PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT

Size: px
Start display at page:

Download "PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT"

Transcription

1 PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT Daniel A. Menascé Robet Peaino Depatment of Compute Science, MS 4A5 Univesity Computing Geoge Mason Univesity Geoge Mason Univesity Faifax, VA Faifax, VA Menasce@cs.gmu.edu Peaino@gmu.edu Nikki Dinh Quan T. Dinh SRA Intenational, Inc. Lockheed Matin Fedeal Systems, Inc Fai Lakes Cout 9500 Godwin D. Faifax, VA Manassas, VA nikki_dinh@sa.com Quan.t.dinh@lmco.com Web seves have become a key aspect of most mission-citical applications. This pape descibes ou expeience in planning the capacity of a poduction seve at ou oganization. The methodology used hee is model-based and allows fo pefomance pediction. The pape descibes how each step of the methodology was caied out with special emphasis in wokload chaacteization, pefomance model development, validation, and calibation. 1. Intoduction At pesent, Geoge Mason Univesity does not have a good undestanding of its web sevice wokload, o the subsequent esouce equiements ceated by this wokload. As a esult, the univesity can neithe quantify cuent esouce utilization, no pedict futue esouce needs. Though the use of a model-based capacity planning methodology [MA98], we seek to paint an analytical pictue of the cuent web sevice wokload, and the esulting esouce utilization. We will also pedict maximum thoughput, and suggest changes that will incease maximum thoughput. This pape will step though the stages of the model-based capacity planning methodology, to include envionmental desciption, wokload chaacteization, wokload model development and validation, pefomance model development, pefomance model validation and calibation, and pefomance pediction. As the Wold Wide Web has become an integal pat of ou society, has become one of the most impotant, and most visible epesentatives of the univesity. The seve (whose fomal name is jiju) is a 24-by-7 opeation. Because it is a highly visible poduction seve, if jiju wee to be down fo any length of time, phones would stat inging almost immediately. This need fo constant availability seveely limited ou ability to pefom benchmaks and othe activities that would nomally occu on off-line equipment. Anothe challenge to ou analysis is the constantly changing natue of jiju. Just pio to the stat of ou analysis, the administato wanted to upgade the seve softwae. Since this might change the pefomance behavio of the seve, we opted to wait fo the upgade to be completed befoe stating ou analysis. And as we wee finishing ou analysis, we wee pessued to do so quickly, since anothe softwae upgade was planned, as well as memoy and RAID disk upgades. This is the volatile natue of mission-citical components. In this pape, we use the capacity planning methodology descibed in [MA98] to plan the capacity of a public Web seve. The methodology consists of the following steps: undestanding the envionment, wokload chaacteization, pefomance model development, model validation, pefomance pediction, wokload foecasting, and costpefomance analysis. We descibe in the following sections ou expeience with applying the methodology. 2. Undestanding the Envionment This fist step in the methodology is concened with descibing the hadwae, the softwae, the connectivity of the seve, and the peak usage peiods. We gatheed ou initial infomation by inteviewing the administation to get an oveview of the hadwae and softwae configuation, and the sevices povided.

2 Figue 1 details the hadwae of the seve which consists of a dual 168 MHz pocesso Sun Seve with 256 MB of RAM unning Solais 2.6. The HTTP seve is Apache vesion The stoage subsystem is composed of thee disks. The opeating system and the logs it geneates ae stoed on disk 1, the HTTP access and eo logs ae stoed on disk 2, and the document tee is stoed on disk 3. The machine is dedicated to being a Web seve. The only pesons who would log diectly into the system ae the administatos. CPU MHz Disk 1 Opeating System epesents appoximately 40,000 samples. Figue 3 is a gaph of the tps ate fo evey minute of the month. The X-axis is labeled by hou of day. We can clealy see that the peak hous ae fom 9 AM to 5 PM. The mean tps ate ove the entie month is 5.49 tps. The maximum ate, aveaged ove one minute, is 28.4 tps. The minimum ate is tps. This means that the seve was neve idle, ove any one-minute inteval. To futhe undestand the data, we added a thid dimension to the data, which is Day of the Week (0 to 6 in Figue 4; 0 is Monday and 6 is Sunday). We could then see how the usage fluctuates thoughout the week. Fom the figue it becomes clea that weekends epesent peiods of lowe activity than weekdays. The peak peiod was detemined to be weekdays fom 9 AM to 5PM CPU MHz Disk 2 HTTP Logs 256 MB RAM Disk 3 Document Tee Figue 1 - Hadwae Configuation of the Seve Figue 2 illustates the connectivity. Jiju is connected to a local netwok via a 100Mbps Ethenet inteface using the TCP/IP potocols. This inteface is connected diectly to a oute, and then out to the Intenet via a T3 line. Jiju is a publicly accessible seve; 50 pecent of all equests oiginate off-campus. Ou analysis concentates on the seve plus the link that connects the seve to the Intenet. Figue 3 - Wokload Intensity (in tps) fo the Month of Febuay Web Seve LAN Route Intenet Client Client Figue 2 - Seve Connectivity In ode to detemine the peak usage peiods, we analyzed the web seve access log fo the month of Febuay, which consists of 13.2 million equests. Fo each minute of the month, an aveage aival ate was calculated, in tansactions pe second (tps). This Figue 4 - Wokload Intensity by Hou of the Day and Day of the Week. 3. Wokload Chaacteization In this step of the capacity planning methodology, we descibe the main components of the global wokload, the decomposition into classes, and how we aived at these esults.

