An IAC Approach for Detecting Profile Cloning in Online Social Networks

Size: px
Start display at page:

Download "An IAC Approach for Detecting Profile Cloning in Online Social Networks"

Transcription

1 An IAC Approach for Dtcting Profil Cloning in Onlin Social Ntworks MortzaYousfi Kharaji 1 and FatmhSalhi Rizi 2 1 Dptartmnt of Computr and Information Tchnology Enginring,Mazandaran of Scinc and Tchnology,Babol, Iran 2 Dpartmnt of Computr Enginring and Information Tchnology, Shikhbaha of Isfahan, Isfahan, Iran Abstract Nowadays, Onlin Social Ntworks (OSNs) ar popular wbsits on th intrnt, which millions of usrs rgistr on and shar thir own prsonal information with othrs. Privacy thrats and disclosing prsonal information ar th most important concrns of OSNs usrs. Rcntly, a nw attack which is namd Idntity Clond Attack is dtctd on OSNs. In this attack th attackr tris to mak a fak idntity of a ral usr in ordr to accss to privat information of th usrs frinds which thy do not publish on th public profils. In today OSNs, thr ar som vrification srvics, but thy ar not activ srvics and thy ar usful for usrs who ar familiar with onlin idntity issus. In this papr, Idntity clond attacks ar xplaind in mor dtails and a nw and prcis mthod to dtct profil cloning in onlin social ntworks is proposd. In this mthod, first, th social ntwork is shown in a form of graph, thn, according to similaritis among usrs, this graph is dividd into smallr communitis. Aftrwards, all of th similar profils to th ral profil ar gathrd (from th sam community), thn strngth of rlationship (among all slctd profils and th ral profil) is calculatd, and thos which hav th lss strngth of rlationship will b vrifid by mutual frind systm. In this study, in ordr to valuat th ffctivnss of proposd mthod, all stps ar applid on a datast of Facbook, and finally this work is compard with two prvious works by applying thm on th datast. Kywords Onlin social ntworks, Profil cloning, Privacy 1.Introduction Social ntwork wbsits ar dfind as wb srvics that allow usrs to mak public and smipublic profils in a boundd systm, to build a list of usrs with whom hav a kind of common rlationship, and to sarch in thir frinds lists [1]. On of th most important challngs of obsrving frinds information is thratning usrs scurity and privacy. An advrsary can caus many problms by xploiting usrs information. This data may contain usrs financial information which advrsary can us thm to do idntity thft attacks, or may contain usrs mdical background such as halthy status, diagnosis or tratmnt rcords [2]. Rcntly, a nw kind of attack which is namd Idntity Clon Attack is dtctd on OSNs that maks fak idntitis of spcific usrs. Th basic goals of th advrsary in this attack ar obtaining victim s frinds prsonal information by forging ral usr profil, and incrasing trust among mutual frinds to do mor dfrauding in th futur [3]. Two kinds of ths attacks ar alrady dfind: first on is Singl-Sit Profil Cloning, and th nxt on is Cross-Sit Profil Cloning. In th first attack, advrsary forgs th ral usr profil in th sam social ntwork and us this clond profil to snd frind rqust to usrs frinds. An unawar usr may think this DOI : /ijnsa

2 rqust is from a familiar usr hnc sh/h will confirm it and his/hr prsonal information will b accssibl for advrsary. Th nxt attack is cross-sit profil cloning, as it shown in Figur1, th advrsary dtcts a usr with his/hr frinds in ntwork A, thn mak a clon profil with his/hr attributs in ntwork B which usr has not mad account yt. Th advrsary snds frind rqusts to th victim s frinds in ntwork B. Victim s frinds think thy know th sndr of rqusts and confirm thm, and as soon as thy confirm th rqust, th advrsary will thiv thir prsonal information. Th advrsary uss this information to mak othr clon profils or to dciv othrs in th futur. Dtcting this kind of attack is vry difficult for srvic providrs and profils ownrs, bcaus srvic providrs think it is a nw usr which is rgistring in ths wbsits [4]. Discovring clond profils with mor prcis mthods can bring mor scurity for usrs who ar using social ntworks, and also caus an incrasing movmnt for srvic providrs to improv thir scurity lvl in th srvics thy provid on thir platforms [5]. Figur 1. Singl-sit profil cloning and cross-sit profil cloning attacks [5] Th rst of th papr is organizd as follows: in sction 2,a short rviw on rlatd works ar xprssd and sction 3 prsnts th proposd mthod for dtcting clond profils in complt dtails. In sction 4, to valuat th applicability of proposd mthod, it is applid on a datast of Facbook and it is also compard with prvious works in sction 5. Finally, in sction 6, th papr is concludd and som fasibl futur works ar discussd. 2.Rlatd Works Many social ntworks hav a wak usr to usr authntication mchanism that ar mostly basd on prsntd information such as nam, photos, and a st of social links. This causs th misus of profil cloning attack to mak fak social links. Bhumiratana in [6] prsntd a modl to xploit of availabl wak trust in social ntworks. This modl savs th authority of an onlin fak idntity which mad by profil cloning attack to obtain mor prsonal information. This rsarch proposd an attack mthodology to us clond profils and to do rliabl intractions among slctd usrs. Proposd modl uss an array of attacking tchniqus to mak a prmannt and automatic clond idntity of ral usrs on social ntworks so that ar abl to gt prsonal data in a spcific priod of tim. This proposd systm works among diffrnt social ntworks. Jin t al. in [7] proposd an activ dtction framwork to dtct clond profils.an intllignt fak idntity not only forgs usrs' attributs, but may add victim's frinds into his frind ntwork too. According to similarity of attributs and usrs' frind list thr ar two ways for dfining similarity masur among ral idntity and fak idntitis. On of thm is basic profil similarity and th nxt on is multipl-fakd idntitis profil similarity. In this rsarch, according to th similarity of profils, a framwork for dtcting clond profils on social ntwork is proposd which contains of thr stps: first stp is to sarch and sparat idntitis as a st of profils, as 76

3 th ntry of sarch is a profil attributs. Scond stp is dtcting suspicious profils by using profil similarity schmas, and third stp is dlting clond profils from frind list. In dtcting procss adjusting a st of paramtrs can hlp to do a corrct dtction in diffrnt social ntworks. Kontaxis t al. in [8] offrd a tool which is abl to automatically sarch and dtct clond profils in OSNs. Th concpt ky of thir approach is using usr-spcific data which is xtractd from ral usr profil in social ntwork. In this approach, finally a list of profils which ar probably clond with similarity scors is prsntd to usr. A string matching algorithm is usd to dfin th similarity of attributs btwn two profils and assign similarity scor for ach candidat idntity. In this mthod dtcting clond profil contains thr stps as follows: information Distillr, profil huntr, and profil vrifir. Gani t al. in [9] discussd a pic of work which intnds to provid som insights rgarding th rsolution of th hard problm of multipl idntitis dtction. Basd on hypothsis that ach prson is uniqu and idntifiabl whthr in its writing styl or social bhavior, thy proposd a framwork rlying on machin larning modls and a dp analysis of social intractions, towards such dtction. Most of th currnt rsarch has focusd on protcting thprivacy of an xisting onlin profil in a givn OSN. Instad, Conti t al. in [10]notd that thr is a risk of not having a profil in th last fancysocial ntwork. Th risk is du to th fact that an advrsary maycrat a fak profil to imprsonat a ral prson on th OSN.Th fak profil could b xploitd to build onlin rlationshipwith th frinds of victim of idntity thft, with th final targt ofstaling prsonal information of th victim, via intracting onlinwith th frinds of th victim. 3. Th proposd approach Th dtction approach is organizd in 6 stps as follows: 3.1. Discovring community th social ntwork graph In many social ntworking sits, ntwork topological structur and attributs valus ar th complt information. Nods rprsnt usrs and dgs rprsnt th rlationship among thm. In ach nod, thr ar som attributs such as nam, gndr, ducation, intrsts, location and social activitis. It is obvious that ntwork topological structur and attribut information can b usd to idntify som hiddn pattrns in communitis. In this study, IAC clustring algorithm [11] is applid to dtct communitis in social ntwork graphs. Figur 2 shows a psudo cod of th algorithm whr it accpts an attribut augmntd graph and rturn a clustrd graph as output. Figur 2. IAC Clustring Algorithm [11] 77

