Research of Network System Reconfigurable Model Based on the Finite State Automation

Size: px
Start display at page:

Download "Research of Network System Reconfigurable Model Based on the Finite State Automation"

Transcription

1 JOURNAL OF NETWORKS, VOL., NO. 5, MAY Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang Unversty, Bejng, Chna Emal: Abstract Snce the network analyss model based on the system state exsts the ssues of network survvablty safety, fault tolerance and dynamc ablty are adapted to the envronment changes, n ths paper, network system model based on the fnte state automaton has reconfgurable qualty. The model frst puts forward the concept of reconfgurable network systems and reveals ts robustness, evoluton and the basc attrbutes of survvablty. By establshng a herarchcal model of system state, the system robust behavor, evoluton behavor and survval behavor are descrbed. Secondly, network topology reconfgurable measurement as an example, puts forward the quanttatve reconfgurable metrcs. At last, the example verfcaton. Experments show that the proposed reconfgurable quanttatve ndcators of reconfgurable resstance model for [.3,.4,.5] prove that the network s an effcent reconfgurable network topology, whch can effectvely adapt the dynamc changes n the envronment. Index Terms Informaton Network; Robustness Indcators; Evoluton Indcators; Measurement I. INTRODUCTION Informaton network n the poltcal, economc and socal lfe plays an rreplaceable role, however, n the process of network operaton often threatened by fault and unpredctable emergences, typcal floods, fres, earthquakes, tsunams and other natural dsasters, terrorst attack, the hacker attack, computer malcous code, operator error or destructon and such abnormal events caused by human factors, wll gve people's producton and lfe brng great nfluence and loss []. On the other hand, as the network scale expandng, network structure s ncreasngly complex, the rapd development of network technology, and the current new applcaton, new demand changng, all need network system can adapt and respond to envronmental change. Therefore, the constructon of hgh relablty and can be self-healng network nfrastructure, buld a stran of reconfgurable network system, s becomng the focus of attenton [2-5]. The core of the challenge faced by Reconfgurable networks s manly the "change" (change or evoluton) (especally unpredctable emergences), n partcular s requred to construct the network system of reconfgurable resstance, can be effcent allocaton of resources avalable for quck response and adapt to the change [6]. Reconfgurable network system s buldng, need to study the sensng, executon, communcaton, control, calculated from the devce n the system level to system level of structure and dynamc characterstc, refactorng to ssue nvolves wde level, s complex, and related research s rarely. At home and abroad, has been carred out for reconfgurable system research ncludes hardware based on chp technology of reconfgurable computng, n response to the reconfgurable manufacturng of market demand changes, orented programmable wreless communcaton technology and software engneerng of reconfgurable software desgn, etc. [7-2]. Although these studes n sngle aspects, such as computng and communcatons, for the whole reconstructon of the network system provde enablng technology, but has not formed a complete system, the basc theory of reconfgurable qualty and the key problem s not clear and consstent descrpton, also lack of system modelng and analyss of reconfgurable [3-5]. Analyss of the modelng of reconfgurable s mportant to the study of network system of reconfgurable management, and desgn and buld the bass and premse of reconfgurable network system). At frst, ths paper puts forward the concept of reconfgurable network systems and basc propertes. In the system state based herarchcal structure, n vew of the reconfgurable has robustness, evoluton and survval of the attrbute to rch, the model s put forward based on the fnte state automata (FSM) reconfgurable analyss model. Then the measure of the network topology reconstructon can be quanttatve analyzed. Fnally summarzes the full text and research system of the reconfgurable network. Ths paper manly carres out the development and nnovatve work n the followng aspects: (a) Based on the system state n the analyss model of network securty, network fault tolerance and survvablty dynamc ablty to adapt to the envronment changes s not strong, n ths paper, based on the fnte state automata network system model of reconfgurable. The model frst puts forward the concept of reconfgurable network systems, reveals ts robustness, evoluton and the basc attrbutes of survvablty. By establshng a herarchcal model of system state, and then descrbe the system robust behavor, evoluton behavor and survval behavor. Secondly, network topology reconfgurable measurement as an example, 24 ACADEMY PUBLISHER do:.434/jnw

