A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy

Size: px
Start display at page:

Download "A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy"

Transcription

1 Journal of Coputatonal Inforaton Systes 6:7(200) Avalable at A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School of Coputer and Inforaton Engneerng, Shangha Unversty of Electrc Power Shangha , Chna Abstract Role-based access control s an portant echans to prevent the unauthorzed access n ters of roles. User herarchy s an effcent structure to express the relatons between dfferent roles. The cobnaton between role-based access control and the user herarchy s requred n dfferent context, especally n open nternet envronent where the publshed or delegated data are encrypted for prvacy. In ths paper, we propose a novel role-based access control schee n user herarchy, whch can pleent dynac access control n open nternet envronent. Our approach s pleented by usng one-way hash functon to avod the leakage of keys fro dfferent roles, by usng a hashed value as the dentfer of a role and by usng dervaton functon to derve keys n the lower herarchy fro the keys n the upper herarchy. The key generaton, dentfer coputaton and key dervaton s qute sple, and the paraeters reebered by users are fxed. Keywords: Role-based Access Control; Dynac Access Control; User Herarchy. Introducton In recent years, ore and ore nforaton ncludng senstve data s publshed through nternet. However, the leakage of senstve data, such as edcal records or stocks data, ake the data publcaton developng slowly. In order to protect the senstve data fro unauthorzed or alcous access, ost of proposed papers are focused on adoptng encrypton to guarantee the prvacy of senstve data. Under the encrypton technque, only the user who has the correct decrypton key can decrypt the encrypted data and gets the real senstve data. However, encrypton of data brngs about two probles, one s that the encrypton for all senstve data by usng only one encrypton key akes all data n danger, the other s that the encrypton for each senstve data by usng dfferent encrypton keys akes the key anageent and dstrbuton dffcult. Therefore t s ore attractve and portant to cobne the encrypton wth access control n herarchy to pleent the effcent access control as well as the protecton of senstve data. In ths paper, we concentrate on desgnng a novel access control schee, whch can copute the keys for all users n ters of the dfferent relatons aong users n the herarchy. Related work. Access control n database s an portant echans to guarantee the securty and data prvacy, and there are any access control odels appled to dfferent data anageent systes. Bertno et al[2] states the current challenge of database securty and evoluton of the access control odel n dfferent data anageent syste, and dscussed access controls n obect-orented database systes n []. But n the data publcaton[6] and database outsourcng odel[4], tradtonal access control technology Correspondng author. Eal addresses: tanxuxa_76@sna.co.cn (Xuxa TIAN) / Copyrght 200 Bnary Inforaton Press July, 200

2 2424 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) whch operates on the clent-server archtecture n ters of the assupton that the trusted server s responsble for the desgnng and enforcng of the access control polcy, s challenged, because the data publsher or the database servce provder ay be untrusted for the publshed or delegated data contents. In data publcaton, Mklau et al[6] frst proposed a fraework to enforce access control polces on publshed XML docuents by usng cryptography, n whch the data owner enforce access control polcy by dstrbutng keys to users who are granted to access the correspondng data. In outsourced database, Saarat[3], Vercat [4], Tan[5] et al proposed to cobne the encrypton and access control to realze the effcent access control n ters of the keys dstrbuton. Especally Tan[5] ntroduced a DSP re-encrypton echans to pleent the selectve access control of the encrypted data as well as releve the clent fro the coplex key dervaton procedure. A nuber of works [7][8][9][0][][2][3] relatng to access control n a herarchy have been proposed. In alost all these works, there s a relatonshp between the key assgned to a node and those assgned to ts chldren. The dfference between the related works les ostly n the dfferent cryptographc technques eployed for key generaton. Yang et al[7] addressed an access control schee based on one-way hash functon, but Hsu et al[8] ponted out the securty leakage n Hsu s schee and proposed a new robust dynac access control schee. However, Hsu et al[8] schee ntroduced each user s dentty nforaton nto the hash functon to avod the key leakage. In ths paper, we concentrate on desgnng a schee to solve how to copute the prvate keys for users n ters of the dfferent relatons aong users n the herarchy. In our approach, the users n the herarchy are grouped nto dfferent roles n ters of ther access rghts, that s, the users who have the sae access rghts are assgned nto the sae role. 2. Prelnares 2.. Hash Functon We use H denotng as a hash functon, whch s the functon by nputtng an nforaton of arbtrary length and outputtng a dgest of fxed length. Assue H s an one-way, collson-resstant hash functon, whch eets wth the followng two propertes: ) Coputng H () s easy under the condton of known nforaton, but the reverse s ntractable. 2) If ', then H ( ) H ( ' ). Fg. Hash Functon Workng Prncple Fg. s the workng flow and propertes for hash functon H. Fro Fg. we know that H () s not equal to H (') as long as s not equal to ', that s to say that any bt of changng n nforaton wll result n dfferent hash result H (). The hash functon s the portant securty and effcency