4 An augmntd graph is a graph G = (V, E, ), whr V = {v 1, v 2, v 3,,v n } is th st of nods and n = V dnots th numbr of nods in th graph, E V V is th st of dgs,e = {(v i, v j ): v i, v j V}, and R v d is th nods attribut matrix. First of all, th algorithm crats th similarity matrix C, thn according to K (K = E) it adds th st of dgs to th graph and th lmnts which blong to ths dgs ar st to 1 in matrix S. As wll as matrix W is mad by summation of S and A. To this nd, a wightd graph is clustrd by MCL algorithm that is dmonstratd in Figur 3. MCL is a clustring algorithm [12] basd on stochastic flows on th graph and in ordr to xcut it, first, transition matrix should b mad from wightd graph obtaind through matrix W. This algorithm includs xpansion and inflationoprations on stochastic matrixs such that th xpansion is calculatd as M M and th inflation incrass th M s lmnts to amount of r (r > 1), thn normalizs ach column. Eq. 1 indicats how th inflation opration works, aftr normalizing th summation of ach column will b 1. Γ M MCL is startd from a standard flow matrix and th two oprations apply it altrnativly until th output matrix gts a stabl stat and it will not b changd whn th oprations ar applid again. Aftr,allof clustrs ar dtrmind in th rows of th stabl matrix. (1) 3.2.Extraction usr s attribut Figur 3. MCL clustring algorithm [12] In this stag, th usr s information is xtractd from his/hr lgitimat profil in onlin social ntwork. At th start, th usr s profil is analyzd thn it is spcifid that which parts of usr s profil can b rgard as usr-spcific. This information is usd to construct quris in sarch ngins of social ntworks. Th xtractd information is includs nam, gndr, location, ducation, mail and tc. social ntworks ownr and srvic providr hav complt accss to usrs data and can xploit usr-spcific from hr/his profil asily. 3.3.Sarch in community In stp1, th socialgraphwasclustrdconcrning to usrs attribut similaritis. In this stag for finding similar profils to ral usr s profil, th clustr which is blong to ral usr is markd thn all of similar profils ar sarchd by nam attribut. Th sarch rsult is th list of profils with similar or sam nam to ral profil. 78

5 3.4. Slcting profil In this stag, th profils which hav mutual frinds with victim (ral profil) ar pickd up among foundd profils in stp 3. Mutual frinds ar th frinds who xist in th victim s frind list and in th frind list of ach candidat profil in th sam tim. Sinc, in profil cloning attacks many frind rqusts ar snt to victim s frinds, it is obvious thy hav som common frinds with victim [4]. Hnc, only profils which hav mutual frinds with victim ar chosn for continuing nxt stps Computing strngth of rlationship In stp 5, all of nods dgs which was accdd in this stag, ar wightd considring to th numbr of common activ frinds, shard Urls and pag-liks among usrs. Formally, th social ntwork can b dfind as a wightd graph G = (V, E, W), whr V is th st of profils, E V V is th st of dgs, and W R is a st of wights ar assignd to dgs. For ach nod v V, a 3-dimntional fatur vctor is dfind as it is includd in th numbr of activ frinds, pag liks and common shard URLs. Thrfor, wight of ach dg ij = (v i,v j ) is calculatd as summation of common activs frinds, pag liks and common shard URLs btwn nods v i and v j. Furthr dtails prsntd how th wights can comput com in th following parts [13] Activ frinds: This masur taks th intraction frquncy of a usr with his/hr frinds in th ntwork. For a usr V i with F i as th st of frinds, th st of activ frinds F i a can b computd as an intraction btwn th st F i and th st of frinds of V i who wr ithr contactd by V i or thos who intractd with V i through wall posts, commnts or tags. It can b dfind using Eq. 2 in whr I i is th st of usrs with whom V i has intractions in th ntwork. For a nod V i th valu of th activ frinds fatur is takn as th cardinality of th st of its activ frinds F i a. Similarly, th st of common activ frinds in th ntwork with whom a pair of usrs v i and v j hav intractd is calculatd as th intrsction of thir activ frinds F i a and F j a, rspctivly, as givn in Eq. 3. For an dg ij = (v i,v j ), th valu of th activ frinds fatur is takn as th cardinality of th st of common activ frinds F ij a [13]. (2) Pags-liks: (3) This fatur computs th pag liks frquncy of th usrs in social ntwork. For an dg ij = (v i, v j ), th common pag liks of v i and v j, P ij, is calculatd as th intraction of th sts of pag liks of v i and v j, as givn in Eq. 4, and th pag liks attribut valu is calculatd as th cardinality of th st P ij [13]. (4) URLs: this fatur capturs th URL sharing pattrns of th social ntworks usrs. For an dg ij = (v i,v j ), th common URLs of v i and v j, U ij, is calculatd as th intrsction of th st of URLs shard by v i and v j. Th URLs attribut valu is calculatd as a fraction of URLs commonly shard by thm using Eq. 5 [13]. (5) 79

6 On th basis of th abov mntiond faturs, ach dg ij = (v i,v j ), is assignd a wight w( ij ) that is calculatd as an summation of th individual fatur valu as givn in Eq. 6. rprsnts th cardinality of th st [13]. (6) Aftrward, th wights ar assignd to ach dg in social ntwork graph and strngth of rlationship is calculatd btwn two nods as follows: Dfinition 1 (Frindship Graph) [14] Givn a social ntwork G and a nod v G.N, th frindship graph of v, dnotd as FG (v), is a sub-graph of G whr: (1) FG(v).N = {v} {n G.N n v, G.E, = <v, n> }; (2) FG(v).E = { = <v, n> G.E n FG (v).n} { = <n, n > G.E n, n FG(v).N } Dfinition 2 (Mutual Frinds Graph) [14] Givn a social ntwork G and two nods v, c G.N, th mutual frinds Graph of v and c, dnotd as MFG(v, c), is a sub-graph of G whr: (1) MFG(v, c).n = {v, c} {n G.N n v, n c,, G.E, = <v, n> = <n, c> }; (2) MFG(v, c).e = { = n, n G.E n, n MFG (v, c).n} For instanc, Frindship graph of nod 7 and mutual frinds graph of 7 and 12 ar shown in Figur 4. Figur 4. Frinds and mutual frinds graphs Dfinition 3 (Strngth of rlationship btwn two nods) Givn a social ntwork G and two nods v, c G.N, Lt T = {MFG(v, c).e }, R = { FG(v).E }, P = {FG (c).e }. Strngth of rlationship btwn v and c is dfind in Eq.7 as follows:, (7) Strngth of rlationship (SR)masur is calculatd btwn ach suspiciousprofil which hasmutual frinds with victim. Inasmuch as an xprt advrsary attmpts to mak lss suspicious by making social rlationship and intractions with victim s frinds. Strngth of rlationship masur is usd to dtct clond idntitis bcaus th ral idntitis mak mor dp social activitis than thm as thy mostly know ach othr in ral lif. Thy might gt intimacy through rlationships in ral lif or voic and vido chat on th Intrnt for a whil [15]. Thrfor, ral 80

7 usrs contribut in social activitis lik commnting, snding mssag and tagging mor than faks and clarly thy hav highr SR comparing to clond profils. In th rst of this stag, nods ar sortd in a list by amount of SR as RS (v, c 1 ) < RS (v, c 2 )<RS (v, c 3 ) < <RS (v, c n ) and n is th numbr of profils which hav rachd in stp 5. Among ths profils, c 1 has th last SR and it will b snt to nxt stp for vrifying. If it dos not idntify as a clond idntity th nxt on in th list, c 2 will b gon to stag 6. This trnd will b continud until th last profil in th list Dcision making Hrtofor, som mthods wr prsntd to vrify th suspicious idntity in onlin social ntworks. In a primary approach, th ID numbr is askd from usrs for vrification procss. For xampl Idntity Badg wants usrs to ntr thir passport numbr [16]. Th social vrification approach is prsntd by Schchtr t al. [17] want usrs to dsign som qustions to vrify thir frinds and if a usr answrs most qustions corrctly h/sh will b markd as a valid usr. A proposd approach is vrifying suspicious idntitis by mutual frinds as it is wantd mutual frinds to dsign som qustion concrning to background knowldg that thy hav obtaind during thir rlationships. As wll as ths qustions can b dsign by som social nginring tachings. It is vidnt that a clond idntity cannot answr th qustion corrctly, spcially th qustions which ar dsignd considring to usrs background. Also similar idntitis (ar not fak) snd thir own answrs which ar undrstandabl for mutual frinds as thy com from ral idntitis. Evntually, fak idntitis ar idntifid and thy rmov or closd tmporary by srvic providr as wll as thir frinds rciv som notification for xistnc a fak idntity in thir frind list. Figur 5dmonstrats a viw of proposd vrification systm. Figur 5. Vrification systm by mutual frinds Th diagram of dtction approach is shown in Figur 6. Figur 6. IAC Dtction Approach 81