2 23 JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 puts forward the quanttatve metrcs of reconfgurable, evaluaton s consdered to be a measure of the reconfgurable respectvely by robust d, evolutonary survval and product structure measurement of threedmensonal space. Metrc values of reconfgurable correspondng to 3 d vector of the three dmensonal space, the robustness, evoluton and survvablty ndex ndcators. (b) In order to further valdaton n ths paper, based on the fnte state automata, the correctness and valdty of network system reconfgurable model, for example, uses the ARPA network topology, based on the evoluton of ARPA network robustness, and quanttatve analyss of survvablty ndex, the ARPA network of 3 d reconstructon can be quanttatve ndcators for [.3,.4,.5], shows that ARPA network s an effcent reconfgurable network topology. Experments show that: based on the fnte state automata network system reconfgurable model can construct an effcent reconfgurable network topology, can effectvely to adapt to the dynamc changes n the envronment. II. RECONFIGURABLE Reconfgurable s not a new concept noun, but t had already appeared n the feld of manufacturng systems and nformaton systems. Although people put forward the concept of reconfgurable system already has a hstory, the nternatonal exploraton of reconfgurable network has just begun, the understandng of the basc concepts and scentfc ssues s not deep. Internatonal reconfgurable representatve s avalable at the moment of ths paper: descrpton of the reconfgurable system of the Unted States natonal aeronautcs and space admnstraton (NASA) refers to the functon layer and physcal layer has the adaptablty, can automatc or remote control and effcent system of one or more goals. The system can not only handle the upfront desgn events or scenaros, but also deal wth unknown uncertanty durng the desgn phase scene; In the natonal scence foundaton (NSF) applcaton plan mentoned n 7-56: reconfgurable refers to the abnormal stuatons n order to ensure the system to work normally, and change the system structure and operaton ablty to meet the demand of the system. The autonomy reconfgurable of nformaton nfrastructure based on next generaton, ntegrated equpment, network, software engneerng and embedded reconfgurable system provded by the pervasve computng power. Network system s reconstructon refers to the system can be flexble confguraton avalable resources to adapt to envronmental changes, ablty to provde contnuous and effectve servces. Reconfgurable network system s a comprehensve concept, should contan multple attrbutes. To be specfc: from the angle of system desgn, the need to provde Robustness (Robustness), make the system have certan resstance to falure and attack and tolerance; From the angle of system development requres evoluton (Evolvablty), make the system has the adaptablty to the envronment change and extensblty; From the perspectve of user requrements to guarantee the servce avalablty and Survvablty (Survvablty), t s an mportant objectve of system reconstructon. Dfferent from the system robustness, evoluton and survvablty n the tradtonal sense dspersed, solated concept and connotaton of reconfgurable network system wll be under the goal of adaptve envronmental change ntegraton of the three basc attrbutes to form an organc whole. As shown n fgure, the reconfgurable network system of falure or attack response process can be dvded nto nformaton acquston, data processng and response to realze three parts. Among them, the nformaton acquston stage accordng to the system demand actve external network envronment nformaton, system status nformaton and alarm nformaton, effectve recognton network fault, analyze the runnng status of network system to master the current avalable resources dstrbuton n the network, when and where the system how to refactorng support for nformaton. Avalable resources reasonable schedulng and allocaton s used to drve and coordnaton needed refactorng response behavor. Accordng to the behavor characterstcs of reconstructng response can be dvded nto: robust behavor, evoluton behavor and survval behavor. Robust behavor s the early stages of system response, manly refers to the system takes advantage of the redundancy devces confgured, redundant lnk resources such as spontaneous resstance and tolerance falure or attack behavor of system; Evoluton behavor s the advanced stage of system response, s manly refers to accordng to the emergency needs, can mplement large span network structure and resource reconfguraton; Survval behavor s necessary to reconfgurable system, can work accordng to the system state for adaptve adjustment and the capablty of fault recovery, etc. Access to Infomaton Fault/Excepton dentfcaton The network status Dstrbuton of avalable resources Input Analyss and decson To deal wth Response to realze Robust behavor Evoluton behavor Survval behavor Output The avalable resource schedulng and allocaton Fgure. Refractors process of the reconfgurable network III. FSM RECONFIGURABLE MODEL Based on the complexty, the openness and dversty of the network system, reconfgurable network system analyss and nvolved approprate models focus on the modelng problem. Analyss method of the exstng system characterstcs, man bols down to set legal and state law. Compared wth the method of combnaton model, the model based on the state can express more complcated 24 ACADEMY PUBLISHER

