Secure User Data in Cloud Computing Using Encryption Algorithms

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Secure User Data in Cloud Computing Using Encryption Algorithms"

Transcription

1 Scur Usr Data in Using Encrypt Algorithms Rachna Arora*, Anshu Parashar ** *(Rsarch Scholar, HCTM, Kaithal, Haryana) ** (Associat Profssor, HCTM, Kaithal, Haryana) ABSTRACT is transming inmat tchnology. As inmat and procsss ar migra to th cloud, it is transming not only whr compu is don, but also fundamntally, how it is don. As incrasingly mor corporat and acadmic worlds invst in this tchnology, it will also drastically chang IT profssals working nvironmnt. solvs many problms of convntal compu, including handling pak loads, installing softwar updats, and, using xcss compu cycls. Howvr, th nw tchnology has also cratd nw challngs such as data scurity, data ownrship and trans-cod data storag. In this papr w hav discussd about cloud compu scurity issus, mchanism, challngs that cloud srvic r fac during cloud nginring and prsntd th mtaphoric study of various scurity algorithms. Kywords - Algorithms:, Blowfish, DES, RSA,, Data Scurity I. INTRODUCTION is th ability to accss a pool of compu rsourcs ownd and maintaind by a third party via th Intrnt. It is not a nw tchnology but a way of dlivring compu rsourcs basd on long xis tchnologis such as srvr virtualizat. Th cloud is composd of hardwar, storag, ntworks, intrfacs, and srvics that th mans through which usrs can accss th infrastructurs, compu powr, applicats, and srvics on dmand which ar indpndnt of locats. compu usually involvs th transfr, storag, and procssing of inmat on th rs infrastructur, which is not includd in th customrs control policy. Th concpt is linkd closly with thos of Inmat as a Srvic (IaaS), Platm as a Srvic (PaaS), Softwar as a Srvic (SaaS) all of which mans a srvic orintd architctur [1]. Hr coms th first bnfit of th i.. it rducs th cost of hardwar that could hav bn usd at usr nd. As thr is no nd to stor data at usr s nd bcaus it is alrady at som othr locat. So instad of buying th whol infrastructur rquird to run th procsss and sav bulk of data which You ar just rn th assts according to your rquirmnts. Th similar ida is bhind all cloud ntworks [2]. It uss rmot srvics through a ntwork using various rsourcs. It is basically mant to giv maximum with th minimum rsourcs i.. th usr nd is having th minimum hardwar rquirmnt but is using th maximum capability of compu. This is possibl only through this tchnology which rquirs and utilizs its rsourcs in th bst way. Th advantag of cloud compu ovr tradital compu includ: agility, lowr ntry cost, dvic indpndncy, locat indpndncy, and scalability [1]. In ordr to solv th problm of data intgrity chcking, many schms ar proposd undr diffrnt systms and scurity modls [2], [3], [4], [5], [6]. In all ths works, grat fts ar mad to dsign soluts that mt various rquirmnts: high schm fficincy, statlss vrificat, unboundd us of quris and rtrivability of data, tc. Considring th rol of th vrifir in th modl all th schms prsntd b fall into two catgoris: privat auditability and public auditability. Although schms with privat auditability can achiv highr schm fficincy, public auditability allows anyon not just th clint (data ownr), to challng th cloud srvr corrctnss of data storag whil kping no privat inmat. II. SECURITY ISSUES AND CHALLENGES OF CLOUD COMPUTING Scurity is considrd as on of th most critical aspcts in vryday compu and it is not diffrnt cloud compu du to snsitivity and importanc of data stord on th cloud. infrastructur uss nw tchnologis and srvics, most of which havn t bn fully valuatd with rspct to th scurity. has svral major issus and concrns, such as data scurity, trust, xpctats, rgulats, and prmancs issus. On issu with cloud compu is that th managmnt of th data which might not b fully trustworthy; th risk of malicious insidrs in th cloud and th failur of cloud srvics hav rcivd a strong attnt by companis P a g

2 Whnvr w discussd about scurity of cloud compu, thr ar various scurity issus aris in path of cloud. Som of th scurity concrns and soluts of thm ar listd and dirctd blow: 2.1 SECURITY CONCERN 1 With th cloud physical scurity is lost bcaus of sharing compu rsourcs with othr companis. No knowldg or control of whr th rsourcs run. ENSUE: Scur Data Transfr 2.2 SECURITY CONCERN 2 Ensuring th intgrity of th data (transfr, storag, and rtrival) rally mans that it changs only in rspons to authorizd transacts. A common standard to nsur data intgrity dos not yt xists. ENSUE: Scur Softwar Intrfacs 2.3 SECURITY CONCERN 3 Customr may b abl to su cloud srvic rs if privacy rights ar violatd, and in any cas th cloud srvic rs may fac damag to thir rputat. Concrns aris whn it is not clar to individuals why thir prsonal inmat is rqustd or how it will b usd or passd on to othr partis. ENSUE: Data Sparat 2.4 SECURITY CONCERN 4 Who controls th / kys? Logically it should b th customr. ENSUE: Scur Stord Data 2.5 SECURITY CONCERN 5 In cas of Paymnt Card Industry Data Scurity Standard (PCI DSS) data logs must b to scurity mangrs and rgulators [6], [7], [8]. ENSUE: Usr Accss Control III. PROBLEM FORMULATION Thr ar various policis issus and thrats in cloud compu tchnology which includ privacy, sgrgat, storag, rliability, scurity, capacity and mor. But most important among ths to concrn is scurity and how srvic r assurs it to maintain. Gnrally cloud compu has svral customrs such as ordinary usrs, acadmia and ntrpriss who hav diffrnt motivats to mov to cloud. If cloud clints ar acadmia, scurity ffct on prmanc of compu and thm cloud rs hav to find a way to combin scurity and prmanc. For ntrpriss most important problm is also scurity but with diffrnt vis. So, w mainly concntrat on USER_CLOUD scurity of cloud compu using algorithm using particular proposd plan. IV. PROPOSED WORK PLAN W hav proposd diffrnt scurity algorithms to liminat th concrns rgarding data loss, sgrgat and privacy whil accssing wb applicat on cloud. Algorithms lik: RSA, DES,, Blowfish hav bn usd and comparativ study among thm hav also bn prsntd to nsur th scurity of data on cloud. DES,, Blowfish ar symmtric ky algorithms, in which a singl ky is usd / of mssags whras DES (Data Encrypt Standard) was dvlopd in arly 1970s by IBM. Blowfish was dsignd by Bruc Schnir in 1993, xprssly us in prmanc constraind nvironmnts such as mbddd systm. (Advancd Encrypt Standard) was dsignd by NIST in RSA is a public ky algorithm invntd by Rivst, Shamir and Adlman in 1978 and also calld as Asymmtric ky algorithm, th algorithm that uss diffrnt kys and purposs. Th ky sizs of all th algorithms ar diffrnt from ach othr. Th ky lngth of DES algorithm is 56. Th ky siz of algorithm is 128, 192, 256. Th ky siz of Blowfish algorithm is Th ky siz of RSA algorithm is Using Nt bans IDE 7.3, and Java Run Tim Environmnt, w hav implmntd our ida in th m of and algorithms which hav discussd abov and also w hav mad comparison btwn thm on th basis of thir charactristics. V. SECURITY ALGORITHM USED IN CLOUD COMPUTING 5.1 RSA ALGORITHM Th most common Public Ky algorithm is RSA, namd its invntors Rivst, Shamir, and Adlman (RSA). RSA is basically an asymmtric / algorithm. It is asymmtric in th sns, that hr public ky distributd to all through which on can th mssag and privat ky which is usd is kpt scrt and is not shard to vryon. How RSA is going to work in cloud nvironmnt is xplaind as: RSA algorithm is usd to nsur th scurity of data in cloud compu. In RSA algorithm w hav d our data to scurity. Th purpos of scuring data is that only concrnd and authorizd usrs can accss it. Aftr data is stord in th cloud. So that whn it is rquird thn a rqust can b placd to cloud r. r authnticats th usr and dlivrs th data to usr. As RSA is a Block Ciphr in which vry mssag is mappd to an intgr. In th proposd cloud nvironmnt, Public known to all, whras Privat Ky known only to usr who originally owns th data. Thus 1923 P a g