8 4.Exprimntal Rsults In ordr to valuat th proposd approach, an offic datast of Facbook usrs [18] is usd and it is updatd by adding usr s attributs, shard Urls and pag-liks. Vrification th proposd approach is not possibl for a normal social ntwork usr bcaus only srvic providrs havaccss to usrs original information and social ntwork graph.also som social ntworks hav rstrictions thus normal usrs cannot mak clon profil asily [4]. Thr ar 63,731 usrs in this datast and 1,634,115 links among thm thus ach usr has 25.6 rlationship links on avrag. To valuat th approach, it is assumd that thr ar som fak idntitis in this datast and it is ncssary to add thmto datast as victims. For dmonstrating th dtail of ffctivnss of proposd approach, 20 usrs ar slctd from th datast as thir social graph is shown in Figur7 and thir attributs ar xhibitd in Tabl 1. Tabl usrs attributs slctd from datast ID Nam Gnd r Education School Dgr Work Employ r Position Birthd ay Locatio n Rlatio nship 32 NikoP arda Fmal Harvard PhD East Man Managr 1979 USA Singl 35 Abraha m Fmal Arcadia Mastr s Owns Wb Dvlopr 1980 USA Singl 36 Abraha Fmal Carolina Mastr s Owns Wb Dvlopr 1980 USA Singl 174 David Ernox Mal Michigan Mastr s Qpass Java Dvlopr 1984 USA Singl 463 Abram Fmal Michigan Mastr s AppNt Wb Dvlopr 1985 USA Singl 1236 Tom Banho Mal Acadia Bachlor Xing Ntwork Managr 1979 USA Marrid 2411 Ros Milan Fmal Koln PhD Axvrt Managr 1972 USA Singl 33 Hanrry Dabuo Mal Dublin High school Diploma Sonic Scrtary 1970 UK Marrid 34 Rosa Morad a Fmal Franklin school High Diploma Sonic Bookkping 1974 UK Marrid 163 Charls Slvin Mal Pitrsburg Bachlor Sony Accountant 1979 UK Marrid 4013 SolDi ao Mal Chstr Mastr s Maxtor Databas Administrator 1983 Franc Singl 4014 Lor Parsan Fmal Pitrsburg Bachlor Sonic Databas Administrator 1982 Spain Singl 4023 Caroli n Wolf Fmal Franklin school High Diploma Sony Bookkping 1979 Grman y Marrid 1081 Alx Monat a Mal Lowa Mastr s Sony Elctrical Enginr 1986 UK Marrid 82

9 37 Silvia Jacson Fmal Carolina Bachlor MySpac Computr Data Clrk 1978 Australi a Marrid 1187 Shry Monat n Fmal Dublin High school Diploma MySpac Buyr 1968 Australi a Singl 1195 Mlina Diyana Fmal Pitrsburg PhD MySpac Call Cntr Assistant 1989 Australi a Singl 1234 LinaEg hos Fmal Gablino school High Diploma Amgn Buyr 1980 Canada Singl 1235 Mariya naplan ta Fmal lowa Bachlor Amgn Elctrical Enginr 1987 Canada Singl 1237 Tony Cazola Mal Carolina Bachlor Amgn Call Oprator cntr 1978 Canada Singl Figur 7.20 usrs social graph As mntiond bfor, an activ frind is a frind who posts on th wall, commnts and tags on hr/his frinds posts. This rlationship is shown in grn lins in Figur Tsting th IAC approach on datast All of dtction stps (6 stps) ar applid to usrs of datast as wll as it is supposd that thy do not us any particular privacy stting Choosing a victim idntity Initially, a usr is slctd as a victim idntity from datast. As it is mntiond in sction 1, an attackr maks a fak idntity considring som accptabl information of a ral idntity which h/sh has alrady gathrd from onlin social ntworks or othr sits. Attackr uss this victim to rach his goal by conncting to victim s frinds [4].Usr 35 is chosn as a victim bcaus it has som prquisits as th numbr of links (dgs) and social activitis (grn dgs) in th ntwork. Thrfor a victim idntity 35 is cratd and its attribut valus ar displayd in Tabl 2 and Figur 8 dmonstrats its position in social graph in rd color. 83

10 Tabl usrs attributs slctd from datast with fak idntity ID Nam Gndr 32 NikoParda Fmal Abraham Abraham Fmal Fmal 36 Abraha Fmal 174 David Ernox Mal 463 Abram Fmal 1236 Tom Banho Mal Education Work School Dgr Employr Position Harvard Arcadia Arcadia Carolina Michigan Michigan Acadia Birthday Locati on Rlations hip PhD East Man Managr 1979 USA Singl Mastr s Owns Wb Dvlopr 1980 USA Singl Bachlor Owns Wb Dvlopr 1980 USA Singl Mastr s Owns Wb Dvlopr 1980 USA Singl Mastr s Qpass Java Dvlopr 1984 USA Singl Mastr s AppNt Wb Dvlopr 1985 USA Singl Bachlor Xing Ntwork Managr 1979 USA Marrid 2411 Ros Milan Fmal Koln PhD Axvrt Managr 1972 USA Singl HanrryDabu o Rosa Morada Mal Fmal 163 CharlsSlvin Mal 4013 SolDiao Mal 4014 Lor Parsan Fmal 4023 Carolin Wolf Fmal 1081 Alx Monata Mal 37 Silvia Jacson Fmal ShryMonat n Mlina Diyana Fmal Fmal 1234 LinaEghos Fmal MariyanaPla nta Tony Cazola Dublin school Franklin school Pitrsburg Chstr Pitrsburg Franklin school Lowa Carolina Dublin school Pitrsburg High High High High Gablino High school Diploma Sonic Scrtary 1970 UK Marrid Diploma Sonic Bookkping 1974 UK Marrid Bachlor Sony Accountant 1979 UK Marrid Mastr s Bachlor Maxtor Sonic Databas Administrator Databas Administrator Diploma Sony Bookkping 1979 Mastr s Bachlor Sony MySpac Elctrical Enginr Computr Clrk Data 1983 Franc Singl 1982 Spain Singl Grma ny Marrid 1986 UK Marrid 1978 Diploma MySpac Buyr 1968 PhD MySpac Fmal lowa Bachlor Amgn Mal Carolina Call Cntr Assistant 1989 Diploma Amgn Buyr 1980 Bachlor Amgn Elctrical Enginr Call Oprator cntr Austral ia Austral ia Austral ia Canad a Canad a Canad a Marrid Singl Singl Singl Singl Singl 84

11 Initializing Figur usrs social graph with a fak idntity As mntiond in sction 3-1, it is ncssary to initializ bfor prforming th xprimnts on thdatast. Attribut augmntd dgs ar chosn among th top K similar pairs of matrix C whr K = E. Th highr mount is gottn, th mor dgs ar addd to ach community thus mor accurat clustrs ar formd on th social graph. At th bginning, is st by 0.68 (K = 34) thn it will b st by othr valus in sction Discovring communitis in social graph Aftr prforming IAC algorithm on datast, th attribut augmntd graph and clustrd graph with thr communitis C 1, C 2 and C 3 ar gaind so that isshown in Figur 9 and Figur 10 rspctivly. Figur 9. Attribut augmntd graph 85

12 Extracting victim s attributs Figur 10.Clustrd graph by IAC algorithm Th information of victim (who wants to dtct his clons) is xtractd in this stp and it shown in Tabl 3. Tabl 3. Ral usr s attributs ID Nam Gndr 35 Abraham Fmal Education Work Birthda School Dgr Employr Position y Arcadia Mastr s Owns Wb Dvlopr Location Rlationshi p 1980 USA Singl Sarching in Community Sinc nod 35 is blong to C 1, only in this community is sarch for finding similar profils to 35. Th sarchrsult is shown in Tabl 4. Tabl 4.Similar usrs to 35 ID Nam Gndr Abraha m Abraha Abram Fmal Fmal Fmal Education Work Birthd School Dgr Employr Position ay Arcadia Carolina Michigan Bachlor Mastr s Mastr s Owns Owns AppNt Wb Dvlopr Wb Dvlopr Wb Dvlopr Location 1980 USA Singl 1980 USA Singl Rlationship 1985 USA Singl 86