3 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) guarantee for the schee proposed by us Partally Ordered Set (POSET) Due to the practcal organzaton relaton n copany, the access control s always fored as a user herarchy, n whch users are grouped nto dfferent roles, and each role s assgned a dfferent securty clearance, such as, 2,..., n n Fg.2, n s the nuber of roles. If usng < expresses a bnary partally ordered relaton, then < denotes that has hgher securty clearance than, n other words, the users n have the rghts to access data belongng to users n, but the reverse doesn t succeed. For clearness we gve the foral defnton of POSET n the followng. Suppose that an organzaton structure can be represented as a partally ordered set (, < ), s a set of levels n herarchy, and < s the donance relaton between the levels. For splcty, we also use representng the role n that level. In the followng and are two levels respectvely n the herarchy. ) If <, then we say that strctly donates, and s strctly donated by. 2) If < and >, then we say that the two levels are equal and denote ths as =. 3) If ether < or =, then we say that donates, and s donated by and denotes ths as. 4) If nether nor, then we say that the two levels are ncoparable. 5) If < and no z akes < z < succeed, then we say that s a parent of. If < only, then we say that s an ancestor of and s a descendant of. So the organzaton structure n Fg.2 s a POSET, and then satsfes the propertes of POSET. 3. Revew Hash Based Schee 3.. Yang[7] s Schee In Yang[7] s schee, A trusted certfcaton authorty(ca) frst deternes a set of one-way hash functons S H = { H, H 2,..., H n}, where n s the axu degree of the herarchy, n another words, the axu drect chld nodes of one parent node n the herarchy. Assung that there are seven securty clearances, 2, 3, 4, 5, 6, 7, and whch are organzed n a herarchy n Fg.2. The degree s 3 for the herarchy n Fg.2. In ther approach, the CA assgns one secret key k for each securty clearance, 7, such as k for securty clearance, k 2 for securty clearance 2. The dervaton rule s dvded nto the followng three stuatons: ) For the root node. The secret key for the root node s assgned arbtrarly by CA and can t be derved by anyone, such as k for. 2) For the node whch has unque drect parent node. Suppose node s the unque drect parent node of node,, and s the th chld node of, denoted as C,, the chld

4 2426 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) are nubered fro the left to the rght. The secret key of can be derved fro k = H ( k ). For C, exaple 3 s the 2 th chld node of, denoted as C,2, and the secret key k 3 can be derved fro equaton k = H ( k ). 3 C,2 3) For the node whch has ore than one drect parent node. Suppose has drect parent nodes,,...,, where 2,, and s the th chld node of, C denoted as,. Assue the secret keys of k, k,..., k respectvely, the 2,,..., are,,2, parent H ( k ), t ust share the other paraeters Ct, t C s the order of t th parent node, t, and t, to derve the secret key of through the equaton: k = H ( H ( k ), H ( k ),..., H ( k )), C, denotes that s the C, C,, C, 2,2 C,, th chld node of. Fg. 2 Key Dervaton n the Herarchy Fg. 3 After Addng a New Node new For exaple, takng Fg.2 as an exaple, explans how to assgn and derve keys for each node n the herarchy through the followng stuatons: ) The secret key of the root node s k. 2) Node 2 can derve the secret key of node 5 by coputng H 2 ( k 2 ), therefore k 5 = H 2 ( k 2 ), and accordng to the sae rule, coputng k 2 = H ( k ), k 3 = H 2 ( k ) et al. Node 6 has two drect parent nodes, so node 2 and node 3 both can derve the secret key of 6 by coputng k 6 = H 3 ( H 3 ( k2 ), H( k3 )) under the condton that nodes 2 and 3 sharng the values of H ) and H ) each other. 3 ( k 2 ( k The Attacks n Yang[7] s Schee and ts Iproveent Paper[8] ponts out that n schee[7] soeone ay overstep hs authorty to access the unauthorzed nforaton n two cases, one s addng a new node, and the other s addng a new node after deletng an old