3 is don by th cloud srvic r and is don by th cloud usr or consumr. Onc th data is d with th Public ky, it will b d using th corrsponding Privat Ky only. 5.2 ALGORITHM Advancd Encrypt Standard (), also known as Rijindal is usd scuring inmat. is a symmtric block ciphr that has bn analyzd xtnsivly and is usd widly now-a-days. How works in cloud nvironmnt?, symmtric ky algorithm is usd with ky lngth of 128- this purpos. As is usd widly now-a-days scurity of cloud. Implmntat proposal stats that First, Usr dcids to us cloud srvics and will migrat his data on cloud. Thn Usr submits his srvics rquirmnts with Srvic Providr (CSP) and chooss bst spcifid srvics offrd by r. Whn migrat of data to th chosn CSP happns and in futur whnvr an applicat uploads any data on cloud, th data will first d using algorithm and thn snt to r. Onc d, data is uploadd on th cloud, any rqust to rad th data will occur aftr it is d on th usrs nd and thn plain txt data can b rad by usr. Th plain txt data is nvr writtn anywhr on cloud. This includs all typs of data. This solut is transparnt to th applicat and can b intgratd quickly and asily without any changs to applicat. Th nvr stord nxt to th d data, sinc it may compromis th ky also. To stor th kys, a physical ky managmnt srvr can b installd in th usr s prmiss. This protcts data and kys and guarants that thy rmain undr usr s control and will nvr b xposd in storag or in transit. has rplacd th DES as approvd standard a wid rang of applicats. 5.3 DES ALGORITHM Th Data Encrypt Standard (DES) is a block ciphr. It s data in blocks of siz 64 ach. That is 64 of plain txt gos as input to DES, which producs 64 of ciphr txt. Th sam algorithm and ky ar usd and, with minor diffrncs. Th ky lngth of this algorithm is 56 ; howvr a 64 actually input. DES is thr a symmtric ky algorithm. 5.4 BLOWFISH ALGORITHM Blowfish is a symmtric ky cryptographic algorithm. Blowfish s 64 bit blocks with a variabl lngth ky of According to Schnir, Blowfish was dsignd with th followings objctivs in mind: a) Fast- Blowfish rat on 32-bit microprocssors is 26 clock cycls pr byt. b) Compact- Blowfish can xcut in lss 5 kb mmory. c) Simpl-Blowfish uss only primitiv oprat -s, such as addit, XOR and tabl look up, making its dsign and implmntat simpl. d) Scur- Blowfish has a variabl ky lngth up to maximum of 448-bit long, making it scur and flxibl. Blowfish suits applicats whr th ky rmains constant a long tim (.g. Communicats link ), but not whr th ky changs frquntly (.g. Packt Switching). 5.5 IMPLEMENTATION AND RESULTS Implmntat of algorithms has bn don using NtBans IDE with Java. Coding s usd algorithms hav shown blow: Coding 1 usd making data scur Coding 2 usd making data scur 5.6 RESULTS CHARACTERISTICS AND COMPARISON OF ALGORITHMS TABLE 1 Charact RSA BLOW DES ristics Platm Ky Siz 128,19 2, FISH Ky Usd Sam Public Sam For 1924 P a g

