A Study on Security Technique of Cloud Data Processing in Electronic Commerce
|
|
- Pierce Dennis
- 7 years ago
- Views:
Transcription
1 Internatonal Journal of Securty and Its Applcatons, pp A Study on Securty Technque of Cloud Data Processng n Electronc Commerce We Da 1, Xuefang Zhang 2 and Peng Hu 3 1 School of Economcs and Management, Hube Polytechnc Unversty, Huangsh , Hube, P.R.Chna 2 School of Economcs and Management, Hube Polytechnc Unversty, Huangsh , Hube, P.R.Chna 3 School of Mathematcs and Physcs, Hube Polytechnc Unversty, Huangsh , Hube, P.R.Chna 1 dwesky@163.com, 2 zxf1223@126.com (Correspondng Author), 3 penghut@163.com Abstract In the age of e-commerce, the ssue of nformaton leakage of nternet users s a wde concern. The e-commerce enterprses should be prepared to deal wth network data processng securty, and to avod varous nconvenences led by the loss of data nformaton. In ths study, the "busness to customer" (B2C) cloud data processng model s taken as an example to propose a securty countermeasure for network data processng based on cloud computng platform. The cloud network computng model s adopted for the automated processng on B2C network data. Based on the network overlappng relatonshp and model settngs, the securty workflow of the cloud data computng processng s bult. Moreover, the overlappng network plan and flow network technque are consdered as the bass of the model, and a dversfed securty control platform s created by combnng wth modelng tools. Keywords: E-commerce, Cloud data, Informaton leakage, Securty control 1. Introducton The global trade and economy s rsng n recent years. Commercal trade has become the man trend of the market n many countres. Moreover, technology trade s the development trend of the global economc reform. Ths s due to the regonal openness of Internet platform. Varous types of commercal trade networks [1-4] have appeared on the Internet platform and promote the vrtualzaton constructon of economc transacton actvtes. As one of the earlest e-commerce platform n Chna, "busness to customer" (B2C) has dffculty to get rd of customer nformaton securty rsks n the long term, whch has made massve leaks of customer nformaton and brought about a plenty of transacton securty ssues. In order to promote the sustanable development of e-commerce webstes, t s necessary to adopt new technologes to address the securty ssues of customer nformaton and to create a safe and relable nternet transacton envronment for both busnesses and customers. 2. Current Status of Informaton Securty of E-Commerce Webstes There are varous factors leadng to customer nformaton leakage of e-commerce webstes ISSN: IJSIA Copyrght c 2014 SERSC
2 Internatonal Journal of Securty and Its Applcatons based on B2C platform [5, 6]. A lot of B2C e-commerce webstes do not pay suffcent attenton to the confdentalty of customer nformaton. Besdes, the staff moblty of these webstes s hgh, and hence there have already been plenty of customer nformaton leakage cases caused by the staff of B2C e-commerce webstes. The applcaton feld of e-commerce technology s gradually expandng, and the e-commerce networks are facng the stuaton of growng data traffc. Therefore, a sngle e-commerce platform can no longer satsfy the data processng requrements. As the host platform of e-commerce webste, cloud computng network [7, 8] encounters dfferent data operaton problems when processng e-commerce data, thereby ncreasng the data nformaton securty rsks. 3. Survey on Customer Informaton Leakage of Jngdong Mall E-commerce s created n the context of vrtualzaton of global commercal trade. Under E-commence, the transactons are completed through browser or server. It can be seen from the ncdents of customer nformaton leakage of Jngdong Mall that the attacker drectly extracted customers' personal nformaton from the backstage of Jngdong, whch means that there are two stuatons leadng to such ncdent. The frst one s that the attacker found the vulnerablty of the web server and drectly nvaded the server to steal the customer personal nformaton. The second s that before the attacker attacked the ste, he found who wanted to attack the e-commerce webste va an llegal underground ndustry chan lke customer nformaton traffckng, and then he sneaked nto the company as an employee, worked for some tme and stole customer nformaton by settng the backdoor. The specfc forms of loophole are shown n Table 1. Table 1. Jngdong Mall Loophole Type Statstcs Loophole type XSS scrptng attacks SQL necton Command executon Unauthorzed access Desgn flaw Others Percentage 25% 12% 8% 15% 15% 25% So far, wth the development of "busness to customer", whch s the earlest e-commerce model n Chna, t has great nfluence on commercal trade actvtes. The loophole types that result n the massve customer nformaton leakage account for about 4% of the total. The frst thng for Jngdong Mall to do to prevent customer nformaton from beng stolen s to fnd the loopholes of webste n tme and fx them mmedately once they are found, so that the attacker would have no chance to steal the customer nformaton. Today, personal nformaton prvacy s hghly concerned by the publc. Improvng the securty envronment of customer nformaton wll brng a better development for the e-commerce webstes on B2C platform. 284 Copyrght c 2014 SERSC