3 JOURNAL OF NETWORKS, VOL., NO. 5, MAY relatonshp, such as random behavor, emergent behavor, etc. And compared wth the general state of the system model, through the layered structure descrbes the state of the system model can effectvely avod the system state defntons and based on the analyss of state drectly. A. The Herarchcal Structure of the System State Reconfgurable network system s determned by the system tself, not only s closely related wth ts surroundngs. In ths paper, startng from the relatonshp of system envronment, through to the system nput events (abnormal), examne the response of the system behavor (robust behavor and evoluton behavor and lvng behavor, etc.), and then analyze the system of reconfgurable. In order to facltate subsequent reconfgurable analyss, t s necessary to smplfy the system properly, frst used the followng defntons and symbols: Defnton the basc Servce (Essental Servce, EsS ): system under abnormal envronment stll need to provde complete Servce system s ndspensable key functon; Defnton 2 the Emergency servces (Emergency Servce, EmS ): a system to meet the new requrements or specal Servce provded by the Emergency response. It s dfferent from the conventonal basc servces, s the product of reconstructng system evoluton. Defnton 3 basc components (Essental Component, EC ): refers to the resource unt of system whch plays a role of supportng servce system, accordng to degree of dependence on the system servce, every basc component s a mportance weghts v In ths artcle the system status s decded by the performance of the system servce, the servce s provded by the system accordng to user requrements defnton, servces that the system requres can be composed of a servces set { S }. Based on Workflow (Workflow) technology, the path between the servers to request as a ppelne, the transport of whch s requred to provde the servce, the servce flow. Identfed the resources unt come across by the servce flow S, form the basc component set { EC } the servces needed, the basc components formed the partcpants of servce flow. Accordng to the envronment of system operaton and performance of the servces they offer, assumng falure probablty of basc components EC : j Rj mn(. yj t,.2) () T represents the falure probablty of the basc components wthout consderng the mportance weghts of basc components, α represents the threat coeffcent of attack wth related basc component EC mportance weghts y j. When represents random attack wthout consderng the component s mportance. The greater the value of α s, the greater the chance of mportant component of ts delberate attacks n the network servce j j system. In order to damage the system serve effectveness and safety, the nvaders wll adopt a seres of steps, ntellgence gatherng, long-range attack, get permssons, set the back door, etc. Therefore, ths artcle use scenaros to descrbe the correlaton of seres events). Defnton 4 event scene (Event Scenaro, E ): to acheve a certan goal nfluencng system servces, and take a seres of events. Specfcally, the scene can be dvded nto excepton events Scenaro (Abnormal Event Sce naro, AE ) harm the system servce and the response of recovery, refactorng, down the system servce Event scene ( Event Scenaro, RE ). Re sponse Event scenaro descrbes the nteracton of the network envronment and network system. Among them, the AE represents ncentves of envronment on the system, through the analyss of consumpton or damage the system resources (basc components) wll affect system performance; RE system response to envronmental changes, manly through robust behavor, evoluton behavor and lvng behavor to restore basc servces, refactorng emergency servces and degraded lvng servces, etc. Accordng to the defnton above, the system state s determned by system servce performance, servce and system performance depends on the basc components of system. It need excepton event scene by attackng system basc components nfluence the servce performance of the system and respond mprove system performance through reconfguraton of the basc components n the system. In the analyss of the system state, through the establshment of the system status herarchy descrpton that can effectvely avod the general state of the system based on state of the model defnton and tme constrant condtons known system state dstrbuton of state transton analyss. EsS AE State EC E EmS RE Fgure 2. The herarchcal structure of the system state Herarchcal structure of the system state as shown n fgure 2, the analyss of the system state can press the arrow step by step, whch wll make drect state of the system defnton and analyss of abnormal events stuaton, respond to events and ther role n the defnton of system analyss of the basc components, n turn, affects system performance. B. The Analyss Process based on FSM The followng fnte state automata (FSM) can be used to descrbe the basc network system (not refactorng network system): T R,,, k, K (2) 24 ACADEMY PUBLISHER

