A CPN-based Trust Negotiation Model on Service Level Agreement in Cloud Environment

Size: px
Start display at page:

Download "A CPN-based Trust Negotiation Model on Service Level Agreement in Cloud Environment"

Transcription

1 , pp A CPN-based Tust Negotato Model o Sevce Level Ageemet Cloud Evomet Hogwe Che, Quxa Che ad Chuzh Wag School of Compute Scece, Hube Uvesty of Techology, Wuha, Cha chw2001@sa.com Abstact The egotato pocess of the Sevce Level Ageemet (SLA) cloud evomet s a teacto pocess of access cotol ules ad cedetals. Due to the mass of cedetals cloud evomet, the egotato effcecy s ot hgh. To addess the poblem, ths pape poposes a Automated Tust Negotato (ATN) model based o Coloed Pet Net (CPN), whch exsts a legtmate occuece sequece ad a eachable state space gaph. A Mmal Cedetal Path Seachg (MCPS) algothm s poposed to fd a mmum cedetal dsclosue set the eachable makg gaph. The esults show that the algothm ca effectvely mpove the egotato effcecy. Keywods: Cloud Computg, Sevce Level Ageemet, Automated Tust Negotato, Cedetal set, Coloed Pet Net 1. Itoducto I cloud evomet, the Cloud Sevce Cosume (CSC) ca use esouces elastcally o the demad ad Pay-Pe-Use o Pay-As-You-Go; the ATN method [1-3] o SLA povdes a ew access cotol way to espod the dyamc esouce equest by equestg ad dsclosg dgtal cetfcates gadually betwee the Cloud Sevce Povdes (CSP) ad the CSC, fally to establsh the mutual tust elatoshp. Howeve, the pocess of the actual SLA egotato cloud evomet, each cloud sevce esouces' acqusto eques mass of attbute cedetal to dsclose, the complex access cotol ules ad the lage umbe of egotato hadshakes, whch make the egotato effcecy ot hgh dug the ATN pocess. Theefoe, t s ecessay to study the mmum dsclosue cedetal set to cotol the ATN pocess o SLA cloud evomet, whch educes uecessay cedetals to dsclose ad mpove the egotato effcecy. Wth the advatages of gaphc tutosm ad udestadablty, the CPN [4] s a effectve fomal modelg ad aalyss tool to geeate a secue ad cedble cedetal dsclosue set o SLA cloud evomet. Especally fo a complcated model wth a lage amout of data, the ATN stateges ca be expessed dsjuctve omal fom the CPN, whch ca smplfy geatly cloud evomet. I ths pape, places epeset cedetals betwee two egotato pates, ad tastos epeset the clause of access cotol polces. The essece of ATN s that two stage egotato pates exchage a sees of cedetals to establsh tust elatoshp. I fact, the pocess of ATN s to seach a cedetal dsclosue sequece betwee the esouce povde ad esouce equeste dstbuted etwok [5]. To mpove the attbutes secuty of use's detty dug tust egotato, Fedeca Pac [6] puts fowad a mmum cetfcate sequece method that two pates oly eed to exchage the ecessay popety cedetals. I ths pape, we povde a ATN example o SLA cloud evomet, buld a CPN-based model tems of the example, ad aalyze the CPN-based model accodg to legtmate cedetal sequeces, whch make esouce equest eachable. A eachable ISSN: IJGDC Copyght c 2015 SERSC

2 state space gaph ca be mapped fom the CPN model, ad a algothm fo seachg mmum cedetal dsclosue set s put fowad O the bass of the eachable gaph. Ths pape s ogazed as follows: Secto 1 toduces the elated eseach o ATN cloud evomet. Secto 2 poposes achtectue of ATN o SLA cloud evomet ad descbes the fucto of each compoet befly. Secto 3 gves a cocete ATN example o SLA cloud evomet, ad pesets access cotol stateges betwee CSC ad CSP accodg to the example. Secto 4 maly descbes the CPN model ad the eachable state space gaph accodg to the example. The, Secto 5 puts fowad a algothm fo seachg the mmum cedetal dsclosue set ad aalyzes ths algothm, ad the smulato esults show that the algothm ca effectvely mpove the egotato effcecy. Fally, Secto 6 cocludes the wok. 2. Achtectue of ATN o SLA Cloud Evomet I cloud evomet, t s dyamc fo the CSC to use cloud esouces, so the CSP eeds a stadad SLA documet to maage cloud esouces wth the CSC. A SLA documet ca povde the CSC wth dffeet sevce levels, so the CSC ad the CSP eed egotate fo geeatg the SLA successfully befoe the CSP povde cloud esouces ad sevces fo the CSC tems of the SLA. Dug the pocess of tust egotato, the two egotato sdes dsclose cedetals ad access cotol polces gadually to establsh tust elatoshp. Ths secto descbes the achtectue of ATN o SLA ad the fucto of each compoet dug the pocess of tust egotato. The poposed achtectue of ATN o SLA s show Fgue 1, whch maly cludes thee compoets: the SLA documet, cloud esouces, ad the ATN module. The SLA documet cotas may egotato clauses, whch maly clude sevce level, sevce pcg, QoS dcato ad moto maagemet, etc. The CSC ca stat tust egotato tems of dffeet cloud sevce level, whch s coespodg to dffeet sevce pcg ad QoS dcato. Afte successful egotato, the CSP wll deploy cloud sevces ad povdes the cloud esouces to the CSC accodg to the SLA documet. The CSP ow cloud esouces ad povdes cloud sevces by boadcastg the sevce type ad sevce cotet to the CSC va esouce catalogs. Cuetly, cloud sevces ae dvded to thee categoes [7], amely Ifastuctue as a Sevce (IaaS), Platfom as a Sevce (PaaS), ad Softwae as a Sevce (SaaS). The ATN module maly cludes access cotol polces, cedetals, egotato stateges ad egotato potocol. Cedetal ad access cotol polces have played a mpotat ole potectg sestve fomato togethe. Both egotato sdes who pocess cedetals ca access ceta esouces by the dsclosue of the cedetals. I ode to guaatee successful ATN o SLA, cofdece teval s toduced to choose the most cedble cedetal to establsh tust elatoshp [8]. Oly whe tust values of the cedetals fall to the coespodg cofdece teval, the cedetal ca dsclose. Cedetals usually cota some sestve fomato, such as the ID of cloud sevce applcato, the esouce type ad access cotol polces, tust value ad vaous cotol paametes. Both egotato sdes hope to dsclose as lttle fomato as possble to each a SLA cotact fo cloud sevce. Negotato stategy decdes how to elease cetfcates ad access cotol polces [9-11]. Ths pape adopts the cautous egotato stategy, amely the egotato sde povde the elevat cedetal oly whe the access cotol polcy equest the ceta cedetal. I ode to mpove the egotato effcecy, t's ecessay to fd a set of mmum cedetals. The egotato potocol s esposble fo egotato sequeces of both sdes o the bass of egotato stategy. 248 Copyght c 2015 SERSC

