A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
|
|
- Baldric Chapman
- 8 years ago
- Views:
Transcription
1 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation Science & Technoogy, Nanjing, 0044, China Schoo o Computer & Sotware, Nanjing University o Inormation Science & Technoogy, Nanjing, 0044, China Abstract. With the growing popuarity o coud computing, more and more users outsource their private data to the coud. To ensure the security o private data, data owners usuay encrypt their private data beore outsourcing the data to the coud server, which brings incommodity o data operating. This paper proposes a scheme or simiar search on encrypted images based on a secure transormation method. The transormation on eatures protects the inormation about eatures, and does not degrade the resut accuracy. Moreover, the image owner coud update the encrypted image database as we as the secure index very easiy. Introduction Due to strong data storage and management abiity o the coud server, more and more data owners wi outsource data to the coud server. In order to ensure the security o private data, data owners need to encrypt their data beore upoading the data. Unortunatey, data encryption, i not done appropriatey, may reduce the eectiveness o data utiization. For exampe, content-based image retrieva (CBIR) techniue has been widey used in the rea word; however, the technoogies are invaid ater the eature vectors are encrypted. Currenty, searchabe symmetric encryption has been widey researched. Song et a. proposed the irst practica searchabe encryption method []. Ater that, in order to enhance the search exibiity and usabiity, some researchers proposed works to support simiar keyword search which coud toerate typing errors [-4]. On the other hand, some o the works ocused on muti-keyword searches which coud return more accurate resuts ranked according to some predeined criterions [5-8]. However, these works are mainy designed or the search on encrypted texts, and coud not be utiized directy or the encrypted images. Inspired by the searchabe encryption on texts, Lu et a. proposed a search scheme over encrypted mutimedia databases [9]. They extracted visua words rom images, based on which they coud achieve simiar search on encrypted images with the methods that are usuay empoyed by the encrypted text search schemes. However, this work is not suitabe or other image eatures except the NGCIT 03, ASTL Vo. 7, pp , 03 SERSC 03 03
2 Proceedings, The nd Internationa Conerence on Next Generation Computer and Inormation Technoogy visua words, and their index makes the search resut ess accurate. In this paper, we propose a scheme that not ony ensure the security o the images and eatures but aso support simiar search on encrypted images. In the proposed scheme, the encryption on eatures does not degrade the resut accuracy. Moreover, the image owner coud update the encrypted image database as we as the secure index uite easiy. Probem Formuations The proposed scheme incudes three dierent entities: image owner, coud server, and image user. Image owner has a coection o n images M = { m, m,, m n } that he wants to outsource to the coud server in encrypted orm. Meanwhie, the image owner wants to keep the capabiity to search through the images or eective utiization reasons. First, the image owner extracts a eature vector = (,,, ) T rom each image as common image retrieva system does. Secondy, the images are encrypted. Thirdy, the image owner buids a secure searchabe index I with the set{ } n i i=. Finay, the encrypted images and the index I are upoaded to the coud server. Image user is the authorized ones to use the images. We assume that the authorization between the image owner and image user is appropriatey done. In order to uery images, the image user extracts the uery eature vector rom the uery image. Then, the vector is used to generate a trapdoor TD( ). Finay, the trapdoor TD( ) is submitted to the coud server or the purpose o searching simiar images. Coud server stores the encrypted images and the index I or the image owner and processes the uery o image users. Ater receiving a uery trapdoor TD( ), coud server compares the trapdoor T ( ) with the items in index I to return k most simiar images. 3 Preiminaries 3. Feature Extraction Content-based image retrieva usuay invoves extraction o eatures and search on the eature index or simiar images. Without oss o generaity, the proposed scheme chooses the histogram eatures which are the most typica and simpest ones or CBIR. 04