4 24 JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 where n, R R, R,..., RM represents that contans M state of the system state set, and the system state can be defned accordng to the operaton condton of the system servces: E, E,..., EN (3) Represent a set that contans N scenaros; means state transfer functons, dependng on the nput event scene, by the state transton functon : R Q decded vcsstude from the current state of the system to the next system state; R represents the ntal status of the system, R R ; F represents stable state of the system, the system steady state can be any state n the R, so F R. AE q q q q j F a Fgure 3. Basc system state transton dagrams Basc network system n case of any attack or falure, the relatonshp between the system state transtons s shown n fgure 3. The system state arrange from left to rght, from hgh to low, q for the system normal workng condton, Fa F for system paralyss (falure). Abnormal events scene AE can be treated as ncentves of the network system, the system state transfer as the response of a system, the characterstcs of basc network system state transfer reflects when the system n case of any attack or falure, process of servce performance gradually reduce untl the system operaton. In fact, most of the network system through the redundant equpment and lnk, under the condton of the gateway and subnet falure, can also mantan the basc communcaton and servces, has certan robustness. There are a lot of ndexes to measure the network system robustness, ncludng n the feld of network securty, the most concerned about s the system for the tolerance of random fault and delberate attacks. System robustness s descrbed by usng FSM as shown n fgure 4 (a), the system state, q, q and q j correspondng system servce performance reduce n turn RE and RE j to represent the response ncdent scene under the acton of the system robustness, dotted lne s shown n state transfer q RE q and q RE q, descrbes the response process of the j system fault tolerance, restore servce. Network system evoluton refers to the system response to envronmental changes and the capablty of adaptve reconfguraton structure and resources. In the process of system evoluton, can be extended to generate emergency servces to meet the specfc requrements of the envronmental changes. As shown n fgure 4 (b), q ' s generated the new state n the process of system evoluton response, accordng to the emergency servces defnton provded by system evoluton extenson. State transfer q RE q embodes the system through the role of j the response to an event scene evoluton stage producton meet the demand of system especally the evoluton behavor. Network survvablty s refers to the system when subjected to random falure or malcous attacks, can contnue to provde servce for users "survval" ablty, ths s an mportant target of system reconstructon. Abnormal events n the scenaro, system can stll provde elegant relegaton servce, s the outstandng performance of the system can survve, usng FSM descrpton as shown n fgure 4 (c). Fa ' s a graceful degradaton n system workng condton, the basc servce before complete falure s consdered to be a system exsts some falure state of the system. RE d s degraded servce condton and respond to events, turned to the Fa ' state transton q RE d Fa ' and j j q ' RE ' d Fa ' embodes the survvablty response behavor of system to provde the degraded servce. RE - q - q RE j- (a) State transton dagram under the acton of robustness q - RE - q q RE j- (b) State transton dagram under the acton of an evolutonary q' j RE j'-d q j Fa' RE j-d (c) State transton dagram under the survvablty acton Fgure 4. State transton dagram of dfferent attrbute system C. The Reconfgurable Analyss Model based on FSM Robustness, evoluton and survvablty s basc attrbute of reconfgurable network system, whch embodes the reconfgurable system robustness has some fault tolerance and reslence of prmary reconfgurable quantty; Evolutonary embodes the reconfgurable system has expansblty and flexblty of advanced reconfgurable ablty and survvablty embodes the mportant target to reconstruct the network system. Integrate the reconfgurable network system model of robustness, evoluton and survvablty, t can be descrbed as: q j q j Fa RM Q q F,,,, (4) The Q s the system state, and the system state decdes accordng to the servce performance of the system 24 ACADEMY PUBLISHER

