Private Division over FHE-Encrypted Data using Newton-Raphson Approximation

2018 ◽  
Vol 15 (3) ◽  
pp. 189-204
Author(s):  
Myungsun Kim
Author(s):  
Nadia Hashim Al-Noor ◽  
Shurooq A.K. Al-Sultany

        In real situations all observations and measurements are not exact numbers but more or less non-exact, also called fuzzy. So, in this paper, we use approximate non-Bayesian computational methods to estimate inverse Weibull parameters and reliability function with fuzzy data. The maximum likelihood and moment estimations are obtained as non-Bayesian estimation. The maximum likelihood estimators have been derived numerically based on two iterative techniques namely “Newton-Raphson” and the “Expectation-Maximization” techniques. In addition, we provide compared numerically through Monte-Carlo simulation study to obtained estimates of the parameters and reliability function in terms of their mean squared error values and integrated mean squared error values respectively.


2012 ◽  
Vol 35 (11) ◽  
pp. 2215 ◽  
Author(s):  
Fang-Quan CHENG ◽  
Zhi-Yong PENG ◽  
Wei SONG ◽  
Shu-Lin WANG ◽  
Yi-Hui CUI

2010 ◽  
Vol 30 (4) ◽  
pp. 1099-1102
Author(s):  
Yu-yi KE ◽  
Shi-xiong XIA ◽  
Chu-jiao WANG

2010 ◽  
Vol 7 ◽  
pp. 182-190
Author(s):  
I.Sh. Nasibullayev ◽  
E.Sh. Nasibullaeva

In this paper the investigation of the axisymmetric flow of a liquid with a boundary perpendicular to the flow is considered. Analytical equations are derived for the radial and axial velocity and pressure components of fluid flow in a pipe of finite length with a movable right boundary, and boundary conditions on the moving boundary are also defined. A numerical solution of the problem on a finite-difference grid by the iterative Newton-Raphson method for various velocities of the boundary motion is obtained.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


1989 ◽  
Vol 3 (3) ◽  
pp. 397-403 ◽  
Author(s):  
P. Whittle

A condition expressed in Eq. (7) is given which, with one simplifying regularity condition, ensures that the policy-improvement algorithm is equivalent to application of the Newton–Raphson algorithm to an optimality condition. It is shown that this condition covers the two known cases of such equivalence, and another example is noted. The condition is believed to be necessary to within transformations of the problem, but this has not been proved.


1983 ◽  
Vol 23 (05) ◽  
pp. 727-742 ◽  
Author(s):  
Larry C. Young ◽  
Robert E. Stephenson

A procedure for solving compositional model equations is described. The procedure is based on the Newton Raphson iteration method. The equations and unknowns in the algorithm are ordered in such a way that different fluid property correlations can be accommodated leadily. Three different correlations have been implemented with the method. These include simplified correlations as well as a Redlich-Kwong equation of state (EOS). The example problems considered area conventional waterflood problem,displacement of oil by CO, andthe displacement of a gas condensate by nitrogen. These examples illustrate the utility of the different fluid-property correlations. The computing times reported are at least as low as for other methods that are specialized for a narrower class of problems. Introduction Black-oil models are used to study conventional recovery techniques in reservoirs for which fluid properties can be expressed as a function of pressure and bubble-point pressure. Compositional models are used when either the pressure. Compositional models are used when either the in-place or injected fluid causes fluid properties to be dependent on composition also. Examples of problems generally requiring compositional models are primary production or injection processes (such as primary production or injection processes (such as nitrogen injection) into gas condensate and volatile oil reservoirs and (2) enhanced recovery from oil reservoirs by CO or enriched gas injection. With deeper drilling, the frequency of gas condensate and volatile oil reservoir discoveries is increasing. The drive to increase domestic oil production has increased the importance of enhanced recovery by gas injection. These two factors suggest an increased need for compositional reservoir modeling. Conventional reservoir modeling is also likely to remain important for some time. In the past, two separate simulators have been developed and maintained for studying these two classes of problems. This result was dictated by the fact that compositional models have generally required substantially greater computing time than black-oil models. This paper describes a compositional modeling approach paper describes a compositional modeling approach useful for simulating both black-oil and compositional problems. The approach is based on the use of explicit problems. The approach is based on the use of explicit flow coefficients. For compositional modeling, two basic methods of solution have been proposed. We call these methods "Newton-Raphson" and "non-Newton-Raphson" methods. These methods differ in the manner in which a pressure equation is formed. In the Newton-Raphson method the iterative technique specifies how the pressure equation is formed. In the non-Newton-Raphson method, the composition dependence of certain ten-ns is neglected to form the pressure equation. With the non-Newton-Raphson pressure equation. With the non-Newton-Raphson methods, three to eight iterations have been reported per time step. Our experience with the Newton-Raphson method indicates that one to three iterations per tune step normally is sufficient. In the present study a Newton-Raphson iteration sequence is used. The calculations are organized in a manner which is both efficient and for which different fluid property descriptions can be accommodated readily. Early compositional simulators were based on K-values that were expressed as a function of pressure and convergence pressure. A number of potential difficulties are inherent in this approach. More recently, cubic equations of state such as the Redlich-Kwong, or Peng-Robinson appear to be more popular for the correlation Peng-Robinson appear to be more popular for the correlation of fluid properties. SPEJ p. 727


Sign in / Sign up

Export Citation Format

Share Document