3 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation We denote mxas ( ) the gray vaue at the ocation x in an image m. Then, the histogram eatures can be ormuated as { mx ( ) = i} i =, () m where { mx ( ) = i} =, i mxeuas ( ) to i, ese { mx ( ) = i} =0, m is the pixe number o the image. The simiarity between two histogram eature vectors can be evauated by Eucidean distance, deined as ( ),, D(, )= =. () i j i j ik jk k = 3. Secure Transormation Approach Image eatures in paintext may revea inormation about image content. First, the eature vector = (,,, ) T is extended as where = i i= an ( + ) ( + ) invertibe matrix R as T = (,,, ), (3). Then, the modiied eature vector is transormed with T = R, (4) where the matrix R is kept as the secure key by image owner and the authorized image user. In summary, the secure transorm agorithm can be written as = SecureTransrom( R, ) T T = R (,...,, ). (5) 4 The Proposed Scheme To achieve secure simiar search on images outsourced to the coud, the image owner needs to construct a secure searchabe index and outsource it to the coud server aong with the encrypted images. Ater that, coud server coud perorm simiar search on the index according to the uery reuests submitted by image users. The proposed scheme needs to ensure that the coud server earns nothing about the uery, index, and image databases. In this section, we describe our scheme in detai in two phases. 05
4 Proceedings, The nd Internationa Conerence on Next Generation Computer and Inormation Technoogy 4. The Setup Phase In the setup phase, image owner needs to buid a secure index and encrypt the images. Then, the index and the encrypted images are upoaded to the coud. Step: Key Generation. The image owner generates the private key k img eature vectors respectivey. Step: Feature Extraction. and R to encrypt the images and the The image owner extracts a eature vector = (,,, ) T rom each image in the databases M. In the proposed scheme, the eatures are the histogram eatures as it is described in subsection 3.. Step3: Secure Index Construction. Ater the eature vectors are extracted rom the image database M, they are utiized to buid secure searchabe index I. The image owner transorms each with private key R by using the secure transormation method SecureTransrom( R, ) so as to generate the corresponding encrypted eature vector. Then, the secure index I is constructed as shown in Tabe, where ID( m i ) is the identiier o ie mi that can uniuey ocate the actua ie. Tabe. The secure searchabe index I ID( m ) ID( m ) ID( m ) 3 3 ID( m ) n n Step4: Upoad. Ater constructing the index I, data owner encrypts a o the images in M with the secure key k img. Then, the encrypted images and the secure searchabe index I are upoaded to the coud. 06
5 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation 4. Search phase In search phase, the image user wants to retrieve images that are simiar to a uery image rom the coud server. In order to avoid the inormation eakage, the image user generates a secure trapdoor with the uery image. Then, the trapdoor is submitted to the coud server. Utiizing the trapdoor, the coud server returns k most simiar images by searching on the index I. Step: Trapdoor Generation. In order to uery images, the image user extracts the uery eature vector = (,,...,, ) rom the uery image with the eature extraction method introduced in the step o setup phase. Then, the uery eature vector is used to generate a trapdoor TD( ) as oowing. First, with the, the image user generates = (,...,,) T. (6),, Then, the trapdoor TD( ) is cacuated as TD R, (7) ( ) = r where r is a positive random rea number, and R is the shared secure key. Finay, the trapdoor TD( ) is submitted to coud server by the image user. Step: Search Index. Ater receiving a search reuest TD( ), the coud server wi search on the secure index I, and return k most simiar images to the user. The distance between uery vector and the vector i, i =,..., n, can be cacuated as oows: Dis TD T ( ( ), i) = ( TD( )) i T T T T ( rr (,,...,,,) ) ( R ( i,,..., i,, i ) ) = T T T,, R R i, i, i = r(,...,,) ( ) (,...,, ) ( i ) = r. (8) For every uery, the r and between and i is impied in the are the same or every i, and the Eucidean distance ( ( ), i) Dis TD. Thereore, with this distance criterion, the coud server coud return the same k most simiar resuts exacty as it does on unencrypted eature vectors. Finay, the coud server returns k most simiar resuts with minimum distance to the uery vector to image user, who coud decrypt the images with the shared key k img. 07
