inxpnsiv isks Shaifali Shrivastava 1 partmnt
More informationWORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769
08-16-85 WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769 Summary of Dutis : Dtrmins City accptanc of workrs' compnsation cass for injurd mploys; authorizs appropriat tratmnt
More informationSwisscom Cloud Strategy & Services
Swisscom Stratgy & Srvics Swisscom our 360 On for Entrpris Workloads and Wb Srvics Dynamic Computing Srvics Our intgratd approach is uniqu B2C B2B Ntwork, infrastructur and IT from a singl sourc All Industris
More informationUser-Perceived Quality of Service in Hybrid Broadcast and Telecommunication Networks
Usr-Prcivd Quality of Srvic in Hybrid Broadcast and Tlcommunication Ntworks Michal Galtzka Fraunhofr Institut for Intgratd Circuits Branch Lab Dsign Automation, Drsdn, Grmany Michal.Galtzka@as.iis.fhg.d
More informationCategory 7: Employee Commuting
7 Catgory 7: Employ Commuting Catgory dscription This catgory includs missions from th transportation of mploys 4 btwn thir homs and thir worksits. Emissions from mploy commuting may aris from: Automobil
More informationEnforcing Fine-grained Authorization Policies for Java Mobile Agents
Enforcing Fin-graind Authorization Policis for Java Mobil Agnts Giovanni Russllo Changyu Dong Narankr Dulay Dpartmnt of Computing Imprial Collg London South Knsington London, SW7 2AZ, UK {g.russllo, changyu.dong,
More informationITIL & Service Predictability/Modeling. 2006 Plexent
ITIL & Srvic Prdictability/Modling 1 2 Plxnt Th Company 2001 Foundd Plxnt basd on an Expandd ITIL Architctur, CMMI, ISO, and BS15000 - itdna 2003 Launchd itdna Srvic Offring 2003 John Groom, past Dirctor
More informationPlanning and Managing Copper Cable Maintenance through Cost- Benefit Modeling
Planning and Managing Coppr Cabl Maintnanc through Cost- Bnfit Modling Jason W. Rup U S WEST Advancd Tchnologis Bouldr Ky Words: Maintnanc, Managmnt Stratgy, Rhabilitation, Cost-bnfit Analysis, Rliability
More informationMoving Securely Around Space: The Case of ESA
Moving Scurly Around Spac: Th Cas of ESA Prpard By: Andra Baldi, Jos Frnandz Balsiro, Marco Incollingo Tommaso Parrinllo, Cristiano Silvagni, Stfano Zatti Europan Spac Agncy Andra.Baldi@sa.int ESA Scnario
More informationProduct Overview. Version 1-12/14
Product Ovrviw Vrsion 1-12/14 W ar Grosvnor Tchnology Accss Control Solutions W dvlop, manufactur and provid accss control and workforc managmnt solutions th world ovr. Our product offring ompasss hardwar,
More informationSecure User Data in Cloud Computing Using Encryption Algorithms
Scur Usr Data in Using Encrypt Algorithms Rachna Arora*, Anshu Parashar ** *(Rsarch Scholar, HCTM, Kaithal, Haryana) ** (Associat Profssor, HCTM, Kaithal, Haryana) ABSTRACT is transming inmat tchnology.
More informationCARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises
CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY Outcom 10 Rgulation 11 Safty and Suitability of Prmiss CQC Rf 10A 10A(1) Lad Dirctor / Lad Officr Rspons Impact Liklihood Lvl of Concrn
More informationC H A P T E R 1 Writing Reports with SAS
C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd
More informationAsset set Liability Management for
KSD -larning and rfrnc products for th global financ profssional Highlights Library of 29 Courss Availabl Products Upcoming Products Rply Form Asst st Liability Managmnt for Insuranc Companis A comprhnsiv
More informationMaintain Your F5 Solution with Fast, Reliable Support
F5 SERVICES TECHNICAL SUPPORT SERVICES DATASHEET Maintain Your F5 Solution with Fast, Rliabl Support In a world whr chang is th only constant, you rly on your F5 tchnology to dlivr no mattr what turns
More informationData warehouse on Manpower Employment for Decision Support System
Data warhous on Manpowr Employmnt for Dcision Support Systm Amro F. ALASTA, and Muftah A. Enaba Abstract Sinc th us of computrs in businss world, data collction has bcom on of th most important issus du
More informationEntity-Relationship Model
Entity-Rlationship Modl Kuang-hua Chn Dpartmnt of Library and Information Scinc National Taiwan Univrsity A Company Databas Kps track of a company s mploys, dpartmnts and projcts Aftr th rquirmnts collction
More informationRemember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D
24+ Advancd Larning Loan Application form Rmmbr you can apply onlin. It s quick and asy. Go to www.gov.uk/advancdlarningloans About this form Complt this form if: you r studying an ligibl cours at an approvd
More informationSTUDENT. Achieve More! AT A GLANCE BECOME A CWI. I fee. Learn More: www.cwidaho.cc OPPORTUNITIES TO
f YO U! o n io s r V w Th N P.O. Box 3010 Nampa, ID 83653 Call: 208.562.3000 Click: cwidaho.cc/go Visit: A On Stop Studnt Srvics Location TS NOW YOURS STAR www.cwidaho.cc 208.562.3000 Stay Connctd 022015-05
More informationDevelopment of Financial Management Reporting in MPLS
1 Dvlopmnt of Financial Managmnt Rporting in MPLS 1. Aim Our currnt financial rports ar structurd to dlivr an ovrall financial pictur of th dpartmnt in it s ntirty, and thr is no attmpt to provid ithr
More informationCombinatorial Analysis of Network Security
Combinatorial Analysis of Ntwork Scurity Stvn Nol a, Brian O Brry a, Charls Hutchinson a, Sushil Jajodia a, Lynn Kuthan b, and Andy Nguyn b a Gorg Mason Univrsity Cntr for Scur Information Systms b Dfns
More informationImportant Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2
Installation and Opration Intrnt Tlphony Adaptr Aurswald Box Indx C I R 884264 03 02/05 Call Duration, maximum...10 Call Through...7 Call Transportation...7 Calls Call Through...7 Intrnt Tlphony...3 two
More informationIHE IT Infrastructure (ITI) Technical Framework Supplement. Cross-Enterprise Document Workflow (XDW) Trial Implementation
Intgrating th Halthcar Entrpris 5 IHE IT Infrastructur (ITI) Tchnical Framwork Supplmnt 10 Cross-Entrpris Documnt Workflow (XDW) 15 Trial Implmntation 20 Dat: Octobr 13, 2014 Author: IHE ITI Tchnical Committ
More informationIncomplete 2-Port Vector Network Analyzer Calibration Methods
Incomplt -Port Vctor Ntwork nalyzr Calibration Mthods. Hnz, N. Tmpon, G. Monastrios, H. ilva 4 RF Mtrology Laboratory Instituto Nacional d Tcnología Industrial (INTI) Bunos irs, rgntina ahnz@inti.gov.ar
More informationUse a high-level conceptual data model (ER Model). Identify objects of interest (entities) and relationships between these objects
Chaptr 3: Entity Rlationship Modl Databas Dsign Procss Us a high-lvl concptual data modl (ER Modl). Idntify objcts of intrst (ntitis) and rlationships btwn ths objcts Idntify constraints (conditions) End
More informationCPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions
CPS 22 Thory of Computation REGULAR LANGUAGES Rgular xprssions Lik mathmatical xprssion (5+3) * 4. Rgular xprssion ar built using rgular oprations. (By th way, rgular xprssions show up in various languags:
More informationA Theoretical Model of Public Response to the Homeland Security Advisory System
A Thortical Modl of Public Rspons to th Homland Scurity Advisory Systm Amy (Wnxuan) Ding Dpartmnt of Information and Dcision Scincs Univrsity of Illinois Chicago, IL 60607 wxding@uicdu Using a diffrntial
More informationby John Donald, Lecturer, School of Accounting, Economics and Finance, Deakin University, Australia
Studnt Nots Cost Volum Profit Analysis by John Donald, Lcturr, School of Accounting, Economics and Financ, Dakin Univrsity, Australia As mntiond in th last st of Studnt Nots, th ability to catgoris costs
More informationAnalyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop
Intrnational Journal of Computr Scinc and Enginring Opn Accss Rsarch Papr Volum-2, Issu-1 E-ISSN: 2347-2693 Analyzing Failurs of a Smi-Structurd Suprcomputr Log Fil Efficintly by Using PIG on Hadoop Madhuri
More informationReview and Analysis of Cloud Computing Quality of Experience
Rviw and Analysis of Cloud Computing Quality of Exprinc Fash Safdari and Victor Chang School of Computing, Crativ Tchnologis and Enginring, Lds Mtropolitan Univrsity, Hadinly, Lds LS6 3QR, U.K. {F.Safdari,
More informationDesigning a Secure DNS Architecture
WHITE PAPER Dsigning a Scur DNS Architctur In today s ntworking landscap, it is no longr adquat to hav a DNS infrastructur that simply rsponds to quris. What is ndd is an intgratd scur DNS architctur that
More informationTeaching Computer Networking with the Help of Personal Computer Networks
Taching Computr Ntworking with th Hlp of Prsonal Computr Ntworks Rocky K. C. Chang Dpartmnt of Computing Th Hong Kong Polytchnic Univrsity Hung Hom, Kowloon, Hong Kong csrchang@comp.polyu.du.hk ABSTRACT
More informationJob Description. Programme Leader & Subject Matter Expert
Job titl: Programm Ladr & Subjct Mattr xprt Arbitration Pathways, ducation and Training Dpartmnt Salary band: 47,500 to 56,500 (dpndnt upon xprinc) Hours: 35 hours a wk Trm: Full Tim, Prmannt Accountabl
More informationPresentation on Short-Term Certificates to the CAPSEE Conference. September 18, 2014
Prsntation on Short-Trm Crtificats to th CAPSEE Confrnc Sptmbr 18, 2014 Th first goal of City Collgs Rinvntion is focusd on nsuring studnts arn crdntials of conomic valu Rinvntion Goals Incras numbr of
More informationCisco Data Virtualization
Cisco Data Virtualization Big Data Eco-systm Discussion with Bloor Group Bob Ev, David Bsmr July 2014 Cisco Data Virtualization Backgroundr Cisco Data Virtualization is agil data intgration softwar that
More informationWhole Systems Approach to CO 2 Capture, Transport and Storage
Whol Systms Approach to CO 2 Captur, Transport and Storag N. Mac Dowll, A. Alhajaj, N. Elahi, Y. Zhao, N. Samsatli and N. Shah UKCCS Mting, July 14th 2011, Nottingham, UK Ovrviw 1 Introduction 2 3 4 Powr
More informationScalable Transactions for Web Applications in the Cloud using Customized CloudTPS
Shashikant Mahadu Bankar/ (IJCSIT) Intrnational Journal of Computr Scinc and Information Tchnologis, Vol. (3), 2015, 218-2191 Scalabl Transactions for Wb Applications in th Cloud using Customizd CloudTPS
More informationLecture 20: Emitter Follower and Differential Amplifiers
Whits, EE 3 Lctur 0 Pag of 8 Lctur 0: Emittr Followr and Diffrntial Amplifirs Th nxt two amplifir circuits w will discuss ar ry important to lctrical nginring in gnral, and to th NorCal 40A spcifically.
More informationQUANTITATIVE METHODS CLASSES WEEK SEVEN
QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.