4 Scalabilit y Initial Vctor Siz Scurity Data Encrypti on Capacity Authnti cat Typ Mmory Usag Excutio n Tim usd to and th blocks. 128 Scur r and usr. Usd of larg amount of data Bst authnt icity r Low RAM ndd Fastr othrs usd and privat ky, Not 1024 Scur usr only Usd of small data Robust authnt ic impl mntat Highst mmor y usag algorith m Rquir s maxim um tim usd and of data. and sam usd Scur rs and usr/cli nt sid Lss Compa rabl to Can xcut in lss 5 kb Lssr tim to xcut Scurit y applid to rs and usr Lss Lss authnt ic. Mor Equals to VI. CONCLUSION AND FUTURE PROSPECTS In this papr algorithms hav bn proposd to mak cloud data scur, vulnrabl and gav concrn to scurity issus, challngs and also comparisons hav bn mad btwn, DES, Blowfish and RSA algorithms to find th bst on scurity algorithm, which has to b usd in cloud compu making cloud data scur and not to b hackd by attackrs. Encrypt algorithms play an important rol in data scurity on cloud and by comparison of diffrnt paramtrs usd in algorithms, it has bn found that algorithm uss last tim to xcut cloud data. Blowfish algorithm has last mmory rquirmnt. DES algorithm consums last tim. RSA consums longst mmory siz and tim. By doing implmntat all algorithms in IDE tool and JDK 1.7, th dsird output th data on cloud compu has bn achivd. In today s ra dmand of cloud is incrasing so th scurity of th cloud and usr is on top concrn. Hnc, proposd algorithms ar hlpful today s rquirmnt. In futur svral comparisons with diffrnt approachs and rsults to show ffctivnss of proposd framwork can b d. ACKNOWLEDGEMENT Our Thanks to HCTM, Kaithal dvlopmnt of this papr. REFERENCES Journal Paprs: [1] Zhidong Shn, Li Li, Fi Yan, Xiaoping Wu, Systm Basd on Trustd Platm, Intrnatal Confrnc on Intllignt tat Tchnology and Automat, Volum 1, May 2010, On pag(s): [2] Parson, S., Bnamur, A., Privacy, Scurity and Trust Issus Ariss from, Tchnology and Scinc (Com), IEEE Scond Intrnatal Confrnc 2010, On pag(s): [3] Rohit Bhadauria and Sugata Sanyal, A Survy on Scurity Issus in and Associatd Mitigat Tchniqus. Intrnatal Journal of tr Applicats, Volum 47- Numbr 18, Jun 2012, On pag(s): [4] Mohammd, E.M, Amblkadar, H.S, Enhancd Data Scurity Modl on, 8 th Intrnatal Confrnc on IEEE publicat 2012, On pag(s): cc-12- cc-17 [5] Sang Ho. Na, Jun-Young Park, Eui- Nam Huh, Prsonal Scurity Framwork, Srvic Confrnc (APSSC), Dc 2010 IEEE, On pag(s): [6] Wang, J.K.; Xinpi Jia, Data Scurity and Authnticat in hybrid cloud compu modl, Global High Tch Congrss on Elctronics (GHTCE), 2012 IEEE, On pag(s): [7] Ptr Mll, Timothy Granc, Th NIST Dfinit of, January t-sp _cloud-dfinit.pdf P a g

5 [8] Iankoulova, I.; Danya, M., compu scurity rquirmnts: A systmatic rviw, Rsarch Challngs in Inmat Scinc (RCIS), Sixth Intrnatal Confrnc on, 2012, On pag(s): 1-7. [9] Scurity Allianc, Top Thrats to V1.0, ianc.org/topthrats. [10] Lizh Wang, Grgor von Laszwski, Marcl Kunz, Ji Tao, Chng Fu, Xi H, Andrw Young, : A Prspctiv Study, Nw Gnrat - Advancs of Distributd Inmat Procssing, Volum 28, Issu 2, April 2010, On pag(s): [11] Punt Jai Kaur, Sakshi Kaushal, Scurity Concrns in, Communicat in tr and Inmat Scinc Volum 169 in 2011, On pag(s): [12] Shui Zhang, Shufn Zhang, Xubin Chn, Xiuzhn Huo, Rsarch and Dvlopmnt Trnd, Scond Intrnatal Confrnc on Futur Ntworks (ICFN), IEEE Publicats, January 2010, On pag(s): [13] Parson, S., Bnamur, A., Privacy, Scurity and Trust Issus Ariss from, Tchnology and Scinc (Com), IEEE Scond Intrnatal Confrnc,2010, On pag(s): Books: [14] McGraw Hill,, A Practical Approach, By Toby Vlt, Anthony Vlt, Robrt Elsnptr. [15] Furht,B., and Escalant,A. (2010). Handbook of. Nw York: Springr. Chaptrs in Books: [16] Toby Vlt, Anthony Vlt, and Robrt Elsnptr,, A Practical Approach, Chaptr 8, Storag, in 2012, On pag(s): [17] Vams Krishna Yarlagadda and Sriram Ramanujam, Data Scurity in, Volum 2 (1) in 2011, On pag(s): Procding Paprs: [18] W.J. Book, Europan Ntwork and Inmat Scurity Agncy (ENISA), 29 th IEEE Confrnc on Bnfits, Risks and Rcommndats P a g

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE) Publishd by Intrnational Organization of IOTPE ISSN 077-358 IJTPE Journal www.iotp.com ijtp@iotp.com Sptmbr 015 Issu 4 Volum 7

More information

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly

More information

EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS

EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS 25 Vol. 3 () January-March, pp.37-5/tripathi EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS *Shilpa Tripathi Dpartmnt of Chmical Enginring, Indor Institut

More information

Adverse Selection and Moral Hazard in a Model With 2 States of the World

Adverse Selection and Moral Hazard in a Model With 2 States of the World Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,

More information

Rural and Remote Broadband Access: Issues and Solutions in Australia

Rural and Remote Broadband Access: Issues and Solutions in Australia Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity

More information

An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore

An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore Intrnational Journal of mrging Tchnology and dvancd nginring Wbsit: www.ijta.com (ISSN 2250-2459, Volum 2, Issu 4, pril 2012) n road outlin of Rdundant rray of Inxpnsiv isks Shaifali Shrivastava 1 partmnt

More information

CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises

CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY Outcom 10 Rgulation 11 Safty and Suitability of Prmiss CQC Rf 10A 10A(1) Lad Dirctor / Lad Officr Rspons Impact Liklihood Lvl of Concrn

More information

ITIL & Service Predictability/Modeling. 2006 Plexent

ITIL & Service Predictability/Modeling. 2006 Plexent ITIL & Srvic Prdictability/Modling 1 2 Plxnt Th Company 2001 Foundd Plxnt basd on an Expandd ITIL Architctur, CMMI, ISO, and BS15000 - itdna 2003 Launchd itdna Srvic Offring 2003 John Groom, past Dirctor

More information

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13) con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc

More information

Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.

Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives. Volum 3, Issu 6, Jun 2013 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: wwwijarcsscom Dynamic Ranking and Slction of Cloud

More information

Contents. Presentation contents: Basic EDI dataflow in Russia. eaccounting for HR and Payroll. eaccounting in a Cloud

Contents. Presentation contents: Basic EDI dataflow in Russia. eaccounting for HR and Payroll. eaccounting in a Cloud Accounting Contnts Prsntation contnts: Basic EDI dataflow in Russia Accounting for HR and Payroll Accounting in a Cloud Basic EDI Procss Flow Typs of documnts for EDI Lgally rquird documnts: Act of accptanc

More information

A Secure Web Services for Location Based Services in Wireless Networks*

A Secure Web Services for Location Based Services in Wireless Networks* A Scur Wb Srvics for Location Basd Srvics in Wirlss Ntworks* Minsoo L 1, Jintak Kim 1, Shyun Park 1, Jail L 2 and Sokla L 21 1 School of Elctrical and Elctronics Enginring, Chung-Ang Univrsity, 221, HukSuk-Dong,

More information

Personal Identity Verification (PIV) Enablement Solutions

Personal Identity Verification (PIV) Enablement Solutions Prsonal Idntity Vrification (PIV) Enablmnt Solutions pivclass Govrnmnt Solutions Affordabl Prsonal Idntity Vrification (PIV) Enablmnt Solutions from a Singl, Trustd Supplir Complt Solution for PIV Enablmnt

More information

REPORT' Meeting Date: April 19,201 2 Audit Committee

REPORT' Meeting Date: April 19,201 2 Audit Committee REPORT' Mting Dat: April 19,201 2 Audit Committ For Information DATE: March 21,2012 REPORT TITLE: FROM: Paul Wallis, CMA, CIA, CISA, Dirctor, Intrnal Audit OBJECTIVE To inform Audit Committ of th rsults

More information

Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131

Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131 Sci.Int.(Lahor),26(1),131-138,214 ISSN 113-5316; CODEN: SINTE 8 131 REQUIREMENT CHANGE MANAGEMENT IN AGILE OFFSHORE DEVELOPMENT (RCMAOD) 1 Suhail Kazi, 2 Muhammad Salman Bashir, 3 Muhammad Munwar Iqbal,

More information

Architecture of the proposed standard

Architecture of the proposed standard Architctur of th proposd standard Introduction Th goal of th nw standardisation projct is th dvlopmnt of a standard dscribing building srvics (.g.hvac) product catalogus basd on th xprincs mad with th

More information

Parallel and Distributed Programming. Performance Metrics

Parallel and Distributed Programming. Performance Metrics Paralll and Distributd Programming Prformanc! wo main goals to b achivd with th dsign of aralll alications ar:! Prformanc: th caacity to rduc th tim to solv th roblm whn th comuting rsourcs incras;! Scalability:

More information

Continuity Cloud Virtual Firewall Guide

Continuity Cloud Virtual Firewall Guide Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY

More information

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book. Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl

More information

Moving Securely Around Space: The Case of ESA

Moving Securely Around Space: The Case of ESA Moving Scurly Around Spac: Th Cas of ESA Prpard By: Andra Baldi, Jos Frnandz Balsiro, Marco Incollingo Tommaso Parrinllo, Cristiano Silvagni, Stfano Zatti Europan Spac Agncy Andra.Baldi@sa.int ESA Scnario

More information

IBM Healthcare Home Care Monitoring

IBM Healthcare Home Care Monitoring IBM Halthcar Hom Car Monitoring Sptmbr 30th, 2015 by Sal P. Causi, P. Eng. IBM Halthcar Businss Dvlopmnt Excutiv scausi@ca.ibm.com IBM Canada Cloud Computing Tigr Tam Homcar by dfinition 1. With a gnsis

More information

Maintain Your F5 Solution with Fast, Reliable Support

Maintain Your F5 Solution with Fast, Reliable Support F5 SERVICES TECHNICAL SUPPORT SERVICES DATASHEET Maintain Your F5 Solution with Fast, Rliabl Support In a world whr chang is th only constant, you rly on your F5 tchnology to dlivr no mattr what turns

More information

Cisco Data Virtualization

Cisco Data Virtualization Cisco Data Virtualization Big Data Eco-systm Discussion with Bloor Group Bob Ev, David Bsmr July 2014 Cisco Data Virtualization Backgroundr Cisco Data Virtualization is agil data intgration softwar that

More information

Hardware Modules of the RSA Algorithm

Hardware Modules of the RSA Algorithm SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 11, No. 1, Fbruary 2014, 121-131 UDC: 004.3`142:621.394.14 DOI: 10.2298/SJEE140114011S Hardwar Moduls of th RSA Algorithm Vlibor Škobić 1, Branko Dokić 1,

More information

Developing Economies and Cloud Security: A Study of Africa Mathias Mujinga School of Computing, University of South Africa mujinm@unisa.ac.

Developing Economies and Cloud Security: A Study of Africa Mathias Mujinga School of Computing, University of South Africa mujinm@unisa.ac. Journal of Emrging Trnds in Computing and Information Scincs 2009-2012 CIS Journal. All rights rsrvd. Dvloping Economis and Cloud Scurity: A Study of Africa Mathias Mujinga School of Computing, Univrsity

More information

A Project Management framework for Software Implementation Planning and Management

A Project Management framework for Software Implementation Planning and Management PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis Kith.Lancastr@LancastrStratgis.com Th goal of introducing nw tchnologis into your company

More information

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling Planning and Managing Coppr Cabl Maintnanc through Cost- Bnfit Modling Jason W. Rup U S WEST Advancd Tchnologis Bouldr Ky Words: Maintnanc, Managmnt Stratgy, Rhabilitation, Cost-bnfit Analysis, Rliability

More information

Non-Homogeneous Systems, Euler s Method, and Exponential Matrix

Non-Homogeneous Systems, Euler s Method, and Exponential Matrix Non-Homognous Systms, Eulr s Mthod, and Exponntial Matrix W carry on nonhomognous first-ordr linar systm of diffrntial quations. W will show how Eulr s mthod gnralizs to systms, giving us a numrical approach