5 JOURNAL OF NETWORKS, VOL., NO. 5, MAY provdes, namely the servce focus provded by the system contan whch basc servces and emergency AE..., AE...; RE..., RE... Is a collecton servces; of abnormal stuaton and response events scene; Q for the system normal workng state; Fa ' for graceful degradaton of the system workng status (partal falure); Fa ' for system paralyss (complete falure). For event scene Σ, get by the state transton functon : Q Q and then, comng nto next state. State transton of reconfgurable system s shown n fgure 5, the system state from hgh to low n turn arranged { q, q ', q..., q '..., Fa ', q..., q j..., Fa }, { q ', q ' } s generated new state of grade system evoluton response, Fa ' s survval grade response the graceful degradaton of workng condton. Sold arrows shown n AE ndcate the system under the acton of abnormal events scene state transton; the loop lne shown n RE reflects the system robustness under the acton of the tolerance of the response of the stuaton of abnormal events, ponts lne arrow shown n RE shows the ' j system robustness to system servce recovery; short dotted arrow shown n RE ' embodes the sexual response under the acton of system evoluton scenaro generaton evoluton of emergency servces; the status change shown n RE, t turn to Fa ' reflected the j d survvablty of the system. AE attack RE addlnk q o q RE - q ' q ' AE q q j RE j ' Fa' RE -' RE j-d Fgure 5. State transton dagram of reconfgurable system Compared wth the analyss model n prevous network based on the system state, although n ths paper, the analyss of the process s also based on the transfer of the system state, effectvely avods the drect defnton of the system state and the probablty calculaton of state transton. D. Quanttatve Analyss of Reconfgurable Qualty Quanttatve analyss of the reconfgurable s an mportant content of the reconfgurable network system research. Reconfgurable s a comprehensve concept, wth multple attrbutes, drectly to the quanttatve analyss of reconfgurable tself s very dffcult. Based on the analyss of the basc propertes and reconfgurable model, ths secton has quanttatve robustness, evoluton and survvablty s metrcs and then a quanttatve analyss of reconfgurable system. The followng s a quanttatve attrbute ndex. ) Robustness Index Robustness reflect the system under a varety of ncentves of the abnormal events, can stll provde the requred basc servce ablty, emphaszed on the bass of Fa usng lmted resources to mantan the servce performance of the system. The system robustness wth the state correspondng servce system effcency after robustness effect and the state correspondng servce system effcency before robustness effect, the correspondng servce effcency rato, R. J f / Rf R (5) J / R f f Among them, the rato of the system servce capacty (output) and consume resources R (nput) represent system servce effcency. J / R represents system servce effcency after robustness effect, J f / R f represents system servce effcency before robustness effect. Based on the herarchcal structure of the system status, system servce capacty can be represent for J s. vs, among them, v s represents the mportance weght of basc servce S s remans effectve; Consume resources can be represented as R jecj vj, among them, vj represents the basc components EC j mportance weghts whch s depended on basc servce S ; From the defnton of the system robustness ndex R for a network system has good robustness, ts robustness ndex should be greater than or equal to. 2) Evoluton Indcators System evoluton quantty reflects the reconfguraton of the system resource's ablty to meet the demand of system servce at a certan evoluton cost. System evoluton wth the evoluton after state the correspondng servce system effcency and the evoluton before state the correspondng servce system effcency rato, remember to z. f J / C J / J J / C C / C f z z z z (6) z Among them, J z represents system servce ablty after the evoluton, J represents the system servce ablty before evoluton functon; C z represents resources consumed n the evoluton confguraton, C represents resources consumed wthout carryng out the evoluton confguraton. By defnton, when Jz J, z, represents evolutonary confguraton n the stuaton of the cost s not hgh to get hgher network performance, ths case has good evoluton; Jz J, Cz C, z represents evoluton effcency s not obvous, and the prce s hgher, makes lttle sense to evoluton of confguraton of ths knd of crcumstance; Other stuatons also need to accordng to the requrements of system evoluton (focus on the prce or performance) or add new ndcators to analyze. 3) Survvablty Index Vablty of the system under abnormal envronment can use the rate of tme change of d / d system servce J t 24 ACADEMY PUBLISHER

