A CPN-based Trust Negotiation Model on Service Level Agreement in Cloud Environment
|
|
- Aubrey Roberts
- 8 years ago
- Views:
Transcription
1 , pp A CPN-based Tust Negotato Model o Sevce Level Ageemet Cloud Evomet Hogwe Che, Quxa Che ad Chuzh Wag School of Compute Scece, Hube Uvesty of Techology, Wuha, Cha chw2001@sa.com Abstact The egotato pocess of the Sevce Level Ageemet (SLA) cloud evomet s a teacto pocess of access cotol ules ad cedetals. Due to the mass of cedetals cloud evomet, the egotato effcecy s ot hgh. To addess the poblem, ths pape poposes a Automated Tust Negotato (ATN) model based o Coloed Pet Net (CPN), whch exsts a legtmate occuece sequece ad a eachable state space gaph. A Mmal Cedetal Path Seachg (MCPS) algothm s poposed to fd a mmum cedetal dsclosue set the eachable makg gaph. The esults show that the algothm ca effectvely mpove the egotato effcecy. Keywods: Cloud Computg, Sevce Level Ageemet, Automated Tust Negotato, Cedetal set, Coloed Pet Net 1. Itoducto I cloud evomet, the Cloud Sevce Cosume (CSC) ca use esouces elastcally o the demad ad Pay-Pe-Use o Pay-As-You-Go; the ATN method [1-3] o SLA povdes a ew access cotol way to espod the dyamc esouce equest by equestg ad dsclosg dgtal cetfcates gadually betwee the Cloud Sevce Povdes (CSP) ad the CSC, fally to establsh the mutual tust elatoshp. Howeve, the pocess of the actual SLA egotato cloud evomet, each cloud sevce esouces' acqusto eques mass of attbute cedetal to dsclose, the complex access cotol ules ad the lage umbe of egotato hadshakes, whch make the egotato effcecy ot hgh dug the ATN pocess. Theefoe, t s ecessay to study the mmum dsclosue cedetal set to cotol the ATN pocess o SLA cloud evomet, whch educes uecessay cedetals to dsclose ad mpove the egotato effcecy. Wth the advatages of gaphc tutosm ad udestadablty, the CPN [4] s a effectve fomal modelg ad aalyss tool to geeate a secue ad cedble cedetal dsclosue set o SLA cloud evomet. Especally fo a complcated model wth a lage amout of data, the ATN stateges ca be expessed dsjuctve omal fom the CPN, whch ca smplfy geatly cloud evomet. I ths pape, places epeset cedetals betwee two egotato pates, ad tastos epeset the clause of access cotol polces. The essece of ATN s that two stage egotato pates exchage a sees of cedetals to establsh tust elatoshp. I fact, the pocess of ATN s to seach a cedetal dsclosue sequece betwee the esouce povde ad esouce equeste dstbuted etwok [5]. To mpove the attbutes secuty of use's detty dug tust egotato, Fedeca Pac [6] puts fowad a mmum cetfcate sequece method that two pates oly eed to exchage the ecessay popety cedetals. I ths pape, we povde a ATN example o SLA cloud evomet, buld a CPN-based model tems of the example, ad aalyze the CPN-based model accodg to legtmate cedetal sequeces, whch make esouce equest eachable. A eachable ISSN: IJGDC Copyght c 2015 SERSC
2 state space gaph ca be mapped fom the CPN model, ad a algothm fo seachg mmum cedetal dsclosue set s put fowad O the bass of the eachable gaph. Ths pape s ogazed as follows: Secto 1 toduces the elated eseach o ATN cloud evomet. Secto 2 poposes achtectue of ATN o SLA cloud evomet ad descbes the fucto of each compoet befly. Secto 3 gves a cocete ATN example o SLA cloud evomet, ad pesets access cotol stateges betwee CSC ad CSP accodg to the example. Secto 4 maly descbes the CPN model ad the eachable state space gaph accodg to the example. The, Secto 5 puts fowad a algothm fo seachg the mmum cedetal dsclosue set ad aalyzes ths algothm, ad the smulato esults show that the algothm ca effectvely mpove the egotato effcecy. Fally, Secto 6 cocludes the wok. 2. Achtectue of ATN o SLA Cloud Evomet I cloud evomet, t s dyamc fo the CSC to use cloud esouces, so the CSP eeds a stadad SLA documet to maage cloud esouces wth the CSC. A SLA documet ca povde the CSC wth dffeet sevce levels, so the CSC ad the CSP eed egotate fo geeatg the SLA successfully befoe the CSP povde cloud esouces ad sevces fo the CSC tems of the SLA. Dug the pocess of tust egotato, the two egotato sdes dsclose cedetals ad access cotol polces gadually to establsh tust elatoshp. Ths secto descbes the achtectue of ATN o SLA ad the fucto of each compoet dug the pocess of tust egotato. The poposed achtectue of ATN o SLA s show Fgue 1, whch maly cludes thee compoets: the SLA documet, cloud esouces, ad the ATN module. The SLA documet cotas may egotato clauses, whch maly clude sevce level, sevce pcg, QoS dcato ad moto maagemet, etc. The CSC ca stat tust egotato tems of dffeet cloud sevce level, whch s coespodg to dffeet sevce pcg ad QoS dcato. Afte successful egotato, the CSP wll deploy cloud sevces ad povdes the cloud esouces to the CSC accodg to the SLA documet. The CSP ow cloud esouces ad povdes cloud sevces by boadcastg the sevce type ad sevce cotet to the CSC va esouce catalogs. Cuetly, cloud sevces ae dvded to thee categoes [7], amely Ifastuctue as a Sevce (IaaS), Platfom as a Sevce (PaaS), ad Softwae as a Sevce (SaaS). The ATN module maly cludes access cotol polces, cedetals, egotato stateges ad egotato potocol. Cedetal ad access cotol polces have played a mpotat ole potectg sestve fomato togethe. Both egotato sdes who pocess cedetals ca access ceta esouces by the dsclosue of the cedetals. I ode to guaatee successful ATN o SLA, cofdece teval s toduced to choose the most cedble cedetal to establsh tust elatoshp [8]. Oly whe tust values of the cedetals fall to the coespodg cofdece teval, the cedetal ca dsclose. Cedetals usually cota some sestve fomato, such as the ID of cloud sevce applcato, the esouce type ad access cotol polces, tust value ad vaous cotol paametes. Both egotato sdes hope to dsclose as lttle fomato as possble to each a SLA cotact fo cloud sevce. Negotato stategy decdes how to elease cetfcates ad access cotol polces [9-11]. Ths pape adopts the cautous egotato stategy, amely the egotato sde povde the elevat cedetal oly whe the access cotol polcy equest the ceta cedetal. I ode to mpove the egotato effcecy, t's ecessay to fd a set of mmum cedetals. The egotato potocol s esposble fo egotato sequeces of both sdes o the bass of egotato stategy. 248 Copyght c 2015 SERSC
3 Boadcast CSP Negotato esult Access Cotol Polcy Cedetals Sestve Ifomato Potecto CSC Negotato esult cofdece teval Cotol Negotato Stategy Negotato Potocol Resouces catalog ATN Sevce Level Request Sevce Level Cloud Resouces IaaS/SaaS/PaaS Sevce Pcg Deploymet QoS Idcato Moto Maagemet : : SLA Documet Fgue 1. The Achtectue of ATN o SLA Cloud Evomet 3. Access Cotol Polces o SLA Cloud Evomet The access cotol polcy o SLA the pape uses dsjuctve omal fomula, R D D... D, D C C... C, k. C epesets the cedetals that 1 2 k 1 2 m both egotato sdes eed dsclose. I ths pape, we gve a example, ad the scee s as follows. A egula CSC wats to et a ole maagemet softwae the cloud, ad the CSP povdes a dscout ( Dscout ( ) )to the egula CSC o those who et the cloud sevce (executo tme T) fo moe tha 3 yeas. I ode to potect the ow teests, t s ecessay to cay out a ATN to make a SLA documet befoe etg ths sevce. The CSC as a esouce equesto stats the SLA-based tust egotato pocess. I ode to avod beg deceved ad mpovg safety, fst of all, both egotato sdes eed dsclose the detty fomato. The CSP eed dsclose the cetfcate of the elevat pemts (CSP.c), ad the CSC eed dsclose the egsteed cetfcate (Use.ID ad passwod) ad popose the sevce paametes about ths maagemet softwae such as elablty( R el().level ), avalablty ( Av ( ). level ),ad sevce tme(t) to get a sevces dscout. Accodg to the achtectue of fgue 1, the cloud sevce the example belogs to the applcato of SaaS, the the SLA tust egotato betwee both sdes maly focus o the followg aspects: (1) Safety of the CSC ad the CSP. Befoe egotatg sevce paametes, both sdes eed vefy the authozato of the sevce ad pemsso, such as the Use. ID ad Passwod. (2) The sevce pcg. The budget of the cloud sevce s calculated as ceta pcples, such as dscout, sevce level (level) ad sevce executo tme T. (3) Cedblty of cloud esouces. The cedblty of the sevce popetes ca be dvded to thee levels: tust, ukow ad dstust. The CSC chooses the sevce level they wat, ad the cedblty s evaluated by the oveall tust value a peod of tme. Copyght c 2015 SERSC 249