6 Proceedings, The nd Internationa Conerence on Next Generation Computer and Inormation Technoogy 5 Security and Perormance 5. Security Anaysis () Conidentiaity o the data: In the proposed scheme, the image database, index, and uery are encrypted. The coud server can not access the origina images and eature vectors without the secure key k img and R. () Query uninkabiity: By introducing the random vaue r in trapdoor generation, the same uery reuests wi generate dierent trapdoors. Thus, uery uninkabiity is better protected. 5. Perormance () Resut accuracy: This criterion is used to evauate the correction o the returned resuts. The accuracy o the scheme is mainy decided by the eature extraction method in common image retrieva systems. The proposed scheme hods the same resut accuracy as the common schemes that do not encrypt the eature vectors according to the ormua (8). () Time compexity: The process o index construction incudes eature extraction and eature vector transormation. The time cost o cacuation o histogram is O ( m n). Here, m is pixe number o the image, and n is number o images. The transormation o eature vectors invoves a mutipication o a ( + ) ( + ) matrix, and thus, the time cost iso (( + ) n). In summary, the time compexity o index construction iso (( m + ( + ) ) n). The search process incudes trapdoor generation and search, the time costs o which areo( ) and O ( n), respectivey. In summary, the time compexities o index construction and uery are determined by the size o database n. 6 Concusion A basic simiarity search scheme over encrypted images is proposed based on a secure transormation approach. The proposed scheme protects the conidentiaity o image database, eature vectors, and user s uery. Meanwhie, the proposed scheme possesses the same accuracy as the schemes which use the same eature extraction method but do not encrypt the eatures. However, the proposed scheme is by no means the optima one. It does not bedim the search pattern and access pattern, and thus may suer rom statistic attacks. In addition, the time compexity o uery on invert index is O ( n), which can be urther improved by using better index. In uture, we wi improve our scheme in these two aspects. 08
7 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Acknowedgements. This work is supported by the NSFC (6306, 6034, , , 6734, 6734, 67336, 6035, 63733, , and 60739), Nationa Basic Research Program 973 (0CB3808), 0GK009, GYHY006033, , 03DFG860, SBC030569, Research Start-Up und o NUIST (0048), and PAPD und. Reerences. D. X. Song, et a., "Practica techniues or searches on encrypted data," in Security and Privacy, 000. S&P 000. Proceedings. 000 IEEE Symposium on, ed: IEEE, 000, pp C. Wang, et a., "Achieving usabe and privacy-assured simiarity search over outsourced coud data," in INFOCOM, 0 Proceedings IEEE, pp , J. Li, et a., "Fuzzy keyword search over encrypted data in coud computing," in INFOCOM, 00 Proceedings IEEE, pp. -5, M. Chuah and W. Hu, "Privacy-aware bedtree based soution or uzzy muti-keyword search over encrypted data," in Distributed Computing Systems Workshops (ICDCSW), 0 3st Internationa Conerence on, pp. 73-8, D. Boneh and B. Waters, "Conjunctive, subset, and range ueries on encrypted data," in Theory o cryptography, ed: Springer, 007, pp C. Ning, et a., "Privacy-preserving muti-keyword ranked search over encrypted coud data," in INFOCOM, 0 Proceedings IEEE, pp , W. Sun, et a., "Privacy-preserving muti-keyword text search in the coud supporting simiarity-based ranking," in Proceedings o the 8th ACM SIGSAC symposium on Inormation, computer and communications security, pp. 7-8, X. Jun, et a., "Two-Step-Ranking Secure Muti-Keyword Search over Encrypted Coud Data," in Coud and Service Computing (CSC), 0 Internationa Conerence on, pp. 4-30, W. Lu, et a., "Enabing search over encrypted mutimedia databases," in IS&T/SPIE Eectronic Imaging, pp ,
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
More informationDynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud
Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,
More informationSecure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
More informationFace Hallucination and Recognition
Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.
