A Study on Security Technique of Cloud Data Processing in Electronic Commerce

Size: px
Start display at page:

Download "A Study on Security Technique of Cloud Data Processing in Electronic Commerce"

Transcription

1 Internatonal Journal of Securty and Its Applcatons, pp A Study on Securty Technque of Cloud Data Processng n Electronc Commerce We Da 1, Xuefang Zhang 2 and Peng Hu 3 1 School of Economcs and Management, Hube Polytechnc Unversty, Huangsh , Hube, P.R.Chna 2 School of Economcs and Management, Hube Polytechnc Unversty, Huangsh , Hube, P.R.Chna 3 School of Mathematcs and Physcs, Hube Polytechnc Unversty, Huangsh , Hube, P.R.Chna 1 dwesky@163.com, 2 zxf1223@126.com (Correspondng Author), 3 penghut@163.com Abstract In the age of e-commerce, the ssue of nformaton leakage of nternet users s a wde concern. The e-commerce enterprses should be prepared to deal wth network data processng securty, and to avod varous nconvenences led by the loss of data nformaton. In ths study, the "busness to customer" (B2C) cloud data processng model s taken as an example to propose a securty countermeasure for network data processng based on cloud computng platform. The cloud network computng model s adopted for the automated processng on B2C network data. Based on the network overlappng relatonshp and model settngs, the securty workflow of the cloud data computng processng s bult. Moreover, the overlappng network plan and flow network technque are consdered as the bass of the model, and a dversfed securty control platform s created by combnng wth modelng tools. Keywords: E-commerce, Cloud data, Informaton leakage, Securty control 1. Introducton The global trade and economy s rsng n recent years. Commercal trade has become the man trend of the market n many countres. Moreover, technology trade s the development trend of the global economc reform. Ths s due to the regonal openness of Internet platform. Varous types of commercal trade networks [1-4] have appeared on the Internet platform and promote the vrtualzaton constructon of economc transacton actvtes. As one of the earlest e-commerce platform n Chna, "busness to customer" (B2C) has dffculty to get rd of customer nformaton securty rsks n the long term, whch has made massve leaks of customer nformaton and brought about a plenty of transacton securty ssues. In order to promote the sustanable development of e-commerce webstes, t s necessary to adopt new technologes to address the securty ssues of customer nformaton and to create a safe and relable nternet transacton envronment for both busnesses and customers. 2. Current Status of Informaton Securty of E-Commerce Webstes There are varous factors leadng to customer nformaton leakage of e-commerce webstes ISSN: IJSIA Copyrght c 2014 SERSC

2 Internatonal Journal of Securty and Its Applcatons based on B2C platform [5, 6]. A lot of B2C e-commerce webstes do not pay suffcent attenton to the confdentalty of customer nformaton. Besdes, the staff moblty of these webstes s hgh, and hence there have already been plenty of customer nformaton leakage cases caused by the staff of B2C e-commerce webstes. The applcaton feld of e-commerce technology s gradually expandng, and the e-commerce networks are facng the stuaton of growng data traffc. Therefore, a sngle e-commerce platform can no longer satsfy the data processng requrements. As the host platform of e-commerce webste, cloud computng network [7, 8] encounters dfferent data operaton problems when processng e-commerce data, thereby ncreasng the data nformaton securty rsks. 3. Survey on Customer Informaton Leakage of Jngdong Mall E-commerce s created n the context of vrtualzaton of global commercal trade. Under E-commence, the transactons are completed through browser or server. It can be seen from the ncdents of customer nformaton leakage of Jngdong Mall that the attacker drectly extracted customers' personal nformaton from the backstage of Jngdong, whch means that there are two stuatons leadng to such ncdent. The frst one s that the attacker found the vulnerablty of the web server and drectly nvaded the server to steal the customer personal nformaton. The second s that before the attacker attacked the ste, he found who wanted to attack the e-commerce webste va an llegal underground ndustry chan lke customer nformaton traffckng, and then he sneaked nto the company as an employee, worked for some tme and stole customer nformaton by settng the backdoor. The specfc forms of loophole are shown n Table 1. Table 1. Jngdong Mall Loophole Type Statstcs Loophole type XSS scrptng attacks SQL necton Command executon Unauthorzed access Desgn flaw Others Percentage 25% 12% 8% 15% 15% 25% So far, wth the development of "busness to customer", whch s the earlest e-commerce model n Chna, t has great nfluence on commercal trade actvtes. The loophole types that result n the massve customer nformaton leakage account for about 4% of the total. The frst thng for Jngdong Mall to do to prevent customer nformaton from beng stolen s to fnd the loopholes of webste n tme and fx them mmedately once they are found, so that the attacker would have no chance to steal the customer nformaton. Today, personal nformaton prvacy s hghly concerned by the publc. Improvng the securty envronment of customer nformaton wll brng a better development for the e-commerce webstes on B2C platform. 284 Copyrght c 2014 SERSC