3 Boadcast CSP Negotato esult Access Cotol Polcy Cedetals Sestve Ifomato Potecto CSC Negotato esult cofdece teval Cotol Negotato Stategy Negotato Potocol Resouces catalog ATN Sevce Level Request Sevce Level Cloud Resouces IaaS/SaaS/PaaS Sevce Pcg Deploymet QoS Idcato Moto Maagemet : : SLA Documet Fgue 1. The Achtectue of ATN o SLA Cloud Evomet 3. Access Cotol Polces o SLA Cloud Evomet The access cotol polcy o SLA the pape uses dsjuctve omal fomula, R D D... D, D C C... C, k. C epesets the cedetals that 1 2 k 1 2 m both egotato sdes eed dsclose. I ths pape, we gve a example, ad the scee s as follows. A egula CSC wats to et a ole maagemet softwae the cloud, ad the CSP povdes a dscout ( Dscout ( ) )to the egula CSC o those who et the cloud sevce (executo tme T) fo moe tha 3 yeas. I ode to potect the ow teests, t s ecessay to cay out a ATN to make a SLA documet befoe etg ths sevce. The CSC as a esouce equesto stats the SLA-based tust egotato pocess. I ode to avod beg deceved ad mpovg safety, fst of all, both egotato sdes eed dsclose the detty fomato. The CSP eed dsclose the cetfcate of the elevat pemts (CSP.c), ad the CSC eed dsclose the egsteed cetfcate (Use.ID ad passwod) ad popose the sevce paametes about ths maagemet softwae such as elablty( R el().level ), avalablty ( Av ( ). level ),ad sevce tme(t) to get a sevces dscout. Accodg to the achtectue of fgue 1, the cloud sevce the example belogs to the applcato of SaaS, the the SLA tust egotato betwee both sdes maly focus o the followg aspects: (1) Safety of the CSC ad the CSP. Befoe egotatg sevce paametes, both sdes eed vefy the authozato of the sevce ad pemsso, such as the Use. ID ad Passwod. (2) The sevce pcg. The budget of the cloud sevce s calculated as ceta pcples, such as dscout, sevce level (level) ad sevce executo tme T. (3) Cedblty of cloud esouces. The cedblty of the sevce popetes ca be dvded to thee levels: tust, ukow ad dstust. The CSC chooses the sevce level they wat, ad the cedblty s evaluated by the oveall tust value a peod of tme. Copyght c 2015 SERSC 249

4 (4) Relablty of cloud esouces, such as avalablty, elablty, ad mea tme to estoato (MTTR). Fgue 2 s access cotol polces fo the CSC ad the CSP accodg to above example. Access Cotol Polces fo the CSC: U s e. ID C S P. c E ( f ) P a s s w o d C S P. c R E ( f ) ID passw od N ( ). p c e B c D s c o u t ( ) E ( f ) N ( ). p c e A v ( ). le v e l A V ( ) E ( f ) A v ( ). le v e l R e l ( ). le v e l R E L E ( f ) R e l ( ). le v e l t ( ). le v e l T E.( f ) t ( ). le v e l M tt ( ). le v e l T u e CSP. c Use. ID Passwod E Access Cotol Polces fo the CSP: CSP. c ( f ) Sevce ( ) ( N ( ). pce Av ( ). level ) ( Rel ( ). level t ( ). level ) Mtt ( ). level E Sevce ( ) ( f ) AV ( ) N ( ). pce Av ( ). level E AV ( ) ( f ) REL ( ) N ( ). pce Rel ( ). level E REL ( ) ( f ) Bc Tue R Tue MTTR ( ) Mtt ( ). level E MTTR ( ) ( f ) T Tue Dscout ( ) Use. ID (( T 3) R )) Fgue 2. Access Cotol Polces fo the CSC ad the CSP 4. The CPN Model fo ATN o SLA Cloud Evomet 4.1. Mappg fom Access Cotol Polces to the CPN Gaph Whe a CPN gaph s mapped to access cotol polces, places epeset the lmted access esouces o cedetals, ad tastos epeset the dsclosue of cedetals, whch s a clause of access cotol polces. Wth Boolea opeato expesso, the logcal elatoshp betwee places ad tastos s defed as follows: (1) The flow elatoshp fom tastos to places s deoted as : R D D... D ; 1 2 k (2) The flow elatoshp fom places to tastos s deoted as: (3) The tal upotected cedetal s expessed as: C T u e. D C C C ; Fgue 3 shows the mappg fom access cotol polces to the CPN gaph wth the CPN tool [12], ad C ( p ) { C, C } deotes the colo set of cedetals fom both S C egotato sdes. m 250 Copyght c 2015 SERSC