3 3.1 Identifying the Basic Component The sevice povided by jiju suppots the HTTP Potocol. This potocol defines a seies of equest types, with ancillay data. The basic component of this system is the HTTP GET equest. Analysis of one month of the Apache web seve access logs shows that pecent of all activity is of this type. 3.2 Choice of the Chaacteizing Paametes The choice of the chaacteizing paametes is staightfowad. The wokload intensity of equests is chaacteized by the aival ate, measued in tansactions pe second (tps). Sevice demands ae computed fo the thee disks, and the two CPUs. 3.3 Patitioning the Wokload Fo the pupose of making the wokload model moe epesentative, we patitioned the wokload accoding to file sizes. Utilizing the web seve access log fo the peak peiods as defined in section 2, we wee able to obtain file sizes and fequencies. We wanted to see if thee wee aeas of file size concentations that would make the patitions obvious. The data was so dispaate as to make any visual display useless. We then implemented the minimum spanning tee (MST) [MAD94, MA98] clusteing algoithm so that we could pefom a one-dimensional clusteing on file sizes. We initially an the clusteing algoithm with 150 clustes. Upon inspection, we noticed that the top 4 clustes epesented 98 pecent of all equests. Additionally, zeo-length tansfes wee the esult of pecent of all equests. A equest may epot a zeo-length tansfe fo seveal easons including: The vesion in the client cache is up to date. The equested file was not found. An access violation pevented file tansfe. In each of these cases, the equest must be pocessed, which ceates CPU demand, and a seach must be done fo the file, which ceates disk demand. So, the zeo-length tansfes ae a vey eal pat of the system activity. Using the clusteing esults as a stating point, along with the above obsevations, we decided on fou classes of equests, as shown in Table 1. Class Range (Bytes) % Requests % Data Deived fom Fom cluste Remainde of cluste Clustes 1, 2, and 3 4 > Remainde of clustes Table 1 - Class Chaacteization. Note that 10.77% of the equests (classes 3 and 4) ae esponsible fo etieving about 77% of the data. This is typical of Web seves [AW96,CB96]. 3.4 Data Collection This section discusses the tools used fo data collection and descibes how they wee used to obtain the sevice demands at the CPU and disks Tools Used fo Data Collection Fom the pespective of the system, we used iostat and pocess accounting. iostat povided us with the necessay device utilization fo both the CPU and disks. Pocess accounting povided us with a vey detailed look at the system activity. This allowed us to ensue that we accounted fo all majo esouce usage. Fom the pespective of the Apache seve, we elied on the seve access log. In detemining what ou data equiements would be, we decided that the existing access log did not povide sufficient infomation about seve activity. Since the souce code fo Apache is available, we could instument the seve, to wite additional infomation into the log. By mid-mach, the following additional fields wee being ecoded in the poduction log: PID, sevice time, CPU time, and system date/time. We explain each of these additional fields in what follows. PID: the Pocess ID. The Apache seve woks in a maste/slave aangement. A maste pocess spawns slave tasks to sevice equests. When a slave seve has handled a cetain pe-configued numbe of equests, the maste kills the slave and stats a new one in its place. The intent behind this design is to avoid memoy leaks in key system functions, on cetain OS platfoms. Ou intention in ecoding the PID of the slave on each log ecod was to be able to find all equests handled by a single slave, and then match that slave to a pocess accounting ecod. Sevice Time. Also defined as the seve-side esponse time, this is the elapsed time in micoseconds, fom the stat of pocessing of a equest, until the data is completely sent. The intent of ecoding this was to have a diect measue of esponse time fo validation of the pefomance model, and fo benchmaking puposes. CPU Time. This is the accumulated CPU time of the equest, in milliseconds. This field allows us to have a diect measue of CPU sevice demand fo each equest. Ou plan was to find the aveage CPU sevice demand fo each class of equest. It tuns out that this field poved useless as explained in section System Date/Time in Seconds. Although the date and time is ecoded in the HTTP log, it is not ecoded in a fomat useful fo time manipulation. This field ecods the system intenal clock in accumulated