More information

Lecture 3: Diffusion: Fick s first law

Lecture 3: Diffusion: Fick s first law Lctur 3: Diffusion: Fick s first law Today s topics What is diffusion? What drivs diffusion to occur? Undrstand why diffusion can surprisingly occur against th concntration gradint? Larn how to dduc th

More information

Product Overview. Version 1-12/14

Product Overview. Version 1-12/14 Product Ovrviw Vrsion 1-12/14 W ar Grosvnor Tchnology Accss Control Solutions W dvlop, manufactur and provid accss control and workforc managmnt solutions th world ovr. Our product offring ompasss hardwar,

More information

Exponential Growth and Decay; Modeling Data

Exponential Growth and Decay; Modeling Data Exponntial Growth and Dcay; Modling Data In this sction, w will study som of th applications of xponntial and logarithmic functions. Logarithms wr invntd by John Napir. Originally, thy wr usd to liminat

More information

Deer: Predation or Starvation

Deer: Predation or Starvation : Prdation or Starvation National Scinc Contnt Standards: Lif Scinc: s and cosystms Rgulation and Bhavior Scinc in Prsonal and Social Prspctiv s, rsourcs and nvironmnts Unifying Concpts and Procsss Systms,

More information

Data Encryption and Decryption Using RSA Algorithm in a Network Environment

Data Encryption and Decryption Using RSA Algorithm in a Network Environment IJCSNS Intrnational Journal of Computr Scinc and Ntwork Scurity, VOL.13 No.7, July 2013 9 Data Encryption and Dcryption Using RSA Algorithm in a Ntwork Environmnt Nntaw Y. Goshw. Dpartmnt of Elctrical/Elctronics

More information

Designing a Secure DNS Architecture

Designing a Secure DNS Architecture WHITE PAPER Dsigning a Scur DNS Architctur In today s ntworking landscap, it is no longr adquat to hav a DNS infrastructur that simply rsponds to quris. What is ndd is an intgratd scur DNS architctur that

More information

Universities as role models for sustainable development

Universities as role models for sustainable development EUA Annual confrnc "Th Sustainability of Europan Univrsitis", Warwick, 120322-23. Sssion - "Sustainabl Campuss" Univrsitis as rol modls for sustainabl dvlopmnt Pam Frdman Vic-Chancllor /miljo Structur

More information

union scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME!

union scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME! union scholars YOU CAN CHANGE THE WORLD... program AND EARN MONEY FOR COLLEGE AT THE SAME TIME! AFSCME Unitd Ngro Collg Fund Harvard Univrsity Labor and Worklif Program APPLICATION DEADLINE: FEBRUARY 28

More information

Enforcing Fine-grained Authorization Policies for Java Mobile Agents

Enforcing Fine-grained Authorization Policies for Java Mobile Agents Enforcing Fin-graind Authorization Policis for Java Mobil Agnts Giovanni Russllo Changyu Dong Narankr Dulay Dpartmnt of Computing Imprial Collg London South Knsington London, SW7 2AZ, UK {g.russllo, changyu.dong,

More information

Asset set Liability Management for

Asset set Liability Management for KSD -larning and rfrnc products for th global financ profssional Highlights Library of 29 Courss Availabl Products Upcoming Products Rply Form Asst st Liability Managmnt for Insuranc Companis A comprhnsiv

More information

7 Timetable test 1 The Combing Chart

7 Timetable test 1 The Combing Chart 7 Timtabl tst 1 Th Combing Chart 7.1 Introduction 7.2 Tachr tams two workd xampls 7.3 Th Principl of Compatibility 7.4 Choosing tachr tams workd xampl 7.5 Ruls for drawing a Combing Chart 7.6 Th Combing

More information

Foreign Exchange Markets and Exchange Rates

Foreign Exchange Markets and Exchange Rates Microconomics Topic 1: Explain why xchang rats indicat th pric of intrnational currncis and how xchang rats ar dtrmind by supply and dmand for currncis in intrnational markts. Rfrnc: Grgory Mankiw s Principls

More information

Important Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2

Important Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2 Installation and Opration Intrnt Tlphony Adaptr Aurswald Box Indx C I R 884264 03 02/05 Call Duration, maximum...10 Call Through...7 Call Transportation...7 Calls Call Through...7 Intrnt Tlphony...3 two

More information

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim

More information

Global Sourcing: lessons from lean companies to improve supply chain performances

Global Sourcing: lessons from lean companies to improve supply chain performances 3 rd Intrnational Confrnc on Industrial Enginring and Industrial Managmnt XIII Congrso d Ingniría d Organización Barclona-Trrassa, Sptmbr 2nd-4th 2009 Global Sourcing: lssons from lan companis to improv

More information

Improving Managerial Accounting and Calculation of Labor Costs in the Context of Using Standard Cost

Improving Managerial Accounting and Calculation of Labor Costs in the Context of Using Standard Cost Economy Transdisciplinarity Cognition www.ugb.ro/tc Vol. 16, Issu 1/2013 50-54 Improving Managrial Accounting and Calculation of Labor Costs in th Contxt of Using Standard Cost Lucian OCNEANU, Constantin

More information

WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769

WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769 08-16-85 WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769 Summary of Dutis : Dtrmins City accptanc of workrs' compnsation cass for injurd mploys; authorizs appropriat tratmnt

More information

Installation Saving Space-efficient Panel Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison

Installation Saving Space-efficient Panel Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison Contnts Tchnology Nwly Dvlopd Cllo Tchnology Cllo Tchnology : Improvd Absorption of Light Doubl-sidd Cll Structur Cllo Tchnology : Lss Powr Gnration Loss Extrmly Low LID Clls 3 3 4 4 4 Advantag Installation

More information

Lecture 20: Emitter Follower and Differential Amplifiers

Lecture 20: Emitter Follower and Differential Amplifiers Whits, EE 3 Lctur 0 Pag of 8 Lctur 0: Emittr Followr and Diffrntial Amplifirs Th nxt two amplifir circuits w will discuss ar ry important to lctrical nginring in gnral, and to th NorCal 40A spcifically.