5 1 `( 2,4 ) M T T R ( ) t1 6 M tt().le v e l t1 5 t1 3 S e v c e ( ) t1 4 R e l().le v e l t1 1 t1 2 t( ).le v e l 1 `( 1,1 ) `( 2,2 ) `( 3,3 ) `( 4,4 ) `( 5,5 ) N ( ).p c e A v ( ).le v e l t1 0 R E L ( ) t7 t8 B c t6 A V () D s c o u t( ) IN T x D A T A t9 T IN T x D A T A IN T x D A T A 1 `( 1,1 ) `( 2,2 ) `( 3,3 ) `( 4,4 ) `( 5,5 ) 1 `( 1,"tu s t" ) `( 2,"d s tu s t")+ + 1 `( 3,"u k o w " ) t5 C S P.c R (,d ) t2 IN T x D A T A U s e.id t1 t4 t3 P a s s w o d (,d ) (,d ) IN T x D A T A Fgue 3. Mappg fom Access Cotol Polces to the CPN Gaph C S { CSP. c, Bc, REL ( ), AV ( ), R, Dscout ( ), MTTR ( ), T } s a cedetal set fo sevce level. Bc deotes the colo set of dffeet sevce levels' budget to the CSC. The CSC should meet the demad of sevce budget ode to access a ceta level of cloud sevce. The place R epesets the colo set whch shows the tust level of cloud esouces. The tal tust level ca be obtaed dectly by boadcastg. T deotes the colo set of the executo tme. C C { Use. ID, Passwod, N ( ). pce, Av ( ). level, Rel ( ). level, Mtt ( ). level, t ( ). level } coespods to the cedetal set whch the CSC eed dsclose to access the cloud sevce the pocess of egotato, such as ID vefcato( U s e. ID, P a s s w o d ), sged sevce pce cetfcate( N ( ). p ce ), ad the sevce level of avalablty( A v ( ). level ), elablty( R e l.le v e l ), mea tme to estoato( Mtt ( ). level ), executo tme( t ( ). level ) ad dscout ( D sco u t () ). Of whch, Mtt ( ). level deotes the colo combato of mea tme to estoato, ad the cedetal accesso s ot estcted. C ( U tlty ) { (, )} s a applcato fucto, whch epesets a theshold fucto o a Boolea expesso to decde whethe dsclosg the access cotol polcy dug the tust egotato. The applcato fucto ca make the place chaged ad tasfe egotato to the ext cedetal, oly whe the tust value of the cetfcate meets the Copyght c 2015 SERSC 251

6 demad of cofdece teval. The applcato fucto vaes wth dffeet egotatos, ad the egotated fomato s C C C ( t ) C ( U tlty ) Reachablty Aalyss of the CPN Model S C I ode to fd a cedetal dsclosue set fo accessg the equested cloud esouces, t s ecessay to aalyze the above CPN model. Due to the boudedess of the CPN, thee exsts oe o moe legtmate eachable sequeces. If a sequece fom the tal maks M 0 to the ed maks M F exsts, that s M F M 0, ad the sequece s eachable. I Fgue 4, all states ad chages ca be see fom a eachable makg gaph. Thee ae 3375 odes the state space mappg fom the CPN model, so Fgue 4 s oly a pat of eachable makg gaph fom the above CPN model. Each ode epesets a eachable makg, ad each ac epesets the occuece of a bdg elemet fom souce ode to destato ode. The eachable makg gaph ecods all chages of places ad tastos the CPN model, ad expesses the logcal elatoshp amog vaous evets. Each ode's fomato about the umbe of subsequet odes ad the pecuso odes s gve the gaph, such as the "1" ode "0:10" deotes t has 10 subsequet odes ad o pecuso ode. Whe egotato pocess stats, the eabled makg place makes a tasto, whle othe places ae watg state. If a ac fucto meets the equemets of a tasto, the the place makg coveys to the othe place. The eachable makg gaph Fgue 4 demostates the feasblty of the CPN model. Fgue 4. Pat of Reachable Makg Gaph fom the CPN Model 5. The Algothm fo Mmum Cedetal Dsclosue Set 5.1. The Mmal Cedetal Path Seachg Algothm I the pocess of actual tust egotato o SLA cloud evomet, each acqusto fo cloud sevce eques dsclosue of may attbute cedetals to the othe paty. Both egotatos sdes wsh to dsclose as lttle fomato as possble to acheve successful tust egotato o SLA cloud evomet, cludg some sestve 252 Copyght c 2015 SERSC

