SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAGEMENT SYSTEM

Size: px
Start display at page:

Download "SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAGEMENT SYSTEM"

Transcription

1 SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAGEMENT SYSTEM Mohammad Al Rawajbeh 1, Vladimir Sayenko 2 and Mohammad I. Muhairat 3 1 Department o Computer Networks, Al-Zaytoonah University o Jordan, Amman, Jordan 2 Kharkov National University o Radio Electronics (KhNURE) Kharkiv, Ukraine 3 Department o Sotware Engineering, Al-Zaytoonah University o Jordan, Amman, Jordan ABSTRACT The process o choosing and integrating a network management system (NMS) to an existing computer network became a big question due to the complexity o used technologies and the variety o NMS options. Most o computer networks are being developed according to their internal rules in cloud environments. The use o NMS requires not only inrastructural changes, consequently increasing the cost o integration and maintenance, but also increases the risk o potential ailures. In this paper, conception and method o express choice to implement and integrate a network management system are presented. Review o basic methods o cost analysis or IT systems is presented. The simpliied conception o cost beneits analysis (CBA) is utilized as a basis o the oered method. A inal estimation is based on three groups o parameters: parameters o expected integration risk evaluation, expected eect and level o completed management tasks. The explanation o the method is provided via example. KEYWORDS Network Management; NMS; CBA; Integrated System; Cost Analysis; Eiciency Criterion 1. INTRODUCTION It is early or late, but or any complexity computer network the updating process begins. This process changes not only the hardware o computer network but also its inrastructure. The sotware structure is changed, and unctionality properties are changed too. This problem is described very nice in [1, 4]. The responsibility on these actions is an administrator. He makes the update operations according to the pre-determined network management concept. The basic principals o those concepts are considered in [1, 2]. The simplest schema o this concept according to [1] is FCAPS (Fault, Coniguration, Accounting, Perormance, and Security). The more complex schema is Microsot Framework MOF 4.0 [3]. For the considered task we can use the simplest schema FCAPS and choose the Coniguration Management unctions. According to MS MOF 4.0 and Management unctions (SMF) we can choose "Change and Coniguration SMF". In the MS MOF 4.0 or C&C SMF we ind a good description o the updating process or the change procedure and the descriptions o the correspondence responsibilities roles. The choose procedure or the alternative sotware elements is an administrator's decision. For the existence computer network inrastructure any changes leads to changes o the computer network state. These changes carried out the positive (A) and negative (B) eects. As a result, or each Sot i (Sotware updates) there are unique evaluations (A, B). The igure 1 shows that the administrator has to chose the best optimal solution. DOI: /ijcnc

2 Figure 1. Choice solution or integrated sotware And he has two main questions How? and What?. The question How? means the evaluation method or (A, B). The methodology questions o that task is considered in [5]. The question What? means the rules and criteria to chose the concrete system rom the existence set. This choice is dependent on the type o sotware updating service or apps Sot i. Let s consider the task when Sot i = NMS (Network Management System). It means that the existence NMS should be changed or a new NMS should be implemented. The usage o management tools becomes actual, and it improves network administration, automated storage operations and management inormation analysis. The example o this tool is Network Management System (NMS) [1, 2]. The complexity o the managed system increases the complexity o the management system. In this situation, inrastructural changes will not only increase the cost o integration and maintenance, but will also increase the risk o potential ailures. Integration o the NMS may sometimes reduce the eiciency o the whole system as well. Based on the above, the problem o estimating the eiciency o integrating the new network management system into an existing inrastructure o inormation space is actual. In view o certain situations, the decisions about the integration o a special system oten must be taken rapidly. It depends on the real inancial condition o the company. These solutions could be considered as an independent IT e-space [13] or within separate unctions o network management rameworks. Such rameworks are inancial management MOF SMF [3] or ITIL [16]. They are parts o the general complex concept o the unctions and areas o network management rameworks. As a result, the considered task is presented as Figure 2. 48

3 Figure 2.Choice solution or integrated network management system The questions How? and What? are remained open, but the choice o NMS could be done according to FCAPS demands. It means that the evaluation o positive and negative eects could be considered according to FCAPS concepts: A(FCAPS), B(FCAPS). The answers on the questions How? and What? are bound with the evaluation procedures o A(FCAPS), B(FCAPS). They belong to the area o eiciency and cost analysis or the implemented systems Sot i. Additionally, there is the time restriction to make optimal decision (Time < T*). In such cases, the availability o methods that allow justiying such a decision is actual. Such methods and techniques are Total Cost o Ownership (TCO) [7], Total Beneits o Ownership (TBO) [8] and Return On Investment (ROI) [9]. These techniques were successully used in assessing the eectiveness o new inormation systems implementations, or example, Cloud system [11] and Data Center. O course, these are good techniques, but they have one big disadvantage. Actually, they are the ultimate economic methodologies that require qualiied experts, high research level and time expenses. Most o the techniques are based on three main approaches: estimation o costs associated with the implemented systems, estimation o implementation risk, and estimation o beneits. Here are the examples o some popular techniques that can help estimate the impact o the new IT solution integration or complex inormation systems. For example, TCO [7] allows us to estimate the total costs, TBO [8] helps evaluate the beneits o such integration, IT IR (IT Integration Risk) [12] allows analysing and evaluating the risk, ROI (ROI) [9] allows evaluating the eiciency o an investment. In [19] proposed the several dimensions o complexity that have to be considered during the building o cost management model (CM), and ound that, the reliability o the model is depending on the degree o complexity. Out o all described concepts, two o them are the most widely used; namely TCO and TBO. Both concepts are based on the determination o the purchase price o an asset plus the costs o operation, but they possess opposite ideas under the hood. The TCO shows how the costs will increase ater integration o a new system, whereas the TBO points to the beneits o the integration with the same system. The Cost-Beneit Analysis belongs to the ratio approach to decision-making processes [18]. 49

4 Another popular concept is Cost beneit Analysis (CBA) [6, 7]. It uses two components; one o them considers the cost o integrated inormation technology and the problems that rise ater the main system coniguration change (e.g., additional cost and eort associated with the restructuring o the management, the sta adaptation period and so on.). The second one considers the advantages that we get ater the system integration. It appears that the CBA is a more advanced approach or these tasks. The article consists o the review part, ormulation o the problem, description o the concept, description o the parameters, proposed method o analysis and examples. 2. EVALUATION CONCEPT 2.1. PROBLEM FORMULATION AND DESCRIPTION OF THE STUDIED OBJECT THE AIM The aim o the article is to identiy the ways o express (simpliied) selection o Network Management Systems implementation and their integration THE RESEARCH OBJECT Assume that some company has deployed a computer network. There is a need or additional integration o specialized network management system. The question o the implementation or integration o complex (expensive) sotware is considered. At the same time, there are alternative ways to purchase one o several types o such sotware systems. Suppose there is an ITdepartment in the company. It is responsible or the network administration. The head o department should take the decision about integration in limited time PROBLEM FORMULATION It is necessary to have a method (technique) that allows making the decision o the NMS systems selection rom available alternatives. This method should be relatively easy to use. It should not demand additional specialist involvement rom other departments or companies. The number o method parameters should be small, the criteria should take into account the level o solving the basic problems; the results o the analysis should be understandable or managers and the network administrator. The basic approach o the problem solving is assessing the beneits o new system integration, estimating the level o existing problems, and resolving and assessing the possible problems arising rom the new sotware (system) exploitation COMMON CONCEPT OF EVALUATION Let us have three groups o criteria. The irst group describes the level o probable risk (E r (NMS)). It means that we highlight the most signiicant problems on administrator's mind. These problems could appear in the network ater new system integration. The second group covers the eectiveness o the network maintenance (E e (NMS)). We suppose that ater integration o the NMS, the general eectiveness is going to increase. In general the eectiveness is characterized as, D0 = E1 / E0, ( E1, E0) [0,1], where E1, E0 are the current and basic variables. In this case, we use time and money as the main characteristics. This is a complex 50