4 (4) Relablty of cloud esouces, such as avalablty, elablty, ad mea tme to estoato (MTTR). Fgue 2 s access cotol polces fo the CSC ad the CSP accodg to above example. Access Cotol Polces fo the CSC: U s e. ID C S P. c E ( f ) P a s s w o d C S P. c R E ( f ) ID passw od N ( ). p c e B c D s c o u t ( ) E ( f ) N ( ). p c e A v ( ). le v e l A V ( ) E ( f ) A v ( ). le v e l R e l ( ). le v e l R E L E ( f ) R e l ( ). le v e l t ( ). le v e l T E.( f ) t ( ). le v e l M tt ( ). le v e l T u e CSP. c Use. ID Passwod E Access Cotol Polces fo the CSP: CSP. c ( f ) Sevce ( ) ( N ( ). pce Av ( ). level ) ( Rel ( ). level t ( ). level ) Mtt ( ). level E Sevce ( ) ( f ) AV ( ) N ( ). pce Av ( ). level E AV ( ) ( f ) REL ( ) N ( ). pce Rel ( ). level E REL ( ) ( f ) Bc Tue R Tue MTTR ( ) Mtt ( ). level E MTTR ( ) ( f ) T Tue Dscout ( ) Use. ID (( T 3) R )) Fgue 2. Access Cotol Polces fo the CSC ad the CSP 4. The CPN Model fo ATN o SLA Cloud Evomet 4.1. Mappg fom Access Cotol Polces to the CPN Gaph Whe a CPN gaph s mapped to access cotol polces, places epeset the lmted access esouces o cedetals, ad tastos epeset the dsclosue of cedetals, whch s a clause of access cotol polces. Wth Boolea opeato expesso, the logcal elatoshp betwee places ad tastos s defed as follows: (1) The flow elatoshp fom tastos to places s deoted as : R D D... D ; 1 2 k (2) The flow elatoshp fom places to tastos s deoted as: (3) The tal upotected cedetal s expessed as: C T u e. D C C C ; Fgue 3 shows the mappg fom access cotol polces to the CPN gaph wth the CPN tool [12], ad C ( p ) { C, C } deotes the colo set of cedetals fom both S C egotato sdes. m 250 Copyght c 2015 SERSC
5 1 `( 2,4 ) M T T R ( ) t1 6 M tt().le v e l t1 5 t1 3 S e v c e ( ) t1 4 R e l().le v e l t1 1 t1 2 t( ).le v e l 1 `( 1,1 ) `( 2,2 ) `( 3,3 ) `( 4,4 ) `( 5,5 ) N ( ).p c e A v ( ).le v e l t1 0 R E L ( ) t7 t8 B c t6 A V () D s c o u t( ) IN T x D A T A t9 T IN T x D A T A IN T x D A T A 1 `( 1,1 ) `( 2,2 ) `( 3,3 ) `( 4,4 ) `( 5,5 ) 1 `( 1,"tu s t" ) `( 2,"d s tu s t")+ + 1 `( 3,"u k o w " ) t5 C S P.c R (,d ) t2 IN T x D A T A U s e.id t1 t4 t3 P a s s w o d (,d ) (,d ) IN T x D A T A Fgue 3. Mappg fom Access Cotol Polces to the CPN Gaph C S { CSP. c, Bc, REL ( ), AV ( ), R, Dscout ( ), MTTR ( ), T } s a cedetal set fo sevce level. Bc deotes the colo set of dffeet sevce levels' budget to the CSC. The CSC should meet the demad of sevce budget ode to access a ceta level of cloud sevce. The place R epesets the colo set whch shows the tust level of cloud esouces. The tal tust level ca be obtaed dectly by boadcastg. T deotes the colo set of the executo tme. C C { Use. ID, Passwod, N ( ). pce, Av ( ). level, Rel ( ). level, Mtt ( ). level, t ( ). level } coespods to the cedetal set whch the CSC eed dsclose to access the cloud sevce the pocess of egotato, such as ID vefcato( U s e. ID, P a s s w o d ), sged sevce pce cetfcate( N ( ). p ce ), ad the sevce level of avalablty( A v ( ). level ), elablty( R e l.le v e l ), mea tme to estoato( Mtt ( ). level ), executo tme( t ( ). level ) ad dscout ( D sco u t () ). Of whch, Mtt ( ). level deotes the colo combato of mea tme to estoato, ad the cedetal accesso s ot estcted. C ( U tlty ) { (, )} s a applcato fucto, whch epesets a theshold fucto o a Boolea expesso to decde whethe dsclosg the access cotol polcy dug the tust egotato. The applcato fucto ca make the place chaged ad tasfe egotato to the ext cedetal, oly whe the tust value of the cetfcate meets the Copyght c 2015 SERSC 251
6 demad of cofdece teval. The applcato fucto vaes wth dffeet egotatos, ad the egotated fomato s C C C ( t ) C ( U tlty ) Reachablty Aalyss of the CPN Model S C I ode to fd a cedetal dsclosue set fo accessg the equested cloud esouces, t s ecessay to aalyze the above CPN model. Due to the boudedess of the CPN, thee exsts oe o moe legtmate eachable sequeces. If a sequece fom the tal maks M 0 to the ed maks M F exsts, that s M F M 0, ad the sequece s eachable. I Fgue 4, all states ad chages ca be see fom a eachable makg gaph. Thee ae 3375 odes the state space mappg fom the CPN model, so Fgue 4 s oly a pat of eachable makg gaph fom the above CPN model. Each ode epesets a eachable makg, ad each ac epesets the occuece of a bdg elemet fom souce ode to destato ode. The eachable makg gaph ecods all chages of places ad tastos the CPN model, ad expesses the logcal elatoshp amog vaous evets. Each ode's fomato about the umbe of subsequet odes ad the pecuso odes s gve the gaph, such as the "1" ode "0:10" deotes t has 10 subsequet odes ad o pecuso ode. Whe egotato pocess stats, the eabled makg place makes a tasto, whle othe places ae watg state. If a ac fucto meets the equemets of a tasto, the the place makg coveys to the othe place. The eachable makg gaph Fgue 4 demostates the feasblty of the CPN model. Fgue 4. Pat of Reachable Makg Gaph fom the CPN Model 5. The Algothm fo Mmum Cedetal Dsclosue Set 5.1. The Mmal Cedetal Path Seachg Algothm I the pocess of actual tust egotato o SLA cloud evomet, each acqusto fo cloud sevce eques dsclosue of may attbute cedetals to the othe paty. Both egotatos sdes wsh to dsclose as lttle fomato as possble to acheve successful tust egotato o SLA cloud evomet, cludg some sestve 252 Copyght c 2015 SERSC