5 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) one. Fg.3 s the graph after addng a new node n the poston of frst chld n Fg.2. Now the secret key of node 6 s coputed fro H ( k 3 ) and H 4 ( k 2 ) n ters of the coputaton rule, k 6 = H 3 ( H 4 ( k 2 ), H( k3 )), but before ths node 3 has already known the share value H 3 ( k 2 ), whch s now the secret key of node 5. Therefore the securty of node 5 wll be endangered, and the nforaton encrypted by usng secret key H 3 ( k 2 ) for node 5 wll be leaked. Fg.4 s another case, denotng that a new node s nserted n the poston where the old node has ust been deleted. Before the deletng operaton, node 3 knows the secret key H 3 ( k 2 ) of node 6, however, after the deletng operatng of node 5, node 3 wll know the secret key H 2 ( k 2 ) of node 6. Contnung the process, when addng a new node the secret key H 2 ( k 2 ) of the new node new new to the poston where node 5 s deleted, s already known by node 3, so the prvacy of new node new s endangered and the nforaton encrypted by the secret key H 2 ( k 2 ) s dsclosed. Hsu[8] proved the securty of schee proposed by Yang[7] through addng the dentty nforaton nto the process of secret key coputaton, such as k 2 can be coputed by usng the equaton k 2 = H( ID, k, ) 2 ID, where ID, ID 2 are the dentfer for node 2, respectvely. Fg. 4 Addng a New Node new after Deletng an Old Node 5 4. Proposed Schee n User Herarchy 4.. The Identfer Defnton for a Role We assgn an dentfer for each role n the syste, and the dentfer can be coputed and publshed by each role wthout dsclosng any prvacy of user. r d = H ( userd userd 2... userdn ) th Where and s the nuber of roles n the syste, n s the nuber of users n the role. So each te deletng or nsertng a user fro soe role, the dentfer of the role wll be changed at the sae te, Fg.5 llustrates the herarchy of roles n the syste and the correspondng publcaton table for dentfers of roles. For exaple, the herarchy n Fg.5 s an acadec organzaton n soe college n one unversty. The college s anaged by a Dean. Under the dean are the dfferent departents chars, such as coputer scence(cs) char, councaton engneerng(ce) char. The students, who are n the lowest level, are advsed by one or ore tutors n the correspondng teacher groups. In ters of the practcal applcaton, we need to antan the senstve score or transcrpt nforaton of each student. The followng access control requreents need to be satsfed. ) Each student can read hs/her score or transcrpt.

6 2428 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) ) The teacher who teaches the student can read the score or transcrpt of the student. 3) The char of the departent n whch a student s aorng can read the student s score or transcrpt nforaton. 4) The dean can read all students transcrpts. Fg. 5 A Herarchy and ts Correspondng Publshed Identfers for Roles Suppose the Stu s a role whch s coposed of fve students, so the role dentfer for role Stu s n the followng. Stu d = H ( stud stud 2 stud 3 stud 4 stud 5 ) Assue the CS group conssts of three teachers, so the role dentfer for role CS group s as follows. CSgroup d = H ( teacherd teacherd 2 teacherd 3 ) The dentfers for other roles can be derved n ters of the nuber of persons n the roles, and the coputaton process s slar as above. So the deletng or nsertng users fro correspondng roles wll pact the dentfer of the role, and n turn effect the key dervaton fro the upper level to lower level The Proposed Schee Our schee requres satsfyng the followng three stuatons, that s, the key assgnent n the herarchy eet wth the followng three stuatons: ) For the unque parent node. Its secret key k root s assgned arbtrarly by the CA, such as k root = k for the node of role Dean. 2) For the nodes whch only have one drect parent node. If only has one drect parent node, then the secret key for s k = k = H k, ), k s the secret key for ( d, s the dentfer d for role, d can be searched n the publcaton of CA n table n Fg.6. For exaple, CS char can derve the secret key for CS group as follows. k = H ( k, CSgroup ), where CSgroup CSchar d CSgroup d = H ( teacherd teacherd 2... teacherd ), s the nuber of teachers n the CS group. 3) For the node whch has ore than one drect parent node. Suppose has drect parent nodes 2,,...,, where,, and s the th chld node of, denoted as C,. Assue the secret keys of 2,,..., are k, k,2,..., k,, respectvely, the parent ust