5 problem or direct values estimation, so we should use the indirect characteristics such as the maintenance o the network. We assume that i we improve the maintenance o the network, the main characteristics will be improved as well. The maintenance and eiciency will be considered or the independent management areas. There are several concepts o representation o management areas [1, 6]. In accordance with the concept based on the OSI RM (ISO) the management is divided into 5 areas or 5 basic management unctions - FCAPS (Coniguration, Perormance, Fault, Accounting, and Security) [1, 2]. It should be noticed that the proposed division o Microsot SMF MOF 4.0 suggests 18 unctions [3]. In addition, there is also a TMN (ITU-T) [1, 2] classiication. The third group evaluates the completion level o the general solutions on the system integration (E (NMS)). It is possible that the integrated system will not solve all o the management problems completely, and ater the purchase o the system, we will have to buy another one (This is an incomplete solution). So that, instead o abstract positive (A) and negative (B) variables, we can evaluate the eectiveness levels, completion and probable risk. The task is as evaluation o values or (Ee, Er, E). The Figure 3 shows that the task became clear or administrator. Instead o the question How? he can use the evaluation procedures or each considered NMS. Instead o the question What? he can use the analysis procedure and the set o criteria. All solutions will be conormed to FCAPS and MS MOF 4.0 (C&C SMF). All previous demands will be in orce. Figure 3. Choice concept or integrated network management system The concept o a NMS comparison may be represented in the orm o ive stages: 1. Evaluation o the level o probable risk or the integrated system. 2. Evaluation o the beneits ater system integration in the network maintenance. 51

6 3. Estimation o completion level ater system integration. 4. Evaluation o the generalized criterion o selection expediency o the system to be integrated. 5. Estimation scale ormation or comparative variables. The generalized criterion should be an integrated variable. Estimation scale ormation or comparative variables means that or all variables we should have a single scale. It should be with relative values on the interval [0, 2] with the control ixed points {0, 1, and 2} = {<bad>, <OK>, <good>}. This approach allows getting the normalization and standardization o all variable values and makes them uniorm. 3. EVALUATION CRITERIA 3.1. CRITERIA OF THE LEVEL OF PROBABLE RISK Let us introduce our types o criteria or this group: load ( Load ), complexity o the administration ( Adm ), network security ( Sec ) and cost o ownership or the system ( Cst ). "Load" means the approximate amount o traic that is generated by the new system throughout on network. Actually, it is an evaluation o the additional network load, created by the service management traic. It is determined as the total generalized estimate, based on the average load at the workstation Load( WS ), the average load at the segment Load( Seg ) and the average load at the server Load ( Ser ). Load WS = Load Sg Load Sr Nw 1 ( ) N Load ( WS ) w i= 1 i Ng 1 ( ) = N Load( Sg ) g i= 1 i Ns 1 ( ) = N Load ( Sr ) s i= 1 i (1) Where Nw, Ng, Ns are the number o workstations, segments, and servers, respectively. { Load ( WS), Load ( Sg), Load( Sr)} {( < low >, < medium >, < high > )} ={0,1,2}, (2) Load( Net) = l1load ( WS) + l2load( Sg) + l3load( Sr), (3) with the criterion Load ( Net) min, l1 + l2 + l3 = 1, hence assuming same values o coeicients l 1 = l 2 = l 3 = 1/ 3 «Complexity o the administration» ( Adm ),is an expert estimation. Adm { < low >, < medium >, < high > } ={0,1,2}, (4) with the criterion Adm min. The point is as ollows. The integration increases the administration process and could increase the complexity o the base network and its inrastructure. «Network security» ( Sec ) means that using another s NMS reduces the security level. This is an expert estimation 52

7 Sec { < low >, < medium >, < high > } ={2,1,0}, (5) with the criterion Sec min. «Cost o ownership» is complexity estimation. It consists o three estimations: cost o purchase ( Cst( In ) ), cost o deployment ( Cst( Use ) ), and cost on supporting ( Cst( Sup ) ). Each o criterions Cst( In ), Cst( Use ), and Cst( Sup ) will be estimated by an expert. Cst( p) { < low >, < medium >, < high > } ={0,1,2}, where p { < In >, < Use >, < Sup > }. There are three types o estimation: 1) each criterion Cst( p) is considered separately, 2) only one criterion is used, and 3) the average value o all criterions is used. The type o estimation is given by parameter c i. Cst( Net) = c Cst( In) + c Cst( Use) + c Cst( Sup), (6) where c1 + c2 + c3 = 1, hence assuming c 1 = c 2 = c 3 = 1/ 3. To exclude type o estimation, use c i = 0. The criterion Cst( Net) min. Any system could be estimated by usage o the Cost o ownership. E ( NMS) = r Load ( Net) + r Adm( Net) + r Sec( Net) + r Cst( Net), (7) r with the criterion Er ( NMS) min, r1 + r2 + r3 + r4 = 1, hence assuming r 1 = r 2 = r 3 = r 4 = 1/ GENERALIZED CRITERIA FOR THE EFFECTIVENESS According to ive Management areas (FCASP), it is recommended to use ive criterions: perormance ( Pe ), coniguration ( Ce ), Fault tolerance ( Fe ), security ( Se ) and accounting ( Ae ). In this group, Perormance means the state o data perormance (real throughput) in case o the integrated system usage. It is expected that the value o perormance criterion will increase ater the integration. This is an expert estimation. Pe { < not changed >, < changed >, < very high > } = {0,1,2}, (8) with the criterion Pe max. Coniguration means the act o presence o Management coniguration. Coniguration is an expert estimation. The coniguration management is optional. In case o presence, it could have dierent levels o depth and complexity, or example, logical and unctional management coniguration. In this case, it is multiple. Ce { < no >, < partially >, < multiple > } ={0,1,2}, (9) 53

8 with the criterion Ce max. Fault tolerance means the improvement in the detection, prediction and prevention o possible ailures elimination. It could be estimated by Minimum Time beore Repairing (MTBR) or by reducing the number o aults. It is recommended to use an expert estimation. Fe { < no improving >, < partially >, < very good > } = {0,1,2}, (10) with the criterion Fe max. Security means that the integration o a new system will increase the security level. This is an expert estimation. Se { < no >, < partially >, < very good > } ={0,1,2}, (11) with the criterion Se max. Accounting means the possibility to maintain user access control and release control o personal QoS. This is an expert estimation Ae { < no >, < partially >, < very good > } ={0,1,2}, with the criterion Ae max. (12) To sum up, we get estimation o generalized eectiveness criteria. E ( e NMS ) = e ( ) ( ) ( ) ( ) ( ) 1Pe Net + e2ce Net + e3fe Net + e4se Net + e5 Ae Net, (13) with the criterion Ee ( NMS) max. e1 + e2 + e3 + e4 + e5 = 1, hence assuming same values o coeicients i.e. e1 = e2 = e3 = e4 = e5 = 1/ COMPLETION LEVEL CRITERIA In general, this group can be represented by a list that does not coincide with the previous group; it will be more suitable when the lists are the same. Perormance is a number o criterions that characterize the problems, which are being resolved, and their level o completeness. Use the estimation P { < no >, < partially >, < yes > } ={0,1,2}, (14) with the criterion P max. Coniguration means the act o solving the task o coniguration management in the network C { < no >, < partially >, < all > } ={0,1,2}, (15) with the criterion C max. 54

9 Fault tolerance means the act o solving the task o ault management in the network. Use the estimation F { < no >, < partially >, < all > } ={0,1,2}, (16) with the criterion F max. Security means the act o solving the task o security management in the network. Use the estimation S { < no >, < partially >, < all > } ={0,1,2} (17) with the criterion S max. Accounting means the act o solving the task o accounting management in the network. Use the estimation A { < no >, < partially >, < all > } ={0,1,2} (18) with the criterion A max. To sum up, we get a generalized criterion that shows the level o problem solving completion. E ( NMS) = a1p ( Net) + a2c ( Net) + a3f ( Net) + + a4s ( Net) + a5a ( Net) (19) a + a + a + a + a, hence assuming same values o coeicients i.e =1 a = a = a = a = a =1/ GENERALIZED CRITERION This inal generalized criterion is estimated as the ratio o sums o eiciencies ( E (NMS) + E e (NMS) ) to the criterion o expected risk E r (NMS). Since the value o criterion E (NMS) could be equal to 0, use a biased estimate (1 + E (NMS)). The inal equation will be r Q( NMS) = ( E ( NMS) + E ( NMS)) /(1 + E ( NMS)) (20) e r with the criterion Q( NMS) max. This inal equation takes into account all criterions and allows to compare all decisions. As a result, we have a convolution o the evaluations as it shown on Figure 4. r 55

10 Figure 4. Convolution o the evaluations. 4. EVALUATION METHOD The inal method o estimation consists o six steps. 1. General analysis o all considered existing systems. 2. Evaluation o the level o probable risk or the integrated system. This step should cover the ollowing points: the evaluation o the additional network load created by service traic (1), (2), (3), the probable increase o complexity o administering process (4), the probable decrease o security level (5), cost evaluation depends on integrated system such as: cost o purchase ( Cst( In ) ), cost o deployment ( Cst( Use ) ), cost on supporting ( Cst( Sup ) ) (6) and general estimation o probable risk Er ( NMS ) (7). Figure 5 illustrates the lowchart or the method o Evaluation o the probable risk level. 56