7 fomato o uecessay cedetals. I a example lke the oe llustated above, thee ae acs ad 3375 odes. The moe odes, the moe complcated CPN model, so t s ecessay to fd the shotest path to each the taget ode sevce () that s to fd a mmal cedetal dsclosue set. The followg s the pseudo code of the Mmal Cedetal Path Seachg (MCPS) algothm fo mmum cedetal dsclosue set: Table 1. The Mmal Cedetal Path Seachg (MCPS) Algothm Algothm 1: The Mmal Cedetal Path Seachg Algothm OPEN { S }; CLOSED ; w h le (! O P E N ) { } g e t _ m _ e v a lu a to ( O P E N ); f ( Sevce ( )) //Sevce() s the taget ode beak ; fo ( ea ch ch ld u fo m ) { } g u eva lu a te ( u ); f ( u O P E N ) { } fo c a lc u la te _ e v a lu a to ( O P E N ); f ( g u fo ) { } u. p a e t ; fo u p d a te _ e v a lu a to ( O P E N ); else f ( u C L O S E D ) co t u e ; e lse { // u O P E N && u C L O S E D } u. p a e t ; O P E N O P E N { u} ; C L O S E D C L O S E D { } ; s o t _ e v a lu a to ( O P E N ); m _ p a th u p d a te _ p a th ( O P E N ); m _ d s t u p d a te _ d s ta c e ( O P E N ); The MPCS algothm ths pape s o the bass of the heustc seachg algothm A*, whch s used to fd optmal path. A successful SLA egotato eeds kds of sevce qualty popety ad detty fomato to establsh tust elatoshp fo cloud sevce. As may cedetals exst the pocess of SLA egotato cloud evomet, cedetals wll be mapped to the CPN model as may odes. The MCPS algothm evaluates odes whch eed to be exteded, ad chooses the best ode; the cotues to exted the ode, utl to fd the taget ode sevce (). I the pocess of tust egotato cloud evomet, may cedetals eed to be classfed to educe the state space ad mpove the effcecy. I fact, classfcato s a clusteg poblem [13-14], so ths pape also caes o the cluste aalyss fo states of odes. Accodg to the chaactestc X of each ode state space gaph, the tal samples ae bulded. The ogal data matx has samples ad m dmesos, ad the matx fom s as show Fomula (1): Copyght c 2015 SERSC 253
8 x x... x m x x... x m X x x... x 1 2 m Fomula (2) s the stadadzato of stadad devato esult fom Fomula (1). x ' j 1 x j 1 1 ( x j x j ) ( 1,2,...,, j 1,2,... m ) (1) x j 1 (2) Calculatg the smlaty j betwee the sample ad the sample j, ad costuctg the fuzzy smlaty matx R, R m 2 m m m, j 1 c x k x (3) jk k 1 I Fomula (3), c s a pope selectve paamete, ad the matx R s a symmetc matx. We ca judge whethe a uclassfed ode belogs to the th ode by meas of the followg fucto, x j 0, 1, j j, whch s the eghbo theshold. So, whe tavesg the gaph, the kow th classfcato theshold categoy Smulato Results ad Aalyss satsfes I ( x j ) /. If I, the ode belogs to the 1 I ode to vefy the valdty ad elablty of the Mmal Cedetal Path Seachg algothm, we coduct smulato test accodg to the above example. Thee exst 15 kds of cedetals the example, so the tusted odes ad the egotato goal (Sevce ()) ca classfy 15 categoes. Accodg to the algothm, fst of all, 3600 odes ae geeated adomly, the a smlaty matx s ceated, ad dffeet categoes epeset dffeet attbutes of tusted odes, such as elablty, cost budget, etc. I Fgue 5, t s about 15 kds of tusted odes' classfcato dagam, tusted odes' value falls to dffeet cofdece teval afte omalzato of the tust value, t s coveet fo the CSC to seach dectly fom a class to choose a elgble tusted ode ad tu to the ext class of tusted odes quckly. (4) 254 Copyght c 2015 SERSC