7 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) share the other paraeters H ( k, t, d ), d s the dentfer for role, t, and t, to derve the secret key of through the equaton: k = H ( H ( k,, d ), H ( k,2, d ),..., H ( k,, d )). For exaple, the secret key for role Stu2 n Fg.6 can be coputed as follows: k Stu2 = H ( H ( kcsgroup2, Stu2d ), H ( kcegroup, Stu2d )), where Stu 2d = H ( stud stud 2... stud ), s the nuber of students n role Stu2. 5. Dynac Access Control n the Herarchy 5.. Addng a User When addng a new user, there are two dfferent stuatons, the frst s that the new user doesn t belong to any role exst, so t s necessary to create a new role for the user. The second s that the new user belongs to a role exst, so the dentfer of the role exst need to be updated. In the frst stuaton If the new node wll be the new root node, the CA needs to assgn an arbtrary key for the new role, and all keys drect or ndrect wll be coputed agan. For exaple, nsertng a new node nto the root node n Fg.2, the orgnal node becoes the drect chld of new node knew arbtrarly for node new our proposed schee n secton 4.2. new new. The CA assgns a key, and all the other keys wll be regenerated n ters of the three stuatons n If a new node new s nserted nto a branch between and 3 n Fg.2, the drect parent only needs to derve the secret key k = H ( k, ) for the new nserted node new, where new newd newd s the dentfer of the new node, newd = H ( newuserd ). At the sae te the secret keys of drect or the ndrect chld of the new node new are updated, such as the keys for the nodes 3, 6, 7. The dentfers for all roles exst don t need to be updated because of no user nsertng. In the second stuaton If a new user s nserted nto a role exst, then we need to update the dentfer of the role, and at the sae te update the key for the role, such as nsertng a new user nto role 2 n Fg.2, then the dentfer of role 2 becoes H ( 2d d d 2dnew ), 2 dnew s the d of new user. At the sae te the secret keys of drect or the ndrect chld of the role 2 are updated, such as the keys for the nodes 4, 5, 6. Insertng a new user nto the role 6 s the sae as above, but now only the dentfer and secret key of 6 s updated, the others are keep the sae because the node 6 s a leaf node Deletng a User When deletng a user, there are two dfferent stuatons, the frst s to delete a role(a node n the herarchy). The second s to delete a user fro soe role. In the frst stuaton When the deletng node s the root node, then the keys of ts drect or ndrect node should be updated. For exaple, the deletng of node fro Fg.2 results n the CA assgnng keys for nodes 2 and 3 arbtrarly, and then regeneratng the keys for the nodes below the, such as 4, 5, 6, 7. If a node 5 s deleted fro Fg.2, all other keys needn t to be updated because 5 s a leaf node. The dentfers for all roles exst don t need to be updated because of no user deletng.