11 Figure 5. Flowchart or the method o Evaluation o the probable risk level 3. Evaluation o the beneits ater integrating the system in maintaining the network. This step should cover the ollowing points: the evaluation o the probable improving o perormance (8), coniguration management (9), network in general (10), security level (11), accounting or users (12) and evaluating the total value o expected eiciency Ee( NMS ) (13). Figure 6 illustrates the low charts or the method o Evaluation o the beneits (a) and Evaluation o the completion level (b). 4. Evaluation o the completion level ater system integration. This step should cover the ollowing points: the evaluation o the supporting level or perormance (14), or coniguration management (15), or ault tolerance (16), or security management (17), or user accounting (18), and evaluation o the total value o expected completion level E ( NMS ) (19). 5. Evaluation o the total criterion value Q( NMS ). 6. Processing o the inal analysis and decision making on selection o the system to integrate (20). Figure 6 (c) illustrates the low charts or general method. 57

12 (a) (b) (c) Figure 6. Flowchart or the sub-methods: (a) or beneits ater integrating, (b) or completion level, (c) the general method 5. ANALYSIS OF THE SUGGESTED SOLUTIONS The backbone o the proposed method is based on the act that this method and technique use expert assessment and express evaluation o the complex technical and cost criteria. They are oriented on the evaluation o total risk and beneits when there is a need o integration o a new inormation system to the existing inrastructure o a computer network. The proposed method and the concept should be compared to CBA analysis [1, 2], or other methods o analysis, that are used or analysis o dierent inormation systems [10, 14, 15]. First o all, the proposed concept is a simpliication o the existing one. There are three proposed groups o criteria. These are the main eatures o the proposed method. The assessment methodology is presented or each group o the criteria. In opposite to traditional methods [10, 7, 14, 15], it is proposed to use expert estimates. In this case, head o the IT department could make the evaluation process. There is no need to do detailed cost analysis. The proposed method is simple, lexible and allows perorming the required analysis and justiication in a short time. The number o criteria parameters in the method is small. The criteria take into account the basic 58

13 network management problems. The results o the analysis are clear or managers and the network administrator. The proposed method is used or ast pre-assessment. TCO methods can be used as a supplement to make more extended evaluation. One more additional implementation o this approach is creating the dierent IT e-spaces [13]. This eature helps to manage inrastructure solutions. The main eatures o the suggested solution are the ollowing. Firstly, it oers a symbolic language that is understandable by all o oice managers. This approach helps to orm the development strategy o the computer network inrastructure, as well as to coordinate the strategy according to the company's inancial plans and policy o inancial management. The common terms and categories or proposed conceptions are shown in Figure 7. Figure 7. Schema o the methodology Secondly, it oers a simple method o dierent solutions comparative assessment. This allows the network administrator to make a proper decision quickly or the required system selection. This situation is very typical in real lie. Thirdly, the proposed solution is ocused on the integration o NMS, although it can be applied to the integration o any complex inormation system. In this case, however, it is necessary to review a set o criteria. Why should we choose the estimation scale [0, 2] instead o [0.1]? This is the choice o the authors. We can airm that values {0, 1, 2} are more suitable to interpret than ractional values. They are integer, but in general, it would be possible to use a scale [0, 1]. All o the arguments would stay in orce. For the inal criterion, we should select a range [0, 4]. I we select a range [0, 2], we get the values close to 0.5. In this case, it is diicult to determine and interpret the dierence between various values. How do the changes o value or Er inluence on the values o Q(NMS)? The diagram on the Figure 8 shows these with conditions Er =(2, 1, 0) and Sum=Ee(NMS)+E(NMS)= (1, 2, 3, 4). 59

14 Q(NMS) ٢ ١ ٠ Er Sum=1 Sum=2 Sum=3 Sum=4 Figure 8. Diagram or Q(NMS) by changing Er For the inal evaluation we can chose the basic values as a classiication o general estimation. These values are given in the Table 1. Table 1. Basic values Value Er+E Er Q (NMS) very bad bad 1 2 0,33 middle good 3 1 1,5 best The diagram on the Figure 9 shows the general estimation. Q(NMS) very bad. bad middle good best Diagr 1. Figure 9. Diagram or general estimation Q(NMS) Why does it put a limit on the number and type o criterions? The answer is that, all solutions are oered or speciic systems, NMS. 60

15 6. EXAMPLES 6.1. USING THE CRITERIA OF LEVEL OF PROBABLE RISK Suppose there are three systems: C1 a simple multiunctional system, C2 a multiunctional system, and C3 a ull multiunctional system. The irst system does not make additional load on the network channels; Load ( Net) = 0 X, does not change the existing network administration; process Adm( Net ) = 0, does not change the existing level o security; Sec( Net ) = 0 and has a low cost; Cst( Net ) = 0. The total estimation is equal to Er( NMS ) = 0. The second system is a dierent one. The load o service traic is an average o Load( Net ) = 1, the complexity o administration process is an average o Adm( Net ) = 1, the level o security is an average o Sec( Net ) = 1, and the cost is an average o Cst( Net ) = 1. Thereore, the total estimation is equal to Er ( NMS ) = 1. Third system is a complex multiunctional system, perhaps like management platorms MS System Center or IBM Tivoli. This system has an additional impact on the existing network administration process and complicates it's Load ( Net ) = 2, Adm( Net ) = 2. This can change the security level; Sec( Net ) = 2, and has a high cost; Cst( Net ) = 2. Thus, the inal estimate o the expected risk is equal to Er ( NMS ) = USING THE CRITERIA FOR THE EFFECTIVENESS For the irst system, we ind that the beneits will not be signiicant and they will not change the perormance, security aults or accounting criterion. Suppose that they are ocused only on the collection and monitoring processes are related to the state o network coniguration. Then, we have respectively: For the irst system, P = 0, C = 1, F = 0, S = 0, A = 0 as total E (NMS)=0.2., e e e e e e n i= 1 2 i For the second system, P = 0, C = 2, F = 1, S = 0, A = 1, E (NMS)=0.8. e e e e e e For the third system, P = 1, C = 2, F = 1, S = 2, A = 2, E (NMS)=1.6. e e e e e e 6.3. USING THE CRITERIA OF THE COMPLETION LEVEL The irst system does not have high level o unctionality, so the estimations will be: 61

16 P = 0, C = 1, F = 01, S = 0, A = 0, E (NMS)=0.2. The second system can solve only some tasks or coniguration and accounting management. Thereore, we have: P = 0, C = 1.3, F = 0, S = 0, A = 1 as total E (NMS)= A third system can completely solve the problem o coniguration management and other problems that have been solved in part. Thereore, we have P = 1, C = 2, F = 1, S = 1, A = 1 as total E (NMS)=1.2.. All results and the inal estimation Q( NMS ) are shown in Table 2. It can be seen that this technique does not allow directly speciying which system to choose, but it can help justiy any choice. Table 2. Comparative analysis Name o Values or criterion Goal Criterion C1 C2 C3 E (NMS) Min=0 r E (NMS) Max=2 e E ( NMS ) Max=2 Q( NMS ) Max=4 I we choose the irst system, we spend the least amount o money and make ourselves the least number o problems, but it solves a very small number o tasks. Oten, it cannot give us the possibility o unctional extensions. This is a good solution when the IT-Department is small. I we choose the second system, we restrict ourselves to a partial solution o basic problems. This solution is good or common types o the administrative department: the risk is low and the problem is alleviated. I we choose the third system, then deliberately and consciously we are switching to higher risks and costs, but the eect o the system integration will be much higher. This solution is good or the IT-administration department o a large corporation. In real lie, there are no such particular situations such as Systems 1, 2, and 3. The most values o criteria are very dierent, so in this case, the proposed method can be very useul. The generalized criterion is eective or choosing an integrated system at the comparative analysis. It can be seen that the result is not very dierent in all three cases (Recall that or this method we have the border values Q = 4). This means that in reality the overall eiciency dose not greatly increase because o the problems with integrating or implementing required systems and because o the incompleteness o inal solutions. 62