3 Internatonal Journal of Securty and Its Applcatons 4. Applcaton of Computng Model of E-Commerce Cloud Network Securty The scale expanson of e-commerce webstes has brought about a seres of nformaton securty problems. The server of e-commerce webste wll lose the hgh effcency data processng functon when facng massve data nformaton, and encounter a varety of obstacles n the deployment of nformaton resources. Although domestc e-commerce has been dvded nto multple patterns, nformaton leakage s stll the largest drawback durng the popularzaton perod of B2C webstes. Retalers do not take suffcent countermeasures to protect customer nformaton, whch leads to the personal prvacy of customers beng stolen and lowers the nformaton securty of the customers [9, 10]. The network plan computng model utlzes the overlappng network relatonshp to provde a broader platform for cloud data processng, so that the operaton rsks of e-commerce network can be reduced Basc Model of Overlappng Relatonshp Faced wth a more open network market, the data securty ssue of e-commerce has attracted wde attenton. Crss of confdence s the outcome of these massve customer nformaton leakage ncdents. An automated processng can be mplemented on busness data based on network overlappng relatonshp, and provde a plenty of references for data resources deployment. If the overlappng network s chosen to solve the cloud data securty ssue, the specfc crcumstances of overlappng relatonshp must be frst clarfed. In ths study, there are four basc overlappng relatonshps encountered by the sequence par (, ) wth partally or completely contnuous relatonshp Relaton from Fnsh to Start (FTS): There s the relatonshp requred of tme dstance from the fnsh of sequence to the start of sequence Relaton from Start to Start (STS): There s the relatonshp requred of tme dstance from the start of sequence to the start of sequence Relaton from Fnsh to Fnsh (FTF): There s the relatonshp requred of tme dstance from the fnsh of sequence to the fnsh of sequence Relaton from Start to Fnsh (STF): It s the relatonshp requred of tme dstance + from the start of sequence to the fnsh of sequence, that s, t s requred to complete after a tme of from the start of sequence, then after a tme of for performng sequence. The four types of relatonshp are shown as Table 1, and the combnatons of them form more complcated overlappng relatonshps. The overlappng relatonshps could be appled to more complex types of processng operatons on cloud data. The e-commerce enterprses should choose the data to process n accordance wth the actual stuaton, thereby ensurng the relablty of e-commerce cloud data. Copyrght c 2014 SERSC 285

4 Internatonal Journal of Securty and Its Applcatons Overlappng relatonshp type Overlappng relatonshp dagram Fnsh to Start 0 0 (FTS) T>0 Start to Start (STS) 0 0 Fnsh to Fnsh (FTF) 0 0 Start to Fnsh (STF) Delay Tme Dstance Fgure 1. Overlappng Network Relatonshp The network model of the basc overlappng relatonshp s used, and the cloud data processng flow s relatvely complex. There are two stuatons n the overlappng model of e-commerce cloud data processng: the frst one s that the sequence begns after sequence fnshes; the second one s that sequence can start before sequence fnshes. Therefore, the tme dfference from the end of sequence to the start of sequence can be utlzed to unfy varous overlappng relatonshps. The frst step s to execute the overlappng. The tme delay dstance of overlappng sequence par (, ) s the tme dstance from the start of sequence to the fnsh of sequence, whch s constraned by the overlappng relatonshp. It s denoted as T (, ). Accordng to the defnton, the calculaton equaton for tme delay dstance s: L T ( F T S ) L T t ( ) ( S T S ) (, ) L T t ( ) ( F T F ) L T L T t ( ) t ( ) ( S T F ) (1) 4.3. Relaton between Three Network Plans In order to get rd of the nformaton leakage rsks exstng n tradtonal e-commerce 286 Copyrght c 2014 SERSC