9 Rug tme(s) Cofdece Iteval Iteatoal Joual of Gd Dstbuto Computg 1 The classfcato of the cedetal Cofdece Iteval Fgue 5. Tusted Nodes Classfcato Dagam based o the MCPS Algothm Wth the ceasg of odes, the ac umbe ad teacto of odes become moe complcated, ad classfcato tme ases shaply, thus classfcato eeds a lage umbe of odes codto whe tavesg odes. We cease the umbe of odes gadually ad ecod the elapse tme that dffeet umbe of odes to be classfed. The smulato esult s show Fgue 6. Fom the smulato esult, we ca see that wth the cease of tusted odes, the classfcato tme ceases whe usg the MCPS algothm to tavesal all tusted odes. Whe the umbe of the odes s small (<600), the classfcato tme s shot, ad the classfcato tme ses obsevably whe tust odes become lage gadually. 30 Relatoshp betwee the umbe of odes ad tme cosumpto The umbe of odes Fgue 6. Relatoshp Dagam betwee the Numbe of Nodes ad Tme Cosumpto Copyght c 2015 SERSC 255
10 The shotest dstace to fd the odes Iteatoal Joual of Gd Dstbuto Computg Wth the cease of tusted odes, the shotest dstace both gow whe usg the MCPS algothm wth classfcato ad the BFS [15] algothm wth o classfcato. The MPCS algothm fo seachg the shotest dstace s less tha the latte. Fgue 7 shows compaso betwee the MCPS algothm ad the BFS algothm shotest dstace.i Fgue 7, the shotest dstace equals to the shotest path to sevce () that meas the least cedetal exchage. I cloud evomet, o the same codto of the same umbe of odes, the legth of shotest path geeated by the MCPS algothm s less tha that by the BFS algothm MCPS Algothm BFS Algothm The umbe of odes Fgue 7. Compaso betwee the MCPS Algothm ad the BFS Algothm Shotest Dstace 6. Coclusos Ths pape we popose a CPN-based tust egotato model o SLA cloud evomet. I the CPN model, a cedetal s egaded as a tusted ode, ad the cedetal wth a tust value fallg to cofdece teval detemes the coespodg sevce level. I cloud evomet, thee ae a lage umbe of cedetals eed to be exchaged, whch make the tust egotato effcecy ot hgh. Theefoe, we eed smplfy the complex model ad dsclose the mmum cedetals. The eachable makg gaph s the ma measue fo qualtatve aalyss ad quattatve aalyss the CPN model, whch s also the foudato of elated popetes aalyss. A Mmal Cedetal Path Seachg algothm s poposed to fd a mmum cedetal dsclosue set the eachable gaph. The esults show that the algothm ca effectvely mpove the egotato effcecy. I the futue, we wll make a futhe exteso fo the poposed achtectue of ths pape, ad buld the layeed CPN model o SLA, that adapts to the complex cloud evomet bette. Ackowledgemets Ths wok s suppoted by the Natoal Natual Scece Foudato of Cha (No , No , No ), ad the Geeal Pogam fo Natual Scece Foudato of Hube Povce Cha (No. 2013CFB020, No. 2013CFA046). 256 Copyght c 2015 SERSC
11 Refeeces [1] A. V. Dastjed ad R. Buyya, A Autoomous Relablty-Awae Negotato Stategy fo Cloud Computg Evomets, 12th IEEE/ACM Iteatoal Symposum o Cluste, Cloud ad Gd Computg, (2012), pp [2] A. C. Squcca, F. Pac ad Elsa Beto, Tust establshmet the fomato of Vtual Ogazatos, Compute Stadads & Itefaces, vol. 33, o. 1, (2011), pp [3] D. Zou, S. Du, W. Zheg ad H. J, Buldg Automated Tust Negotato achtectue vtual computg evomet, The Joual of Supecomputg, vol. 55, o. 11, (2011), pp [4] P. Katsaos, A oadmap to electoc paymet tasacto guaatees ad a Coloed Pet Net model checkg appoach, Ifomato ad Softwae Techology, vol. 51, o. 2, (2009), pp [5] C. A. Adaga, S. De C. d Vmecat, S. Foest, S. Paabosch ad P. Samaat, Mmzg dsclosue of clet fomato cedetal-based teactos, Iteatoal Joual of Ifomato Pvacy, Secuty ad Itegty, vol. 1, o. 2, (2012), pp [6] F. Pac, D. Baue, E. Beto, D. M. Blough, A. Squcca ad A. Gupta, Mmal cedetal dsclosue tust egotatos, Idetty the Ifomato Socety, vol. 2, o. 3, (2009), pp [7] I. Muttk ad C. Bato, Cloud secuty techologes, Ifomato secuty techcal epot, vol. 14, o. 1, (2009), pp [8] Q. Ha, Y. L, R. Zhag, H. We, Y. Xe, X. Zhu, Y. Jag ad X. Guo, A P2P ecommeded tust odes selecto algothm based o topologcal potetal, 2013 IEEE Cofeece o Commucatos ad Netwok Secuty (CNS), IEEE Pess, (2013), pp [9] X. Dogme, Z. Guosu, H. Yu ad B. Yu, Aalyss of Automated Tust Negotato Polcy, d Iteatoal Cofeece o e-busess ad Ifomato System Secuty (EBISS), IEEE Pess, (2010), pp [10] C. Ke, Z. Huag ad M. Tag, Suppotg egotato mechasm pvacy authoty method cloud computg, Kowledge-Based Systems, vol. 51, (2013), pp [11] A. V. Dastjed ad R. Buyya, A Autoomous Relablty-Awae Negotato Stategy fo Cloud Computg Evomets, Poceedgs of the th IEEE/ACM Iteatoal Symposum o Cluste, Cloud ad Gd Computg (ccgd 2012), IEEE Pess, (2012), pp [12] L. Yoghao ad L. Yu, Reseach o Modelg of Multpaty Tust Negotato Based o Coloued Pet-et P2P Netwok, 2010 Secod Iteatoal