13 Slcting apt idntitis According to profil cloning attacks, an attackr aims victim s frinds and snds thm frind rqusts hnc a clond profil will hav som victim s frinds in its frind list [29]. Nod 463 is not a clon idntity bcaus it is connctd to nod 35 dirctly and only 36 and 35 ar passd to nxt stp Computing strngth of rlationship In this stp, SR is calculatd for nod 35 and nod 36 in rgard to Eq. 2,3,4,5,6,7 thn thy will b ordrd by valus: SR (35, 35 ) = SR (35, 36) = As it is shown amount of SR (35, 35 ) is lss than othr and first it will b snt to nxt stag for vrification Vrification In this part, nods 2411, 32, 1236, 174 (mutual frinds btwn 35 and 35 ) ar askd to dsign som tchnical qustions concrning th rlationship background. Nod 35 cannot answr th qustions du to lack of knowldg about usrs prvious activitis and it is markd as clon nods. 4.2.Th rol of to constructing communitis In this sction, th is st by som othr valus as rprsnt in Tabl 4. For xampl whn =1, th numbr of augmntd dgs will b E. Th clustrd graphs with changing arshown in Figur11. If is incrasd and th form of clustring dos not chang, it mans that th dfault valu for was corrct and most similar usrs ar in ach community. Tabl 5. Diffrnt valus of K

14 Figur 11. Th diffrnt graphs with diffrnt For indicating th rol of to construct communitis with similar mmbrs, a similarity rat in clustr paramtr is dfind as follows: similarity rat in clustr C1 C2 C3 Figur 12. Similarity rat in community Th similar rat in clustrsfor C 1, C 2 and C 3 in Figur 10, is indicatd in diagram of Figur 12. According to diagram, through incrasing th valu of th most accurat clustrs ar obtaind in th light of similar mmbrs. 88

15 5. Evaluation In ordr to dmonstrat th accuracy of IAC approach,first two paramtrs ar dfind as follows: Tru positiv (TP): Numbr of clon nods that ar idntifid as fak nods Fals Positiv (FP): Numbr of ral nods that ar idntifid as fak nods Nxt, som othr clon nods ar addd to datast and IAC approach is applid on. As shown in Figur 13, for all numbrs of fak nods, th mount of TP is highr than FP Numbr of clon nods TP FP Figur 13. TP and FP for clon nod dtction With th intnsion of comparing IAC approach to prvious approachs,all of thr prvious approachs ar applid on th datast. As diagram in Figur 14shows, in prvious approachs th mount of thir TP is lss than th TP of IAC approach and also th mount of thir FP is mor than th FP of IAC approach. Hnc our approach can dtct fak nods mor accurat than othrs Jin Kontaxis IAC TP FP 6.CONCLUSIONS Figur 14.Comparing thr xiting approachs Nwly, social ntworks bcam a significant part of popl normal lif and th most intrnt usrs spnd thir tims on. Alongsid many usful applications thy hav som othr aspcts which ar growing by hackrs, hustlrs and onlin thif. In this papr, an approach was suggstdfor 89

16 dtcting clond profils dpnding on usrs similaritis and thir rlationship in 6 stps. It should b notd that, although dtcting fak idntitis can stop gratr xtnt of dcption in futur, prvntion is bttr than cur bcaus it is nough for an attackr to obsrvr usrs dtail onc. Thrfor, taching usrs is a worthy attmpt to prvnt cloning attacksso that thy must not accpt frind rqusts whn thy do not know th sndr. With a viw to xtnd th proposd approach, it can b dvlopd as a Facbook application which ach usr can run it on his/hr profil and also som fuzzy mthods can b usd to ovrcom wrongly typdinformation in usrs profils. REFERENCES [1] D. Boyd and N. Ellison, Social ntwork sits: Dfinition, history, and scholarship, IEEE Enginring Managmnt Rviw Journal, vol. 38, no. 3, pp , [2] G. J Ahn, M. Shhab and A. Squicciarini, Scurity and Privacy in Social Ntworks, IEEE Intrnt Computing Journal, vol. 15, no. 3, pp , [3] H. Gao, Jun Hu, T. Huang, J. Wang and Y. Chn, Scurity issus in onlin social ntworks, IEEE Intnt Computing Journal, vol. 15, no. 4, pp , [4] L. Bilg, T. Struf, D. Balzarotti and E. Kirda, All Your Contacts Ar Blong to Us: Automatd Idntity Thft Attacks on Social Ntworks, In Procding of 18th Intrnational Confrnc World Wid Wb, pp , [5] All SysSc Partnrs, "A Europan Ntwork of Excllnc in Managing Thrats and Vulnrabilitis in th Futur Intrnt", Dlivrabl D7.1: Rviw of th Stat-of-th-Art in Cybr Attacks, [6] BhumBhumiratana, A Modl for Automating Prsistnt Idntity Clon in Onlin Social Ntwork, In Procdings of th IEEE 10th Intrnational Confrnc on Trust, Scurity and Privacy in Computing and Communications, pp , [7] L. Jin, H. Takabi and J. Joshi, Towards Activ Dtction of Idntity Clon Attacks ononlin Social Ntworks, In Procdings of th first ACM Confrnc on Data and application scurity and privacy, pp , [8] G. Kontaxis, I. Polakis, S. Ioannidis and E. Markatos, Dtcting Social Ntwork Profil Cloning, In Procdings of IEEE Intrnational Confrnc on Prvasiv Computing and Communications, pp , [9] K. Gani, H. Hacidand R. Skraba, Towards Multipl Idntity Dtction in Social Ntworks, In Procdings of th 21st ACM intrnational confrnc companion on World Wid Wb, pp , [10] M. Conti, R. Poovndran and M. Scchiro, Fakbook: Dtcting Fak Profils in Onlin Social Ntworks, In Procdings of IEEE/ACM Intrnational Confrnc on Adavncss in Social Ntworks Analysis and Mining, pp , [11] S. Salm, Sh. Banitaan, I. Aljarah, J. E. Brwr and R. Alroobi, Discovring Communitis in Social Ntworks Using Topology and Attributs, In Procdings of th th Intrnational Confrnc on Machin Larning and Applications, pp , 2011 [12]S. V. Dongn, Graph Clustring by Flow Simulation, PhD Thsis, of Utrcht, [13] F. Ahmd and M. Abulaish, An MCL-Basd Approach for Spam Profil Dtction in Onlin Social Ntworks, In Procdings of th 2012 IEEE 11th Intrnational Confrnc on Trust, Scurity and Privacy in Computing and Communications, pp , [14] C. G. Akcora, B. Carminati ande.frrari, Usr similaritis on social ntworks, Social Ntworks analysis and Mining Journal, pp. 1-21, 2013 [15] Q. Cao, M. Sirivianos, X. Yang and T. Prguiro, Aiding th Dtction of Fak Accounts in Larg Scal Social Onlin Svics, In Procdings of th 9th USENIX confrnc on Ntworkd Systms Dsign and Implmntation, pp , [16] Idntity Badg [Onlin]. [17] S. Schchtr, S. Eglman, and R.W. Rdr, It's not what you know, but who you know: a social approach to lastrsort authntication, In Procdings of th 27th Intrnational Confrnc on Human Factors in computing systms,pp , [18] B.Viswanath, A. Mislov, M. Cha and K. P. Gummaldi, On th Evolution of Usr Intraction in Facbook, Procdings of th 2nd ACM workshop on onlin social ntworks, pp ,

C H A P T E R 1 Writing Reports with SAS

C H A P T E R 1 Writing Reports with SAS C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd

More information

Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.

Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives. Volum 3, Issu 6, Jun 2013 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: wwwijarcsscom Dynamic Ranking and Slction of Cloud

More information

Architecture of the proposed standard

Architecture of the proposed standard Architctur of th proposd standard Introduction Th goal of th nw standardisation projct is th dvlopmnt of a standard dscribing building srvics (.g.hvac) product catalogus basd on th xprincs mad with th

More information

FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data

FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data FACULTY SALARIES FALL 2004 NKU CUPA Data Compard To Publishd National Data May 2005 Fall 2004 NKU Faculty Salaris Compard To Fall 2004 Publishd CUPA Data In th fall 2004 Northrn Kntucky Univrsity was among

More information

QUANTITATIVE METHODS CLASSES WEEK SEVEN

QUANTITATIVE METHODS CLASSES WEEK SEVEN QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.