More informationApplication-Aware Data Collection in Wireless Sensor Networks
Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,
More informationAn Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data
, pp.323-332 http://dx.doi.org/10.14257/isia.2014.8.2.33 An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data Li Chen, Xingming Sun, *Zhihua Xia and Qi Liu
More informationMinimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games
Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS
More informationAustralian Bureau of Statistics Management of Business Providers
Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad
More informationCLOUD service providers manage an enterprise-class
IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With
More informationSecure semantic based search over cloud
Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,
More informationWHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization
Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the
More informationCertificateless Public Auditing for Data Integrity in the Cloud
Certificateess Pubic Auditing for Data Integrity in the Coud Boyang Wang,, Baochun Li, Hui Li and Fenghua Li, State Key Laboratory of Integrated Service Networks, Xidian University,Xi an,shaanxi,china
More informationMUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi
More informationStoring Shared Data on the Cloud via Security-Mediator
Storing Shared Data on the Coud via Security-Mediator Boyang Wang, Sherman S. M. Chow, Ming Li, and Hui Li State Key Laboratory of Integrated Service Networks, Xidian University, Xi an, China Department
More informationHybrid Selection of Language Model Training Data Using Linguistic Information and Perplexity
Hybrid Seection o Language Mode Training Data Using Linguistic Inormation and Antonio Tora Schoo o Computing Dubin City University Dubin, Ireand atora@computing.dcu.ie Abstract We expore the seection o
More informationLT Codes-based Secure and Reliable Cloud Storage Service
2012 Proceedings IEEE INFOCOM LT Codes-based Secure and Reiabe Coud Storage Service Ning Cao Shucheng Yu Zhenyu Yang Wenjing Lou Y. Thomas Hou Worcester Poytechnic Institute, Worcester, MA, USA University
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationACO and SVM Selection Feature Weighting of Network Intrusion Detection Method
, pp. 129-270 http://dx.doi.org/10.14257/ijsia.2015.9.4.24 ACO and SVM Seection Feature Weighting of Network Intrusion Detection Method Wang Xingzhu Furong Coege Hunan, University of Arts and Science,
More informationChapter 3: e-business Integration Patterns
Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?
More informationHow To Search Over Encrypted Cloud Data
Xia et al. Journal of Cloud Computing: Advances, Systems and Applications 2014, 3:8 RESEARCH Open Access Secure semantic expansion based search over encrypted cloud data supporting similarity ranking Zhihua
More informationSELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci
SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise
More informationMaintenance activities planning and grouping for complex structure systems
Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe
More informationVendor Performance Measurement Using Fuzzy Logic Controller
The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer
More informationLoad Balancing in Distributed Web Server Systems with Partial Document Replication *
Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong
More informationResearch Article Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks
Internationa Journa of Distributed Sensor Networks Voume 2015, Artice ID 593759, 10 pages http://dx.doi.org/10.1155/2015/593759 Research Artice Efficient Pairing-Free Privacy-Preserving Auditing Scheme
More informationTeamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
More informationRanked Search over Encrypted Cloud Data using Multiple Keywords
Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology
More informationMulti-Robot Task Scheduling
Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in
More informationAn Integrated Data Management Framework of Wireless Sensor Network
An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan
More informationDesign and Analysis of a Hidden Peer-to-peer Backup Market
Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present
More informationCONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS
Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,
More informationAssessing Network Vulnerability Under Probabilistic Region Failure Model
2011 IEEE 12th Internationa Conference on High Performance Switching and Routing Assessing Networ Vunerabiity Under Probabiistic Region Faiure Mode Xiaoiang Wang, Xiaohong Jiang and Achie Pattavina State