5 Internatonal Journal of Securty and Its Applcatons network, the cloud data processng can be based on overlappng network plan and the flow network plan s used as the computng model to help solve a seres of securty problems n the cloud data processng system. As shown n Fgure 1, n overlappng network plan, when (, ) 0, sequence and sequence does not overlap. When T (, ) 0, the two sequences begn to overlap. At ths tme, T (, ) s the tme dstance by whch sequence can start before fnshng sequence. The overlappng network plan s the network plan when there exsts the sequence par (, ) for (, ) 0. When (, ) 0, t means that sequence s mmedately after sequence n general stuaton. It s called general sequence par n the followng. The network plan s a general network plan when there s (, ) 0 for all sequence pars (, ). The flow network plan can be seen as an overlappng network plan wth STS overlappng relatonshp between flow processes. The flow step dstance s the overlappng tme dstance, and the correspondng delay tme dstance T (, ) s usually less than 0. Usng the network overlappng relatonshp, the processng flow of e-commerce cloud data can be smplfed. The overlappng network s used as the control center to execute data processng operatons, thereby guaranteeng the safe use of e-commerce network data. 5. Securty Control Platform Based on Framework Manager For the data processng on e-commerce cloud data, both general network plan and flow network plan are specal overlappng network plans, whle the overlappng network plan and flow network plan are the extenson of general network plan. B2C customer nformaton leakage can cause a varety of abnormaltes, and ncrease the rsk of e-commerce webstes, whch s apparently not conducve to the sustanable development of the new ndustry. Cloud computng s the mprovement of nternet-related servce. It can provde more network servces accordng to user requrements and to specfc tme. It focuses on treatng the servce ssues related wth the control of vrtualzed resource Modelng Cloud Data Securty As an mportant reportng tool n the ndustry, Cognos for cloud data securty modelng s also used n the securty processng of e-commerce cloud data, thus enhancng the relablty of B2C data. In the process of creatng data model wth Cognos Framework Manager [11], by ntroducng dfferent user groups or roles, dfferent data securty access levels are set for the same query obect. Therefore, dfferent user groups are allowed to access dfferent data subsets of the same query obect. Framework Manager s a clent-based modelng tool of Cognos, as shown n Fgure 2. The model s a set of related obects assocated wth each other, and can confgure the reportng form for e-commerce data and reflect the authentcty of data nformaton obectvely. Copyrght c 2014 SERSC 287

6 Internatonal Journal of Securty and Its Applcatons Data Source FM Desgn/Create Proect Prepare Metadata Prepare Busness Vew Publsh Set Securty Create &Manage Package Cognos Content Store Query Studo Report Studo Fgure 2. Framework Manager Workflow In Framework Manager, securty control s a method to control the access to Cognos product data and metadata. If t s set to be safe n FM, then access by selected users, user groups or roles to the content s controlled. The securty control n FM can be dvded nto three types Data Securty: It s used to constran the returned data, whch s used n specfc query obect. When the report developer s developng the report based on the query obect, whch data s returned to the customer s controlled Obect Securty: Accordng to the settng, the users have access to one obect, or do not have access to an obect, or one obect s hdden from some users. The obect here refers to the query obect, query term or flter crtera Packet Securty: The packet securty n FM means that whoever has the authorty to use the packet n Cognos Studo (QueryStudo, ReportStudo etc.) or whether there s the authorty to operate a report usng the packet n Cognos Connecton Cloud Technology Applcaton In the customer nformaton leakage ncdent of Jngdong Mall, although the customer nformaton s not stolen drectly from the target webste, t may be ndrectly accessed by concdence due to the connectvty of nternet. The automatc detecton of program code stored n cloud database can be used to actvely gve an alarm when dscoverng abnormal data to remnd the users to re-examne the data to perform a 288 Copyrght c 2014 SERSC