More information

EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS

EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS 25 Vol. 3 () January-March, pp.37-5/tripathi EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS *Shilpa Tripathi Dpartmnt of Chmical Enginring, Indor Institut

More information

union scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME!

union scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME! union scholars YOU CAN CHANGE THE WORLD... program AND EARN MONEY FOR COLLEGE AT THE SAME TIME! AFSCME Unitd Ngro Collg Fund Harvard Univrsity Labor and Worklif Program APPLICATION DEADLINE: FEBRUARY 28

More information

Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131

Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131 Sci.Int.(Lahor),26(1),131-138,214 ISSN 113-5316; CODEN: SINTE 8 131 REQUIREMENT CHANGE MANAGEMENT IN AGILE OFFSHORE DEVELOPMENT (RCMAOD) 1 Suhail Kazi, 2 Muhammad Salman Bashir, 3 Muhammad Munwar Iqbal,

More information

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book. Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl

More information

Remember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D

Remember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D 24+ Advancd Larning Loan Application form Rmmbr you can apply onlin. It s quick and asy. Go to www.gov.uk/advancdlarningloans About this form Complt this form if: you r studying an ligibl cours at an approvd

More information

A Project Management framework for Software Implementation Planning and Management

A Project Management framework for Software Implementation Planning and Management PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis Kith.Lancastr@LancastrStratgis.com Th goal of introducing nw tchnologis into your company

More information

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA

SOFTWARE ENGINEERING AND APPLIED CRYPTOGRAPHY IN CLOUD COMPUTING AND BIG DATA Intrnational Journal on Tchnical and Physical Problms of Enginring (IJTPE) Publishd by Intrnational Organization of IOTPE ISSN 077-358 IJTPE Journal www.iotp.com ijtp@iotp.com Sptmbr 015 Issu 4 Volum 7

More information

Use a high-level conceptual data model (ER Model). Identify objects of interest (entities) and relationships between these objects

Use a high-level conceptual data model (ER Model). Identify objects of interest (entities) and relationships between these objects Chaptr 3: Entity Rlationship Modl Databas Dsign Procss Us a high-lvl concptual data modl (ER Modl). Idntify objcts of intrst (ntitis) and rlationships btwn ths objcts Idntify constraints (conditions) End

More information

Gold versus stock investment: An econometric analysis

Gold versus stock investment: An econometric analysis Intrnational Journal of Dvlopmnt and Sustainability Onlin ISSN: 268-8662 www.isdsnt.com/ijds Volum Numbr, Jun 202, Pag -7 ISDS Articl ID: IJDS20300 Gold vrsus stock invstmnt: An conomtric analysis Martin

More information

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly

More information

by John Donald, Lecturer, School of Accounting, Economics and Finance, Deakin University, Australia

by John Donald, Lecturer, School of Accounting, Economics and Finance, Deakin University, Australia Studnt Nots Cost Volum Profit Analysis by John Donald, Lcturr, School of Accounting, Economics and Financ, Dakin Univrsity, Australia As mntiond in th last st of Studnt Nots, th ability to catgoris costs

More information

Continuity Cloud Virtual Firewall Guide

Continuity Cloud Virtual Firewall Guide Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY

More information

Entity-Relationship Model

Entity-Relationship Model Entity-Rlationship Modl Kuang-hua Chn Dpartmnt of Library and Information Scinc National Taiwan Univrsity A Company Databas Kps track of a company s mploys, dpartmnts and projcts Aftr th rquirmnts collction

More information

Free ACA SOLUTION (IRS 1094&1095 Reporting)

Free ACA SOLUTION (IRS 1094&1095 Reporting) Fr ACA SOLUTION (IRS 1094&1095 Rporting) Th Insuranc Exchang (301) 279-1062 ACA Srvics Transmit IRS Form 1094 -C for mployrs Print & mail IRS Form 1095-C to mploys HR Assist 360 will gnrat th 1095 s for

More information

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13) con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc

More information

WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769

WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769 08-16-85 WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769 Summary of Dutis : Dtrmins City accptanc of workrs' compnsation cass for injurd mploys; authorizs appropriat tratmnt

More information

Enforcing Fine-grained Authorization Policies for Java Mobile Agents

Enforcing Fine-grained Authorization Policies for Java Mobile Agents Enforcing Fin-graind Authorization Policis for Java Mobil Agnts Giovanni Russllo Changyu Dong Narankr Dulay Dpartmnt of Computing Imprial Collg London South Knsington London, SW7 2AZ, UK {g.russllo, changyu.dong,

More information

Adverse Selection and Moral Hazard in a Model With 2 States of the World

Adverse Selection and Moral Hazard in a Model With 2 States of the World Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,

More information

A Secure Web Services for Location Based Services in Wireless Networks*

A Secure Web Services for Location Based Services in Wireless Networks* A Scur Wb Srvics for Location Basd Srvics in Wirlss Ntworks* Minsoo L 1, Jintak Kim 1, Shyun Park 1, Jail L 2 and Sokla L 21 1 School of Elctrical and Elctronics Enginring, Chung-Ang Univrsity, 221, HukSuk-Dong,

More information

Analyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop

Analyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop Intrnational Journal of Computr Scinc and Enginring Opn Accss Rsarch Papr Volum-2, Issu-1 E-ISSN: 2347-2693 Analyzing Failurs of a Smi-Structurd Suprcomputr Log Fil Efficintly by Using PIG on Hadoop Madhuri

More information

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim

More information

June 2012. Enprise Rent. Enprise 1.1.6. Author: Document Version: Product: Product Version: SAP Version: 8.81.100 8.8

June 2012. Enprise Rent. Enprise 1.1.6. Author: Document Version: Product: Product Version: SAP Version: 8.81.100 8.8 Jun 22 Enpris Rnt Author: Documnt Vrsion: Product: Product Vrsion: SAP Vrsion: Enpris Enpris Rnt 88 88 Enpris Rnt 22 Enpris Solutions All rights rsrvd No parts of this work may b rproducd in any form or

More information

Important Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2

Important Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2 Installation and Opration Intrnt Tlphony Adaptr Aurswald Box Indx C I R 884264 03 02/05 Call Duration, maximum...10 Call Through...7 Call Transportation...7 Calls Call Through...7 Intrnt Tlphony...3 two

More information

AP Calculus AB 2008 Scoring Guidelines

AP Calculus AB 2008 Scoring Guidelines AP Calculus AB 8 Scoring Guidlins Th Collg Board: Conncting Studnts to Collg Succss Th Collg Board is a not-for-profit mmbrship association whos mission is to connct studnts to collg succss and opportunity.

More information

CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises

CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY Outcom 10 Rgulation 11 Safty and Suitability of Prmiss CQC Rf 10A 10A(1) Lad Dirctor / Lad Officr Rspons Impact Liklihood Lvl of Concrn

More information

IBM Healthcare Home Care Monitoring

IBM Healthcare Home Care Monitoring IBM Halthcar Hom Car Monitoring Sptmbr 30th, 2015 by Sal P. Causi, P. Eng. IBM Halthcar Businss Dvlopmnt Excutiv scausi@ca.ibm.com IBM Canada Cloud Computing Tigr Tam Homcar by dfinition 1. With a gnsis

More information

An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore

An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore Intrnational Journal of mrging Tchnology and dvancd nginring Wbsit: www.ijta.com (ISSN 2250-2459, Volum 2, Issu 4, pril 2012) n road outlin of Rdundant rray of Inxpnsiv isks Shaifali Shrivastava 1 partmnt

More information

The international Internet site of the geoviticulture MCC system Le site Internet international du système CCM géoviticole

The international Internet site of the geoviticulture MCC system Le site Internet international du système CCM géoviticole Th intrnational Intrnt sit of th goviticultur MCC systm L sit Intrnt intrnational du systèm CCM géoviticol Flávio BELLO FIALHO 1 and Jorg TONIETTO 1 1 Rsarchr, Embrapa Uva Vinho, Caixa Postal 130, 95700-000

More information

Lecture 20: Emitter Follower and Differential Amplifiers

Lecture 20: Emitter Follower and Differential Amplifiers Whits, EE 3 Lctur 0 Pag of 8 Lctur 0: Emittr Followr and Diffrntial Amplifirs Th nxt two amplifir circuits w will discuss ar ry important to lctrical nginring in gnral, and to th NorCal 40A spcifically.