4 seconds, since Time of Epoch. This allows us to find the elapsed time between any two log ecods by simply subtacting the time values, and was used to compute equest inte-aival times. 3.5 Computing Sevice Demands The sevice demand D i, of equests of class at device i is defined as the total sevice time of equests of that class at that device [MAD94, MA98] and can be computed as D i U i, T C, (1) whee U i, is the utilization of device i due to equests of class, T is the inteval duing which the utilization was measued and C is the numbe of equests of class pocessed in the inteval of duation T. While it is easy to obtain the oveall utilization of a device, it is not always easy to obtain the utilization of that device due to a specific type of equest, especially when the seve is a poduction seve that cannot be taken offline fo unning contolled benchmaks. Also, we did not have access to any simila machine on which we could un equivalent benchmaks. This placed a temendous limitation on ou options fo computing sevice demands fo the esouces and classes. We decided to ely on a ule of popotionality fo cetain esouces. In othe wods, we assumed, that fo cetain devices, the utilization of a specific class at that device is popotional to the faction of data etieved by that class fom the total numbe of bytes etieved. We also decided to distibute system ovehead popotionally among the classes. The utilization of system esouces was ecoded fo one inteval of the peak peiod time window. The sevice demands fo each esouce and class wee deived fom these utilization values based on the fomula: D i U i f T C, (2) whee, D i, is the sevice demand of equests of class at esouce i, U i is the total utilization of esouce i (obtained fom iostat), T the measuement peiod, C is the numbe of equests of class pocessed duing the inteval (obtained fom the HTTP log), and f, is a popotionality facto that indicates the faction of the busy peiod of esouce i that can be attibuted to class CPU Sevice Demand At fist, we planned to deive the CPU sevice demands diectly fom the instumented seve log. We wee disappointed to discove that this would not be possible due to the ganulaity with which the system ecods CPU time accumulation. The system can only update the CPU time at the end of a pocess timeslice. On jiju, this time peiod is 10 msec. Testing veified that CPU time would always be epoted in incements of 10 msec. Unfotunately, the sevice demand of most equests is less than 10 msec. As a esult, the time epoted in the log fo small files is eithe 0 msec o 10 msec, neithe of which is coect. We decided to wok with the pemise that the CPU sevice demand is popotional to the file size. To test this supposition, we benchmaked the CPU time equied to equest a set of files of inceasing size. The files had to be of sufficient size such that the ganulaity of the CPU time epoted by the system would not have a significant impact on the measuements. We benchmaked files of size 1 MB to 10MB in incements of 1MB. Each file size was benchmaked 10 times. We then pefomed a linea egession on the esulting data. Figue 5 shows the esults of the benchmaks, and the linea egession. Assuming that CPU demand is popotional to file size implies that class 1 (zeolength files) equies no time. But those equests must use some time, so we ely on the linea egession and set the sevice demand to be the y-intecept, which would be the expected value fo a file of zeo bytes. To calculate the sevice demands fo the othe classes, we use Eq. (2), but we fist must subtact fom the CPU busy time (2 x U CPU x T) the activity epesented by class 1, which was calculated independently. Also, the facto f is the pecentage of bytes b etieved by class equests. So the CPU sevice demand is given by D cpu, 2 U T D 1 C1 b cpu cpu, whee C 1 is the numbe of class 1 equests executed duing time T. Note that the facto 2 in the total CPU time (2 x U CPU x T) is due to the fact that the seve has two CPUs and the CPU utilization epoted by iostat is the aveage utilization of the two pocessos. C Disk 1 Sevice Demand Disk 1 contains the opeating system and its suppot files such as the pocess accounting log. As mentioned in section 3.4.1, slave seve pocesses ae constantly being ceated and killed. When a pocess ends, a pocess accounting log ecod is witten. Theefoe, the highe the aival ate of equests, moe pocess accounting ecods ae geneated. Instead of a popotional distibution of activity, each class has the same sevice demand since all accounting ecods (3)