17 7. DISCUSSION AND FUTURE WORK The main advantage o the proposed method is the possibility o using it to make decisions at the real-time operational mode. It uses only the resources o experts. One question is valid is there a risk o errors by experts? Yes, o course, the error is allowed, but the criteria are chosen in such way that the error be minimized. It is expected to develop the proposed method to optimize the inrastructure o computer networks and extend these solutions or cloud systems. 8. CONCLUSION The questions o express choice when integrating a new inormation system on the class o Network Management Systems was covered in this article. All solutions are valid or a complex computer network. A review o basic methods o IT systems cost analysis is discussed. The main results include the presentation o the concept and method o express assessment o new inormation system selection, which is going to be integrated to the existing one. The concept describes a general ramework to solve the problem, the method and how to solve it. The results are scientiic and novel. General description o the scientiic results can be presented in the ollowing way. The simpliied method or evaluation o the appropriateness o the selection algorithm, based on the expert express risk assessment o the system integration, was urther developed. The level o the completion and success o the problem solution is accelerated as well. This method can help reduce the inancial costs and decrease inancial risk in integrating new systems. The practical signiicance o the results is that they can be successully used to solve problems o computer networks inrastructure management and in the assessment o dierent kinds o inormation system selection, not just the NMS ones. This reduces the investment risk and causes a reduction o inancial costs in general. ACKNOWLEDGMENT Special Acknowledgement to Al Zaytoonah University o Jordan, or supporting this research paper.all solutions were obtained according to the research project in the Network Management laboratory, Control Inormation System Department, Kharkov National University, Kharkov, Ukraine. 63

18 REFERENCES [1] Mani Subramanian, (2012). Network Management: Principles and Practices (2nd Edition. Prentice Hall; 726 p [2] Aleksander Clemm, (2007). Network Management Foundamentals. CISCO Press, 510 p. [3] Microsot Operations Framework (MOF) (2008). MOF Executive Overview version 4.0\ Microsot Accelerators, 32 p. Web: technet/solution. [4] Manar Jammala, Taranpreet Singha, Abdallah Shamia, Rasool Asalb,, Yiming Lic, (2014), Sotware deined networking: State o the art and research challenges. Computer Networks Volume 72, 29 October 2014, Pages [5] Shai i Muhammad Abdulhamid. Resource scheduling or inrastructure as a service (IaaS) in cloud computing: Challenges and opportunities, (2016), Journal o Network and Computer Applications 68 (2016) [6] Scott Farrow & Richard O. Zerbe, Jr. (2013) Principles and Standards or Beneit-Cost Analysis. Edward Elgar Pub. [7] Per-Olov Johansson, Bengt Kriström, (2016) Cost-Beneit Analysis or Project Appraisal. Cambridge University Press. [8] Lambert M. Surhone, Miriam T. Timpledon, and Susan F. Marseken, (2010) 'Procurement: Total Cost o Ownership, Scarcity, Cost-Beneit Analysis",Beta script Publishers 132 p. [9] Supercharging Return on Investment with Rapid Application Development Tools, sponsored by FileMaker, Inc., Apr. 2010, 5 р. Web:// [10] Caesar Wu, Raj Kumar Buyya, (2015) Cloud Data Centers and Cost Modeling, Morgan Kaumann,1st ed 848p. [11] Matthew D. Adler, Eric A. Posner (2006) New Foundations o Cost-Beneit Analysis, Harvard University Press 256p. [12] Paul M. Duvall, Steve Matyas, Andrew Glover (2007) Continuous Integration: Improving Sotware Quality and Reducing Risk. Addison-Wesley Proessional, 336 p. [13] Sayenko V.; Al Rawajbeh M.; Levikin V., (2005)- The E-space and Models o the Services, ineer Conerence or Engineering Education and Research iceer Taipei, Taiwan, CD Proceedings o articles. Session paper N T27, 2005, p [14] E.A. Capuano.(Sep 2005) A TCO Analysis o Cluster Servers Based on TPC-H Benchmarks cluster, 2005 IEEE International Conerence on Cluster Computing, pp.1. [15] Luigi Lavazza. (Aug 2007) Beyond Total Cost o Ownership: Applying Balanced Scorecards to Open- Source Sotware, International Conerence on Sotware Engineering Advances (ICSEA 2007), Aug. 2007, pp [16] ITIL service lie cycle publication suite (2011), 2nd ed 211 p. Web: ( ). [17] Francisco Macia-Perez, Iren Lorenzo-Fonseca, Jose Vicente, Berna-Martinez (april 2014). A ormal ramework or modelling complex network management systems. Journal o network and computer application vol 40,april 2014.pp [18] Petra Marešováa&, Kateřina Půžováb (2014) "Application o Cost Beneit Analysis method in Cloud Computing in the Czech Republic ".2nd World Conerence On Business, Economics And Management- WCBEM 2013.pp [19] Daniel Ellström, Jakob Rehme, Maria Björklund, Håkan Aronsson,( July 2012)" Logistics Cost Management Models and Their Usability or Purchasing", Journal o Modern Accounting and Auditing 2012, Vol. 8, No. 7, pp

19 AUTHORS Dr. Mohammad Al Rawajbeh is an associate proessor at the Computer Network Department, Faculty o Science and Inormation Technology, AL Zaytoonah University o Jordan. Received the High Diploma Degree in Computer Technology rom Yarmouk University, Jordan in Received B.SC and Master Degree in computers and networks rom Kharkov National Polytechnic University, Ukraine rom Obtained his Ph.D. degree in Computer Network Management rom Kharkov National University o Radio-Electronic, Ukraine. His research interests are in the ields o network management, perormance evaluation, and internet technology. He has more than 18 published articles in International Journals and Conerences. Pro. Vladimir I. Sayenko. Proessor o Inormation Control Systems department in Kharkov National University o Radio Electronics, European Engineering Educator IGIP (ING-PAED), Head o Network Management Laboratory. In 1979 graduated with honours rom the Control Systems Department, Kharkov Institute o Radio Electronics (specialty Automated Control Systems), then worked as engineer, junior scientiic associate, senior scientiic associate.in 1987 deended the candidate dissertation (PhD) on the topic: Identiication o Objects o Technical Systems with the Use o Patch Functions" Received an associate proessor certiicate. Since 2001 has been working as a proessor, and at 2001 get the title European Engineer-Educator (ING-PAED IGIP). Supervised many postgraduate dissertations. His research interests in Network Management, Computer Network Optimization, Cloud Systems, and Internet o Things. He has more than 80 published papers. Dr. Mohammed I. Muhairat received the M.Sc. degree in Computer Engineering rom Kharkov State Technical University o Radio Electronics, Ukraine in 1997, and the Ph.D. degree in Inormation Technology rom Kharkov National University o Radio Electronics, Ukraine in Currently, he is Associate Proessor o Sotware Engineering Department and Deputy Dean o Scientiic Research and Higher Studies Deanship at Al Zaytoonah University o Jordan. His research interests in Sotware Engineering ield, such as, Requirements Speciication, Sotware Architecture, Sotware Development Process, Reverse Engineering, and Formal Methods. He has more than 20 published articles in International Journals and Conerences. 65

Maintenance Scheduling Optimization for 30kt Heavy Haul Combined Train in Daqin Railway

Maintenance Scheduling Optimization for 30kt Heavy Haul Combined Train in Daqin Railway 5th International Conerence on Civil Engineering and Transportation (ICCET 2015) Maintenance Scheduling Optimization or 30kt Heavy Haul Combined Train in Daqin Railway Yuan Lin1, a, Leishan Zhou1, b and

More information

A performance analysis of EtherCAT and PROFINET IRT

A performance analysis of EtherCAT and PROFINET IRT A perormance analysis o EtherCAT and PROFINET IRT Conerence paper by Gunnar Prytz ABB AS Corporate Research Center Bergerveien 12 NO-1396 Billingstad, Norway Copyright 2008 IEEE. Reprinted rom the proceedings

More information

!!! Technical Notes : The One-click Installation & The AXIS Internet Dynamic DNS Service. Table of contents

!!! Technical Notes : The One-click Installation & The AXIS Internet Dynamic DNS Service. Table of contents Technical Notes: One-click Installation & The AXIS Internet Dynamic DNS Service Rev: 1.1. Updated 2004-06-01 1 Table o contents The main objective o the One-click Installation...3 Technical description

More information

A FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING

A FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING A FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING FROM SOURCE CODE Vinh T. Ho and Alain Abran Sotware Engineering Management Research Laboratory Université du Québec à Montréal (Canada) vho@lrgl.uqam.ca

More information

Copyright 2005 IEEE. Reprinted from IEEE MTT-S International Microwave Symposium 2005

Copyright 2005 IEEE. Reprinted from IEEE MTT-S International Microwave Symposium 2005 Copyright 2005 IEEE Reprinted rom IEEE MTT-S International Microwave Symposium 2005 This material is posted here with permission o the IEEE. Such permission o the IEEE does t in any way imply IEEE endorsement

More information

Manufacturing and Fractional Cell Formation Using the Modified Binary Digit Grouping Algorithm

Manufacturing and Fractional Cell Formation Using the Modified Binary Digit Grouping Algorithm Proceedings o the 2014 International Conerence on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Manuacturing and Fractional Cell Formation Using the Modiied Binary