7 fomato o uecessay cedetals. I a example lke the oe llustated above, thee ae acs ad 3375 odes. The moe odes, the moe complcated CPN model, so t s ecessay to fd the shotest path to each the taget ode sevce () that s to fd a mmal cedetal dsclosue set. The followg s the pseudo code of the Mmal Cedetal Path Seachg (MCPS) algothm fo mmum cedetal dsclosue set: Table 1. The Mmal Cedetal Path Seachg (MCPS) Algothm Algothm 1: The Mmal Cedetal Path Seachg Algothm OPEN { S }; CLOSED ; w h le (! O P E N ) { } g e t _ m _ e v a lu a to ( O P E N ); f ( Sevce ( )) //Sevce() s the taget ode beak ; fo ( ea ch ch ld u fo m ) { } g u eva lu a te ( u ); f ( u O P E N ) { } fo c a lc u la te _ e v a lu a to ( O P E N ); f ( g u fo ) { } u. p a e t ; fo u p d a te _ e v a lu a to ( O P E N ); else f ( u C L O S E D ) co t u e ; e lse { // u O P E N && u C L O S E D } u. p a e t ; O P E N O P E N { u} ; C L O S E D C L O S E D { } ; s o t _ e v a lu a to ( O P E N ); m _ p a th u p d a te _ p a th ( O P E N ); m _ d s t u p d a te _ d s ta c e ( O P E N ); The MPCS algothm ths pape s o the bass of the heustc seachg algothm A*, whch s used to fd optmal path. A successful SLA egotato eeds kds of sevce qualty popety ad detty fomato to establsh tust elatoshp fo cloud sevce. As may cedetals exst the pocess of SLA egotato cloud evomet, cedetals wll be mapped to the CPN model as may odes. The MCPS algothm evaluates odes whch eed to be exteded, ad chooses the best ode; the cotues to exted the ode, utl to fd the taget ode sevce (). I the pocess of tust egotato cloud evomet, may cedetals eed to be classfed to educe the state space ad mpove the effcecy. I fact, classfcato s a clusteg poblem [13-14], so ths pape also caes o the cluste aalyss fo states of odes. Accodg to the chaactestc X of each ode state space gaph, the tal samples ae bulded. The ogal data matx has samples ad m dmesos, ad the matx fom s as show Fomula (1): Copyght c 2015 SERSC 253

8 x x... x m x x... x m X x x... x 1 2 m Fomula (2) s the stadadzato of stadad devato esult fom Fomula (1). x ' j 1 x j 1 1 ( x j x j ) ( 1,2,...,, j 1,2,... m ) (1) x j 1 (2) Calculatg the smlaty j betwee the sample ad the sample j, ad costuctg the fuzzy smlaty matx R, R m 2 m m m, j 1 c x k x (3) jk k 1 I Fomula (3), c s a pope selectve paamete, ad the matx R s a symmetc matx. We ca judge whethe a uclassfed ode belogs to the th ode by meas of the followg fucto, x j 0, 1, j j, whch s the eghbo theshold. So, whe tavesg the gaph, the kow th classfcato theshold categoy Smulato Results ad Aalyss satsfes I ( x j ) /. If I, the ode belogs to the 1 I ode to vefy the valdty ad elablty of the Mmal Cedetal Path Seachg algothm, we coduct smulato test accodg to the above example. Thee exst 15 kds of cedetals the example, so the tusted odes ad the egotato goal (Sevce ()) ca classfy 15 categoes. Accodg to the algothm, fst of all, 3600 odes ae geeated adomly, the a smlaty matx s ceated, ad dffeet categoes epeset dffeet attbutes of tusted odes, such as elablty, cost budget, etc. I Fgue 5, t s about 15 kds of tusted odes' classfcato dagam, tusted odes' value falls to dffeet cofdece teval afte omalzato of the tust value, t s coveet fo the CSC to seach dectly fom a class to choose a elgble tusted ode ad tu to the ext class of tusted odes quckly. (4) 254 Copyght c 2015 SERSC

9 Rug tme(s) Cofdece Iteval Iteatoal Joual of Gd Dstbuto Computg 1 The classfcato of the cedetal Cofdece Iteval Fgue 5. Tusted Nodes Classfcato Dagam based o the MCPS Algothm Wth the ceasg of odes, the ac umbe ad teacto of odes become moe complcated, ad classfcato tme ases shaply, thus classfcato eeds a lage umbe of odes codto whe tavesg odes. We cease the umbe of odes gadually ad ecod the elapse tme that dffeet umbe of odes to be classfed. The smulato esult s show Fgue 6. Fom the smulato esult, we ca see that wth the cease of tusted odes, the classfcato tme ceases whe usg the MCPS algothm to tavesal all tusted odes. Whe the umbe of the odes s small (<600), the classfcato tme s shot, ad the classfcato tme ses obsevably whe tust odes become lage gadually. 30 Relatoshp betwee the umbe of odes ad tme cosumpto The umbe of odes Fgue 6. Relatoshp Dagam betwee the Numbe of Nodes ad Tme Cosumpto Copyght c 2015 SERSC 255