7 Internatonal Journal of Securty and Its Applcatons second transfer command. Hybrd cloud s a comprehensve type of e-commerce. The technque has a hgher operatng effcency n cloud computng processng and can execute data securty processng, whch helps the users detect the securty factor of the collected data. These are key ssues of consderaton when creatng modern e-commerce. 6. Conclusons In ths study, the obectve s to study the customer nformaton securty of e-commerce webste based on B2C platform. By analyzng the countermeasures for protectng the customer nformaton of the exstng e-commerce webstes based on B2C platform, the possble rsks of actual applcaton are ponted out. The work provdes a relable gudance for ensurng customer nformaton securty and for completng the management system of customer nformaton n e-commerce webstes based on B2C platform. Usng SPI nterface technology n e-commerce cloud data processng can buld dversfed cloud data processng model for users, and satsfy all requrements of deployments and utlzaton of e-commerce data resources. Acknowledgements Ths study has been fnancally supported by Humantes and Socal Scence Youth Fund Proect of Mnstry of Educaton (No.13YJCZH028). References [1] R. B. L, J. Y. Lu, S. Yuan and Y. L. Du, Study on Applcaton Software Update of the Mcro-Navgaton Computer by Seral Port, Mn-mcro Systems, vol. 12, no. 10, (2010), pp [2] N. He, W. M. F. Yun, C. P. Lu and J. Pe, Research on Sensor Technology Face to Wreless Sensor Network, Computer Applcatons and Software, vol. 19, no. 10, (2011), pp [3] P. L, L. K. Zeng, A. Z. Shu, X. L. Jn, Y. C. Lu and H. Wang, Desgn of Forecast System of Back Propagaton Neural Network Based on Matlab, Computer Applcatons and Software, vol. 17, no. 6, (2010), pp [4] B. L. Sh and W. Wang, The Survey of the Research on Data Warehouse and Data Mnng, Computer Applcatons and Software, vol. 15, no. 11, (2009), pp [5] J. H. Chen, Network Securty Data Transfer Method Research Based on Cloud Computng, Computer Smulaton, vol. 29, no. 8, (2012), pp [6] Z. B. Gan, C. Zeng, K. L and J. J. Han, Constructon and Optmzaton of Trust Network n E-Commerce Envronment, Chnese Journal of Computers, vol. 35, no. 1, (2012), pp [7] L. Xu, Y. Y. Zhang, J. Wu and B. Y. Fang, Network technology research under cloud computng envronment, Journal on Communcatons, vol. 33, no. 1, (2012), pp [8] M. M. Fu, Applcaton of Fuzzy Comprehensve Analyss to Informaton Securty Evaluaton, Journal of Southwest Jaotong Unversty, vol. 45, no. 3, (2010), pp [9] D. P. Zhang, K. Ca, M. Zhang and Z. Xu, The Research of Cloud Computng Data Securty Support Platform Archtecture, Journal of Computer Research and Development, vol. 48, no. S3, (2011), pp [10] C. F. Yang, G. Wang and J. H. S, Buld New Generaton EAI Based on SOA, Computer Applcatons and Software, vol. 22, no. 10, (2005), pp [11] IBM Cognos&Busness Intellgence, (2010). Copyrght c 2014 SERSC 289

8 Internatonal Journal of Securty and Its Applcatons Authors We Da, he receved hs M.S.E. n Computer Scence and Technology (2006) and PhD n Computer Applcaton Technology (2012) from Wuhan Unversty of Technology. Now he s full researcher of nformatcs at Economcs and Management Department, Hube Polytechnc Unversty. Hs current research nterests nclude dfferent aspects of Intellgence Computng and Informaton Systems. Xuefang Zhang, she receved her B.B.M. n Fnance (2004) and M.Ec n Industral Economcs (2007) from Huazhong Agrcultural Unversty. Now she s full researcher of nformatcs at Economcs and Management Department, Hube Polytechnc Unversty. Her current research nterests nclude dfferent aspects of Fnancal Engneerng and Informaton Computng. Peng Hu, he receved hs B.S. n Mathematcs (2003) from Hube Normal Unversty and M.Sc. n Informaton Scences (2010) from Hube Unversty. Now he s full researcher of nformatcs at Mathematcs and Physcs Department, Hube Polytechnc Unversty. Hs current research nterests nclude dfferent aspects of Artfcal Intellgence and Informaton Codng. 290 Copyrght c 2014 SERSC

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises 3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

The Pricing Strategy of the Manufacturer with Dual Channel under Multiple Competitions

The Pricing Strategy of the Manufacturer with Dual Channel under Multiple Competitions Internatonal Journal of u-and e-servce, Scence and Technology Vol.7, No.4 (04), pp.3-4 http://dx.do.org/0.457/junnesst.04.7.4. The Prcng Strategy of the Manufacturer wth Dual Channel under Multple Compettons

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Waste to Energy System in Shanghai City

Waste to Energy System in Shanghai City Waste to Energy System n Shangha Cty Group of Envronmental Systems, Department of Envronmental Studes M2 46876 Ya-Y Zhang 1. Introducton In the past ffteen years, the economcs of Chna has mantaned contnuously

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Pricing Model of Cloud Computing Service with Partial Multihoming

Pricing Model of Cloud Computing Service with Partial Multihoming Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting

Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting 161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN 978-88-9568-37-; ISSN 83-916 The Italan Assocaton of

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

B2C E-Commerce Websites Evaluation System on Users Experience Basis

B2C E-Commerce Websites Evaluation System on Users Experience Basis B2C E-Commerce Webstes Evaluaton System on Users Experence Bass 1 L Xul, 2 Zhao Ru, 3 Xao Yan 1, Frst Author Hebe Normal Unversty of Scence&Technology, Fance&Economcs College, Qnhuangdao, Hebe Provnce,

More information

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Sciences Shenyang, Shenyang, China.