More informationAbstract. Introduction. Statistical Approach for Analyzing Cell Phone Handoff Behavior. Volume 3, Issue 1, 2009
Volum 3, Issu 1, 29 Statistical Approach for Analyzing Cll Phon Handoff Bhavior Shalini Saxna, Florida Atlantic Univrsity, Boca Raton, FL, shalinisaxna1@gmail.com Sad A. Rajput, Farquhar Collg of Arts
More informationParallel and Distributed Programming. Performance Metrics
Paralll and Distributd Programming Prformanc! wo main goals to b achivd with th dsign of aralll alications ar:! Prformanc: th caacity to rduc th tim to solv th roblm whn th comuting rsourcs incras;! Scalability:
More informationSTATEMENT OF INSOLVENCY PRACTICE 3.2
STATEMENT OF INSOLVENCY PRACTICE 3.2 COMPANY VOLUNTARY ARRANGEMENTS INTRODUCTION 1 A Company Voluntary Arrangmnt (CVA) is a statutory contract twn a company and its crditors undr which an insolvncy practitionr
More informationPersonal Identity Verification (PIV) Enablement Solutions
Prsonal Idntity Vrification (PIV) Enablmnt Solutions pivclass Govrnmnt Solutions Affordabl Prsonal Idntity Vrification (PIV) Enablmnt Solutions from a Singl, Trustd Supplir Complt Solution for PIV Enablmnt
More informationEFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS
25 Vol. 3 () January-March, pp.37-5/tripathi EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS *Shilpa Tripathi Dpartmnt of Chmical Enginring, Indor Institut
More informationKeywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.
Volum 3, Issu 6, Jun 2013 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: wwwijarcsscom Dynamic Ranking and Slction of Cloud
More informationThe international Internet site of the geoviticulture MCC system Le site Internet international du système CCM géoviticole
Th intrnational Intrnt sit of th goviticultur MCC systm L sit Intrnt intrnational du systèm CCM géoviticol Flávio BELLO FIALHO 1 and Jorg TONIETTO 1 1 Rsarchr, Embrapa Uva Vinho, Caixa Postal 130, 95700-000
More informationEngineering Analytics Opportunity Preview Zinnov Report August 2013
Enginring Analytics Opportunity Prviw Zinnov Rport August 2013 Enginring Analytics: Prviw Agnda Dfinition Markt Siz Summary 2 Enginring Analytics: Prviw Agnda Dfinition Markt Siz Summary 3 Agnda 1 Enginring
More informationLecture 3: Diffusion: Fick s first law
Lctur 3: Diffusion: Fick s first law Today s topics What is diffusion? What drivs diffusion to occur? Undrstand why diffusion can surprisingly occur against th concntration gradint? Larn how to dduc th
More informationConstraint-Based Analysis of Gene Deletion in a Metabolic Network
Constraint-Basd Analysis of Gn Dltion in a Mtabolic Ntwork Abdlhalim Larhlimi and Alxandr Bockmayr DFG-Rsarch Cntr Mathon, FB Mathmatik und Informatik, Fri Univrsität Brlin, Arnimall, 3, 14195 Brlin, Grmany
More informationA Note on Approximating. the Normal Distribution Function
Applid Mathmatical Scincs, Vol, 00, no 9, 45-49 A Not on Approimating th Normal Distribution Function K M Aludaat and M T Alodat Dpartmnt of Statistics Yarmouk Univrsity, Jordan Aludaatkm@hotmailcom and
More informationSharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means
Qian t al. Journal of Inqualitis and Applications (015) 015:1 DOI 10.1186/s1660-015-0741-1 R E S E A R C H Opn Accss Sharp bounds for Sándor man in trms of arithmtic, gomtric and harmonic mans Wi-Mao Qian
More informationWho uses our services? We have a growing customer base. with institutions all around the globe.
not taking xpr Srvic Guid 2013 / 2014 NTE i an affordabl option for audio to txt convrion. Our rvic includ not or dirct trancription rvic from prviouly rcordd audio fil. Our rvic appal pcially to tudnt
More informationAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Dtcting Profil Cloning in Onlin Social Ntworks MortzaYousfi Kharaji 1 and FatmhSalhi Rizi 2 1 Dptartmnt of Computr and Information Tchnology Enginring,Mazandaran of Scinc and Tchnology,Babol,
More informationJune 2012. Enprise Rent. Enprise 1.1.6. Author: Document Version: Product: Product Version: SAP Version: 8.81.100 8.8
Jun 22 Enpris Rnt Author: Documnt Vrsion: Product: Product Vrsion: SAP Vrsion: Enpris Enpris Rnt 88 88 Enpris Rnt 22 Enpris Solutions All rights rsrvd No parts of this work may b rproducd in any form or
More informationContents. Presentation contents: Basic EDI dataflow in Russia. eaccounting for HR and Payroll. eaccounting in a Cloud
Accounting Contnts Prsntation contnts: Basic EDI dataflow in Russia Accounting for HR and Payroll Accounting in a Cloud Basic EDI Procss Flow Typs of documnts for EDI Lgally rquird documnts: Act of accptanc
More informationME 612 Metal Forming and Theory of Plasticity. 6. Strain
Mtal Forming and Thory of Plasticity -mail: azsnalp@gyt.du.tr Makin Mühndisliği Bölümü Gbz Yüksk Tknoloji Enstitüsü 6.1. Uniaxial Strain Figur 6.1 Dfinition of th uniaxial strain (a) Tnsil and (b) Comprssiv.