More information

QUANTITATIVE METHODS CLASSES WEEK SEVEN

QUANTITATIVE METHODS CLASSES WEEK SEVEN QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.

More information

Analyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop

Analyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop Intrnational Journal of Computr Scinc and Enginring Opn Accss Rsarch Papr Volum-2, Issu-1 E-ISSN: 2347-2693 Analyzing Failurs of a Smi-Structurd Suprcomputr Log Fil Efficintly by Using PIG on Hadoop Madhuri

More information

User-Perceived Quality of Service in Hybrid Broadcast and Telecommunication Networks

User-Perceived Quality of Service in Hybrid Broadcast and Telecommunication Networks Usr-Prcivd Quality of Srvic in Hybrid Broadcast and Tlcommunication Ntworks Michal Galtzka Fraunhofr Institut for Intgratd Circuits Branch Lab Dsign Automation, Drsdn, Grmany Michal.Galtzka@as.iis.fhg.d

More information

Review and Analysis of Cloud Computing Quality of Experience

Review and Analysis of Cloud Computing Quality of Experience Rviw and Analysis of Cloud Computing Quality of Exprinc Fash Safdari and Victor Chang School of Computing, Crativ Tchnologis and Enginring, Lds Mtropolitan Univrsity, Hadinly, Lds LS6 3QR, U.K. {F.Safdari,

More information

Remember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D

Remember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D 24+ Advancd Larning Loan Application form Rmmbr you can apply onlin. It s quick and asy. Go to www.gov.uk/advancdlarningloans About this form Complt this form if: you r studying an ligibl cours at an approvd

More information

Category 7: Employee Commuting

Category 7: Employee Commuting 7 Catgory 7: Employ Commuting Catgory dscription This catgory includs missions from th transportation of mploys 4 btwn thir homs and thir worksits. Emissions from mploy commuting may aris from: Automobil

More information

Gold versus stock investment: An econometric analysis

Gold versus stock investment: An econometric analysis Intrnational Journal of Dvlopmnt and Sustainability Onlin ISSN: 268-8662 www.isdsnt.com/ijds Volum Numbr, Jun 202, Pag -7 ISDS Articl ID: IJDS20300 Gold vrsus stock invstmnt: An conomtric analysis Martin

More information

Scalable Transactions for Web Applications in the Cloud using Customized CloudTPS

Scalable Transactions for Web Applications in the Cloud using Customized CloudTPS Shashikant Mahadu Bankar/ (IJCSIT) Intrnational Journal of Computr Scinc and Information Tchnologis, Vol. (3), 2015, 218-2191 Scalabl Transactions for Wb Applications in th Cloud using Customizd CloudTPS

More information

The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization

The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization 3 Procdings IEEE INFOCOM Th Constraind Ski-Rntal Problm and its Application to Onlin Cloud Cost Optimization Ali Khanafr, Murali Kodialam, and Krishna P. N. Puttaswam Coordinatd Scinc Laborator, Univrsit

More information

Combinatorial Analysis of Network Security

Combinatorial Analysis of Network Security Combinatorial Analysis of Ntwork Scurity Stvn Nol a, Brian O Brry a, Charls Hutchinson a, Sushil Jajodia a, Lynn Kuthan b, and Andy Nguyn b a Gorg Mason Univrsity Cntr for Scur Information Systms b Dfns

More information

Traffic Flow Analysis (2)

Traffic Flow Analysis (2) Traffic Flow Analysis () Statistical Proprtis. Flow rat distributions. Hadway distributions. Spd distributions by Dr. Gang-Ln Chang, Profssor Dirctor of Traffic safty and Oprations Lab. Univrsity of Maryland,

More information

Data warehouse on Manpower Employment for Decision Support System

Data warehouse on Manpower Employment for Decision Support System Data warhous on Manpowr Employmnt for Dcision Support Systm Amro F. ALASTA, and Muftah A. Enaba Abstract Sinc th us of computrs in businss world, data collction has bcom on of th most important issus du

More information

C H A P T E R 1 Writing Reports with SAS

C H A P T E R 1 Writing Reports with SAS C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd

More information

SCHOOLS' PPP : PROJECT MANAGEMENT

SCHOOLS' PPP : PROJECT MANAGEMENT Rport Schools' PPP Sub Committ 22 April 2004 2 SCHOOLS' PPP : PROJECT MANAGEMENT 1 Rason for Rport To provid Mmbrs with information on th structur of th Schools' PPP Projct Tam 2 Background 21 Dumfris

More information

A Note on Approximating. the Normal Distribution Function

A Note on Approximating. the Normal Distribution Function Applid Mathmatical Scincs, Vol, 00, no 9, 45-49 A Not on Approimating th Normal Distribution Function K M Aludaat and M T Alodat Dpartmnt of Statistics Yarmouk Univrsity, Jordan Aludaatkm@hotmailcom and

More information

Swisscom Cloud Strategy & Services

Swisscom Cloud Strategy & Services Swisscom Stratgy & Srvics Swisscom our 360 On for Entrpris Workloads and Wb Srvics Dynamic Computing Srvics Our intgratd approach is uniqu B2C B2B Ntwork, infrastructur and IT from a singl sourc All Industris

More information

Intermediate Macroeconomic Theory / Macroeconomic Analysis (ECON 3560/5040) Final Exam (Answers)

Intermediate Macroeconomic Theory / Macroeconomic Analysis (ECON 3560/5040) Final Exam (Answers) Intrmdiat Macroconomic Thory / Macroconomic Analysis (ECON 3560/5040) Final Exam (Answrs) Part A (5 points) Stat whthr you think ach of th following qustions is tru (T), fals (F), or uncrtain (U) and brifly

More information

Genetic Drift and Gene Flow Illustration

Genetic Drift and Gene Flow Illustration Gntic Drift and Gn Flow Illustration This is a mor dtaild dscription of Activity Ida 4, Chaptr 3, If Not Rac, How do W Explain Biological Diffrncs? in: How Ral is Rac? A Sourcbook on Rac, Cultur, and Biology.