More informationSentiment Analysis with Global Topics and Local Dependency
Proceedings of the Tenty-Fourth AAAI Conference on Artificia Inteigence (AAAI-10) Sentiment Anaysis ith Goba Topics and Loca Dependency Fangtao Li, Minie Huang, Xiaoyan Zhu State Key Laboratory of Inteigent
More informationNetwork/Communicational Vulnerability
Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security
More informationIntroduction the pressure for efficiency the Estates opportunity
Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary
More informationPrivacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing
Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,
More informationA train dispatching model based on fuzzy passenger demand forecasting during holidays
Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand
More informationELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES
About ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account. Some of
More informationBetting on the Real Line
Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing
More informationManaging Business Risks from Major Chemical
Managing Business Risks from Major Chemica Process Accidents Mariana Bardy 1, Dr Luiz Fernando Oiveira 2, and Dr Nic Cavanagh 3 1 Head of Section, Risk Management Soutions Savador, DNV Energy Soutions
More informationDelhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha
Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 TREATMENT TMENT OF GOODWILL IN ACCOUNTING Mohammad Taha GOODWILL is usuay ony recorded in an accounting system when a company purchases an unincorporated
More informationNonlinear Orbital Dynamic Equations and State- Dependent Riccati Equation Control of Formation Flying Satellites 1
Noninear Orbita Dynamic Equations and State- Dependent Riccati Equation Contro o Formation Fying Sateites 1 Chang-Hee Won and Hyo-Sung Ahn Department o Eectrica Engineering University o North Dakota 15
More informationMigrating and Managing Dynamic, Non-Textua Content
Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,
More informationOpenScape Desk Phone IP 35G OpenScape Voice. User Guide A31003-D3500-U101-2-7619
OpenScape Desk Phone IP 35G OpenScape Voice User Guide A31003-D3500-U101-2-7619 Our Quaity and Environmenta Management Systems are impemented according to the requirements o the ISO9001 and ISO14001 standards
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More informationLeadership & Management Certificate Programs
MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J
More informationArt of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0
IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks
More informationLeakage detection in water pipe networks using a Bayesian probabilistic framework
Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationNCH Software MoneyLine
NCH Software MoneyLine This user guide has been created for use with MoneyLine Version 2.xx NCH Software Technica Support If you have difficuties using MoneyLine pease read the appicabe topic before requesting
More informationELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l
ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may
More informationAN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE
AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory
More informationDocumentation. OpenScape Voice OpenStage 20 E SIP, OpenStage 20/20 G SIP. User Guide. Communication for the open minded. V1 R3.x V1 R4.
Documentation OpenScape Voice OpenStage 20 E SIP, OpenStage 20/20 G SIP User Guide Communication or the open minded V1 R3.x V1 R4.x Siemens Enterprise Communications www.siemens-enterprise.com Important
More informationTechnology and Consulting - Newsletter 1. IBM. July 2013
Technoogy and Consuting - Newsetter Juy 2013 Wecome to Latitude Executive Consuting s atest newsetter, reviewing recent marketpace activity. The newsetter focuses on the Technoogy and Consuting sectors,
More informationNormalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies
ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database
More informationSNMP Reference Guide for Avaya Communication Manager
SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this
More informationUS 20060288075Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0288075 A1 Wu (57) A sender is selectively input- S301
US 20060288075A (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2006/0288075 A1 Wu (43) Pub. Date: Dec. 21, 2006 (54) ELECTRONIC MAILBOX ADDRESS BOOK MANAGEMENT SYSTEM AND METHOD
More informationOrder-to-Cash Processes
TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes
More informationA RAPID METHOD FOR WATER TARGET EXTRACTION IN SAR IMAGE
A RAPI METHO FOR WATER TARGET EXTRACTION IN SAR IMAGE WANG ong a, QIN Ping a ept. o Surveying and Geo-inormatic Tongji University, Shanghai 200092, China. - wangdong75@gmail.com ept. o Inormation, East