10 The shotest dstace to fd the odes Iteatoal Joual of Gd Dstbuto Computg Wth the cease of tusted odes, the shotest dstace both gow whe usg the MCPS algothm wth classfcato ad the BFS [15] algothm wth o classfcato. The MPCS algothm fo seachg the shotest dstace s less tha the latte. Fgue 7 shows compaso betwee the MCPS algothm ad the BFS algothm shotest dstace.i Fgue 7, the shotest dstace equals to the shotest path to sevce () that meas the least cedetal exchage. I cloud evomet, o the same codto of the same umbe of odes, the legth of shotest path geeated by the MCPS algothm s less tha that by the BFS algothm MCPS Algothm BFS Algothm The umbe of odes Fgue 7. Compaso betwee the MCPS Algothm ad the BFS Algothm Shotest Dstace 6. Coclusos Ths pape we popose a CPN-based tust egotato model o SLA cloud evomet. I the CPN model, a cedetal s egaded as a tusted ode, ad the cedetal wth a tust value fallg to cofdece teval detemes the coespodg sevce level. I cloud evomet, thee ae a lage umbe of cedetals eed to be exchaged, whch make the tust egotato effcecy ot hgh. Theefoe, we eed smplfy the complex model ad dsclose the mmum cedetals. The eachable makg gaph s the ma measue fo qualtatve aalyss ad quattatve aalyss the CPN model, whch s also the foudato of elated popetes aalyss. A Mmal Cedetal Path Seachg algothm s poposed to fd a mmum cedetal dsclosue set the eachable gaph. The esults show that the algothm ca effectvely mpove the egotato effcecy. I the futue, we wll make a futhe exteso fo the poposed achtectue of ths pape, ad buld the layeed CPN model o SLA, that adapts to the complex cloud evomet bette. Ackowledgemets Ths wok s suppoted by the Natoal Natual Scece Foudato of Cha (No , No , No ), ad the Geeal Pogam fo Natual Scece Foudato of Hube Povce Cha (No. 2013CFB020, No. 2013CFA046). 256 Copyght c 2015 SERSC

11 Refeeces [1] A. V. Dastjed ad R. Buyya, A Autoomous Relablty-Awae Negotato Stategy fo Cloud Computg Evomets, 12th IEEE/ACM Iteatoal Symposum o Cluste, Cloud ad Gd Computg, (2012), pp [2] A. C. Squcca, F. Pac ad Elsa Beto, Tust establshmet the fomato of Vtual Ogazatos, Compute Stadads & Itefaces, vol. 33, o. 1, (2011), pp [3] D. Zou, S. Du, W. Zheg ad H. J, Buldg Automated Tust Negotato achtectue vtual computg evomet, The Joual of Supecomputg, vol. 55, o. 11, (2011), pp [4] P. Katsaos, A oadmap to electoc paymet tasacto guaatees ad a Coloed Pet Net model checkg appoach, Ifomato ad Softwae Techology, vol. 51, o. 2, (2009), pp [5] C. A. Adaga, S. De C. d Vmecat, S. Foest, S. Paabosch ad P. Samaat, Mmzg dsclosue of clet fomato cedetal-based teactos, Iteatoal Joual of Ifomato Pvacy, Secuty ad Itegty, vol. 1, o. 2, (2012), pp [6] F. Pac, D. Baue, E. Beto, D. M. Blough, A. Squcca ad A. Gupta, Mmal cedetal dsclosue tust egotatos, Idetty the Ifomato Socety, vol. 2, o. 3, (2009), pp [7] I. Muttk ad C. Bato, Cloud secuty techologes, Ifomato secuty techcal epot, vol. 14, o. 1, (2009), pp [8] Q. Ha, Y. L, R. Zhag, H. We, Y. Xe, X. Zhu, Y. Jag ad X. Guo, A P2P ecommeded tust odes selecto algothm based o topologcal potetal, 2013 IEEE Cofeece o Commucatos ad Netwok Secuty (CNS), IEEE Pess, (2013), pp [9] X. Dogme, Z. Guosu, H. Yu ad B. Yu, Aalyss of Automated Tust Negotato Polcy, d Iteatoal Cofeece o e-busess ad Ifomato System Secuty (EBISS), IEEE Pess, (2010), pp [10] C. Ke, Z. Huag ad M. Tag, Suppotg egotato mechasm pvacy authoty method cloud computg, Kowledge-Based Systems, vol. 51, (2013), pp [11] A. V. Dastjed ad R. Buyya, A Autoomous Relablty-Awae Negotato Stategy fo Cloud Computg Evomets, Poceedgs of the th IEEE/ACM Iteatoal Symposum o Cluste, Cloud ad Gd Computg (ccgd 2012), IEEE Pess, (2012), pp [12] L. Yoghao ad L. Yu, Reseach o Modelg of Multpaty Tust Negotato Based o Coloued Pet-et P2P Netwok, 2010 Secod Iteatoal Cofeece o Netwoks Secuty Weless Commucatos ad Tusted Computg (NSWCTC), IEEE Pess, (2010), pp [13] P. Jag ad M. Sgh, SPIC: a fast clusteg algothm fo lage bologcal etwoks, Bofomatcs, vol. 26, o. 8, (2010), pp [14] M. Polczysk ad M. Polczysk, Usg the k-meas Clusteg Algothm to Classfy Featues fo Choopleth Maps, Catogaphca: The Iteatoal Joual fo Geogaphc Ifomato ad Geovsualzato, vol. 49, o. 1, (2014), pp [15] M. Kuat, A. Makopoulou ad P. Tha, Towads ubased BFS samplg, IEEE Joual o Selected Aeas Commucatos, vol. 29, o. 9, (2011), pp Authos Hogwe Che, 2006, he gaduated fom Najg Uvesty of Posts & Telecommucatos ad eceved PHD degee Cha, majoed Commucato ad Ifomato System. He s a assocate pofesso at School of Compute Scece Hube Uvesty of Techology, Wuha, Cha. Fom August of 2013 to Febuay of 2014, he was a academc vstg schola at Temple Uvesty USA. Now hs majo study feld s Pee-to-Pee Computg, Cloud Computg ad SDN. Quxa Che, She s fom Guagx Povce of Cha, ad a maste caddate at School of Compute Scece Hube Uvesty of Techology, teested Cloud Computg. Copyght c 2015 SERSC 257