3 Internatonal Journal of Securty and Its Applcatons 4. Applcaton of Computng Model of E-Commerce Cloud Network Securty The scale expanson of e-commerce webstes has brought about a seres of nformaton securty problems. The server of e-commerce webste wll lose the hgh effcency data processng functon when facng massve data nformaton, and encounter a varety of obstacles n the deployment of nformaton resources. Although domestc e-commerce has been dvded nto multple patterns, nformaton leakage s stll the largest drawback durng the popularzaton perod of B2C webstes. Retalers do not take suffcent countermeasures to protect customer nformaton, whch leads to the personal prvacy of customers beng stolen and lowers the nformaton securty of the customers [9, 10]. The network plan computng model utlzes the overlappng network relatonshp to provde a broader platform for cloud data processng, so that the operaton rsks of e-commerce network can be reduced Basc Model of Overlappng Relatonshp Faced wth a more open network market, the data securty ssue of e-commerce has attracted wde attenton. Crss of confdence s the outcome of these massve customer nformaton leakage ncdents. An automated processng can be mplemented on busness data based on network overlappng relatonshp, and provde a plenty of references for data resources deployment. If the overlappng network s chosen to solve the cloud data securty ssue, the specfc crcumstances of overlappng relatonshp must be frst clarfed. In ths study, there are four basc overlappng relatonshps encountered by the sequence par (, ) wth partally or completely contnuous relatonshp Relaton from Fnsh to Start (FTS): There s the relatonshp requred of tme dstance from the fnsh of sequence to the start of sequence Relaton from Start to Start (STS): There s the relatonshp requred of tme dstance from the start of sequence to the start of sequence Relaton from Fnsh to Fnsh (FTF): There s the relatonshp requred of tme dstance from the fnsh of sequence to the fnsh of sequence Relaton from Start to Fnsh (STF): It s the relatonshp requred of tme dstance + from the start of sequence to the fnsh of sequence, that s, t s requred to complete after a tme of from the start of sequence, then after a tme of for performng sequence. The four types of relatonshp are shown as Table 1, and the combnatons of them form more complcated overlappng relatonshps. The overlappng relatonshps could be appled to more complex types of processng operatons on cloud data. The e-commerce enterprses should choose the data to process n accordance wth the actual stuaton, thereby ensurng the relablty of e-commerce cloud data. Copyrght c 2014 SERSC 285
4 Internatonal Journal of Securty and Its Applcatons Overlappng relatonshp type Overlappng relatonshp dagram Fnsh to Start 0 0 (FTS) T>0 Start to Start (STS) 0 0 Fnsh to Fnsh (FTF) 0 0 Start to Fnsh (STF) Delay Tme Dstance Fgure 1. Overlappng Network Relatonshp The network model of the basc overlappng relatonshp s used, and the cloud data processng flow s relatvely complex. There are two stuatons n the overlappng model of e-commerce cloud data processng: the frst one s that the sequence begns after sequence fnshes; the second one s that sequence can start before sequence fnshes. Therefore, the tme dfference from the end of sequence to the start of sequence can be utlzed to unfy varous overlappng relatonshps. The frst step s to execute the overlappng. The tme delay dstance of overlappng sequence par (, ) s the tme dstance from the start of sequence to the fnsh of sequence, whch s constraned by the overlappng relatonshp. It s denoted as T (, ). Accordng to the defnton, the calculaton equaton for tme delay dstance s: L T ( F T S ) L T t ( ) ( S T S ) (, ) L T t ( ) ( F T F ) L T L T t ( ) t ( ) ( S T F ) (1) 4.3. Relaton between Three Network Plans In order to get rd of the nformaton leakage rsks exstng n tradtonal e-commerce 286 Copyrght c 2014 SERSC
5 Internatonal Journal of Securty and Its Applcatons network, the cloud data processng can be based on overlappng network plan and the flow network plan s used as the computng model to help solve a seres of securty problems n the cloud data processng system. As shown n Fgure 1, n overlappng network plan, when (, ) 0, sequence and sequence does not overlap. When T (, ) 0, the two sequences begn to overlap. At ths tme, T (, ) s the tme dstance by whch sequence can start before fnshng sequence. The overlappng network plan s the network plan when there exsts the sequence par (, ) for (, ) 0. When (, ) 0, t means that sequence s mmedately after sequence n general stuaton. It s called general sequence par n the followng. The network plan s a general network plan when there s (, ) 0 for all sequence pars (, ). The flow network plan can be seen as an overlappng network plan wth STS overlappng relatonshp between flow processes. The flow step dstance s the overlappng tme dstance, and the correspondng delay tme dstance T (, ) s usually less than 0. Usng the network overlappng relatonshp, the processng flow of e-commerce cloud data can be smplfed. The overlappng network s used as the control center to execute data processng operatons, thereby guaranteeng the safe use of e-commerce network data. 5. Securty Control Platform Based on Framework Manager For the data processng on e-commerce cloud data, both general network plan and flow network plan are specal overlappng network plans, whle the overlappng