Cofeece o Netwoks Secuty Weless Commucatos ad Tusted Computg (NSWCTC), IEEE Pess, (2010), pp [13] P. Jag ad M. Sgh, SPIC: a fast clusteg algothm fo lage bologcal etwoks, Bofomatcs, vol. 26, o. 8, (2010), pp [14] M. Polczysk ad M. Polczysk, Usg the k-meas Clusteg Algothm to Classfy Featues fo Choopleth Maps, Catogaphca: The Iteatoal Joual fo Geogaphc Ifomato ad Geovsualzato, vol. 49, o. 1, (2014), pp [15] M. Kuat, A. Makopoulou ad P. Tha, Towads ubased BFS samplg, IEEE Joual o Selected Aeas Commucatos, vol. 29, o. 9, (2011), pp Authos Hogwe Che, 2006, he gaduated fom Najg Uvesty of Posts & Telecommucatos ad eceved PHD degee Cha, majoed Commucato ad Ifomato System. He s a assocate pofesso at School of Compute Scece Hube Uvesty of Techology, Wuha, Cha. Fom August of 2013 to Febuay of 2014, he was a academc vstg schola at Temple Uvesty USA. Now hs majo study feld s Pee-to-Pee Computg, Cloud Computg ad SDN. Quxa Che, She s fom Guagx Povce of Cha, ad a maste caddate at School of Compute Scece Hube Uvesty of Techology, teested Cloud Computg. Copyght c 2015 SERSC 257
12 Chuzh Wa, She s fom Hube povce of Cha, PHD, pofesso ad dea at School of Compute Scece, Hube Uvesty of Techology. She s teested Pee-to-Pee Computg ad etwok secuty. She s a membe of CCF, ACM ad IEEE. 258 Copyght c 2015 SERSC
A Markov Chain Grey Forecasting Model: A Case Study of Energy Demand of Industry Sector in Iran
0 3d Iteatoal Cofeece o Ifomato ad Facal Egeeg IED vol. (0) (0) IACSIT ess, Sgapoe A Makov Cha Gey Foecastg Model: A Case Study of Eegy Demad of Idusty Secto Ia A. Kazem +, M. Modaes, M.. Mehega, N. Neshat
More informationRevenue Management for Online Advertising: Impatient Advertisers
Reveue Maagemet fo Ole Advetsg: Impatet Advetses Kst Fdgesdott Maagemet Scece ad Opeatos, Lodo Busess School, Reget s Pak, Lodo, NW 4SA, Uted Kgdom, kst@lodo.edu Sam Naaf Asadolah Maagemet Scece ad Opeatos,
More informationEFFICIENT GENERATION OF CFD-BASED LOADS FOR THE FEM-ANALYSIS OF SHIP STRUCTURES
EFFICIENT GENERATION OF CFD-BASED LOADS FOR THE FEM-ANALYSIS OF SHIP STRUCTURES H Ese ad C Cabos, Gemasche Lloyd AG, Gemay SUMMARY Stegth aalyss of shp stuctues by meas of FEM eques ealstc loads. The most
More informationRandomized Load Balancing by Joining and Splitting Bins
Radomzed Load Baacg by Jog ad Spttg Bs James Aspes Ytog Y 1 Itoducto Cosde the foowg oad baacg sceao: a ceta amout of wo oad s dstbuted amog a set of maches that may chage ove tme as maches o ad eave the
More informationAnalysis of marketing data to extract key factors of telecom churn management
fca Joual of usess Maagemet Vol. 5(0) pp. 84-84716 eptembe 011 valable ole at http://www.academcjouals.og/jm DOI: 10.5897/JM11.944 IN 1993-833 011 cademc Jouals Full Legth Reseach Pape alyss of maketg
More information16. Mean Square Estimation
6 Me Sque stmto Gve some fomto tht s elted to uow qutty of teest the poblem s to obt good estmte fo the uow tems of the obseved dt Suppose epeset sequece of dom vbles bout whom oe set of obsevtos e vlble
More informationOPTIMAL REDUNDANCY ALLOCATION FOR INFORMATION MANAGEMENT SYSTEMS
Relablty ad Qualty Cotol Pactce ad Expeece OPTIMAL REDUNDANCY ALLOCATION FOR INFORMATION MANAGEMENT SYSTEMS Ceza VASILESCU PhD, Assocate Pofesso Natoal Defese Uvesty, Buchaest, Roaa E-al: caesav@ca.o Abstact:
More informationBank loans pricing and Basel II: a multi-period risk-adjusted methodology under the new regulatory constraints
Baks ad Bak Systems, Volume 4, Issue 4, 2009 Domeco Cuco (Italy, Igo Gafacesco (Italy Bak loas pcg ad Basel II: a mult-peod sk-usted methodology ude the ew egulatoy costats Abstact Ude the ew Basel II
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationbetween Modern Degree Model Logistics Industry in Gansu Province 2. Measurement Model 1. Introduction 2.1 Synergetic Degree
www.ijcsi.og 385 Calculatio adaalysis alysis of the Syegetic Degee Model betwee Mode Logistics ad Taspotatio Idusty i Gasu Povice Ya Ya 1, Yogsheg Qia, Yogzhog Yag 3,Juwei Zeg 4 ad Mi Wag 5 1 School of
More informationVendor Evaluation Using Multi Criteria Decision Making Technique
Iteatoal Joual o ompute pplcatos (975 8887) Volume 5 No.9, ugust Vedo Ealuato Usg Mult tea ecso Makg Techque. Elachezha Reseach Schola, ept. o Poducto Techology, M.I.T.ampus, a Uesty, hompet, hea-6 44.