12 Chuzh Wa, She s fom Hube povce of Cha, PHD, pofesso ad dea at School of Compute Scece, Hube Uvesty of Techology. She s teested Pee-to-Pee Computg ad etwok secuty. She s a membe of CCF, ACM ad IEEE. 258 Copyght c 2015 SERSC

A Markov Chain Grey Forecasting Model: A Case Study of Energy Demand of Industry Sector in Iran

A Markov Chain Grey Forecasting Model: A Case Study of Energy Demand of Industry Sector in Iran 0 3d Iteatoal Cofeece o Ifomato ad Facal Egeeg IED vol. (0) (0) IACSIT ess, Sgapoe A Makov Cha Gey Foecastg Model: A Case Study of Eegy Demad of Idusty Secto Ia A. Kazem +, M. Modaes, M.. Mehega, N. Neshat

More information

Revenue Management for Online Advertising: Impatient Advertisers

Revenue Management for Online Advertising: Impatient Advertisers Reveue Maagemet fo Ole Advetsg: Impatet Advetses Kst Fdgesdott Maagemet Scece ad Opeatos, Lodo Busess School, Reget s Pak, Lodo, NW 4SA, Uted Kgdom, kst@lodo.edu Sam Naaf Asadolah Maagemet Scece ad Opeatos,

More information

EFFICIENT GENERATION OF CFD-BASED LOADS FOR THE FEM-ANALYSIS OF SHIP STRUCTURES

EFFICIENT GENERATION OF CFD-BASED LOADS FOR THE FEM-ANALYSIS OF SHIP STRUCTURES EFFICIENT GENERATION OF CFD-BASED LOADS FOR THE FEM-ANALYSIS OF SHIP STRUCTURES H Ese ad C Cabos, Gemasche Lloyd AG, Gemay SUMMARY Stegth aalyss of shp stuctues by meas of FEM eques ealstc loads. The most

More information

Randomized Load Balancing by Joining and Splitting Bins

Randomized Load Balancing by Joining and Splitting Bins Radomzed Load Baacg by Jog ad Spttg Bs James Aspes Ytog Y 1 Itoducto Cosde the foowg oad baacg sceao: a ceta amout of wo oad s dstbuted amog a set of maches that may chage ove tme as maches o ad eave the

More information

Analysis of marketing data to extract key factors of telecom churn management

Analysis of marketing data to extract key factors of telecom churn management fca Joual of usess Maagemet Vol. 5(0) pp. 84-84716 eptembe 011 valable ole at http://www.academcjouals.og/jm DOI: 10.5897/JM11.944 IN 1993-833 011 cademc Jouals Full Legth Reseach Pape alyss of maketg

More information

16. Mean Square Estimation

16. Mean Square Estimation 6 Me Sque stmto Gve some fomto tht s elted to uow qutty of teest the poblem s to obt good estmte fo the uow tems of the obseved dt Suppose epeset sequece of dom vbles bout whom oe set of obsevtos e vlble

More information

OPTIMAL REDUNDANCY ALLOCATION FOR INFORMATION MANAGEMENT SYSTEMS

OPTIMAL REDUNDANCY ALLOCATION FOR INFORMATION MANAGEMENT SYSTEMS Relablty ad Qualty Cotol Pactce ad Expeece OPTIMAL REDUNDANCY ALLOCATION FOR INFORMATION MANAGEMENT SYSTEMS Ceza VASILESCU PhD, Assocate Pofesso Natoal Defese Uvesty, Buchaest, Roaa E-al: caesav@ca.o Abstact:

More information

Bank loans pricing and Basel II: a multi-period risk-adjusted methodology under the new regulatory constraints

Bank loans pricing and Basel II: a multi-period risk-adjusted methodology under the new regulatory constraints Baks ad Bak Systems, Volume 4, Issue 4, 2009 Domeco Cuco (Italy, Igo Gafacesco (Italy Bak loas pcg ad Basel II: a mult-peod sk-usted methodology ude the ew egulatoy costats Abstact Ude the ew Basel II

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

between Modern Degree Model Logistics Industry in Gansu Province 2. Measurement Model 1. Introduction 2.1 Synergetic Degree

between Modern Degree Model Logistics Industry in Gansu Province 2. Measurement Model 1. Introduction 2.1 Synergetic Degree www.ijcsi.og 385 Calculatio adaalysis alysis of the Syegetic Degee Model betwee Mode Logistics ad Taspotatio Idusty i Gasu Povice Ya Ya 1, Yogsheg Qia, Yogzhog Yag 3,Juwei Zeg 4 ad Mi Wag 5 1 School of

More information

Vendor Evaluation Using Multi Criteria Decision Making Technique

Vendor Evaluation Using Multi Criteria Decision Making Technique Iteatoal Joual o ompute pplcatos (975 8887) Volume 5 No.9, ugust Vedo Ealuato Usg Mult tea ecso Makg Techque. Elachezha Reseach Schola, ept. o Poducto Techology, M.I.T.ampus, a Uesty, hompet, hea-6 44.