More information

LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W

LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W Cllo Tchnology LG has introducd th NON 2, with nwly dvlopd Cllo Tchnology which improvs prformanc and rliability. Up to 320W 300W Cllo Tchnology Cll Connction Elctrically Low Loss Low Strss Optical Absorption

More information

The Matrix Exponential

The Matrix Exponential Th Matrix Exponntial (with xrciss) 92.222 - Linar Algbra II - Spring 2006 by D. Klain prliminary vrsion Corrctions and commnts ar wlcom! Th Matrix Exponntial For ach n n complx matrix A, dfin th xponntial

More information

Defining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind

Defining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind Dfining Rtirmnt Succss for Dfind Contribution Plan Sponsors: Bgin with th End in Mind David Blanchtt, CFA, CFP, AIFA Had of Rtirmnt Rsarch Morningstar Invstmnt Managmnt david.blanchtt@morningstar.com Nathan

More information

intro Imagine that someone asked you to describe church using only the bible. What would you say to them?

intro Imagine that someone asked you to describe church using only the bible. What would you say to them? intro Imagin that somon askd you to dscrib church using only th bibl. What would you say to thm? So many of th things w'v mad church to b arn't ssntial in scriptur. W'r on a journy of r-imagining what

More information

14.3 Area Between Curves

14.3 Area Between Curves 14. Ara Btwn Curvs Qustion 1: How is th ara btwn two functions calculatd? Qustion : What ar consumrs and producrs surplus? Earlir in this chaptr, w usd dfinit intgrals to find th ara undr a function and

More information

SUBATOMIC PARTICLES AND ANTIPARTICLES AS DIFFERENT STATES OF THE SAME MICROCOSM OBJECT. Eduard N. Klenov* Rostov-on-Don. Russia

SUBATOMIC PARTICLES AND ANTIPARTICLES AS DIFFERENT STATES OF THE SAME MICROCOSM OBJECT. Eduard N. Klenov* Rostov-on-Don. Russia SUBATOMIC PARTICLES AND ANTIPARTICLES AS DIFFERENT STATES OF THE SAME MICROCOSM OBJECT Eduard N. Klnov* Rostov-on-Don. Russia Th distribution law for th valus of pairs of th consrvd additiv quantum numbrs

More information

Cookie Policy- May 5, 2014

Cookie Policy- May 5, 2014 Cooki Policy- May 5, 2014 Us of Cookis on Sizmk Wbsits This Cooki Disclosur applis only to us of cookis on corporat wbsits (www.sizmk.com and rlatd rgional wbsits) publishd by Sizmk Inc. and its affiliats

More information

Cost Benefit Analysis of the etir system Summary, limitations and recommendations

Cost Benefit Analysis of the etir system Summary, limitations and recommendations UNITED NATIONS Cost Bnfit Analysis of th TIR systm Summary, limitations and rcommndations Agnda itm 5 André Scia Informal Ad hoc Exprt Group on Concptual and Tchnical Aspcts of Computrization of th TIR

More information

FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data

FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data FACULTY SALARIES FALL 2004 NKU CUPA Data Compard To Publishd National Data May 2005 Fall 2004 NKU Faculty Salaris Compard To Fall 2004 Publishd CUPA Data In th fall 2004 Northrn Kntucky Univrsity was among

More information

An IAC Approach for Detecting Profile Cloning in Online Social Networks

An IAC Approach for Detecting Profile Cloning in Online Social Networks An IAC Approach for Dtcting Profil Cloning in Onlin Social Ntworks MortzaYousfi Kharaji 1 and FatmhSalhi Rizi 2 1 Dptartmnt of Computr and Information Tchnology Enginring,Mazandaran of Scinc and Tchnology,Babol,

More information

Development of Financial Management Reporting in MPLS

Development of Financial Management Reporting in MPLS 1 Dvlopmnt of Financial Managmnt Rporting in MPLS 1. Aim Our currnt financial rports ar structurd to dlivr an ovrall financial pictur of th dpartmnt in it s ntirty, and thr is no attmpt to provid ithr

More information

Who uses our services? We have a growing customer base. with institutions all around the globe.

Who uses our services? We have a growing customer base. with institutions all around the globe. not taking xpr Srvic Guid 2013 / 2014 NTE i an affordabl option for audio to txt convrion. Our rvic includ not or dirct trancription rvic from prviouly rcordd audio fil. Our rvic appal pcially to tudnt

More information

I. INTRODUCTION. Figure 1, The Input Display II. DESIGN PROCEDURE

I. INTRODUCTION. Figure 1, The Input Display II. DESIGN PROCEDURE Ballast Dsign Softwar Ptr Grn, Snior ighting Systms Enginr, Intrnational Rctifir, ighting Group, 101S Spulvda Boulvard, El Sgundo, CA, 9045-438 as prsntd at PCIM Europ 0 Abstract: W hav dvlopd a Windows

More information

Service-Grids based on UNICORE. ======!" ==Systems=

Service-Grids based on UNICORE. ======! ==Systems= Srvic-Grids basd on UNICORE. Outlin. Srvic Grids: Vision, Stratgy and Activitis Th Rol of UNICORE in Srvic-Grids for th Tchnical Computing Markt Srvic-Modls and Exampls for Customr-Environmnts Rlas-Managmnt

More information

Principles of Humidity Dalton s law

Principles of Humidity Dalton s law Principls of Humidity Dalton s law Air is a mixtur of diffrnt gass. Th main gas componnts ar: Gas componnt volum [%] wight [%] Nitrogn N 2 78,03 75,47 Oxygn O 2 20,99 23,20 Argon Ar 0,93 1,28 Carbon dioxid

More information

STATEMENT OF INSOLVENCY PRACTICE 3.2

STATEMENT OF INSOLVENCY PRACTICE 3.2 STATEMENT OF INSOLVENCY PRACTICE 3.2 COMPANY VOLUNTARY ARRANGEMENTS INTRODUCTION 1 A Company Voluntary Arrangmnt (CVA) is a statutory contract twn a company and its crditors undr which an insolvncy practitionr