More information

User-Perceived Quality of Service in Hybrid Broadcast and Telecommunication Networks

User-Perceived Quality of Service in Hybrid Broadcast and Telecommunication Networks Usr-Prcivd Quality of Srvic in Hybrid Broadcast and Tlcommunication Ntworks Michal Galtzka Fraunhofr Institut for Intgratd Circuits Branch Lab Dsign Automation, Drsdn, Grmany Michal.Galtzka@as.iis.fhg.d

More information

Rural and Remote Broadband Access: Issues and Solutions in Australia

Rural and Remote Broadband Access: Issues and Solutions in Australia Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity

More information

Combinatorial Analysis of Network Security

Combinatorial Analysis of Network Security Combinatorial Analysis of Ntwork Scurity Stvn Nol a, Brian O Brry a, Charls Hutchinson a, Sushil Jajodia a, Lynn Kuthan b, and Andy Nguyn b a Gorg Mason Univrsity Cntr for Scur Information Systms b Dfns

More information

A Graph-based Proactive Fault Identification Approach in Computer Networks

A Graph-based Proactive Fault Identification Approach in Computer Networks A Graph-basd Proacti Fault Idntification Approach in Computr Ntworks Yijiao Yu, Qin Liu and Lianshng Tan * Dpartmnt of Computr Scinc, Cntral China Normal Unirsity, Wuhan 4379 PR China E-mail: yjyu, liuqin,

More information

Data warehouse on Manpower Employment for Decision Support System

Data warehouse on Manpower Employment for Decision Support System Data warhous on Manpowr Employmnt for Dcision Support Systm Amro F. ALASTA, and Muftah A. Enaba Abstract Sinc th us of computrs in businss world, data collction has bcom on of th most important issus du

More information

Question 3: How do you find the relative extrema of a function?

Question 3: How do you find the relative extrema of a function? ustion 3: How do you find th rlativ trma of a function? Th stratgy for tracking th sign of th drivativ is usful for mor than dtrmining whr a function is incrasing or dcrasing. It is also usful for locating

More information

Parallel and Distributed Programming. Performance Metrics

Parallel and Distributed Programming. Performance Metrics Paralll and Distributd Programming Prformanc! wo main goals to b achivd with th dsign of aralll alications ar:! Prformanc: th caacity to rduc th tim to solv th roblm whn th comuting rsourcs incras;! Scalability:

More information

Performance Evaluation

Performance Evaluation Prformanc Evaluation ( ) Contnts lists availabl at ScincDirct Prformanc Evaluation journal hompag: www.lsvir.com/locat/pva Modling Bay-lik rputation systms: Analysis, charactrization and insuranc mchanism

More information

Category 7: Employee Commuting

Category 7: Employee Commuting 7 Catgory 7: Employ Commuting Catgory dscription This catgory includs missions from th transportation of mploys 4 btwn thir homs and thir worksits. Emissions from mploy commuting may aris from: Automobil

More information

(Analytic Formula for the European Normal Black Scholes Formula)

(Analytic Formula for the European Normal Black Scholes Formula) (Analytic Formula for th Europan Normal Black Schols Formula) by Kazuhiro Iwasawa Dcmbr 2, 2001 In this short summary papr, a brif summary of Black Schols typ formula for Normal modl will b givn. Usually

More information

CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions

CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions CPS 22 Thory of Computation REGULAR LANGUAGES Rgular xprssions Lik mathmatical xprssion (5+3) * 4. Rgular xprssion ar built using rgular oprations. (By th way, rgular xprssions show up in various languags:

More information

Asset set Liability Management for

Asset set Liability Management for KSD -larning and rfrnc products for th global financ profssional Highlights Library of 29 Courss Availabl Products Upcoming Products Rply Form Asst st Liability Managmnt for Insuranc Companis A comprhnsiv

More information

Incomplete 2-Port Vector Network Analyzer Calibration Methods

Incomplete 2-Port Vector Network Analyzer Calibration Methods Incomplt -Port Vctor Ntwork nalyzr Calibration Mthods. Hnz, N. Tmpon, G. Monastrios, H. ilva 4 RF Mtrology Laboratory Instituto Nacional d Tcnología Industrial (INTI) Bunos irs, rgntina ahnz@inti.gov.ar

More information

CPU. Rasterization. Per Vertex Operations & Primitive Assembly. Polynomial Evaluator. Frame Buffer. Per Fragment. Display List.

CPU. Rasterization. Per Vertex Operations & Primitive Assembly. Polynomial Evaluator. Frame Buffer. Per Fragment. Display List. Elmntary Rndring Elmntary rastr algorithms for fast rndring Gomtric Primitivs Lin procssing Polygon procssing Managing OpnGL Stat OpnGL uffrs OpnGL Gomtric Primitivs ll gomtric primitivs ar spcifid by

More information

Review and Analysis of Cloud Computing Quality of Experience

Review and Analysis of Cloud Computing Quality of Experience Rviw and Analysis of Cloud Computing Quality of Exprinc Fash Safdari and Victor Chang School of Computing, Crativ Tchnologis and Enginring, Lds Mtropolitan Univrsity, Hadinly, Lds LS6 3QR, U.K. {F.Safdari,

More information

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling Planning and Managing Coppr Cabl Maintnanc through Cost- Bnfit Modling Jason W. Rup U S WEST Advancd Tchnologis Bouldr Ky Words: Maintnanc, Managmnt Stratgy, Rhabilitation, Cost-bnfit Analysis, Rliability

More information

Development of Financial Management Reporting in MPLS

Development of Financial Management Reporting in MPLS 1 Dvlopmnt of Financial Managmnt Rporting in MPLS 1. Aim Our currnt financial rports ar structurd to dlivr an ovrall financial pictur of th dpartmnt in it s ntirty, and thr is no attmpt to provid ithr

More information

STATEMENT OF INSOLVENCY PRACTICE 3.2

STATEMENT OF INSOLVENCY PRACTICE 3.2 STATEMENT OF INSOLVENCY PRACTICE 3.2 COMPANY VOLUNTARY ARRANGEMENTS INTRODUCTION 1 A Company Voluntary Arrangmnt (CVA) is a statutory contract twn a company and its crditors undr which an insolvncy practitionr

More information

Abstract. Introduction. Statistical Approach for Analyzing Cell Phone Handoff Behavior. Volume 3, Issue 1, 2009

Abstract. Introduction. Statistical Approach for Analyzing Cell Phone Handoff Behavior. Volume 3, Issue 1, 2009 Volum 3, Issu 1, 29 Statistical Approach for Analyzing Cll Phon Handoff Bhavior Shalini Saxna, Florida Atlantic Univrsity, Boca Raton, FL, shalinisaxna1@gmail.com Sad A. Rajput, Farquhar Collg of Arts

More information

GOAL SETTING AND PERSONAL MISSION STATEMENT

GOAL SETTING AND PERSONAL MISSION STATEMENT Prsonal Dvlopmnt Track Sction 4 GOAL SETTING AND PERSONAL MISSION STATEMENT Ky Points 1 Dfining a Vision 2 Writing a Prsonal Mission Statmnt 3 Writing SMART Goals to Support a Vision and Mission If you

More information

Expert-Mediated Search

Expert-Mediated Search Exprt-Mdiatd Sarch Mnal Chhabra Rnsslar Polytchnic Inst. Dpt. of Computr Scinc Troy, NY, USA chhabm@cs.rpi.du Sanmay Das Rnsslar Polytchnic Inst. Dpt. of Computr Scinc Troy, NY, USA sanmay@cs.rpi.du David

More information

Presentation on Short-Term Certificates to the CAPSEE Conference. September 18, 2014

Presentation on Short-Term Certificates to the CAPSEE Conference. September 18, 2014 Prsntation on Short-Trm Crtificats to th CAPSEE Confrnc Sptmbr 18, 2014 Th first goal of City Collgs Rinvntion is focusd on nsuring studnts arn crdntials of conomic valu Rinvntion Goals Incras numbr of