More information

SIMULATION OF THE FLOW AND ACOUSTIC FIELD OF A FAN

SIMULATION OF THE FLOW AND ACOUSTIC FIELD OF A FAN Cofeece o Modellg Flud Flow (CMFF 9) The 14 th Iteatoal Cofeece o Flud Flow Techologes Budapest, Hugay, Septembe 9-1, 9 SIMULATION OF THE FLOW AND ACOUSTIC FIELD OF A FAN Q Wag 1, Mchael Hess, Bethold

More information

Optimizing Multiproduct Multiconstraint Inventory Control Systems with Stochastic Period Length and Emergency Order

Optimizing Multiproduct Multiconstraint Inventory Control Systems with Stochastic Period Length and Emergency Order 585858585814 Joual of Uceta Systes Vol.7, No.1, pp.58-71, 013 Ole at: www.us.og.uk Optzg Multpoduct Multcostat Ivetoy Cotol Systes wth Stochastc Peod Legth ad egecy Ode Ata Allah Talezadeh 1, Seyed Tagh

More information

Integrated Workforce Planning Considering Regular and Overtime Decisions

Integrated Workforce Planning Considering Regular and Overtime Decisions Poceedgs of the 2011 Idusta Egeeg Reseach Cofeece T. Dooe ad E. Va Ae, eds. Itegated Wofoce Pag Cosdeg Regua ad Ovetme Decsos Shat Jaugum Depatmet of Egeeg Maagemet & Systems Egeeg Mssou Uvesty of Scece

More information

Opinion Makers Section

Opinion Makers Section Goupe de Taal Euopée Ade Multctèe à la Décso Euopea Wog Goup Multple Ctea Decso Adg Sée 3, º8, autome 008. Sees 3, º 8, Fall 008. Opo Maes Secto Hamozg poty weghts ad dffeece judgmets alue fucto mplemetato

More information

A multivariate Denton method for benchmarking large data sets

A multivariate Denton method for benchmarking large data sets 09 A multaate Deto metho fo bechmakg lage ata sets ee Bkke, Jacco Daalmas a No Mushkua The ews epesse ths pape ae those of the autho(s) a o ot ecessaly eflect the polces of tatstcs Nethelas Dscusso pape

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Understanding Financial Management: A Practical Guide Guideline Answers to the Concept Check Questions

Understanding Financial Management: A Practical Guide Guideline Answers to the Concept Check Questions Udestadig Fiacial Maagemet: A Pactical Guide Guidelie Aswes to the Cocept Check Questios Chapte 4 The Time Value of Moey Cocept Check 4.. What is the meaig of the tems isk-etu tadeoff ad time value of

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Keywords: valuation, warrants, executive stock options, capital structure, dilution. JEL Classification: G12, G13.

Keywords: valuation, warrants, executive stock options, capital structure, dilution. JEL Classification: G12, G13. Abstact he textbook teatmet fo the aluato of waats takes as a state aable the alue of the fm ad shows that the alue of a waat s equal to the alue of a call opto o the equty of the fm multpled by a dluto

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Municipal Creditworthiness Modelling by Clustering Methods

Municipal Creditworthiness Modelling by Clustering Methods Mucal Cedtwotess Modellg by Clusteg Metods Pet Háek, Vladmí Ole Isttute of System Egeeg ad Ifomatcs Faculty of Ecoomcs ad Admstato Uvesty of Padubce Studetská 84, 53 0 Padubce Czec eublc Pet.Haek@uce.cz,

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia.

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia. Math 40 Lecture 24 Autes Facal Mathematcs How ready do you feel for the quz o Frday: A) Brg t o B) I wll be by Frday C) I eed aother week D) I eed aother moth Aa NoraEvas 403 Kerchof AaNEvas@vrga.edu http://people.vrga.edu/~as5k/

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

A Resource Scheduling Algorithms Based on the Minimum Relative Degree of Load Imbalance

A Resource Scheduling Algorithms Based on the Minimum Relative Degree of Load Imbalance Jounal of Communcatons Vol. 10, No. 10, Octobe 2015 A Resouce Schedulng Algothms Based on the Mnmum Relatve Degee of Load Imbalance Tao Xue and Zhe Fan Depatment of Compute Scence, X an Polytechnc Unvesty,

More information

Project Request & Project Plan

Project Request & Project Plan Poject Request & Poject Pla ITS Platfoms Cofiguatio Maagemet Pla Vesio: 0.3 Last Updated: 2009/01/07 Date Submitted: 2008/11/20 Submitted by: Stephe Smooge Executive Sposo: Gil Gozales/Moia Geety Expected

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

http://www.elsevier.com/copyright

http://www.elsevier.com/copyright Ths atce was pubshed a Eseve oua. The attached copy s fushed to the autho fo o-commeca eseach ad educato use, cudg fo stucto at the autho s sttuto, shag wth coeagues ad povdg to sttuto admstato. Othe uses,

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Money Math for Teens. Introduction to Earning Interest: 11th and 12th Grades Version

Money Math for Teens. Introduction to Earning Interest: 11th and 12th Grades Version Moey Math fo Tees Itoductio to Eaig Iteest: 11th ad 12th Gades Vesio This Moey Math fo Tees lesso is pat of a seies ceated by Geeatio Moey, a multimedia fiacial liteacy iitiative of the FINRA Ivesto Educatio

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Efficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction

Efficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction Intenatonal Jounal of Machne Leanng and Computng, Vol. 2, No. 3, June 202 Effcent Evolutonay Data Mnng Algothms Appled to the Insuance Faud Pedcton Jenn-Long Lu, Chen-Lang Chen, and Hsng-Hu Yang Abstact

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Learning Objectives. Chapter 2 Pricing of Bonds. Future Value (FV)

Learning Objectives. Chapter 2 Pricing of Bonds. Future Value (FV) Leaig Objectives Chapte 2 Picig of Bods time value of moey Calculate the pice of a bod estimate the expected cash flows detemie the yield to discout Bod pice chages evesely with the yield 2-1 2-2 Leaig