More informationSIMULATION OF THE FLOW AND ACOUSTIC FIELD OF A FAN
Cofeece o Modellg Flud Flow (CMFF 9) The 14 th Iteatoal Cofeece o Flud Flow Techologes Budapest, Hugay, Septembe 9-1, 9 SIMULATION OF THE FLOW AND ACOUSTIC FIELD OF A FAN Q Wag 1, Mchael Hess, Bethold
More informationOptimizing Multiproduct Multiconstraint Inventory Control Systems with Stochastic Period Length and Emergency Order
585858585814 Joual of Uceta Systes Vol.7, No.1, pp.58-71, 013 Ole at: www.us.og.uk Optzg Multpoduct Multcostat Ivetoy Cotol Systes wth Stochastc Peod Legth ad egecy Ode Ata Allah Talezadeh 1, Seyed Tagh
More informationIntegrated Workforce Planning Considering Regular and Overtime Decisions
Poceedgs of the 2011 Idusta Egeeg Reseach Cofeece T. Dooe ad E. Va Ae, eds. Itegated Wofoce Pag Cosdeg Regua ad Ovetme Decsos Shat Jaugum Depatmet of Egeeg Maagemet & Systems Egeeg Mssou Uvesty of Scece
More informationOpinion Makers Section
Goupe de Taal Euopée Ade Multctèe à la Décso Euopea Wog Goup Multple Ctea Decso Adg Sée 3, º8, autome 008. Sees 3, º 8, Fall 008. Opo Maes Secto Hamozg poty weghts ad dffeece judgmets alue fucto mplemetato
More informationA multivariate Denton method for benchmarking large data sets
09 A multaate Deto metho fo bechmakg lage ata sets ee Bkke, Jacco Daalmas a No Mushkua The ews epesse ths pape ae those of the autho(s) a o ot ecessaly eflect the polces of tatstcs Nethelas Dscusso pape
More informationOnline Appendix: Measured Aggregate Gains from International Trade
Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationUnderstanding Financial Management: A Practical Guide Guideline Answers to the Concept Check Questions
Udestadig Fiacial Maagemet: A Pactical Guide Guidelie Aswes to the Cocept Check Questios Chapte 4 The Time Value of Moey Cocept Check 4.. What is the meaig of the tems isk-etu tadeoff ad time value of
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationKeywords: valuation, warrants, executive stock options, capital structure, dilution. JEL Classification: G12, G13.
Abstact he textbook teatmet fo the aluato of waats takes as a state aable the alue of the fm ad shows that the alue of a waat s equal to the alue of a call opto o the equty of the fm multpled by a dluto
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationMunicipal Creditworthiness Modelling by Clustering Methods
Mucal Cedtwotess Modellg by Clusteg Metods Pet Háek, Vladmí Ole Isttute of System Egeeg ad Ifomatcs Faculty of Ecoomcs ad Admstato Uvesty of Padubce Studetská 84, 53 0 Padubce Czec eublc Pet.Haek@uce.cz,
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More information10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia.
Math 40 Lecture 24 Autes Facal Mathematcs How ready do you feel for the quz o Frday: A) Brg t o B) I wll be by Frday C) I eed aother week D) I eed aother moth Aa NoraEvas 403 Kerchof AaNEvas@vrga.edu http://people.vrga.edu/~as5k/
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationA Resource Scheduling Algorithms Based on the Minimum Relative Degree of Load Imbalance
Jounal of Communcatons Vol. 10, No. 10, Octobe 2015 A Resouce Schedulng Algothms Based on the Mnmum Relatve Degee of Load Imbalance Tao Xue and Zhe Fan Depatment of Compute Scence, X an Polytechnc Unvesty,
More informationProject Request & Project Plan
Poject Request & Poject Pla ITS Platfoms Cofiguatio Maagemet Pla Vesio: 0.3 Last Updated: 2009/01/07 Date Submitted: 2008/11/20 Submitted by: Stephe Smooge Executive Sposo: Gil Gozales/Moia Geety Expected
More informationBanking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
More informationhttp://www.elsevier.com/copyright
Ths atce was pubshed a Eseve oua. The attached copy s fushed to the autho fo o-commeca eseach ad educato use, cudg fo stucto at the autho s sttuto, shag wth coeagues ad povdg to sttuto admstato. Othe uses,
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationProjection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationMoney Math for Teens. Introduction to Earning Interest: 11th and 12th Grades Version
Moey Math fo Tees Itoductio to Eaig Iteest: 11th ad 12th Gades Vesio This Moey Math fo Tees lesso is pat of a seies ceated by Geeatio Moey, a multimedia fiacial liteacy iitiative of the FINRA Ivesto Educatio
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More information883 Brochure A5 GENE ss vernis.indd 1-2
ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationEfficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction
Intenatonal Jounal of Machne Leanng and Computng, Vol. 2, No. 3, June 202 Effcent Evolutonay Data Mnng Algothms Appled to the Insuance Faud Pedcton Jenn-Long Lu, Chen-Lang Chen, and Hsng-Hu Yang Abstact
More informationSoftware Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More informationLearning Objectives. Chapter 2 Pricing of Bonds. Future Value (FV)
Leaig Objectives Chapte 2 Picig of Bods time value of moey Calculate the pice of a bod estimate the expected cash flows detemie the yield to discout Bod pice chages evesely with the yield 2-1 2-2 Leaig
More informationAn Approach of Degree Constraint MST Algorithm
I.J. Ifomato Techology a Compute Scece, 203, 09, 80-86 Publhe Ole Augut 203 MECS (http://www.mec-pe.og/) DOI: 0.585/jtc.203.09.08 A Appoach Degee Cotat MST Algothm Sajay Kuma Pal Depatmet Compute Sc. a
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationChapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationIgnorance is not bliss when it comes to knowing credit score
NET GAIN Scoing points fo you financial futue AS SEEN IN USA TODAY SEPTEMBER 28, 2004 Ignoance is not bliss when it comes to knowing cedit scoe By Sanda Block USA TODAY Fom Alabama comes eassuing news
More informationAnnuities and loan. repayments. Syllabus reference Financial mathematics 5 Annuities and loan. repayments
8 8A Futue value of a auity 8B Peset value of a auity 8C Futue ad peset value tables 8D Loa epaymets Auities ad loa epaymets Syllabus efeece Fiacial mathematics 5 Auities ad loa epaymets Supeauatio (othewise
More informationResearch on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of
More informationFault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
More informationFinance Practice Problems
Iteest Fiace Pactice Poblems Iteest is the cost of boowig moey. A iteest ate is the cost stated as a pecet of the amout boowed pe peiod of time, usually oe yea. The pevailig maket ate is composed of: 1.