6 242 JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 performance to measure. Wthn the tme perod T, system survvablty ndex Λ s defned as the acton of system servce performance degradaton rate before the survvablty respond to events and the acton of system servce performance degradaton rate after the survvablty respond to events, dj / dt dj / d (7) Among them, dj / d t represents declne rate of system servce performance before the survvablty, dj R / d t represents declne rate of system servce performance after the survvablty. Accordng to the defnton of system survvablty ndex, has better survvablty for a reconfgurable network topology, ts survvablty ndex should be greater than. Survvablty Robustness R t Reconfgurablty Evolvablty Fgure 6. Reconfgurable metrc space E. Reconfgurable Measurement Reconfgurable of network system are needed to measure from multple targets, multple perspectves, based on the basc attrbute of reconfgurable above, the analyss of robustness, the evoluton and survvablty ndex, evaluaton s consdered to be a measure of the reconfgurable respectvely by robust d, evolutonary survval and product structure measurement of three dmensonal space. Reconfgurable measurement for correspondng to the three dmensonal space of three dmensonal vectors, the component are robustness ndex ndcators, evoluton and survvablty ndex, expressed as [ Rz, ]. Among them, the ndex R and z are seen type () and (), wthn the tme perod w, respectvely get by type (5) and (6) update. As shown n fgure 6, n metrc space of the network system reconfgurable ndcators, weght ndex w, z and values greater than unt cube on the lateral area of the reconfgurable measurement s effcent. IV. w R / w. R w () w w w () z / w. z w w w EXPERIMENT AND ANALYSIS In recent years a large number of studes have shown that the characterstcs owned by network s decdes by the network topologcal. The followng specfc network topology s the quanttatve analyss of the reconfgurable network topology. ARPA network as shown n fgure 7 (a) s Europe and the Unted States common trunk network topology, ncludng 2 nodes and 26 connectons are the unform network, and most node degree s (a) ARPA network topology (b) basc network topology Fgure 7. Examples for network topology Assumng that basc network topology wth the sze of ARPA network the GT s the mnmum connected tree structure generated by 2 nodes and 2 sde shown n fgure 7 (b) of artcle. Compared wth the topology GT, ARPA network topology under the condton of removng any node or malcous removed key nodes at random, won't make the network s not connected, pertanng to the ARPA network for a sngle node falure by robust. However, as the network envronment deteroraton, f consder removng multple nodes at the same tme, such as malcously v 3 and v 2, remove node wll result n no network connectvty, network performance fell sharply. Accordng to the establshed reconfgurable analyss models, assumng that the system state set correspondng to the network topology n abnormal envronment G n, m ( n number of nodes, m sad the number of edges), among them, the part of the state transton relatonshp s shown n fgure (see fgure 5 dotted box wfe fgure). The state q correspondng fgure G ARPA 22,27, q fgure correspondng chart GARPA v3 2, 2 after removng the node v 3, q ' correspondng to add edge set E ' v, v4, v6, v 7 evoluton generated fgure GARPA+E'(2,24), abnormal events scene AE represents removed degree of attack ARPA network Informaton center (Informaton Cen tralty, one of malcous attacks on the largest node vtamn c k, and can be descrbed as qaeattack q state transton; the answerng event scene RE addlnk represents the evoluton response behavor of addng edge set E, q RE q. realze the state transton addlnk The followng analyss the robustness of ARPA network topology, evoluton and survvablty measure and the analyss of ARPA network reconfgurable quantfy. For convenence of analyss, assumng that the connecton of topology at the same prce as, connectng n secton pont, requres at least n the edge, f ' 24 ACADEMY PUBLISHER