More informationEfficient and Effective Clustering Methods for Spatial Data Mining
Efficient and Effective Custering Methods for Spatia Data Mining Raymond T. Ng Department of Computer Science University of British Coumbia Vancouver, B.C., V6T 124, Canada rng@cs.ubc.ca Jiawei Han Schoo
More informationLexmark ESF Applications Guide
Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses
More informationTCP/IP Gateways and Firewalls
Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and
More informationHow To Deiver Resuts
Message We sha make every effort to strengthen the community buiding programme which serves to foster among the peope of Hong Kong a sense of beonging and mutua care. We wi continue to impement the District
More informationKeyword Search over Shared Cloud Data without Secure Channel or Authority
Keyword Search over Shared Cloud Data without Secure Channel or Authority Yilun Wu, Jinshu Su, and Baochun Li College of Computer, National University of Defense Technology, Changsha, Hunan, China Department
More informationarxiv:1506.05851v1 [cs.ai] 18 Jun 2015
Smart Pacing for Effective Onine Ad Campaign Optimization Jian Xu, Kuang-chih Lee, Wentong Li, Hang Qi, and Quan Lu Yahoo Inc. 7 First Avenue, Sunnyvae, Caifornia 9489 {xuian,kcee,wentong,hangqi,qu}@yahoo-inc.com
More informationELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l
ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may
More informationELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l l. l l
ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account Some of these
More informationPricing and Revenue Sharing Strategies for Internet Service Providers
Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu
More informationFast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.
Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services
More informationELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES
ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account Some of these
More informationA MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks
A MPCP-Based Centralized Rate Control Method or Mobile Stations in FiWi Access Networks 215 IEEE. Personal use o this material is permitted. Permission rom IEEE must be obtained or all other uses, in any
More informationHow To Restore A Bue Scratch In Digita Image Sequences
Consigio Nazionae dee Ricerche Istituto di Cacoo e Reti ad Ate Prestazioni Restoration of bue scratches in digita image sequences Lucia Maddaena, Afredo Petrosino RT-ICAR-NA-05-2 December 2005 Consigio
More informationIntegrating Risk into your Plant Lifecycle A next generation software architecture for risk based
Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV
More informationFederal Financial Management Certificate Program
MANAGEMENT CONCEPTS Federa Financia Management Certificate Program Training to hep you achieve the highest eve performance in: Accounting // Auditing // Budgeting // Financia Management ENROLL TODAY! Contract
More informationCopyright 2005 IEEE. Reprinted from IEEE MTT-S International Microwave Symposium 2005
Copyright 2005 IEEE Reprinted rom IEEE MTT-S International Microwave Symposium 2005 This material is posted here with permission o the IEEE. Such permission o the IEEE does t in any way imply IEEE endorsement
More informationThe eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without
More informationRestoration of blue scratches in digital image sequences
Avaiabe onine at www.sciencedirect.com Image and Vision Computing 26 (2008) 1314 1326 www.esevier.com/ocate/imavis Restoration of bue scratches in digita image sequences Lucia Maddaena a, *, Afredo Petrosino
More informationEnhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud
OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure
More informationThe Web Insider... The Best Tool for Building a Web Site *
The Web Insider... The Best Too for Buiding a Web Site * Anna Bee Leiserson ** Ms. Leiserson describes the types of Web-authoring systems that are avaiabe for buiding a site and then discusses the various
More informationREADING A CREDIT REPORT
Name Date CHAPTER 6 STUDENT ACTIVITY SHEET READING A CREDIT REPORT Review the sampe credit report. Then search for a sampe credit report onine, print it off, and answer the questions beow. This activity
More informationELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l. l l. l l. l l
ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may
More informationWith the arrival of Java 2 Micro Edition (J2ME) and its industry
Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting
More informationImplementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated
More informationRicoh Healthcare. Process Optimized. Healthcare Simplified.
Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove
More informationIEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1
IEICE TRANS. INF. & SYST., VOL.E200 D, NO. JANUARY 27 PAPER Specia Issue on Information Processing Technoogy for web utiization A new simiarity measure to understand visitor behavior in a web site Juan
More informationThe Comparison and Selection of Programming Languages for High Energy Physics Applications
The Comparison and Seection of Programming Languages for High Energy Physics Appications TN-91-6 June 1991 (TN) Bebo White Stanford Linear Acceerator Center P.O. Box 4349, Bin 97 Stanford, Caifornia 94309
More informationFixed income managers: evolution or revolution
Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate
More informationOn Distributed Computation Rate Optimization for Deploying Cloud Computing Programming Frameworks
On Distributed omputation ate Optimization for Depoying oud omputing Programming Framewors Jia Liu athy H. Xia Ness B. Shroff Xiaodong Zhang Dept. of Eectrica and omputer Engineering Dept. of Integrated
More informationCreat-Poreen Power Electronics Co., Ltd
(STOCK CODE) 002350 Creat-Poreen Power Eectronics Co., Ltd Address: 4F, Xue Zhi Xuan Mansion, NO.16 Xue Qing Road, Hasidian District, Beijing, 100083 Te: +86 (010) 82755151 Fax: +86 (010) 82755268 Website:
More informationThe guaranteed selection. For certainty in uncertain times
The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay
More informationEfficient Data Partitioning Model for Heterogeneous Graphs in the Cloud
Efficient Data Partitioning Mode for Heterogeneous Graphs in the Coud Kisung Lee Georgia Institute of Technoogy ksee@gatech.edu Ling Liu Georgia Institute of Technoogy ingiu@cc.gatech.edu ABSTRACT As the
More informationAvaya Remote Feature Activation (RFA) User Guide
Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document
More informationHigh-order balanced M-band multiwavelet packet transform-based remote sensing image denoising
Wang et a. EURASIP Journa on Advances in Signa Processing (2016) 2016:10 DOI 10.1186/s13634-015-0298-7 RESEARCH High-order baanced M-band mutiwaveet packet transform-based remote sensing image denoising
More informationA NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW
A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW 1 Dr.T.Nalini,, 2 Dr. A.Kumaravel, 3 Dr.K.Rangarajan Dept o CSE, Bharath University Email-id: nalinicha2002@yahoo.co.in
More informationOracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus
N o r w e g i a n S e a White 60ûN ATLANTIC OCEAN UNITED KINGDOM Rio Douro Hebrid Bay of Biscay Garonne Faroe Isands Shetand Isands Orkney Isands North Loire ine Rhone Rhine Po Ebe Adriatic Batic Guf of
More informationInsertion and deletion correcting DNA barcodes based on watermarks
Kracht and Schober BMC Bioinformatics (2015) 16:50 DOI 10.1186/s12859-015-0482-7 METHODOLOGY ARTICLE Open Access Insertion and deetion correcting DNA barcodes based on watermarks David Kracht * and Steffen
More informationgdoc Core Cross-platform document conversion, optimization and manipulation technology
Patform gdoc Core Cross-patform document conversion, optimization and manipuation technoogy gdoc Core gdoc Core technoogy forms part of a new generation of word-cass eectronic document soutions from Goba
More informationVirtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
More informationSketch-based Network-wide Traffic Anomaly Detection
Sketch-based Network-wide Traffic Anomay Detection Yang Liu, Linfeng Zhang, and Yong Guan Department of Eectrica and Computer Engineering Iowa State University, Ames, Iowa 500 Emai: {yang, zhangf, guan}@iastate.edu
More informationLicensed to: CengageBrain User
Licensed to: Licensed to: This is an eectronic version of the print textbook. Due to eectronic rights restrictions, some third party content may be suppressed. Editoria review has deemed that any suppressed
More information