5 ae the same size egadless of class. The sevice demand fo disk 1 is then computed as D disk, U disk1 4 1 T C 1 (4) Figue 5 - CPU time (in msec) vesus file size (in Mbytes) Disk 2 Sevice Demand Disk 2 holds the web seve log. Just like disk1, the sevice demand necessay to wite a log ecod is the same fo all equests, egadless of class. So the sevice demand is computed in the same manne as disk Disk 3 Sevice Demand Disk 3 is the seve file epositoy. Sevice demands must be deived in a manne simila to the CPU demand. As was the case with the CPU sevice demand, the class 1 sevice demand could not be based on the class 1 popotion of data etieved, since the class 1 file size is zeo. And as mentioned befoe, it was not possible to take the machine off-line fo a contolled benchmak. To get a ough estimate of the sevice demand of disk 3 fo class 1, we pefomed an on-line benchmak. Consideing the easons why a equest would fall into this class (mentioned in section 3.3), the benchmak meely needed to seach fo files, and not open them. The benchmak accessed the I- node infomation fo all files in seveal file systems, while the disk utilization was measued with iostat. This was pefomed by issuing the UNIX command 'ls -lr' ove entie file systems, monitoing the utilization of the disk. We used entie file systems to avoid picking up anything in the cache. We used the long listing (-l) option, to foce the system to look at the file i-node, which should be equivalent to the amount of wok pefomed by 0-length tansfes. Afte the un, we counted the numbe of files in the file system. This would become C 1. We then computed the sevice demand at disk 3 fo class 0 as D=U*(T/C 1 ). We did this fo thee diffeent file systems on jiju and aveaged the esults. The emaining class sevice demands wee computed using the same method as the CPU classes. The esulting sevice demands ae then given in Table 2. Note that we have added the incoming link and outgoing links as additional devices. The sevice demand at these devices was obtained fom the file size fo each class and fom the potocol (TCP/IP + HTTP) ovehead incued in tansmitting files of that size CPU CPU Disk Disk Disk In-link Out-link Table 2 - Sevice demands (msec) Wokload Model Validation Wokload model validation would entail the development of a synthetic wokload based on the wokload chaacteization, which would be un on the system so that pefomance esults could be compaed to poduction pefomance esults. Because jiju is a poduction seve, we wee not pemitted to bing down the seve so that we could un a synthetic wokload. Had we been able to do this, we would have built a scipt that would submit synthetic equests of fou types based on the fou classes. The file sizes would be based on the aveage file sizes fo each class. The distibution of the equests would be based on the popotion of equests that each class epesents. 5. Pefomance Model Development and Pefomance Pediction The pefomance model used to epesent the seve and the incoming and outgoing links is a multiclass open queuing netwok (QN) model (see Fig. 6). To model the dual pocesso CPU we used the appoximation suggested by Seidman et al [SSS87]. Figue 7 shows the aveage esponse time fo the fou classes as a function of the aggegate aival ate of equests. The popotion of equests in each class is the same shown in Table 1. The model shows that afte 120 tps, the utilization of the CPU eaches 100%. Class 4 is the one with the lagest esponse time and with the lagest gowth ate in esponse time.