7 JOURNAL OF NETWORKS, VOL., NO. 5, MAY connected sde s more than n, wll ncrease the correspondng network resources. The redundancy of the network structure can be defned as the excess number of edges n the graph (the actual number of edges wth mnmum connected the dfference between the number of edges of the tree) wth the rato of the number of edges n same sze completely dagram. Removed node or edge from the network, often affect the shortest path between nodes and change of the connecton degree; make the effcency of network change. Average network effcency (Eave) under the random falure can be used to the sad the functon of the network topology effcency. Therefore, the robustness of ARPA network topology ndex can be represented as RF. G ARPA (2,26) G ARPA+(E ' ) (2,24) at G ARPA.(v3) (2,22) AE 6 q attack o q q ' RE addlnk Fgure. Dagram of ARPA network state transton ave z Eave ARPA ARPA.4 E G Evoluton ndcators measure of ARPA network after removng nodes v3, before the evoluton of network dagram GARPA V 3 and after evoluton the generated network dagram GARPA+E' s consder the average effcency rato of the network under network resource consumpton. The ndcators for the evoluton E 2,2 ave G G ARPA E ARPA v3 ent ARPA..42 E G CAPRA E ' 2,25 ave ARPAV 3 ARPA network survvablty measure wth basc network topology wth GT and ARPA network n exceptonal cases, the rato of the network survval adaptablty ( T ) declned to descrbe. Fgure shows the ARPA network and GT survval adaptablty ncreased wth the ncrease of removng node number change (statstcs) of groups of expermental data, can be observed from the table, the ARPA network s better than the GT survval adaptablty, at random to remove node Num,3 ), the survval of GT n the ntal perod ( adaptablty s declne rate obvously bgger than ARPA network. In general, n most of the network, falure probablty of two or more nodes at the same tme s very small, so we only consder removng a few nodes. So consder reduced network adaptve survval rato n the ntal perod can fully reflect the survval adaptablty stuaton of network topology. ARPA network survvablty ndex can be approxmately expressed as NT. T G ARPA T T ARPA Under the network topology survval adaptablty ndex Basc network topology Gt ARPA network topology 4 6 The number of the removed node n the network dagram Num Fgure. Survval adaptablty of ARPA and basc network G T Based on quanttatve analyss of APRA network robustness, evoluton and survvablty ndex above shows that 3 d reconstructon of APRA network can be quanttatve ndcators for [.3,.4,.5], APRA network s an effcent network topology whch can be heavy construct. V. CONCLUSION Reconfgurable research of network system s as a new drecton based on the network safety, fault tolerance and survvablty research n such felds, are recevng more and more attenton. It s dfferent wth prevous analyss model of the system network based on the state, ths paper analyss of reconfgurable although also be based on the system state descrpton, through the establshment of the state of the system herarchy, effectvely avod the drect defnton of the state of the system and the calculaton of the system state transton probablty. Wth the ntroducton of abnormal stuatons and response events scene of dfferent levels on the relatonshp between the envronment - system for dynamc descrpton and analyss, reflects the reconfgurable network system dynamc ablty to adapt to the envronment changes Ths paper carres out the network system reconfgurable analyss model based on FSM whch based on the formal descrpton and modelng for abnormal reconfgurable system robust behavor under the network envronment, evoluton behavor and survval behavor. To acheve the quanttatve evaluaton of the system reconfgurable, n the analyss of the measurement network topology reconfgurable, on the bass of the proposed network system of reconfgurable metrcs. Metrcs of reconfgurable make the network system analyss model wth the quanttatve analyss of applcaton prospects. ACKNOWLEDGMENT The authors wsh to thank Professor Peter Borgesen. The paper s supported by the Fundamental Research Funds for the Central Unverstes (Grant No.YMF-- 2-2). The study s also supported by the Natonal Natural Scence Foundaton of Chna (Grant No. 7274). 24 ACADEMY PUBLISHER

8 244 JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 REFERENCES [] Z. Pe and Z. Zhenxang, "A framework for personalzed servce webste based on TAM," n the nternatonal conference on servce systems and servce management. vol. 2 Troyes, France: IEEE, 26, pp [2] Japng Lu, A. Stolyar, M. Chang, H. V. Poor, "Queue back-pressure random access n multhop wreless networks: optmalty and stablty," IEEE Transactons on Informaton Theory, vol. 55, no., pp. 47-4, 2. do. org/. /TIT [3] Jng Chen, Tong L, Ruyng Du, et al. "Effcent relable opportunstc network codng based on hybrd flow n wreless network," Chna Communcatons, vol., no. 4, pp. 25-3, 2. [4] M. Teltzrow and A. Kobsa, "Impacts of User Prvacy Preferences on Personalzed Systems: A Comparatve Study," Desgnng personalzed user experences n E- Commerce, vol. 5, pp , 24. [5] Mu Yong-mn, ZHENG Yu-hu, ZHANG Zh-hua et al. The algorthm of nfeasble paths extracton orented the functon callng relatonshp. Chnese Journal of Electroncs, 22, 2(2): [6] Nagurney A, Yu M, Qang Q. Supply chan network desgn for crtcal needs outsourcng. Regonal Scence, 2, (): [7] M. Dostál and Z. Echler, "Fne-Graned Adaptve User Interface for Personalzaton of a Word Processor: Prncples and a Prelmnary Study," Communcatons n Computer and Informaton Scence, vol. 73, pp. 46-5, 2. do. org/. 7/ _ [] Yafe Hu, Fangmn L, and Xnhua Lu. "Network Codng Based Lnk Schedulng for QoS Provsonng n Multrado and Mult-channel Wreless Mesh Networks", Journal of Communcatons, vol. 7(4), pp: -, 22. [] Bo Yang, Chung-Huang Yang, Yong Yu, Dan Xe, A Secure Scalar Product Protocol and Its Applcatons to Computatonal Geometry. Journal of Computers, Vol, No (23), [] D. Rgas and K. Al-Omar, "A Controllablty and Customzaton Approach to Personalzed Web Content," Internatonal Journal of Educaton and Informaton Technologes vol. 4, pp. 33-4, 2. [] M. Lllbrdge et ai., "Sparse Indexng, Large Scale, Inlne Deduplcaton Usng Samplng and Localty," n proceedngs of 7th USENIX Conference on Fle and Storage Technologes, USENIX Assocaton, San Francsco, Calforna, 2, pp [2] Ronas, Kevan, Vncent W. S. Wong, and Sathsh Gopalakrshnan. "Dstrbuted Schedulng n Multhop Wreless Networks wth Maxmn Farness Provsonng," IEEE Transactons on Wreless Communcatons, vol., no. 5, pp , do. org/. /TWC [3] Bn Zhou, Rongbo Zhu, Yng Zhang, Lnhu Cheng, An Effcent Data Fngerprnt Query Algorthm Based on Two-Leveled Bloom Flter. Journal of Multmeda, Vol, No 2 (23), 73- [4] R. Ahlwede, N. Ca, S. R. L, R. W. Yeung, "Network nformaton flow," IEEE Transactons on Informaton Theory, vol. 46, no. 4, pp , 2. do. org/. / [5] Takahro Matsuda, Taku Noguch, Tetsuya Takne, "Survey of Network Codng and ts applcatons," IEICE Transactons on Communcatons, vol. E4-B No. 3, ACADEMY PUBLISHER