More information

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks A MPCP-Based Centralized Rate Control Method or Mobile Stations in FiWi Access Networks 215 IEEE. Personal use o this material is permitted. Permission rom IEEE must be obtained or all other uses, in any

More information

Patch management is a crucial component of information security management. An important problem within

Patch management is a crucial component of information security management. An important problem within MANAGEMENT SCIENCE Vol. 54, No. 4, April 2008, pp. 657 670 issn 0025-1909 eissn 1526-5501 08 5404 0657 inorms doi 10.1287/mnsc.1070.0794 2008 INFORMS Security Patch Management: Share the Burden or Share

More information

A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW

A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW 1 Dr.T.Nalini,, 2 Dr. A.Kumaravel, 3 Dr.K.Rangarajan Dept o CSE, Bharath University Email-id: nalinicha2002@yahoo.co.in

More information

International Journal of Pure and Applied Sciences and Technology

International Journal of Pure and Applied Sciences and Technology Int. J. Pure Appl. Sci. Technol., 18(1) (213), pp. 43-53 International Journal o Pure and Applied Sciences and Technology ISS 2229-617 Available online at www.iopaasat.in Research Paper Eect o Volatility

More information

High School Students Who Take Acceleration Mechanisms Perform Better in SUS Than Those Who Take None

High School Students Who Take Acceleration Mechanisms Perform Better in SUS Than Those Who Take None May 2008 Dr. Eric J. Smith, Commissioner Dr. Willis N. Holcombe, Chancellor High School Who Take Acceleration Mechanisms Perorm Better in SUS Than Those Who Take None Edition 2008-01 Introduction. is one

More information

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy Journal o Agricultural and Resource Economics 40(1):80 111 ISSN 1068-5502 Copyright 2015 Western Agricultural Economics Association The Tangled Web o Agricultural Insurance: Evaluating the Impacts o Government

More information

Options on Stock Indices, Currencies and Futures

Options on Stock Indices, Currencies and Futures Options on Stock Indices, Currencies and utures It turns out that options on stock indices, currencies and utures all have something in common. In each o these cases the holder o the option does not get

More information

Accommodating Transient Connectivity in Ad Hoc and Mobile Settings

Accommodating Transient Connectivity in Ad Hoc and Mobile Settings Accommodating Transient Connectivity in Ad Hoc and Mobile Settings Radu Handorean, Christopher Gill and Gruia-Catalin Roman Department o Computer Science and Engineering Washington University in St. Louis

More information

System-Level Security for Network Processors with Hardware Monitors

System-Level Security for Network Processors with Hardware Monitors System-Level Security or Network Processors with Hardware Monitors Kekai Hu, Tilman Wol, Thiago Teixeira and Russell Tessier Department o Electrical and Computer Engineering University o Massachusetts,

More information

A Differential Evolution Approach for Software Testing Effort Allocation

A Differential Evolution Approach for Software Testing Effort Allocation Journal o Industrial and Intelligent Inormation Vol., No., June 03 A Dierential Evolution Approach or Sotare Testing Eort Allocation Md. Nasar and Prashant Johri School o Computing Science & Engineering,

More information

1. Overview of Nios II Embedded Development

1. Overview of Nios II Embedded Development January 2014 NII52001-13.1.0 1. Overview o Nios II Embedded Development NII52001-13.1.0 The Nios II Sotware Developer s Handbook provides the basic inormation needed to develop embedded sotware or the

More information

THE DIFFERENCE BETWEEN COEFFICIENT-OF-FRICTION AND DRAG FACTOR

THE DIFFERENCE BETWEEN COEFFICIENT-OF-FRICTION AND DRAG FACTOR THE DIERECE BETWEE COEICIET-O-RICTIO AD DRAG ACTOR Mark George, Am SAE-A Director, Accident Investigation Services Pty Ltd, Sydney, Australia. May 2005 The terms coeicient-o-riction (µ) and drag actor

More information

Small Cell Traffic Balancing Over Licensed and Unlicensed Bands

Small Cell Traffic Balancing Over Licensed and Unlicensed Bands 1 Small Cell Traic Balancing Over Licensed and Unlicensed Bands Feilu Liu, Erdem Bala, Elza Erkip, Mihaela C. Beluri and Rui Yang arxiv:1501.00203v1 [cs.ni] 31 Dec 2014 Abstract The 3rd Generation Partnership

More information

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy The Tangled Web o Agricultural Insurance: Evaluating the Impacts o Government Policy Jason Pearcy Vincent Smith July 7, 2015 Abstract This paper examines the eects o changes in major elements o the U.S.

More information

Why focus on assessment now?

Why focus on assessment now? Assessment in th Responding to your questions. Assessment is an integral part o teaching and learning I this sounds amiliar to you it s probably because it is one o the most requently quoted lines rom

More information

THEORETICAL CONSIDERATIONS ON THE CALCULATION OF TURNOVER OF BREAK-EVEN IN INSURANCE COMPANIES

THEORETICAL CONSIDERATIONS ON THE CALCULATION OF TURNOVER OF BREAK-EVEN IN INSURANCE COMPANIES THEORETICAL CONSIERATIONS ON THE CALCULATION OF TURNOVER OF BREAK-EVEN IN INSURANCE COMPANIES Florin Cătălin OLTEANU, Gavrilă CALEFARIU* *Economic Engineering and Manuacturing Systems epartment, Transilvania

More information

Research on On-card Bytecode Verifier for Java Cards

Research on On-card Bytecode Verifier for Java Cards 502 JOURNAL OF COMPUTERS, VOL. 4, NO. 6, JUNE 2009 Research on On-card Bytecode Veriier or Java Cards Tongyang Wang, Pengei Yu, Jun-jun Wu and Xin-long Ma Institute o Inormation & System Technology,Huazhong

More information

1. Overview of Nios II Embedded Development

1. Overview of Nios II Embedded Development May 2011 NII52001-11.0.0 1. Overview o Nios II Embedded Development NII52001-11.0.0 The Nios II Sotware Developer s Handbook provides the basic inormation needed to develop embedded sotware or the Altera

More information

EFFECTIVE ASSESSMENTS OF INTEGRATED ANIMATIONS -- EXPLORING DYNAMIC PHYSICS INSTRUCTION FOR COLLEGE STUDENTS LEARNING AND ATTITUDES

EFFECTIVE ASSESSMENTS OF INTEGRATED ANIMATIONS -- EXPLORING DYNAMIC PHYSICS INSTRUCTION FOR COLLEGE STUDENTS LEARNING AND ATTITUDES EFFECTIVE ASSESSMENTS OF INTEGRATED ANIMATIONS -- EXPLORING DYNAMIC PHYSICS INSTRUCTION FOR COLLEGE STUDENTS LEARNING AND ATTITUDES King-Dow Su* 1, Shih-Chuan Yeh 2 Department o Hospitality Management

More information

8. Hardware Acceleration and Coprocessing

8. Hardware Acceleration and Coprocessing July 2011 ED51006-1.2 8. Hardware Acceleration and ED51006-1.2 This chapter discusses how you can use hardware accelerators and coprocessing to create more eicient, higher throughput designs in OPC Builder.

More information

Offshore Oilfield Development Planning under Uncertainty and Fiscal Considerations

Offshore Oilfield Development Planning under Uncertainty and Fiscal Considerations Oshore Oilield Development Planning under Uncertainty and Fiscal Considerations Vijay Gupta 1 and Ignacio E. Grossmann 2 Department o Chemical Engineering, Carnegie Mellon University Pittsburgh, PA 15213

More information

Investment Analysis (FIN 670) Fall 2009. Homework 5

Investment Analysis (FIN 670) Fall 2009. Homework 5 Investment Analysis (FIN 670) Fall 009 Homework 5 Instructions: please read careully You should show your work how to get the answer or each calculation question to get ull credit The due date is Tuesday,

More information

Mining the Situation: Spatiotemporal Traffic Prediction with Big Data

Mining the Situation: Spatiotemporal Traffic Prediction with Big Data 1 Mining the Situation: Spatiotemporal Traic Prediction with Big Data Jie Xu, Dingxiong Deng, Ugur Demiryurek, Cyrus Shahabi, Mihaela van der Schaar Abstract With the vast availability o traic sensors

More information

2. Getting Started with the Graphical User Interface

2. Getting Started with the Graphical User Interface May 2011 NII52017-11.0.0 2. Getting Started with the Graphical User Interace NII52017-11.0.0 The Nios II Sotware Build Tools (SBT) or Eclipse is a set o plugins based on the Eclipse ramework and the Eclipse