6 Avg. Response Time (sec) Outgoing link Incoming link Disk 1 Disk 2 Disk 3 CPUs Figue 6- QN model fo the Web seve Total Aival Rate (tps) Class 1 Class 2 Class 3 Class 4 Figue 7 Response Time vs. Aival Rate 6. Pefomance Model Validation and Calibation In this step, we compaed the model pedictions with the actual epoted system activity. We descibe the validation poblems and how we fixed them. When we tested the model fo the fist time, the esults wee wildly inaccuate, and inconsistent. Each set of data we an fom diffeent days povided diffeing amounts of eo. So we tuned back to ou envionmental eview, to see what we had missed. To get a close look at the system activity, we wee pemitted by the system administato to eview the pocess accounting logs and the con configuation, to get a much moe pecise look at the system activity. Fom the pocess accounting log eview, we identified a pocess that used a temendous amount of esouces, and an evey hou. We taced the pocess to a job that was scheduled in the con configuation. The job tabulated usage statistics by eading the entie access log evey hou. As the log gew in size, so did the esouce equiements of this pocess. Thus, the esouce equiements wee diffeent fo evey hou of evey day of the month. Since the access log is estated only at the end of the month, it will gow to about 1.5 gigabytes in size befoe being emoved. As a esult, by the end of the month, this statistics job equied 45 minutes of CPU time each hou, which is much moe than even the seve equies! We estimated that the statistics job accounts fo appoximately 37 pecent of the epoted aggegate CPU utilization, and this is consistent with the activity we wee seeing with iostat. Befoe we decided how to incopoate this activity into the model, we bought ou findings to the attention of the administation. They did not know that the job was unning, and detemined that it only needed to un once pe week, duing offhous. The escheduling of this job pecluded any need to include it in the model. We felt that we achieved much success aleady, since we saved the univesity almost an entie pocesso! Once the statistics usage job was addessed, ou model accuacy in tems of utilization became quite acceptable. The maximum pecent absolute eo in the utilization was 6.5% and that happened fo class 2. We planned to validate the model esponse time by compaing it to the ecoded seve-side esponse time as defined in section We wee teibly disappointed to discove that although the esponse was being accuately ecoded, it was not stictly seve-side esponse time. This effect was a chaacteistic of being on an open netwok. When we andomly sampled the log, we found that esponse times could vay fom 0.5 seconds to 60 seconds fo the same file size. Causes fo this behavio include netwok sluggishness, timeouts, and slow modem speed at the client. Of couse, the esponse times epoted by the model do not conside these issues. Slow modem speed is pobably the single geatest cause of esponse time vaiability. It should be noted that esponse time cannot be ecoded in the HTTP log until all of the data fo a equest is sent. If the client equest is coming ove low speed modem connections, this will limit the effective bandwidth of the TCP connection used to send the esults back to the client and will theefoe incease esponse time. To study the effects on esponse time of the client access speed, we developed a mixed QN model with one closed class epesenting a client making equests and fou open classes identical to the ones in the pevious model (see Fig. 8). Figue 8 shows thee delay devices, epesented by cicles, coesponding to the bowse, client access link, and the Intenet. The sevice demand at the bowse is the client think time.

7 The sevice demand at the client access link is the total time to tansmit equests and eceive eplies. It is assumed that client access link is dedicated, as is the case with modem access. When this is not tue, as in the case of LAN-based access, we used the effective bandwidth seen by the client to compute the sevice demand. Using the solution methods fo mixed QNs given in [MAD94], we obtained the esponse time as a function of the client-side access speed. This is depicted in Fig. 9 fo class 4 fo an aggegate aival ate fo the open classes equal to 120 tps and fo an Intenet ound tip delay of 200 msec. Response times vay fom 9.51 sec to 6.70 sec depending on the client-side access speed. Note that fo the same aival ate of 120 tps, the seve-side esponse time obtained fom the open QN model is 6.66 sec. This model explains the lage vaiability in esponse time obseved in the log. The esponse times fo equests coming fom campus ove a high speed ATM backbone and 100 Mbps LANs only wee moe in line with those pedicted by the open QN model. Bowse Client access link Intenet Outgoing link Incoming link fom/to othe souces Disk 1 CPUs utilized. We chose this tool because it povided two key featues; we could use actual log activity to dive the benchmak, and we could mimic the aival ate chaacteistics, which would maintain the bustiness of ou wokload. In fact, if we look at a plot of the aival ate ove time we see clealy the busty natue of the wokload. Figue 10 illustates the effects of bustiness. This gaph is a 191-second inteval andomly taken fom the access log on Apil 26, 1999 at 15:37:05, showing the aival ate in equests pe second. The bustiness is clealy visible. While the aveage aival ate ove this inteval is only equests pe second, the busts ae consideably highe. We geneated an InetLoad scipt by pocessing the poduction log to obtain the file efeences and the equest inte-aival times. Busts of equests ae handled in the following manne: if 10 equests aived within one second, the scipt will ensue that the benchmak will equest those 10 files within one second. This is how we maintain the exact natue of the wokload. The aival ate can be inceased without compomising the aival ate chaacteistics, by compessing the eal time inteval duing which an inteval of log activity will be pefomed. This can be accomplished by educing the inte-aival time. Disk 2 Disk 3 Figue 8 Mixed QN Model Response Time (sec) ,600 56,000 1,250, ,000,000 Client access speed (bps) Figue 9 Response Time vs. Client-side Access Speed. Ou analytic model showed a satuation aound 120 tps. We wanted to veify though measuements if this was indeed the case. To that end, we an a benchmak using the InetLoad benchmak tool [InetLoad] to dive the seve to its maximum capacity, detemined by a CPU, ou bottleneck, close to 100% Figue 10- Busty Natue of the Wokload. We an ou benchmak seveal times and aveaged the thoughput obtained. Simultaneously with each un we had iostat active so that we could veify that both CPUs wee close to 100% utilized. The aveage thoughput obseved was 131 tps, 9.2% above the maximum thoughput pedicted by ou model. To detemine the maximum aival ate unde nonbusty conditions, we used InetLoad to pefom a benchmak consisting of equests submitted at a constant ate. The non-busty benchmak was able to dive the seve at 202 tps, well above the values obtained with the busty wokload. These findings cooboate the ones given in [Banga97].