More information

An Approach of Degree Constraint MST Algorithm

An Approach of Degree Constraint MST Algorithm I.J. Ifomato Techology a Compute Scece, 203, 09, 80-86 Publhe Ole Augut 203 MECS (http://www.mec-pe.og/) DOI: 0.585/jtc.203.09.08 A Appoach Degee Cotat MST Algothm Sajay Kuma Pal Depatmet Compute Sc. a

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Ignorance is not bliss when it comes to knowing credit score

Ignorance is not bliss when it comes to knowing credit score NET GAIN Scoing points fo you financial futue AS SEEN IN USA TODAY SEPTEMBER 28, 2004 Ignoance is not bliss when it comes to knowing cedit scoe By Sanda Block USA TODAY Fom Alabama comes eassuing news

More information

Annuities and loan. repayments. Syllabus reference Financial mathematics 5 Annuities and loan. repayments

Annuities and loan. repayments. Syllabus reference Financial mathematics 5 Annuities and loan. repayments 8 8A Futue value of a auity 8B Peset value of a auity 8C Futue ad peset value tables 8D Loa epaymets Auities ad loa epaymets Syllabus efeece Fiacial mathematics 5 Auities ad loa epaymets Supeauatio (othewise

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

Finance Practice Problems

Finance Practice Problems Iteest Fiace Pactice Poblems Iteest is the cost of boowig moey. A iteest ate is the cost stated as a pecet of the amout boowed pe peiod of time, usually oe yea. The pevailig maket ate is composed of: 1.

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Investment Science Chapter 3

Investment Science Chapter 3 Ivestmet Scece Chapte 3 D. James. Tztzous 3. se P wth 7/.58%, P $5,, a 7 84, to obta $377.3. 3. Obseve that sce the et peset value of X s P, the cash flow steam ave at by cyclg X s equvalet

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Periodic Review Probabilistic Multi-Item Inventory System with Zero Lead Time under Constraints and Varying Order Cost

Periodic Review Probabilistic Multi-Item Inventory System with Zero Lead Time under Constraints and Varying Order Cost Ameica Joual of Applied Scieces (8: 3-7, 005 ISS 546-939 005 Sciece Publicatios Peiodic Review Pobabilistic Multi-Item Ivetoy System with Zeo Lead Time ude Costaits ad Vayig Ode Cost Hala A. Fegay Lectue

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

A Novel Lightweight Algorithm for Secure Network Coding

A Novel Lightweight Algorithm for Secure Network Coding A Novel Lghtweght Algothm fo Secue Netwok Codng A Novel Lghtweght Algothm fo Secue Netwok Codng State Key Laboatoy of Integated Sevce Netwoks, Xdan Unvesty, X an, Chna, E-mal: {wangxaoxao,wangmeguo}@mal.xdan.edu.cn

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Answers to Warm-Up Exercises

Answers to Warm-Up Exercises Aswes to Wam-Up Execses E8-1. Total aual etu Aswe: ($0 $1,000 $10,000) $10,000 $,000 $10,000 0% Logstcs, Ic. doubled the aual ate of etu pedcted by the aalyst. The egatve et come s elevat to the poblem.

More information

Joint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments

Joint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments IEEE ICC 2014 - Next-Geneaton Netwokng Symposum 1 Jont Vtual Machne and Bandwdth Allocaton n Softwae Defned Netwok (SDN) and Cloud Computng Envonments Jonathan Chase, Rakpong Kaewpuang, Wen Yonggang, and

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Load and Resistance Factor Design (LRFD)

Load and Resistance Factor Design (LRFD) 53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Derivation of Annuity and Perpetuity Formulae. A. Present Value of an Annuity (Deferred Payment or Ordinary Annuity)

Derivation of Annuity and Perpetuity Formulae. A. Present Value of an Annuity (Deferred Payment or Ordinary Annuity) Aity Deivatios 4/4/ Deivatio of Aity ad Pepetity Fomlae A. Peset Vale of a Aity (Defeed Paymet o Odiay Aity 3 4 We have i the show i the lecte otes ad i ompodi ad Discoti that the peset vale of a set of

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

A New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand

A New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand A ew eplenshment Polcy n a wo-echelon Inventoy System wth Stochastc Demand Rasoul Haj, Mohammadal Payesh eghab 2, Amand Babol 3,2 Industal Engneeng Dept, Shaf Unvesty of echnology, ehan, Ian (haj@shaf.edu,

More information

CSSE463: Image Recognition Day 27

CSSE463: Image Recognition Day 27 CSSE463: Image Recogto Da 27 Ths week Toda: Alcatos of PCA Suda ght: roject las ad relm work due Questos? Prcal Comoets Aalss weght grth c ( )( ) ( )( ( )( ) ) heght sze Gve a set of samles, fd the drecto(s)

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE

AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE Radoengneeng Aea Coveage Smulatons fo Mllmete Pont-to-Multpont Systems Usng Buldng Blockage 43 Vol. 11, No. 4, Decembe AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL

More information

Research on Cloud Computing Load Balancing Based on Virtual Machine Migration

Research on Cloud Computing Load Balancing Based on Virtual Machine Migration Send Odes fo Repnts to epnts@benthascence.ae 334 The Open Cybenetcs & Systecs Jounal, 205, 9, 334-340 Open Access Reseach on Cloud Coputng Load Balancng Based on Vtual Machne Mgaton Lu Kun,*, Xu Gaochao

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

The Detection of Obstacles Using Features by the Horizon View Camera

The Detection of Obstacles Using Features by the Horizon View Camera The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments 1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information