network plan and flow network plan are the extenson of general network plan. B2C customer nformaton leakage can cause a varety of abnormaltes, and ncrease the rsk of e-commerce webstes, whch s apparently not conducve to the sustanable development of the new ndustry. Cloud computng s the mprovement of nternet-related servce. It can provde more network servces accordng to user requrements and to specfc tme. It focuses on treatng the servce ssues related wth the control of vrtualzed resource Modelng Cloud Data Securty As an mportant reportng tool n the ndustry, Cognos for cloud data securty modelng s also used n the securty processng of e-commerce cloud data, thus enhancng the relablty of B2C data. In the process of creatng data model wth Cognos Framework Manager [11], by ntroducng dfferent user groups or roles, dfferent data securty access levels are set for the same query obect. Therefore, dfferent user groups are allowed to access dfferent data subsets of the same query obect. Framework Manager s a clent-based modelng tool of Cognos, as shown n Fgure 2. The model s a set of related obects assocated wth each other, and can confgure the reportng form for e-commerce data and reflect the authentcty of data nformaton obectvely. Copyrght c 2014 SERSC 287
6 Internatonal Journal of Securty and Its Applcatons Data Source FM Desgn/Create Proect Prepare Metadata Prepare Busness Vew Publsh Set Securty Create &Manage Package Cognos Content Store Query Studo Report Studo Fgure 2. Framework Manager Workflow In Framework Manager, securty control s a method to control the access to Cognos product data and metadata. If t s set to be safe n FM, then access by selected users, user groups or roles to the content s controlled. The securty control n FM can be dvded nto three types Data Securty: It s used to constran the returned data, whch s used n specfc query obect. When the report developer s developng the report based on the query obect, whch data s returned to the customer s controlled Obect Securty: Accordng to the settng, the users have access to one obect, or do not have access to an obect, or one obect s hdden from some users. The obect here refers to the query obect, query term or flter crtera Packet Securty: The packet securty n FM means that whoever has the authorty to use the packet n Cognos Studo (QueryStudo, ReportStudo etc.) or whether there s the authorty to operate a report usng the packet n Cognos Connecton Cloud Technology Applcaton In the customer nformaton leakage ncdent of Jngdong Mall, although the customer nformaton s not stolen drectly from the target webste, t may be ndrectly accessed by concdence due to the connectvty of nternet. The automatc detecton of program code stored n cloud database can be used to actvely gve an alarm when dscoverng abnormal data to remnd the users to re-examne the data to perform a 288 Copyrght c 2014 SERSC
7 Internatonal Journal of Securty and Its Applcatons second transfer command. Hybrd cloud s a comprehensve type of e-commerce. The technque has a hgher operatng effcency n cloud computng processng and can execute data securty processng, whch helps the users detect the securty factor of the collected data. These are key ssues of consderaton when creatng modern e-commerce. 6. Conclusons In ths study, the obectve s to study the customer nformaton securty of e-commerce webste based on B2C platform. By analyzng the countermeasures for protectng the customer nformaton of the exstng e-commerce webstes based on B2C platform, the possble rsks of actual applcaton are ponted out. The work provdes a relable gudance for ensurng customer nformaton securty and for completng the management system of customer nformaton n e-commerce webstes based on B2C platform. Usng SPI nterface technology n e-commerce cloud data processng can buld dversfed cloud data processng model for users, and satsfy all requrements of deployments and utlzaton of e-commerce data resources. Acknowledgements Ths study has been fnancally supported by Humantes and Socal Scence Youth Fund Proect of Mnstry of Educaton (No.13YJCZH028). References [1] R. B. L, J. Y. Lu, S. Yuan and Y. L. Du, Study on Applcaton Software Update of the Mcro-Navgaton Computer by Seral Port, Mn-mcro Systems, vol. 12, no. 10, (2010), pp [2] N. He, W. M. F. Yun, C. P. Lu and J. Pe, Research on Sensor Technology Face to Wreless Sensor Network, Computer Applcatons and Software, vol. 19, no. 10, (2011), pp [3] P. L, L. K. Zeng, A. Z. Shu, X. L. Jn, Y. C. Lu and H. Wang, Desgn of Forecast System of Back Propagaton Neural Network Based on Matlab, Computer Applcatons and Software, vol. 17, no. 6, (2010), pp [4] B. L. Sh and W. Wang, The Survey of the Research on Data Warehouse and Data Mnng, Computer Applcatons and Software, vol. 15, no. 11, (2009), pp [5] J. H. Chen, Network Securty Data Transfer Method Research Based on Cloud Computng, Computer Smulaton, vol. 29, no. 8, (2012), pp [6] Z. B. Gan, C. Zeng, K. L and J. J. Han, Constructon and Optmzaton of Trust Network n E-Commerce Envronment, Chnese Journal of Computers, vol. 35, no. 1, (2012), pp [7] L. Xu, Y. Y. Zhang, J. Wu and B. Y. Fang, Network technology research under cloud computng envronment, Journal on Communcatons, vol. 33, no. 1, (2012), pp [8] M. M. Fu, Applcaton of Fuzzy Comprehensve Analyss to Informaton Securty Evaluaton, Journal of Southwest Jaotong Unversty, vol. 45, no. 3, (2010), pp [9] D. P. Zhang, K. Ca, M. Zhang and Z. Xu, The Research of Cloud Computng Data Securty Support Platform Archtecture, Journal of Computer Research and Development, vol. 48, no. S3, (2011), pp [10] C. F. Yang, G. Wang and J. H. S, Buld New Generaton EAI Based on SOA, Computer Applcatons and Software, vol. 22, no. 10, (2005), pp [11] IBM Cognos&Busness Intellgence, (2010). Copyrght c 2014 SERSC 289