8 Additional discussion of load testing can be found in [Michalsky98]. 7. Answeing What-If Questions The univesity is consideing moving the Web seve to a machine with RAID disks fo inceased fault toleance and a diffeent pocesso. One of the machines being consideed by the administation had two slightly slowe pocessos. We advised against it knowing that the CPU was the bottleneck. The othe option had to 250 MHz pocessos. To obtain a vey ough estimate of the gains to be achieved by using the faste pocessos we an ou model again. We an ou model again by multiplying the CPU sevice demand by 168/250 = To account fo the incease in pocesso speed. We could also have used the atio of SPECint95 atings. Fo an aival ate value of 120 ts, class 4 now has a esponse time of sec as opposed to 6.6 sec with the slowe pocessos. Also the maximum thoughput suppoted by the Web seve inceases to 183 tps, an incease of about 52% with espect to the pevious situation. So, ou ecommendation to the administation was to upgade to the configuation with two 250 MHz pocessos. [MENA94] Menascé, D. A., V. A. F. Almeida, and L. W. Dowdy, Capacity Planning and Pefomance Modeling: fom mainfames to client-seve systems, Pentice Hall, Uppe Saddle Rive, NJ, [MENA98] Menascé, D. A. and V. A. F. Almeida, Capacity Planning fo Web Pefomance: metics, models, and methods, Pentice Hall, Uppe Saddle Rive, NJ, [Michalsky98] Michalsky, R. J., Load Testing in an Intenet Wold, Poc CMG Confeence, Dec. 6-11, Anaheim, CA, pp [SSS87] Seidman, A., P. Schweitze, and S. Shalev- Oen, Computeized closed queueing netwok models of flexible manufactuing systems, Lage Scale Syst. J., Noth Hollland, vol. 12, pp , Concluding Remaks The pupose of this pape was to pesent a vey pactical view of how we applied a model-based capacity planning methodology to a poduction webseve. We also discussed whee things went appaently wong and what steps had to be taken to validate and calibate the model. One of the biggest challenges in any capacity planning and pefomance modeling study is making sue one has the ight data, both fo the pupose of computing input paametes to analytic models, as well as fo validating model outputs such thoughput, utilization, and esponse times. Refeences [AW96] Alitt, M. and C. Williamson, Web Seve Wokload Chaacteization: the seach fo invaiants, Poc ACM Sigmetics Confeence, Philadelphia, May [Banga97] Banga, G. and P. Duschel, Measuing the Capacity of a Web Seve, Usenix Symposium on Intenet Technologies and Systems, Decembe [CB96] Covella, M. and A. Bestavos, Self-Similaity in Wold Wide Web Taffic: Evidence and Causes, Poc ACM Sigmetics Confeence, Philadelphia, May [InetLoad] d.htm

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Experiment 6: Centripetal Force

Experiment 6: Centripetal Force Name Section Date Intoduction Expeiment 6: Centipetal oce This expeiment is concened with the foce necessay to keep an object moving in a constant cicula path. Accoding to Newton s fist law of motion thee