More information

CREATING MENTOR NETWORKS IN THE OSCE REGION: A Practical Roadmap. Organization for Security and Co-operation in Europe

CREATING MENTOR NETWORKS IN THE OSCE REGION: A Practical Roadmap. Organization for Security and Co-operation in Europe CREATING MENTOR NETWORKS IN THE OSCE REGION: A Practical Roadmap. Organization or Security and Co-operation in Europe table o contents Project Partners: The Organization or Security and Co-operation in

More information

Development and application of lightweight cloud platform workflow system

Development and application of lightweight cloud platform workflow system Abstract Development and application o lightweight cloud platorm worklow system Qing Hou *, Qingsheng Xie, Shaobo Li Key Laboratory o Advanced Manuacturing Technology, Ministry o Education, Guizhou University,

More information

How To Write A Paper On The Brain Reaction Index During Mental Calculation Rom The Ew

How To Write A Paper On The Brain Reaction Index During Mental Calculation Rom The Ew , pp.123-132 http://dx.doi.org/10.14257/ijbsbt.2014.6.4.12 Suggestion o a ew Brain Reaction Index or the EEG Signal Identiication and Analysis Jungeun Lim 1, Bohyeok Seo 2 and Soonyong Chun * 1 School

More information

Financial Services [Applications]

Financial Services [Applications] Financial Services [Applications] Tomáš Sedliačik Institute o Finance University o Vienna tomas.sedliacik@univie.ac.at 1 Organization Overall there will be 14 units (12 regular units + 2 exams) Course

More information

Integrated airline scheduling

Integrated airline scheduling Computers & Operations Research 36 (2009) 176 195 www.elsevier.com/locate/cor Integrated airline scheduling Nikolaos Papadakos a,b, a Department o Computing, Imperial College London, 180 Queen s Gate,

More information

A RAPID METHOD FOR WATER TARGET EXTRACTION IN SAR IMAGE

A RAPID METHOD FOR WATER TARGET EXTRACTION IN SAR IMAGE A RAPI METHO FOR WATER TARGET EXTRACTION IN SAR IMAGE WANG ong a, QIN Ping a ept. o Surveying and Geo-inormatic Tongji University, Shanghai 200092, China. - wangdong75@gmail.com ept. o Inormation, East

More information

Quality assurance of solar thermal systems with the ISFH- Input/Output-Procedure

Quality assurance of solar thermal systems with the ISFH- Input/Output-Procedure Quality assurance o solar thermal systems with the ISFH- Input/Output-Procedure Peter Paerisch * and Klaus Vanoli Institut uer Solarenergieorschung Hameln (ISFH), Am Ohrberg 1, 31860 Emmerthal, Germany

More information

Exchange Rate Volatility and the Timing of Foreign Direct Investment: Market-seeking versus Export-substituting

Exchange Rate Volatility and the Timing of Foreign Direct Investment: Market-seeking versus Export-substituting Exchange Rate Volatility and the Timing o Foreign Direct Investment: Market-seeking versus Export-substituting Chia-Ching Lin, Kun-Ming Chen, and Hsiu-Hua Rau * Department o International Trade National

More information

Date: 2. Name of individual responsible for the administration of debates: Individual's title in the organization:

Date: 2. Name of individual responsible for the administration of debates: Individual's title in the organization: Debate Certiication Each Clean Elections candidate is required to ile this orm no later than October 1, 2005 to report the arrangements or the two mandatory Clean Elections candidates' debates. Name o

More information

Risk Arbitrage Performance for Stock Swap Offers with Collars

Risk Arbitrage Performance for Stock Swap Offers with Collars Risk Arbitrage Perormance or Stock Swap Oers with Collars Ben Branch Isenberg School o Management University o Massachusetts at Amherst, MA 01003 Phone: 413-5455690 Email: branchb@som.umass.edu Jia Wang

More information

Pattern recognition using multilayer neural-genetic algorithm

Pattern recognition using multilayer neural-genetic algorithm Neurocomputing 51 (2003) 237 247 www.elsevier.com/locate/neucom Pattern recognition using multilayer neural-genetic algorithm Yas Abbas Alsultanny, Musbah M. Aqel Computer Science Department, College o

More information

An Epicor White Paper. Improve Scheduling, Production, and Quality Using Cloud ERP

An Epicor White Paper. Improve Scheduling, Production, and Quality Using Cloud ERP An Epicor White Paper Improve Scheduling, Production, and Quality Using Cloud ERP Table o Contents Introduction...1 Best Practices or Discrete anuacturers...2 Inventory-based manuacturing...2 Discrete

More information

NATIONAL SENIOR CERTIFICATE GRADE 12

NATIONAL SENIOR CERTIFICATE GRADE 12 NATIONAL SENI CERTIFICATE GRADE 1 PHYSICAL SCIENCES: PHYSICS (P1) NOVEMBER 010 MEMANDUM MARKS: 150 This memorandum consists o 3 pages. NOTE: Marking rule 1.5 was changed according to decisions taken at

More information

FIXED INCOME ATTRIBUTION

FIXED INCOME ATTRIBUTION Sotware Requirement Speciication FIXED INCOME ATTRIBUTION Authors Risto Lehtinen Version Date Comment 0.1 2007/02/20 First Drat Table o Contents 1 Introduction... 3 1.1 Purpose o Document... 3 1.2 Glossary,

More information

Digital Systems Design Based on DSP algorithms in FPGA for Fault Identification in Rotary Machines

Digital Systems Design Based on DSP algorithms in FPGA for Fault Identification in Rotary Machines Digital Systems Design Based on DSP algorithms in FPGA or Fault Identiication in Rotary Machines Masamori Kashiwagi 1, Cesar da Costa 1 *, Mauro Hugo Mathias 1 1 Department o Mechanical Engineering, UNESP

More information

90 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 1, MARCH 2014. Proactive Workload Management in Hybrid Cloud Computing

90 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 1, MARCH 2014. Proactive Workload Management in Hybrid Cloud Computing 90 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 1, MARCH 2014 Proactive Workload Management in Hybrid Cloud Computing Hui Zhang, Guoei Jiang, Kenji Yoshihira, and Haieng Chen Abstract

More information

Time-Optimal Online Trajectory Generator for Robotic Manipulators

Time-Optimal Online Trajectory Generator for Robotic Manipulators Time-Optimal Online Trajectory Generator or Robotic Manipulators Francisco Ramos, Mohanarajah Gajamohan, Nico Huebel and Raaello D Andrea Abstract This work presents a trajectory generator or time-optimal

More information

THE MODELING AND CALCULATION OF SOUND RADIATION FROM FACILITIES WITH GAS FLOWED PIPES INTRODUCTION

THE MODELING AND CALCULATION OF SOUND RADIATION FROM FACILITIES WITH GAS FLOWED PIPES INTRODUCTION THE MODELING AND CALCULATION OF SOUND ADIATION FOM FACILITIES WITH GAS FLOWED PIPES INTODUCTION Analysis o the emission caused by industrial acilities like chemical plants, reineries or other production

More information

The top twenty Cloud companies in the UK

The top twenty Cloud companies in the UK Summer 2013 cloudex 20:20 The top twenty Cloud companies in the UK In 2013 we launched Cloudex 20:20, our search or the UK s 20 leading independently-owned Cloud technology businesses. Having drawn up

More information

Eye Gaze Tracking Under Natural Head Movements

Eye Gaze Tracking Under Natural Head Movements Eye Gaze Tracking Under Natural Head Movements Zhiwei Zhu and Qiang Ji Department o ECE, Rensselaer Polytechnic Institute, Troy, NY,12180 {zhuz,jiq}@rpi.edu Abstract Most available remote eye gaze trackers

More information

Application-Level Optimizations on NUMA Multicore Architectures: the Apache Case Study

Application-Level Optimizations on NUMA Multicore Architectures: the Apache Case Study Application-Level Optimizations on NUMA Multicore Architectures: the Apache Case Study Fabien Gaud INRIA abien.gaud@inria.r Gilles Muller INRIA gilles.muller@inria.r Renaud Lachaize Grenoble University

More information

Capital Mobility, Interest Rate Rules, and Equilibrium Indeterminacy. in a Small Open Economy

Capital Mobility, Interest Rate Rules, and Equilibrium Indeterminacy. in a Small Open Economy Capital Mobility, Interest Rate Rules, and Equilibrium Indeterminacy in a Small Open Economy Wen-ya Chang Hsueh-ang Tsai Department and Graduate Institute o Economics, Fu-Jen Catholic University Abstract

More information

Identifying Innovative Agricultural Education Programs. John Rayfield Tim Murphy Gary Briers Lauren Lewis Texas A&M University ABSTRACT

