Two conditions for rock-soil aggregate slope are considered: natu

Two conditions for rock-soil aggregate slope are considered: natural slope and heavy rainfall. Figure 16 shows the three-dimensional limit equilibrium computer http://www.selleckchem.com/products/carfilzomib-pr-171.html model under different conditions. Table 5 shows the computed results for the safety factor of the Gendakan slope under different conditions. And a sensitivity analysis of the shear strength parameters impact on the safety factor of slope is carried out based on the global slope stability; Figure 17 shows the sensitivity analysis results of shear strength parameters and safety factor of global slope stability.Figure 16Three-dimensional limit equilibrium computer model under different conditions: (a) global slope stability; (b) local slope stability case 2; (c) local slope stability case 1, and (d) three-dimensional mesh for (c).

Figure 17Sensitivity analysis results of shear strength parameters and safety factor.Table 5Computed results for the safety factor of Gendakan slope under differen
Cloud storage provides an elastic, highly available, easily accessible, and cheap data repository to users who do not want to maintain their own storage or just for convenience, and such a way of storing data becomes more and more popular. In many cases, especially when the users want to store their sensitive data such as business documents, it requires the security guarantees against the cloud provider since an internal staff may access to the data maliciously. Directly encrypting the sensitive documents using traditional encryption techniques such as AES is not an ideal solution since the user will lose the ability to effectively search for the desired documents.

One solution for effectively searching over encrypted data is searchable encryption technique. It enables a user to securely outsource his private documents to a third party while maintaining the ability to search the documents by keywords. The scenario is simple: the user submits some encrypted keywords to the server, and then the server performs the search and returns the encrypted documents which contain the queried keywords. However, current searchable encryption techniques either directly return the matched documents or return in the first round some limited information (guided mode) which is prestored in metadata, such as the name and a short static abstract for each matched document. The more documents stored, the more possible matched results will be, and finding the desired documents also becomes AV-951 a problem. Moreover, the bandwidth cost must be taken into consideration such that returning a large amount of matched documents seemed to be impractical.Another solution for effectively searching for the desired data is through content preview, which is the main topic of this paper.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>