8 2430 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) In the second stuaton When deletng a user n soe role exst, then we need to update the dentfer of the role, and at the sae te update the key for the role, such as deletng a user fro role 3 n Fg.2, then the dentfer of role 3 becoes 3d = H ( 3d 3d d ( ) ), s the nuber of users n role 3 after deletng. The key for 3 becoes k = H ( k, 3 ) 3 d, and all keys for drect or ndrect node under node 3 are updated n ters of the schee proposed by us. 6. Conclusons and Future Work In ths paper a dynac access control schee n user herarchy based on hash functon s proposed. A dervaton functon s proposed and used to derve keys for dfferent users n the herarchy. Our approach not only provdes the dynac nsertng and deletng support for users, but also s applcable to general case. Securty analyss shows that our schee s securty aganst the key leakage when users change ther roles or leave the roles. In the future, we respect to fnd ore flexble approaches on provng effcency to both the space and the coputaton, especally reduce the share nforaton. Acknowledgeent The authors are grateful for the anonyous revewers who ade constructve coents. Ths work was supported by Research Fund for Excellent Youth Scholars of Shangha Hgher Educaton(No. Z ). References [] E. Bertno, S. Jaoda, and P. Saarat. Access Controls n Obect-Orented Database Systes: Soe Appproaches and Issues. In Advanced Database Concepts and Research Issues, 993, LNCS 759. [2] E. Bertno and R. Sandhu. Database securty-concepts, approaches and challenges. IEEE Transactons on Dependable and Secure Coputng, 2005,2():2-8. [3] P. Saarat. A data outsourcng archtecture cobnng cryptography and access control. Proc. of the st Coputer Securty Archtecture Workshop, Farfax, VA, 2007, pp [4] S. De Captan d Vercat, S. Forest, S. Jaoda, S. Parabosch, and P. Saarat. Over-encrypton: anageent of access control evoluton on outsourced data. In Proc. of the 33rd VLDB Conference, Venna, Austra, 2007, pp [5] X. Tan, X. Wang, and A. Zhou. DSP RE-Encrypton: A Flexble Mechans for Access Control Enforceent Manageent n DaaS IEEE Internatonal Conference on Cloud Coputng, 2009, pp [6] G. Mklau and D. Sucu. Controllng access to publshed data usng cryptography. In Proc. of the 29th VLDB Conference, Berln, Gerany, 2003,pp [7] C. Yang and C. L. Access control n a herarchy usng one-way hash functons. Coputers and Securty, 2004, 23( 8) : [8] C.L. Hsu, P.L. Tas, and Y.C Chou. Robust dynac access control schee n a user herarchy based on one-way hash functon.2009, [9] S. G. Akl and P. D. Taylor. Cryptographc Soluton to a Multlevel Securty Proble. Advances n Cryptology: Proceedngs of CRYPTO, Plenu Press, NY, 982, pp [0] S. G. Akl and P. D. Taylor. Cryptographc Soluton to a Proble of Access Control n a Herarchy. ACM Transactons on Coputer Systes, 983,(3): [] F. H. Kuo, V. R. L. Shen, T. S. Chen, and F. La. Cryptographc key assgnent schee for dynac access control n a user herarchy. Proceedngs of Coputers and Dgtal Technques, 999, 46(5): [2] T. C. Wu and C. C. Chang. Cryptographc key assgnent schee for herarchcal access control. Coputer Systes Scence and Engneerng, 200, 6(): [3] J. Crapton, K. Martn, and P. Wld. On key assgnent for herarchcal access control. In Proc. Of the 9th IEEE CSFW, Vence, Italy, 2006,pp.98-.

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

Secure Cloud Storage Service with An Efficient DOKS Protocol

Secure Cloud Storage Service with An Efficient DOKS Protocol Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand

More information

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,

More information

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co

More information

An Electricity Trade Model for Microgrid Communities in Smart Grid

An Electricity Trade Model for Microgrid Communities in Smart Grid An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

Two-Phase Traceback of DDoS Attacks with Overlay Network

Two-Phase Traceback of DDoS Attacks with Overlay Network 4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School

More information

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments 202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

An Enhanced K-Anonymity Model against Homogeneity Attack

An Enhanced K-Anonymity Model against Homogeneity Attack JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe

More information

Basic Queueing Theory M/M/* Queues. Introduction

Basic Queueing Theory M/M/* Queues. Introduction Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy

More information

Inventory Control in a Multi-Supplier System

Inventory Control in a Multi-Supplier System 3th Intl Workng Senar on Producton Econocs (WSPE), Igls, Autrche, pp.5-6 Inventory Control n a Mult-Suppler Syste Yasen Arda and Jean-Claude Hennet LAAS-CRS, 7 Avenue du Colonel Roche, 3077 Toulouse Cedex

More information

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Traffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method

Traffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method IJCSI Internatonal Journal of Coputer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org 6 Traffc Deand Forecastng for EGCS wth Grey Theory Based Mult- Model

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters 01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng

More information

International Journal of Industrial Engineering Computations

International Journal of Industrial Engineering Computations Internatonal Journal of Industral ngneerng Coputatons 3 (2012) 393 402 Contents lsts avalable at GrowngScence Internatonal Journal of Industral ngneerng Coputatons hoepage: www.growngscence.co/jec Suppler

More information

Virtual machine resource allocation algorithm in cloud environment

Virtual machine resource allocation algorithm in cloud environment COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal

More information

A new anonymity-based protocol preserving privacy based cloud environment

A new anonymity-based protocol preserving privacy based cloud environment Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal

More information

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing Internatonal Journal of Securty and Its Applcatons, pp.343-352 http://dx.do.org/10.14257/sa.2015.9.12.33 Cross-Doman Authorzaton Management Model for Mult- Levels Hybrd Cloud Computng L Na 1, Dong Yun-We

More information

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Web Service-based Business Process Automation Using Matching Algorithms

Web Service-based Business Process Automation Using Matching Algorithms Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng

More information

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA 238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton

More information

R-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2)