8 Internatonal Journal of Securty and Its Applcatons Authors We Da, he receved hs M.S.E. n Computer Scence and Technology (2006) and PhD n Computer Applcaton Technology (2012) from Wuhan Unversty of Technology. Now he s full researcher of nformatcs at Economcs and Management Department, Hube Polytechnc Unversty. Hs current research nterests nclude dfferent aspects of Intellgence Computng and Informaton Systems. Xuefang Zhang, she receved her B.B.M. n Fnance (2004) and M.Ec n Industral Economcs (2007) from Huazhong Agrcultural Unversty. Now she s full researcher of nformatcs at Economcs and Management Department, Hube Polytechnc Unversty. Her current research nterests nclude dfferent aspects of Fnancal Engneerng and Informaton Computng. Peng Hu, he receved hs B.S. n Mathematcs (2003) from Hube Normal Unversty and M.Sc. n Informaton Scences (2010) from Hube Unversty. Now he s full researcher of nformatcs at Mathematcs and Physcs Department, Hube Polytechnc Unversty. Hs current research nterests nclude dfferent aspects of Artfcal Intellgence and Informaton Codng. 290 Copyrght c 2014 SERSC
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationGenetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationResearch on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises
3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationThe Pricing Strategy of the Manufacturer with Dual Channel under Multiple Competitions
Internatonal Journal of u-and e-servce, Scence and Technology Vol.7, No.4 (04), pp.3-4 http://dx.do.org/0.457/junnesst.04.7.4. The Prcng Strategy of the Manufacturer wth Dual Channel under Multple Compettons
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationA Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationPerformance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationPerformance Management and Evaluation Research to University Students
631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton
More informationOptimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationWaste to Energy System in Shanghai City
Waste to Energy System n Shangha Cty Group of Envronmental Systems, Department of Envronmental Studes M2 46876 Ya-Y Zhang 1. Introducton In the past ffteen years, the economcs of Chna has mantaned contnuously
More informationThe Application of Fractional Brownian Motion in Option Pricing
Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationMulti-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationPricing Model of Cloud Computing Service with Partial Multihoming
Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationiavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationApplication of an Improved BP Neural Network Model in Enterprise Network Security Forecasting
161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN 978-88-9568-37-; ISSN 83-916 The Italan Assocaton of
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationTHE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
More informationB2C E-Commerce Websites Evaluation System on Users Experience Basis
B2C E-Commerce Webstes Evaluaton System on Users Experence Bass 1 L Xul, 2 Zhao Ru, 3 Xao Yan 1, Frst Author Hebe Normal Unversty of Scence&Technology, Fance&Economcs College, Qnhuangdao, Hebe Provnce,
More informationInvoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow
Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl
More informationA High-confidence Cyber-Physical Alarm System: Design and Implementation
A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationIntra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error
Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor
More informationSet. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index
ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationAn Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style
Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture
More informationSemantic Link Analysis for Finding Answer Experts *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG
More informationInter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationA Load-Balancing Algorithm for Cluster-based Multi-core Web Servers
Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationMining Multiple Large Data Sources
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationRing structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationAn Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
More informationNEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
More informationSPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME
August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000
More informationA Multi-Camera System on PC-Cluster for Real-time 3-D Tracking
The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and
More informationApplication of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
More informationSciences Shenyang, Shenyang, China.
Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationA New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
More informationNumber of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More informationThe Current Employment Statistics (CES) survey,
Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,
More informationA DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM
A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM 1 WEIZHI LIAO, 2 LINFU SUN 1 School of Electromechancal Engneerng, UESTC of Chna, Chengdu 610054, Chna 2 CAD Engneerng Center, Southwest JIAOTONG
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationResearch of concurrency control protocol based on the main memory database
Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationA new anonymity-based protocol preserving privacy based cloud environment
Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal
More informationMathematical Framework for A Novel Database Replication Algorithm
I.J.Modern Educaton and Computer Scence, 203, 9, -0 Publshed Onlne October 203 n MECS (http://www.mecs-press.org/) DOI: 0.585/jmecs.203.09.0 Mathematcal Framework for A Novel Database Replcaton Algorthm
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationPower Consumption Optimization Strategy of Cloud Workflow. Scheduling Based on SLA
Power Consumpton Optmzaton Strategy of Cloud Workflow Schedulng Based on SLA YONGHONG LUO, SHUREN ZHOU School of Computer and Communcaton Engneerng Changsha Unversty of Scence and Technology 960, 2nd Secton,
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationLoad Balancing By Max-Min Algorithm in Private Cloud Environment
Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam
More informationHP Mission-Critical Services
HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to
More informationTuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
More informationData security in Intelligent Transport Systems
Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More information14.74 Lecture 5: Health (2)
14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,
More informationLei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract
, pp.377-390 http://dx.do.org/10.14257/jsa.2016.10.4.34 Research on the Enterprse Performance Management Informaton System Development and Robustness Optmzaton based on Data Regresson Analyss and Mathematcal
More informationMultiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
More informationResearch Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service
Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed
More informationResource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid
Proceedngs of the 200 4th Internatonal Conference on Computer Supported Cooperatve Work n Desgn Resource Schedulng Based on Dynamc Dependence Injecton n Vrtualzaton-based Smulaton Grd Hanbng Lu,Hongy Su,
More informationAnalysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation *
Energy and Power Engneerng, 3, 5, 85-856 do:.436/ee.3.54b63 Publshed Onlne July 3 (htt://www.scr.org/journal/ee) Analyss and Modelng of Buck Converter n Dscontnuous-Outut-Inductor-Current Mode Oeraton
More informationA Hierarchical Reliability Model of Service-Based Software System
2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and
More informationOservce Vs. Sannet - Which One is Better?
o rcng n Compettve Telephony Markets Yung-Mng L nsttute of nformaton Management Natonal Chao Tung Unversty, Tawan 886-3-57111 Ext 57414 yml@mal.nctu.edu.tw Shh-Wen Chu nsttute of nformaton Management Natonal
More informationModeling and Simulation of Multi-Agent System of China's Real Estate Market Based on Bayesian Network Decision-Making
Int. J. on Recent Trends n Engneerng and Technology, Vol. 11, No. 1, July 2014 Modelng and Smulaton of Mult-Agent System of Chna's Real Estate Market Based on Bayesan Network Decson-Makng Yang Shen, Shan
More informationAllocating Collaborative Profit in Less-than-Truckload Carrier Alliance
J. Servce Scence & Management, 2010, 3: 143-149 do:10.4236/jssm.2010.31018 Publshed Onlne March 2010 (http://www.scrp.org/journal/jssm) 143 Allocatng Collaboratve Proft n Less-than-Truckload Carrer Allance
More informationGlobal innovative solutions You can rely on. www.calyon.com
Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons
More information