Identifying Innovative Agricultural Education Programs. John Rayfield Tim Murphy Gary Briers Lauren Lewis Texas A&M University ABSTRACT Identiying Innovative Agricultural Education Programs ABSTRACT John Rayield Tim Murphy Gary Briers Lauren Lewis Texas A&M University Researchers identiied innovative agricultural education programs across

More information

Keeping the Dream Scholarship 2015 For 2014 Cal-SOAP Scholarship Recipients

Keeping the Dream Scholarship 2015 For 2014 Cal-SOAP Scholarship Recipients Keeping the Dream Scholarship 2015 For 2014 Cal-SOAP Scholarship Recipients Sponsored by: College Access Foundation o Caliornia San Diego and Imperial Counties Cal-SOAP has received $250,000 to award in

More information

User Guide. Introduction. HCS12PLLCALUG/D Rev. 0, 12/2002. HCS12 PLL Component Calculator

User Guide. Introduction. HCS12PLLCALUG/D Rev. 0, 12/2002. HCS12 PLL Component Calculator User Guide HCS12PLLCALUG/D Rev. 0, 12/2002 HCS12 PLL Component Calculator by Stuart Robb Applications Engineering Motorola, East Kilbride Introduction The MC9S12D amily o MCUs includes a Phase-Locked Loop

More information

2. Developing Nios II Software

2. Developing Nios II Software 2. Developing Nios II Sotware July 2011 ED51002-1.4 ED51002-1.4 Introduction This chapter provides in-depth inormation about sotware development or the Altera Nios II processor. It complements the Nios

More information

Regulations on E-Commerce Consumer Protection Rules in China and Europe Compared Same Same but Different?

Regulations on E-Commerce Consumer Protection Rules in China and Europe Compared Same Same but Different? Jörg Binding/ Kai Purnhagen Regulations on E-Commerce Consumer Protection Rules in China and Europe Compared Same Same but Dierent? by Jörg Binding Ph.D., Deutschen Gesellschat ür Internationale Zusammenarbeit

More information

Is the trailing-stop strategy always good for stock trading?

Is the trailing-stop strategy always good for stock trading? Is the trailing-stop strategy always good or stock trading? Zhe George Zhang, Yu Benjamin Fu December 27, 2011 Abstract This paper characterizes the trailing-stop strategy or stock trading and provides

More information

A LabVIEW Based Experimental Platform for Ultrasonic Range Measurements

A LabVIEW Based Experimental Platform for Ultrasonic Range Measurements DSP Journal, Volume 6, Issue, February, 007 A LabVIEW Based Experimental Platorm or Ultrasonic Range Measurements Abdallah Hammad, Ashra Haez, Mohamed arek Elewa Benha University - Faculty o Engineering

More information

GUIDE TO LISTING ON NASDAQ OMX FIRST NORTH

GUIDE TO LISTING ON NASDAQ OMX FIRST NORTH GUIDE TO LISTING ON NASDAQ OMX FIRST NORTH FIRST NORTH* IS NASDAQ OMX S EUROPEAN GROWTH MARKET FOR COMPANIES LOOKING FOR A FIRST STEP INTO THE FINANCIAL MARKET FIRST NORTH OPERATES PARALLEL TO THE MAIN

More information

A Tabu Search Algorithm for the Parallel Assembly Line Balancing Problem

A Tabu Search Algorithm for the Parallel Assembly Line Balancing Problem G.U. Journal o Science (): 33-33 (9) IN PRESS www.gujs.org A Tabu Search Algorithm or the Parallel Assembly Line Balancing Problem Uğur ÖZCAN, Hakan ÇERÇĐOĞLU, Hadi GÖKÇEN, Bilal TOKLU Selçuk University,

More information

Factors Affecting the Adoption of Global Sourcing: A Case Study of Tuskys Supermarkets, Kenya

Factors Affecting the Adoption of Global Sourcing: A Case Study of Tuskys Supermarkets, Kenya IOSR Journal o Business and Management (IOSR-JBM) e-issn: 2278-487X, p-issn: 2319-7668. Volume 16, Issue 4. Ver. V (Apr. 214), PP 72-76 Factors Aecting the Adoption o Global Sourcing: A Case Study o Tuskys

More information

Appendix C White Paper to Support Bicycle Facility Design Toolkit on Lane Width Design Modifications DRAFT

Appendix C White Paper to Support Bicycle Facility Design Toolkit on Lane Width Design Modifications DRAFT Appendix C White Paper to Support Bicycle Facility Design Toolkit on Lane Width Design Modiications MEMORANDUM Date: December 31, 2012 Project #: 11080.03 To: Washington County From: Hermanus Steyn, Pr.

More information

8. Exception Handling

8. Exception Handling 8. Exception Handling February 2011 NII52006-10.1.0 NII52006-10.1.0 Introduction This chapter discusses how to write programs to handle exceptions in the Nios II processor architecture. Emphasis is placed

More information

Retrospective Test for Loss Reserving Methods - Evidence from Auto Insurers

Retrospective Test for Loss Reserving Methods - Evidence from Auto Insurers Retrospective Test or Loss Reserving Methods - Evidence rom Auto Insurers eng Shi - Northern Illinois University joint work with Glenn Meyers - Insurance Services Oice CAS Annual Meeting, November 8, 010

More information

A logistic regression approach to estimating customer profit loss due to lapses in insurance

A logistic regression approach to estimating customer profit loss due to lapses in insurance Insurance Markets and Companies: Analyses and Actuarial Computations, Volume, Issue, Montserrat Guillén Estany (Spain), Ana María Pérez-Marín (Spain), Manuela Alcañiz Zanón (Spain) A logistic regression

More information

THE EFFECT OF THE SPINDLE SYSTEM ON THE POSITION OF CIRCULAR SAW TEETH A STATIC APPROACH

THE EFFECT OF THE SPINDLE SYSTEM ON THE POSITION OF CIRCULAR SAW TEETH A STATIC APPROACH TRIESKOVÉ A BEZTRIESKOVÉ OBRÁBANIE DREVA 2006 12. - 14. 10. 2006 305 THE EFFECT OF THE SPINDLE SYSTEM ON THE POSITION OF CIRCULAR SAW TEETH A STATIC APPROACH Roman Wasielewski - Kazimierz A. Orłowski Abstract

More information

UIC at TREC 2010 Faceted Blog Distillation

UIC at TREC 2010 Faceted Blog Distillation UIC at TREC 2010 Faceted Blog Distillation Lieng Jia and Clement Yu Department o Computer Science University o Illinois at Chicago 851 S Morgan St., Chicago, IL 60607, USA {ljia2, cyu}@uic.edu ABSTRACT

More information

SUPPORTING ANALYSIS. page 89 CASP Cork Area Strategic Plan

SUPPORTING ANALYSIS. page 89 CASP Cork Area Strategic Plan B SUPPORTING ANALYSIS page 89 CASP Cork Area Strategic Plan page 90 5: Economic Projections 6: Population and Employment Projections 7: Capacity Potential 8: Alternative Spatial Strategies 5.1 National

More information

UNIVERSITY OF MICHIGAN

UNIVERSITY OF MICHIGAN UNIVERSITY OF MICHIGAN JOHN M. OLIN CENTER FOR LAW & ECONOMICS BANKRUPTCY AND THE MARKET FOR MORTGAGE AND HOME IMPROVEMENT LOANS EMILY Y. LIN AND MICHELLE J. WHITE PAPER #-13 THIS PAPER CAN BE DOWNLOADED

More information

Power functions: f(x) = x n, n is a natural number The graphs of some power functions are given below. n- even n- odd

Power functions: f(x) = x n, n is a natural number The graphs of some power functions are given below. n- even n- odd 5.1 Polynomial Functions A polynomial unctions is a unction o the orm = a n n + a n-1 n-1 + + a 1 + a 0 Eample: = 3 3 + 5 - The domain o a polynomial unction is the set o all real numbers. The -intercepts

More information

Highway Asset Management

Highway Asset Management Highway Asset Management By Chao Yang A Doctoral Thesis Submitted in partial ulilment o the requirements or the award o Doctor o Philosophy o the University o Nottingham Abstract The aim o this thesis

More information

Tracking and Modelling of Team Game Interactions

Tracking and Modelling of Team Game Interactions Tracking and Modelling o Team Game Interactions by Christopher James Needham Submitted in accordance with the requirements or the degree o Doctor o Philosophy. UNIVERSITY OF LEEDS The University o Leeds

More information

Labor Demand. 1. The Derivation of the Labor Demand Curve in the Short Run:

Labor Demand. 1. The Derivation of the Labor Demand Curve in the Short Run: CON 361: Labor conomics 1. The Derivation o the Curve in the Short Run: We ill no complete our discussion o the components o a labor market by considering a irm s choice o labor demand, beore e consider