More informationESA Support to ESTB Users
ESA Support to ESTB Usrs Dr. Javir Vntura-Travst Europan Spac Agncy 3 rd ESTB Workshop Nic 12 Novmbr 2002 OUTLINE! ESA ESTB wbsit support! Th ESTB/EGNOS Hlpdsk! Th ESTB Nwslttr! Th ESA SISNET tchnology!
More informationNatural Gas & Electricity Prices
Click to dit Mastr titl styl Click to dit Mastr txt styls Scond lvl Third lvl Natural Gas & Elctricity Prics Fourth lvl» Fifth lvl Glnn S. Pool Manufacturing Support Mgr. Enrgy April 4, 2013 Click Vrso
More information81-1-ISD Economic Considerations of Heat Transfer on Sheet Metal Duct
Air Handling Systms Enginring & chnical Bulltin 81-1-ISD Economic Considrations of Hat ransfr on Sht Mtal Duct Othr bulltins hav dmonstratd th nd to add insulation to cooling/hating ducts in ordr to achiv
More informationest with berkeley / uc berkeley exte xtension / be your best with berkel
c rkley xtnsion yor st rkly c rkley xtnsion st with rkly c rkley xt Post-Baccalarat yor st Program with for rkly c rk xtnsion yor st with rkl c rkley xtnsion yor st rkly Consling c rkley and xtnsion st
More informationCost Benefit Analysis of the etir system Summary, limitations and recommendations
UNITED NATIONS Cost Bnfit Analysis of th TIR systm Summary, limitations and rcommndations Agnda itm 5 André Scia Informal Ad hoc Exprt Group on Concptual and Tchnical Aspcts of Computrization of th TIR
More informationUTILITY SOLUTIONS. Security & Site Monitoring. Substation Automation Solutions. Protection & Control Systems. Optical Communication Networks
Scurity & Sit Monitoring Substation Automation Solutions Protction & Control Systms Optical Communication Ntworks UTILITY Intgratd Automation SOLUTIONS for Elctric Utilitis GE Powr Systms GE Industrial
More informationVoice Biometrics: How does it work? Konstantin Simonchik
Voic Biomtrics: How dos it work? Konstantin Simonchik Lappnranta, 4 Octobr 2012 Voicprint Makup Fingrprint Facprint Lik a ingrprint or acprint, a voicprint also has availabl paramtrs that provid uniqu
More informationVector Network Analyzer
Cours on Microwav Masurmnts Vctor Ntwork Analyzr Prof. Luca Prrgrini Dpt. of Elctrical, Computr and Biomdical Enginring Univrsity of Pavia -mail: luca.prrgrini@unipv.it wb: microwav.unipv.it Microwav Masurmnts
More informationGold versus stock investment: An econometric analysis
Intrnational Journal of Dvlopmnt and Sustainability Onlin ISSN: 268-8662 www.isdsnt.com/ijds Volum Numbr, Jun 202, Pag -7 ISDS Articl ID: IJDS20300 Gold vrsus stock invstmnt: An conomtric analysis Martin
More informationTELL YOUR STORY WITH MYNEWSDESK The world's leading all-in-one brand newsroom and multimedia PR platform
TELL YOUR STORY WITH MYNEWSDESK Th world's lading all-in-on brand nwsroom and multimdia PR platform SO WHAT'S THE STORY WITH MYNEWSDESK? Th world s lading all-in-on nwsroom and digital PR platform. Usd
More informationUpper Bounding the Price of Anarchy in Atomic Splittable Selfish Routing
Uppr Bounding th Pric of Anarchy in Atomic Splittabl Slfish Routing Kamyar Khodamoradi 1, Mhrdad Mahdavi, and Mohammad Ghodsi 3 1 Sharif Univrsity of Tchnology, Thran, Iran, khodamoradi@c.sharif.du Sharif
More informationYouthWorks Youth Works (yüth- w rkz), n.