More information10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
More informationInvestment Science Chapter 3
Ivestmet Scece Chapte 3 D. James. Tztzous 3. se P wth 7/.58%, P $5,, a 7 84, to obta $377.3. 3. Obseve that sce the et peset value of X s P, the cash flow steam ave at by cyclg X s equvalet
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationWeb Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm
JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com
More informationPeriodic Review Probabilistic Multi-Item Inventory System with Zero Lead Time under Constraints and Varying Order Cost
Ameica Joual of Applied Scieces (8: 3-7, 005 ISS 546-939 005 Sciece Publicatios Peiodic Review Pobabilistic Multi-Item Ivetoy System with Zeo Lead Time ude Costaits ad Vayig Ode Cost Hala A. Fegay Lectue
More informationHEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
More informationA Novel Lightweight Algorithm for Secure Network Coding
A Novel Lghtweght Algothm fo Secue Netwok Codng A Novel Lghtweght Algothm fo Secue Netwok Codng State Key Laboatoy of Integated Sevce Netwoks, Xdan Unvesty, X an, Chna, E-mal: {wangxaoxao,wangmeguo}@mal.xdan.edu.cn
More informationANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
More informationSpirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project
Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationApplication of Grey Relational Analysis in Computer Communication
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationThe simple linear Regression Model
The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg
More informationOPTIMAL KNOWLEDGE FLOW ON THE INTERNET
İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal
More informationThe analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
More informationAnswers to Warm-Up Exercises
Aswes to Wam-Up Execses E8-1. Total aual etu Aswe: ($0 $1,000 $10,000) $10,000 $,000 $10,000 0% Logstcs, Ic. doubled the aual ate of etu pedcted by the aalyst. The egatve et come s elevat to the poblem.
More informationJoint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments
IEEE ICC 2014 - Next-Geneaton Netwokng Symposum 1 Jont Vtual Machne and Bandwdth Allocaton n Softwae Defned Netwok (SDN) and Cloud Computng Envonments Jonathan Chase, Rakpong Kaewpuang, Wen Yonggang, and
More informationProceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
More informationSTUDENT RESPONSE TO ANNUITY FORMULA DERIVATION
Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationLoad and Resistance Factor Design (LRFD)
53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationof the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
More informationDerivation of Annuity and Perpetuity Formulae. A. Present Value of an Annuity (Deferred Payment or Ordinary Annuity)
Aity Deivatios 4/4/ Deivatio of Aity ad Pepetity Fomlae A. Peset Vale of a Aity (Defeed Paymet o Odiay Aity 3 4 We have i the show i the lecte otes ad i ompodi ad Discoti that the peset vale of a set of
More informationHigh Availability Replication Strategy for Deduplication Storage System
Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data
More informationAutomatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
More informationOptimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl
More informationA DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
More informationA New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand
A ew eplenshment Polcy n a wo-echelon Inventoy System wth Stochastc Demand Rasoul Haj, Mohammadal Payesh eghab 2, Amand Babol 3,2 Industal Engneeng Dept, Shaf Unvesty of echnology, ehan, Ian (haj@shaf.edu,
More informationCSSE463: Image Recognition Day 27
CSSE463: Image Recogto Da 27 Ths week Toda: Alcatos of PCA Suda ght: roject las ad relm work due Questos? Prcal Comoets Aalss weght grth c ( )( ) ( )( ( )( ) ) heght sze Gve a set of samles, fd the drecto(s)
More informationSoftware Reliability Index Reasonable Allocation Based on UML
Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author
More informationThe Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
More informationn. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.
UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.
More informationClassic Problems at a Glance using the TVM Solver
C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the
More informationAREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE
Radoengneeng Aea Coveage Smulatons fo Mllmete Pont-to-Multpont Systems Usng Buldng Blockage 43 Vol. 11, No. 4, Decembe AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL
More informationResearch on Cloud Computing Load Balancing Based on Virtual Machine Migration
Send Odes fo Repnts to epnts@benthascence.ae 334 The Open Cybenetcs & Systecs Jounal, 205, 9, 334-340 Open Access Reseach on Cloud Coputng Load Balancng Based on Vtual Machne Mgaton Lu Kun,*, Xu Gaochao
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationAlarm transmission through Radio and GSM networks
Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS
More informationResearch on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment
Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,
More informationDynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center
200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College
More informationDECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
More informationThe Detection of Obstacles Using Features by the Horizon View Camera
The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp
More informationAn Approach to Optimized Resource Allocation for Cloud Simulation Platform
An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,
More informationA Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments
1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationConverting knowledge Into Practice
Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading
More information