More information

ONLINE CONSUMER BEHAVIOR: AN EXPLORATORY STUDY

ONLINE CONSUMER BEHAVIOR: AN EXPLORATORY STUDY G.J. C.M.P., Vol. 2(4):98-17 July-August, 213 ISSN: 2319 7285 ONLINE CONSUMER BEHAVIOR: AN EXPLORATORY STUDY Namita Bhandari* & Prti Kaushal** *Panjab Univrsity, Chandigarh, India **Chitkara Univrsity,

More information

Version Issue Date Reason / Description of Change Author Draft February, N/A 2009

Version Issue Date Reason / Description of Change Author Draft February, N/A 2009 Appndix A: CNS Managmnt Procss: OTRS POC Documnt Control Titl : CNS Managmnt Procss Documnt : (Location of Documnt and Documnt numbr) Author : Ettin Vrmuln (EV) Ownr : ICT Stratgic Srvics Vrsion : Draft

More information

Sample Lesson. Intensive, Multisensory Reading Intervention with Proven Results Grades Pre-K 8+ RTI. Level 1: Introductory Lesson 5: Short e

Sample Lesson. Intensive, Multisensory Reading Intervention with Proven Results Grades Pre-K 8+ RTI. Level 1: Introductory Lesson 5: Short e ORTON GILLINGHAM Sampl Lsson Intnsiv, Multisnsory Rading Intrvntion with Provn Rsults Grads Pr-K 8+ RTI Lvl 1: Introductory Lsson 5: Short BASED PROGRAM tl 8002255750 psbookscom fax 8884402665 From Tachr

More information

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means Qian t al. Journal of Inqualitis and Applications (015) 015:1 DOI 10.1186/s1660-015-0741-1 R E S E A R C H Opn Accss Sharp bounds for Sándor man in trms of arithmtic, gomtric and harmonic mans Wi-Mao Qian

More information

Evaluation of Cloud-Based Mobile Apps Testing

Evaluation of Cloud-Based Mobile Apps Testing Evaluation of Cloud-Basd Mobil Apps Tsting Prof. Manjula R., rmanjula@vit.ac.in Adithya Vadlamani, adithya.vadlamani2013@vit.ac.in A.M. Sai Prasad, amsaiprasads@gmail.com Prm Sai K., prmsaikanigalpula@gmail.com

More information

EVALUATING EFFICIENCY OF SERVICE SUPPLY CHAIN USING DEA (CASE STUDY: AIR AGENCY)

EVALUATING EFFICIENCY OF SERVICE SUPPLY CHAIN USING DEA (CASE STUDY: AIR AGENCY) Indian Journal Fundamntal and Applid Lif Scincs ISSN: 22 64 (Onlin) An Opn Accss, Onlin Intrnational Journal Availabl at www.cibtch.org/sp.d/jls/20/0/jls.htm 20 Vol. (S), pp. 466-47/Shams and Ghafouripour

More information

FEDERICA. Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures. Mauro Campanella GARR

FEDERICA. Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures. Mauro Campanella GARR W W W.FP7-F ED ER IC A.EU FEDERICA Fdratd E-infrastructur Ddicatd to Europan Rsarchrs Innovating in Computing ntwork Architcturs Mauro Campanlla GARR Mauro.campanlla@garr.it CPqD Workshop on Nw Architctur

More information

Fraud, Investments and Liability Regimes in Payment. Platforms

Fraud, Investments and Liability Regimes in Payment. Platforms Fraud, Invstmnts and Liability Rgims in Paymnt Platforms Anna Crti and Mariann Vrdir y ptmbr 25, 2011 Abstract In this papr, w discuss how fraud liability rgims impact th pric structur that is chosn by

More information

Dehumidifiers: A Major Consumer of Residential Electricity

Dehumidifiers: A Major Consumer of Residential Electricity Dhumidifirs: A Major Consumr of Rsidntial Elctricity Laurn Mattison and Dav Korn, Th Cadmus Group, Inc. ABSTRACT An stimatd 19% of U.S. homs hav dhumidifirs, and thy can account for a substantial portion

More information

UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS:

UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS: UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS: CASE OF NAIROBI CITY WATER AND SEWERAGE COMPANY By TABITHA MBETE NGEI P58/63441/2011

More information

Nimble Storage Exchange 2010 40,000-Mailbox Resiliency Storage Solution

Nimble Storage Exchange 2010 40,000-Mailbox Resiliency Storage Solution Nimbl Storag Exchang 2010 40,0-Mailbox Rsilincy Storag Solution Tstd with: ESRP Storag Vrsion 3.0 Tst dat: July 10, 2012 Ovrviw This documnt provids information on Nimbl Storag's storag solution for Microsoft

More information

Fleet vehicles opportunities for carbon management

Fleet vehicles opportunities for carbon management Flt vhicls opportunitis for carbon managmnt Authors: Kith Robrtson 1 Dr. Kristian Stl 2 Dr. Christoph Hamlmann 3 Alksandra Krukar 4 Tdla Mzmir 5 1 Snior Sustainability Consultant & Lad Analyst, Arup 2

More information

Economic Insecurity, Individual Behavior and Social Policy

Economic Insecurity, Individual Behavior and Social Policy Economic Inscurity, Individual Bhavior and Social Policy By Indrmit S. Gill igill@worldbank.org and Nadm Ilahi nilahi@worldbank.org Th World Bank Washington, DC 20433 First Draft: March 27, 2000 Papr writtn

More information

Upper Bounding the Price of Anarchy in Atomic Splittable Selfish Routing

Upper Bounding the Price of Anarchy in Atomic Splittable Selfish Routing Uppr Bounding th Pric of Anarchy in Atomic Splittabl Slfish Routing Kamyar Khodamoradi 1, Mhrdad Mahdavi, and Mohammad Ghodsi 3 1 Sharif Univrsity of Tchnology, Thran, Iran, khodamoradi@c.sharif.du Sharif

More information

Basis risk. When speaking about forward or futures contracts, basis risk is the market

Basis risk. When speaking about forward or futures contracts, basis risk is the market Basis risk Whn spaking about forward or futurs contracts, basis risk is th markt risk mismatch btwn a position in th spot asst and th corrsponding futurs contract. Mor broadly spaking, basis risk (also

More information