R-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2) R-AS: AS FUNCTION USING RANDO QUADRATIC POLYNOIALS OVER GF() Dhananoy Dey 1, Noopur Shrotrya 1, Indranath Sengupta 1 SAG, etcalfe ouse, Delh-11 54, INDIA. {dhananoydey, noopurshrotrya}@sag.drdo.n Department

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Capacity Planning for Virtualized Servers

Capacity Planning for Virtualized Servers Capacty Plannng for Vrtualzed Servers Martn Bchler, Thoas Setzer, Benjan Spetkap Departent of Inforatcs, TU München 85748 Garchng/Munch, Gerany (bchler setzer benjan.spetkap)@n.tu.de Abstract Today's data

More information

Maximizing profit using recommender systems

Maximizing profit using recommender systems Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

MyINS: A CBR e-commerce Application for Insurance Policies

MyINS: A CBR e-commerce Application for Insurance Policies Proceedngs of the 5th WSEAS Internatonal Conference on E-ACTIVITIES, Vence, Italy, November 20-22, 2006 373 MyINS: A CBR e-commerce Applcaton for Insurance Polces SITI SORAYA ABDUL RAHMAN, AZAH ANIR NORMAN

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Tourism Demand Forecasting by Improved SVR Model

Tourism Demand Forecasting by Improved SVR Model Internatonal Journal of u- and e- Servce, Scence and Technology, pp403-4 http://dxdoorg/0457/junesst058538 Tours Deand Forecastng by Iproved SVR Model L Me Departent of Socal Servces,Zhengzhou Tours College,Henan,PRChna

More information

Naglaa Raga Said Assistant Professor of Operations. Egypt.

Naglaa Raga Said Assistant Professor of Operations. Egypt. Volue, Issue, Deceer ISSN: 77 8X Internatonal Journal of Adanced Research n Coputer Scence and Software Engneerng Research Paper Aalale onlne at: www.jarcsse.co Optal Control Theory Approach to Sole Constraned

More information

A P2P Approach for Business Process Modeling and Reuse

A P2P Approach for Business Process Modeling and Reuse A P2P Approach for Busness Process Modelng and Reuse José A. Rodrgues Nt., Jano Morera de Souza, Geraldo Zbrão, Geraldo Xexéo, Eduardo Neves, Wallace A. Pnhero COPPE Unversdade Federal do Ro de Janero

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

A Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost

A Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost Conteporary Enneern Scences, Vol. 9, 2016, no. 7, 315-324 HIKARI Ltd, www.-hkar.co http://dx.do.or/10.12988/ces.2016.617 A Mult Due Date Batch Scheduln Model on Dynac Flow Shop to Mnze Total Producton

More information

International Journal of Information Management

International Journal of Information Management Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt

More information

Group Solvency Optimization Model for Insurance Companies Using Copula Functions

Group Solvency Optimization Model for Insurance Companies Using Copula Functions Internatonal Conference on Econocs, Busness and Marketng Manageent IPEDR vol.9 () () IACSIT Press, Sngapore Group Solvency Optzaton Model for Insurance Copanes Usng Copula Functons Masayasu Kanno + Faculty

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Section 5.3 Annuities, Future Value, and Sinking Funds

Section 5.3 Annuities, Future Value, and Sinking Funds Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme

More information

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one

More information

Response Coordination of Distributed Generation and Tap Changers for Voltage Support

Response Coordination of Distributed Generation and Tap Changers for Voltage Support Response Coordnaton of Dstrbuted Generaton and Tap Changers for Voltage Support An D.T. Le, Student Member, IEEE, K.M. Muttaq, Senor Member, IEEE, M. Negnevtsky, Member, IEEE,and G. Ledwch, Senor Member,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Fuzzy Keyword Search over Encrypted Data in Cloud Computing Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L,QanWang, Cong Wang,NngCao,KuRen, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc Insttute

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary

LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Problem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative.

Problem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative. Queston roblem Set 3 a) We are asked how people wll react, f the nterest rate on bonds s negatve. When

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation

A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation Lejang GUO 1, We WANG 2, Fangxn CHEN 1, Xao TANG 1,2, Weang WANG 1 Ar Force Radar Acadey (1), Wuhan Unversty (2) A Slar Duplcate Data Detecton Method Based on Fuzzy Clusterng for Topology Foraton Abstract.

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System

An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System 201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

Pricing Model of Cloud Computing Service with Partial Multihoming

Pricing Model of Cloud Computing Service with Partial Multihoming Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information