More information

Patient Risk Prediction Model via Top-k Stability Selection

Patient Risk Prediction Model via Top-k Stability Selection Patient Ris Prediction Model via Top- Stability Selection Jiayu Zhou Jimeng Sun Yashu Liu Jianying Hu Jieping Ye Abstract The patient ris prediction model aims at assessing the ris o a patient in developing

More information

Horizontal Cone Penetration Testing in Sand

Horizontal Cone Penetration Testing in Sand PP Rahardjo & T Lunne (eds) In Situ Measurements and Case Histories, Bandung, Indonesia, 21, pp 649 654 Horizontal Cone Penetration Testing in Sand W Broere Geotechnical Laboratory, Delt University o Technology,

More information

Working Paper Relational goods, monitoring and non-pecuniary compensations in the nonprofit sector: the case of the Italian social services

Working Paper Relational goods, monitoring and non-pecuniary compensations in the nonprofit sector: the case of the Italian social services econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW Leibniz-Inormationszentrum Wirtschat The Open Access Publication Server o the ZBW Leibniz Inormation Centre or Economics Mosca, Michele;

More information

8. ENERGY PERFORMANCE ASSESSMENT OF COMPRESSORS 8.1 Introduction

8. ENERGY PERFORMANCE ASSESSMENT OF COMPRESSORS 8.1 Introduction 8. ENERGY PERFORMANCE ASSESSMENT OF COMPRESSORS 8.1 Introduction The compressed air system is not only an energy intensive utility but also one o the least energy eicient. Over a period o time, both perormance

More information

Staged Configuration Using Feature Models

Staged Configuration Using Feature Models Staged Coniguration Using Feature Models Krzyszto Czarnecki 1, Simon Helsen 1, and Ulrich Eisenecker 2 1 University o Waterloo, Canada 2 University o Applied Sciences Kaiserslautern, Zweibrücken, Germany

More information

Course Information Form (CIF) - February 2014 - QAP0021 Page 1 of 11

Course Information Form (CIF) - February 2014 - QAP0021 Page 1 of 11 Course Inormation Form (CIF) The CIF provides core inormation to students, sta teams and others on a particular course o study. Section 1 - General Course Inormation Course Title Qualiication MA Sport

More information

Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints

Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints Time-Memory Trade-Os: False Alarm Detection Using Checkpoints Gildas Avoine 1, Pascal Junod 2, and Philippe Oechslin 1,3 1 EPFL, Lausanne, Switzerland 2 Nagravision SA (Kudelski Group), Switzerland 3 Objecti

More information

Doppler Shift Estimation for TETRA Cellular Networks

Doppler Shift Estimation for TETRA Cellular Networks oppler Shit Estimation or TETRA Cellular Networks Javad Ashar Jahanshahi, Seyed Ali Ghorashi epartment o Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran j.ashar@mail.sbu.ac.ir,

More information

Susanville Indian Rancheria Higher Education Program Policy Amended and approved by tile Tribal Business Council on July 9,2010.

Susanville Indian Rancheria Higher Education Program Policy Amended and approved by tile Tribal Business Council on July 9,2010. Susanville Indian Rancheria Higher Education Program Policy Amended and approved by tile Tribal Business Council on July 9,2010. li~ghereducation Mission The Susanville Indian Rancheria Tribal Business

More information

DEPARTMENT OF TRANSPORTATION

DEPARTMENT OF TRANSPORTATION OFFICE OF THE SECRETARY Federal Funds General and special unds: SALARIES AND EXPENSES For necessary expenses o the Oice o the Secretary, ø$87,234,000, o which not to exceed $2,220,000 shall be available

More information

Solving Newton s Second Law Problems

Solving Newton s Second Law Problems Solving ewton s Second Law Problems Michael Fowler, Phys 142E Lec 8 Feb 5, 2009 Zero Acceleration Problems: Forces Add to Zero he Law is F ma : the acceleration o a given body is given by the net orce

More information

Mechanism Design for Online Real-Time Scheduling

Mechanism Design for Online Real-Time Scheduling Mechanism Design or Online Real-Time Scheduling Ryan Porter Computer Science Department Stanord University Stanord, CA 94305 rwporter@stanord.edu ABSTRACT For the problem o online real-time scheduling

More information

FACTOR COMPONENTS OF INEQUALITY. Cecilia García-Peñalosa and Elsa Orgiazzi GINI DISCUSSION PAPER 12 JULY 2011 GROWING INEQUALITIES IMPACTS

FACTOR COMPONENTS OF INEQUALITY. Cecilia García-Peñalosa and Elsa Orgiazzi GINI DISCUSSION PAPER 12 JULY 2011 GROWING INEQUALITIES IMPACTS FACTOR COMPONENTS OF INEQUALITY Cecilia García-Peñalosa and Elsa Orgiazzi GINI DISCUSSION PAPER 12 JULY 2011 GROWING INEQUALITIES IMPACTS Acknowledgement This research was partly supported by the Institut

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

Abstract. Introduction

Abstract. Introduction 0XX-01-XXXX How to Write an SAE International Technical Paper (The title should contain the main thoughts and ideas behind the The title needs to be short, but should be inclusive enough to search with

More information

Theoretical Computer Science

Theoretical Computer Science Theoretical Computer Science 410 (2009) 4489 4503 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs A push relabel approximation algorithm

More information

Section II. Hardware Abstraction Layer

Section II. Hardware Abstraction Layer Section II. Hardware Abstraction Layer This section describes the Nios II hardware abstraction layer (HAL). It includes the ollowing chapters: Chapter 5, Overview o the Hardware Abstraction Layer Chapter

More information

Project Portfolio White Paper

Project Portfolio White Paper NEW! Timesheet - Resource Reporting Resource Planning Snapshots and Trend Report Milestones Project Portfolio White Paper Contents 2 Project portfolio A Tool for Strategic Management 3 Portfolio Management:

More information

Support Services insights from Clearwater April 2013. clearthought. The recruitment industry prepares for a new race that will drive M&A

Support Services insights from Clearwater April 2013. clearthought. The recruitment industry prepares for a new race that will drive M&A Support Services insights rom Clearwater April 03 clearthought Ready, Set, Go! The recruitment industry prepares or a new race that will drive M&A Introduction The race to the top is hotting up in the

More information

Office ofinspector General. Independent Evaluation Report

Office ofinspector General. Independent Evaluation Report AR08-004 * Oice onspector General ndependent Evaluation Report./ o. --r-; - - Review o Federal Trade Commission mplementation o the Federal normation Security Management Act For Fiscal Year 2008 September

More information

Regulation and Customer Engagement

Regulation and Customer Engagement Name /EEEP/eeep_06_Littlechild/Mp_1 10/04/2011 02:17PM Plate # 0 pg 1 # 1 Stephen Littlechild a abstract The utility regulation ramework developed in the UK in the 1980s, and widely adopted internationally,

More information

Hewlett-Packard 12C Tutorial

Hewlett-Packard 12C Tutorial To bein, look at the ace o the calculator. Every key (except the arithmetic unction keys in the ar riht column and the ive keys on the bottom let row) has two or three unctions: each key s primary unction

More information

Muslim Charities Forum

Muslim Charities Forum mc Muslim Charities Forum MUSLIM CHARITIES FORUM TRUSTEES' REPORT AND FINANCIAL STATEMENTS Charity Registration Number: 1126638 TRUSTEES' REPORT AND FINANCIAL STATEMENT CONTENTS Page Administrative inormation

More information

A THEORETICAL FRAMEWORK FOR CHILD FOSTERING ARRANGEMENTS IN SUB-SAHARAN AFRICA

A THEORETICAL FRAMEWORK FOR CHILD FOSTERING ARRANGEMENTS IN SUB-SAHARAN AFRICA A TEORETICAL FRAMEWORK FOR CILD FOSTERING ARRANGEMENTS IN SB-SAARAN AFRICA Renata Serra (Please send comments to renataserra99@yahoo.com) June 2000 (Revised October 2000) Abstract The paper provides a

More information

FAMILY, SCHOOL, COMMUNITY EDUCATIONAL PARTNERSHIP << ACADEMIC REPORT >>

FAMILY, SCHOOL, COMMUNITY EDUCATIONAL PARTNERSHIP << ACADEMIC REPORT >> FAMILY, SCHOOL, COMMUNITY EDUCATIONAL PARTNERSHIP > >> WRITTEN BY >> JOHN GALVIN, ANN HIGGINS AND KAREN MAHONY Copyright 2009 Curriculum Development Unit, Mary Immaculate College, Limerick

More information