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises 3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed

More information

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers Modelng and Analyss of D Servce Dfferentaton on e-commerce Servers Xaobo Zhou, Unversty of Colorado, Colorado Sprng, CO zbo@cs.uccs.edu Janbn We and Cheng-Zhong Xu Wayne State Unversty, Detrot, Mchgan

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract , pp.377-390 http://dx.do.org/10.14257/jsa.2016.10.4.34 Research on the Enterprse Performance Management Informaton System Development and Robustness Optmzaton based on Data Regresson Analyss and Mathematcal

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Daily Mood Assessment based on Mobile Phone Sensing

Daily Mood Assessment based on Mobile Phone Sensing 2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM 1 WEIZHI LIAO, 2 LINFU SUN 1 School of Electromechancal Engneerng, UESTC of Chna, Chengdu 610054, Chna 2 CAD Engneerng Center, Southwest JIAOTONG

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

Research on Engineering Software Data Formats Conversion Network

Research on Engineering Software Data Formats Conversion Network 2606 JOURNAL OF SOFTWARE, VOL. 7, NO. 11, NOVEMBER 2012 Research on Engneerng Software Data Formats Converson Network Wenbn Zhao School of Instrument Scence and Engneerng, Southeast Unversty, Nanng, Jangsu,

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Multitone Electronics Plc. delivering certainty

Multitone Electronics Plc. delivering certainty Multtone Electroncs Plc Multtone Electroncs Plc, Multtone House, Shortwood Copse Lane, Basngstoke, Hampshre, RG23 7NL Tel: +44 (0)1256 320292 Fax: +44 (0)1256 462 643 Emal: nfo@multtone.com Web: www.multtone.com

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Modeling and Simulation of Multi-Agent System of China's Real Estate Market Based on Bayesian Network Decision-Making

Modeling and Simulation of Multi-Agent System of China's Real Estate Market Based on Bayesian Network Decision-Making Int. J. on Recent Trends n Engneerng and Technology, Vol. 11, No. 1, July 2014 Modelng and Smulaton of Mult-Agent System of Chna's Real Estate Market Based on Bayesan Network Decson-Makng Yang Shen, Shan

More information

Waste to Energy System in Shanghai City

Waste to Energy System in Shanghai City Waste to Energy System n Shangha Cty Group of Envronmental Systems, Department of Envronmental Studes M2 46876 Ya-Y Zhang 1. Introducton In the past ffteen years, the economcs of Chna has mantaned contnuously

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Dynamic Scheduling of Emergency Department Resources

Dynamic Scheduling of Emergency Department Resources Dynamc Schedulng of Emergency Department Resources Junchao Xao Laboratory for Internet Software Technologes, Insttute of Software, Chnese Academy of Scences P.O.Box 8718, No. 4 South Fourth Street, Zhong

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information