More information

Traffic Flow Analysis (2)

Traffic Flow Analysis (2) Traffic Flow Analysis () Statistical Proprtis. Flow rat distributions. Hadway distributions. Spd distributions by Dr. Gang-Ln Chang, Profssor Dirctor of Traffic safty and Oprations Lab. Univrsity of Maryland,

More information

Teaching Computer Networking with the Help of Personal Computer Networks

Teaching Computer Networking with the Help of Personal Computer Networks Taching Computr Ntworking with th Hlp of Prsonal Computr Ntworks Rocky K. C. Chang Dpartmnt of Computing Th Hong Kong Polytchnic Univrsity Hung Hom, Kowloon, Hong Kong csrchang@comp.polyu.du.hk ABSTRACT

More information

Voice Biometrics: How does it work? Konstantin Simonchik

Voice Biometrics: How does it work? Konstantin Simonchik Voic Biomtrics: How dos it work? Konstantin Simonchik Lappnranta, 4 Octobr 2012 Voicprint Makup Fingrprint Facprint Lik a ingrprint or acprint, a voicprint also has availabl paramtrs that provid uniqu

More information

A Theoretical Model of Public Response to the Homeland Security Advisory System

A Theoretical Model of Public Response to the Homeland Security Advisory System A Thortical Modl of Public Rspons to th Homland Scurity Advisory Systm Amy (Wnxuan) Ding Dpartmnt of Information and Dcision Scincs Univrsity of Illinois Chicago, IL 60607 wxding@uicdu Using a diffrntial

More information

REPORT' Meeting Date: April 19,201 2 Audit Committee

REPORT' Meeting Date: April 19,201 2 Audit Committee REPORT' Mting Dat: April 19,201 2 Audit Committ For Information DATE: March 21,2012 REPORT TITLE: FROM: Paul Wallis, CMA, CIA, CISA, Dirctor, Intrnal Audit OBJECTIVE To inform Audit Committ of th rsults

More information

Logo Design/Development 1-on-1

Logo Design/Development 1-on-1 Logo Dsign/Dvlopmnt 1-on-1 If your company is looking to mak an imprssion and grow in th marktplac, you ll nd a logo. Fortunatly, a good graphic dsignr can crat on for you. Whil th pric tags for thos famous

More information

DENTAL CAD MADE IN GERMANY MODULAR ARCHITECTURE BACKWARD PLANNING CUTBACK FUNCTION BIOARTICULATOR INTUITIVE USAGE OPEN INTERFACE. www.smartoptics.

DENTAL CAD MADE IN GERMANY MODULAR ARCHITECTURE BACKWARD PLANNING CUTBACK FUNCTION BIOARTICULATOR INTUITIVE USAGE OPEN INTERFACE. www.smartoptics. DENTAL CAD MADE IN GERMANY MODULAR ARCHITECTURE BACKWARD PLANNING CUTBACK FUNCTION BIOARTICULATOR INTUITIVE USAGE OPEN INTERFACE www.smartoptics.d dntprogrss an b rsion c v o m d ss.d! A fr ntprog.d w

More information

Personal Identity Verification (PIV) Enablement Solutions

Personal Identity Verification (PIV) Enablement Solutions Prsonal Idntity Vrification (PIV) Enablmnt Solutions pivclass Govrnmnt Solutions Affordabl Prsonal Idntity Vrification (PIV) Enablmnt Solutions from a Singl, Trustd Supplir Complt Solution for PIV Enablmnt

More information

Lecture 3: Diffusion: Fick s first law

Lecture 3: Diffusion: Fick s first law Lctur 3: Diffusion: Fick s first law Today s topics What is diffusion? What drivs diffusion to occur? Undrstand why diffusion can surprisingly occur against th concntration gradint? Larn how to dduc th

More information

Caution laser! Avoid direct eye contact with the laser beam!

Caution laser! Avoid direct eye contact with the laser beam! Manual ontnt 1. aturs 3 2. Spcifications 3 3. Packag contnts 3 4. Th mous at a glanc 4 5. onncting to th P 5 6. Installing th softwar 5 7. Th ditor 6 7.1 Starting th ditor 6 7.2 Main ontrol window 6 7.3

More information

A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux

A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux A Loadabl Task Excution Rcordr for Hirarchical Schduling in Linux Mikal Åsbrg and Thomas Nolt MRTC/Mälardaln Univrsity PO Box 883, SE-721 23, Västrås, Swdn {mikalasbrg,thomasnolt@mdhs Shinpi Kato Carngi

More information

Defining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind

Defining Retirement Success for Defined Contribution Plan Sponsors: Begin with the End in Mind Dfining Rtirmnt Succss for Dfind Contribution Plan Sponsors: Bgin with th End in Mind David Blanchtt, CFA, CFP, AIFA Had of Rtirmnt Rsarch Morningstar Invstmnt Managmnt david.blanchtt@morningstar.com Nathan

More information

A Note on Approximating. the Normal Distribution Function

A Note on Approximating. the Normal Distribution Function Applid Mathmatical Scincs, Vol, 00, no 9, 45-49 A Not on Approimating th Normal Distribution Function K M Aludaat and M T Alodat Dpartmnt of Statistics Yarmouk Univrsity, Jordan Aludaatkm@hotmailcom and

More information

Scalable Transactions for Web Applications in the Cloud using Customized CloudTPS

Scalable Transactions for Web Applications in the Cloud using Customized CloudTPS Shashikant Mahadu Bankar/ (IJCSIT) Intrnational Journal of Computr Scinc and Information Tchnologis, Vol. (3), 2015, 218-2191 Scalabl Transactions for Wb Applications in th Cloud using Customizd CloudTPS

More information

Upper Bounding the Price of Anarchy in Atomic Splittable Selfish Routing

Upper Bounding the Price of Anarchy in Atomic Splittable Selfish Routing Uppr Bounding th Pric of Anarchy in Atomic Splittabl Slfish Routing Kamyar Khodamoradi 1, Mhrdad Mahdavi, and Mohammad Ghodsi 3 1 Sharif Univrsity of Tchnology, Thran, Iran, khodamoradi@c.sharif.du Sharif

More information

Foreign Exchange Markets and Exchange Rates

Foreign Exchange Markets and Exchange Rates Microconomics Topic 1: Explain why xchang rats indicat th pric of intrnational currncis and how xchang rats ar dtrmind by supply and dmand for currncis in intrnational markts. Rfrnc: Grgory Mankiw s Principls

More information

Category 1: Purchased Goods and Services

Category 1: Purchased Goods and Services 1 Catgory 1: Purchasd Goods and Srvics Catgory dscription T his catgory includs all upstram (i.., cradl-to-gat) missions from th production of products purchasd or acquird by th rporting company in th

More information

Cisco Data Virtualization

Cisco Data Virtualization Cisco Data Virtualization Big Data Eco-systm Discussion with Bloor Group Bob Ev, David Bsmr July 2014 Cisco Data Virtualization Backgroundr Cisco Data Virtualization is agil data intgration softwar that

More information

Meerkats: A Power-Aware, Self-Managing Wireless Camera Network for Wide Area Monitoring

Meerkats: A Power-Aware, Self-Managing Wireless Camera Network for Wide Area Monitoring Mrkats: A Powr-Awar, Slf-Managing Wirlss Camra Ntwork for Wid Ara Monitoring C. B. Margi 1, X. Lu 1, G. Zhang 1, G. Stank 2, R. Manduchi 1, K. Obraczka 1 1 Dpartmnt of Computr Enginring, Univrsity of California,

More information

SPECIAL VOWEL SOUNDS

SPECIAL VOWEL SOUNDS SPECIAL VOWEL SOUNDS Plas consult th appropriat supplmnt for th corrsponding computr softwar lsson. Rfr to th 42 Sounds Postr for ach of th Spcial Vowl Sounds. TEACHER INFORMATION: Spcial Vowl Sounds (SVS)

More information

Maintain Your F5 Solution with Fast, Reliable Support

Maintain Your F5 Solution with Fast, Reliable Support F5 SERVICES TECHNICAL SUPPORT SERVICES DATASHEET Maintain Your F5 Solution with Fast, Rliabl Support In a world whr chang is th only constant, you rly on your F5 tchnology to dlivr no mattr what turns

More information

Intermediate Macroeconomic Theory / Macroeconomic Analysis (ECON 3560/5040) Final Exam (Answers)