Sciences Shenyang, Shenyang, China. Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

The Current Employment Statistics (CES) survey,

The Current Employment Statistics (CES) survey, Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,

More information

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM 1 WEIZHI LIAO, 2 LINFU SUN 1 School of Electromechancal Engneerng, UESTC of Chna, Chengdu 610054, Chna 2 CAD Engneerng Center, Southwest JIAOTONG

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Research of concurrency control protocol based on the main memory database

Research of concurrency control protocol based on the main memory database Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

A new anonymity-based protocol preserving privacy based cloud environment

A new anonymity-based protocol preserving privacy based cloud environment Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal

More information

Mathematical Framework for A Novel Database Replication Algorithm

Mathematical Framework for A Novel Database Replication Algorithm I.J.Modern Educaton and Computer Scence, 203, 9, -0 Publshed Onlne October 203 n MECS (http://www.mecs-press.org/) DOI: 0.585/jmecs.203.09.0 Mathematcal Framework for A Novel Database Replcaton Algorthm

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Power Consumption Optimization Strategy of Cloud Workflow. Scheduling Based on SLA

Power Consumption Optimization Strategy of Cloud Workflow. Scheduling Based on SLA Power Consumpton Optmzaton Strategy of Cloud Workflow Schedulng Based on SLA YONGHONG LUO, SHUREN ZHOU School of Computer and Communcaton Engneerng Changsha Unversty of Scence and Technology 960, 2nd Secton,

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Load Balancing By Max-Min Algorithm in Private Cloud Environment Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

Data security in Intelligent Transport Systems

Data security in Intelligent Transport Systems Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

14.74 Lecture 5: Health (2)

14.74 Lecture 5: Health (2) 14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,

More information

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract , pp.377-390 http://dx.do.org/10.14257/jsa.2016.10.4.34 Research on the Enterprse Performance Management Informaton System Development and Robustness Optmzaton based on Data Regresson Analyss and Mathematcal

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed

More information

Resource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid

Resource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid Proceedngs of the 200 4th Internatonal Conference on Computer Supported Cooperatve Work n Desgn Resource Schedulng Based on Dynamc Dependence Injecton n Vrtualzaton-based Smulaton Grd Hanbng Lu,Hongy Su,

More information

Analysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation *

Analysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation * Energy and Power Engneerng, 3, 5, 85-856 do:.436/ee.3.54b63 Publshed Onlne July 3 (htt://www.scr.org/journal/ee) Analyss and Modelng of Buck Converter n Dscontnuous-Outut-Inductor-Current Mode Oeraton

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

Oservce Vs. Sannet - Which One is Better?

Oservce Vs. Sannet - Which One is Better? o rcng n Compettve Telephony Markets Yung-Mng L nsttute of nformaton Management Natonal Chao Tung Unversty, Tawan 886-3-57111 Ext 57414 yml@mal.nctu.edu.tw Shh-Wen Chu nsttute of nformaton Management Natonal

More information

Modeling and Simulation of Multi-Agent System of China's Real Estate Market Based on Bayesian Network Decision-Making

Modeling and Simulation of Multi-Agent System of China's Real Estate Market Based on Bayesian Network Decision-Making Int. J. on Recent Trends n Engneerng and Technology, Vol. 11, No. 1, July 2014 Modelng and Smulaton of Mult-Agent System of Chna's Real Estate Market Based on Bayesan Network Decson-Makng Yang Shen, Shan

More information

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance J. Servce Scence & Management, 2010, 3: 143-149 do:10.4236/jssm.2010.31018 Publshed Onlne March 2010 (http://www.scrp.org/journal/jssm) 143 Allocatng Collaboratve Proft n Less-than-Truckload Carrer Allance

More information

Global innovative solutions You can rely on. www.calyon.com

Global innovative solutions You can rely on. www.calyon.com Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons

More information