YouthWorks Youth Works(yüth- w rkz),n. 1. Baltimor City s summr jobs program. 2. Crats carr pathways for Baltimor City youth. 3. Givs Baltimor mployrs opportunitis to train thir futur workforc. Opportunity
More informationDefining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind
Dfining Rtirmnt Succss for Dfind Contribution Plan Sponsors: Bgin with th End in Mind David Blanchtt, CFA, CFP, AIFA Had of Rtirmnt Rsarch Morningstar Invstmnt Managmnt david.blanchtt@morningstar.com Nathan
More informationest with berkeley / uc berkeley With Berkeley exten be your best with berkeley c berkeley extension / be your best w
c rk xt yor st w rkly c rk xt st with rkly c rk xtn Crtificat yor Program st in with rkly c rk xt yor st with rkl c rk xt yor st w rkly Bsinss c rk xt st with rkly c rk xtn Administration yor st with rkly
More informationMeerkats: A Power-Aware, Self-Managing Wireless Camera Network for Wide Area Monitoring
Mrkats: A Powr-Awar, Slf-Managing Wirlss Camra Ntwork for Wid Ara Monitoring C. B. Margi 1, X. Lu 1, G. Zhang 1, G. Stank 2, R. Manduchi 1, K. Obraczka 1 1 Dpartmnt of Computr Enginring, Univrsity of California,
More informationWhere design facilitates health to lead innovation
Whr dsign facilitats halth to lad innovation 18 March, 2015 Carolin Hummls, c.c.m.hummls@tu.nl Univrsity of Tchnology /dp. of Industrial Dsign / thm Participatory Halth & Wllbing /dp. of All dpartmnts
More informationEVALUATING EFFICIENCY OF SERVICE SUPPLY CHAIN USING DEA (CASE STUDY: AIR AGENCY)
Indian Journal Fundamntal and Applid Lif Scincs ISSN: 22 64 (Onlin) An Opn Accss, Onlin Intrnational Journal Availabl at www.cibtch.org/sp.d/jls/20/0/jls.htm 20 Vol. (S), pp. 466-47/Shams and Ghafouripour
More informationEnterprise Resource Planning (ERP) Systems
Entrpris Rsourc Planning (ERP) Systms For Non-Practitionrs Octobr 1997 Octobr 1997 National Industry Srvics - Industrial & Automotiv Products ERP nabls companis to driv th optimum intr-oprability btwn
More informationProbabilistic maintenance and asset management on moveable storm surge barriers
Probabilistic maintnanc an asst managmnt on movabl storm surg barrirs Patrick Wbbrs Ministry of Transport, Public Works an Watr Managmnt Civil Enginring Division A n a l y s O n r h o u F a a l k a n s
More informationInformation Management Strategy: Exploiting Big data and Advanced Analytics
Information Managmnt Stratgy: Exploiting Big data and Advancd Analytics William Duply Stratgist HP Cloud Hwltt-Packard Canada Big : What w ar building: Actionabl intllignc Businss valu Traditional BI/MIS/CRM/
More informationResource Management and Audit Scrutiny Panel. Apologies for absence were received from Councillors Child, Gilchrist, Maginnis and O Donnell.
+ ED I N BVRG H + THE CITY OF EDINBURGH CUNClL Itm no 4 Committ Mi n Uts Rsourc Managmnt and Audit Scrutiny Panl Edinburgh, Prsnt:- Councillors Jackson (Convnr), Aldridg, Milligan, Munro, Paisly (substitut
More informationCookie Policy- May 5, 2014
Cooki Policy- May 5, 2014 Us of Cookis on Sizmk Wbsits This Cooki Disclosur applis only to us of cookis on corporat wbsits (www.sizmk.com and rlatd rgional wbsits) publishd by Sizmk Inc. and its affiliats
More information