Intermediate Macroeconomic Theory / Macroeconomic Analysis (ECON 3560/5040) Final Exam (Answers) Intrmdiat Macroconomic Thory / Macroconomic Analysis (ECON 3560/5040) Final Exam (Answrs) Part A (5 points) Stat whthr you think ach of th following qustions is tru (T), fals (F), or uncrtain (U) and brifly

More information

the so-called KOBOS system. 1 with the exception of a very small group of the most active stocks which also trade continuously through

the so-called KOBOS system. 1 with the exception of a very small group of the most active stocks which also trade continuously through Liquidity and Information-Basd Trading on th Ordr Drivn Capital Markt: Th Cas of th Pragu tock Exchang Libor 1ÀPH³HN Cntr for Economic Rsarch and Graduat Education, Charls Univrsity and Th Economic Institut

More information

Fraud, Investments and Liability Regimes in Payment. Platforms

Fraud, Investments and Liability Regimes in Payment. Platforms Fraud, Invstmnts and Liability Rgims in Paymnt Platforms Anna Crti and Mariann Vrdir y ptmbr 25, 2011 Abstract In this papr, w discuss how fraud liability rgims impact th pric structur that is chosn by

More information

Cookie Policy- May 5, 2014

Cookie Policy- May 5, 2014 Cooki Policy- May 5, 2014 Us of Cookis on Sizmk Wbsits This Cooki Disclosur applis only to us of cookis on corporat wbsits (www.sizmk.com and rlatd rgional wbsits) publishd by Sizmk Inc. and its affiliats

More information

EVALUATING EFFICIENCY OF SERVICE SUPPLY CHAIN USING DEA (CASE STUDY: AIR AGENCY)

EVALUATING EFFICIENCY OF SERVICE SUPPLY CHAIN USING DEA (CASE STUDY: AIR AGENCY) Indian Journal Fundamntal and Applid Lif Scincs ISSN: 22 64 (Onlin) An Opn Accss, Onlin Intrnational Journal Availabl at www.cibtch.org/sp.d/jls/20/0/jls.htm 20 Vol. (S), pp. 466-47/Shams and Ghafouripour

More information

Hardware Modules of the RSA Algorithm

Hardware Modules of the RSA Algorithm SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 11, No. 1, Fbruary 2014, 121-131 UDC: 004.3`142:621.394.14 DOI: 10.2298/SJEE140114011S Hardwar Moduls of th RSA Algorithm Vlibor Škobić 1, Branko Dokić 1,

More information

Sample Green Belt Certification Examination Questions with Answers

Sample Green Belt Certification Examination Questions with Answers Sampl Grn Blt Crtification Examination Qustions with Answrs (Grn Blt crtification xaminations assum that that th participant has succssfully compltd th Champion crtification xamination at th Univrsity

More information

Keywords: Knowledge Management Foundations, Probst et al., Model, Knowledge Management, Albroz Electric Power Distribution Companies

Keywords: Knowledge Management Foundations, Probst et al., Model, Knowledge Management, Albroz Electric Power Distribution Companies THE ANALYSIS OF KNOWLEDGE MANAGEMENT IN THE ELECTRIC POWER DISTRIBUTION COMPANIES IN IRAN (CASE STUDY: ALBORZ ELECTRICITY PROVINCE DISTRIBUTION COMPANY) *Mortza Shikhi Dpartmnt of Industrial Managmnt,

More information

Product Overview. Version 1-12/14

Product Overview. Version 1-12/14 Product Ovrviw Vrsion 1-12/14 W ar Grosvnor Tchnology Accss Control Solutions W dvlop, manufactur and provid accss control and workforc managmnt solutions th world ovr. Our product offring ompasss hardwar,

More information

Global Sourcing: lessons from lean companies to improve supply chain performances

Global Sourcing: lessons from lean companies to improve supply chain performances 3 rd Intrnational Confrnc on Industrial Enginring and Industrial Managmnt XIII Congrso d Ingniría d Organización Barclona-Trrassa, Sptmbr 2nd-4th 2009 Global Sourcing: lssons from lan companis to improv

More information

Real-Time Evaluation of Email Campaign Performance

Real-Time Evaluation of Email Campaign Performance Singapor Managmnt Univrsity Institutional Knowldg at Singapor Managmnt Univrsity Rsarch Collction L Kong Chian School Of Businss L Kong Chian School of Businss 10-2008 Ral-Tim Evaluation of Email Campaign

More information

TIME MANAGEMENT. 1 The Process for Effective Time Management 2 Barriers to Time Management 3 SMART Goals 4 The POWER Model e. Section 1.

TIME MANAGEMENT. 1 The Process for Effective Time Management 2 Barriers to Time Management 3 SMART Goals 4 The POWER Model e. Section 1. Prsonal Dvlopmnt Track Sction 1 TIME MANAGEMENT Ky Points 1 Th Procss for Effctiv Tim Managmnt 2 Barrirs to Tim Managmnt 3 SMART Goals 4 Th POWER Modl In th Army, w spak of rsourcs in trms of th thr M

More information

http://www.wwnorton.com/chemistry/tutorials/ch14.htm Repulsive Force

http://www.wwnorton.com/chemistry/tutorials/ch14.htm Repulsive Force ctivation nrgis http://www.wwnorton.com/chmistry/tutorials/ch14.htm (back to collision thory...) Potntial and Kintic nrgy during a collision + + ngativly chargd lctron cloud Rpulsiv Forc ngativly chargd

More information

Mathematics. Mathematics 3. hsn.uk.net. Higher HSN23000

Mathematics. Mathematics 3. hsn.uk.net. Higher HSN23000 hsn uknt Highr Mathmatics UNIT Mathmatics HSN000 This documnt was producd spcially for th HSNuknt wbsit, and w rquir that any copis or drivativ works attribut th work to Highr Still Nots For mor dtails

More information

Who uses our services? We have a growing customer base. with institutions all around the globe.

Who uses our services? We have a growing customer base. with institutions all around the globe. not taking xpr Srvic Guid 2013 / 2014 NTE i an affordabl option for audio to txt convrion. Our rvic includ not or dirct trancription rvic from prviouly rcordd audio fil. Our rvic appal pcially to tudnt

More information

Category 11: Use of Sold Products

Category 11: Use of Sold Products 11 Catgory 11: Us of Sold Products Catgory dscription T his catgory includs missions from th us of goods and srvics sold by th rporting company in th rporting yar. A rporting company s scop 3 missions

More information

ITIL & Service Predictability/Modeling. 2006 Plexent

ITIL & Service Predictability/Modeling. 2006 Plexent ITIL & Srvic Prdictability/Modling 1 2 Plxnt Th Company 2001 Foundd Plxnt basd on an Expandd ITIL Architctur, CMMI, ISO, and BS15000 - itdna 2003 Launchd itdna Srvic Offring 2003 John Groom, past Dirctor

More information

YOU HAVE A MISSION WE HAVE TECHNOLOGY SAVING TIME TO BUILD YOUR CAMP S BOTTOM LINE

YOU HAVE A MISSION WE HAVE TECHNOLOGY SAVING TIME TO BUILD YOUR CAMP S BOTTOM LINE YOU HAVE A MISSION WE HAVE TECHNOLOGY SAVING TIME TO BUILD YOUR CAMP S BOTTOM LINE TABLE OF CONTENTS Camp Markting Ar You Invsting Your Markting Budgt Wisly? Choosing A Softwar Partnr 8 Ky Faturs Spotlight

More information

Fleet vehicles opportunities for carbon management

Fleet vehicles opportunities for carbon management Flt vhicls opportunitis for carbon managmnt Authors: Kith Robrtson 1 Dr. Kristian Stl 2 Dr. Christoph Hamlmann 3 Alksandra Krukar 4 Tdla Mzmir 5 1 Snior Sustainability Consultant & Lad Analyst, Arup 2

More information

An Adaptive Clustering MAP Algorithm to Filter Speckle in Multilook SAR Images

An Adaptive Clustering MAP Algorithm to Filter Speckle in Multilook SAR Images An Adaptiv Clustring MAP Algorithm to Filtr Spckl in Multilook SAR Imags FÁTIMA N. S. MEDEIROS 1,3 NELSON D. A. MASCARENHAS LUCIANO DA F. COSTA 1 1 Cybrntic Vision Group IFSC -Univrsity of São Paulo Caia

More information