More information

Lab #7: Energy Conservation

Lab #7: Energy Conservation Lab #7: Enegy Consevation Photo by Kallin http://www.bungeezone.com/pics/kallin.shtml Reading Assignment: Chapte 7 Sections 1,, 3, 5, 6 Chapte 8 Sections 1-4 Intoduction: Pehaps one of the most unusual

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Determining solar characteristics using planetary data

Determining solar characteristics using planetary data Detemining sola chaacteistics using planetay data Intoduction The Sun is a G type main sequence sta at the cente of the Sola System aound which the planets, including ou Eath, obit. In this inestigation

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Nice Resource Reservations in Linux

Nice Resource Reservations in Linux Nice Resouce Resevations in Linux Matin Ohlin Depatment of Automatic Contol Lund Univesity Box 118, SE-221 Lund, Sweden Email: Matin.Ohlin@contol.lth.se Matin A. Kjæ Depatment of Automatic Contol Lund

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards BIOS Ameican Megatends Inc (AMI) v02.61 BIOS setup guide and manual fo AM2/AM2+/AM3 motheboads The BIOS setup, also called CMOS setup, is a cucial pat of the pope setting up of a PC the BIOS (Basic Input

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Hitachi Virtual Storage Platform

Hitachi Virtual Storage Platform Hitachi Vitual Stoage Platfom FASTFIND LINKS Contents Poduct Vesion Getting Help MK-90RD7028-15 2010-2014 Hitachi, Ltd. All ights eseved. No pat of this publication may be epoduced o tansmitted in any

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

MATHEMATICAL SIMULATION OF MASS SPECTRUM

MATHEMATICAL SIMULATION OF MASS SPECTRUM MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360! 1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Magnetic Bearing with Radial Magnetized Permanent Magnets

Magnetic Bearing with Radial Magnetized Permanent Magnets Wold Applied Sciences Jounal 23 (4): 495-499, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.23.04.23080 Magnetic eaing with Radial Magnetized Pemanent Magnets Vyacheslav Evgenevich

More information

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to . Simplify: 0 4 ( 8) 0 64 ( 8) 0 ( 8) = (Ode of opeations fom left to ight: Paenthesis, Exponents, Multiplication, Division, Addition Subtaction). Simplify: (a 4) + (a ) (a+) = a 4 + a 0 a = a 7. Evaluate

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Manual ultrasonic inspection of thin metal welds

Manual ultrasonic inspection of thin metal welds Manual ultasonic inspection of thin metal welds Capucine Capentie and John Rudlin TWI Cambidge CB1 6AL, UK Telephone 01223 899000 Fax 01223 890689 E-mail capucine.capentie@twi.co.uk Abstact BS EN ISO 17640

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

NUCLEAR MAGNETIC RESONANCE

NUCLEAR MAGNETIC RESONANCE 19 Jul 04 NMR.1 NUCLEAR MAGNETIC RESONANCE In this expeiment the phenomenon of nuclea magnetic esonance will be used as the basis fo a method to accuately measue magnetic field stength, and to study magnetic

More information

Thank you for participating in Teach It First!

Thank you for participating in Teach It First! Thank you fo paticipating in Teach It Fist! This Teach It Fist Kit contains a Common Coe Suppot Coach, Foundational Mathematics teache lesson followed by the coesponding student lesson. We ae confident

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

Valuation of Floating Rate Bonds 1

Valuation of Floating Rate Bonds 1 Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

Controlling the Money Supply: Bond Purchases in the Open Market

Controlling the Money Supply: Bond Purchases in the Open Market Money Supply By the Bank of Canada and Inteest Rate Detemination Open Opeations and Monetay Tansmission Mechanism The Cental Bank conducts monetay policy Bank of Canada is Canada's cental bank supevises

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Define What Type of Trader Are you?

Define What Type of Trader Are you? Define What Type of Tade Ae you? Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 1 Disclaime and Risk Wanings Tading any financial maket involves isk. The content of this

More information

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application Real Time Tacking of High Speed Movements in the Context of a Table Tennis Application Stephan Rusdof Chemnitz Univesity of Technology D-09107, Chemnitz, Gemany +49 371 531 1533 stephan.usdof@infomatik.tu-chemnitz.de

More information

Smarter Transportation: The power of Big Data and Analytics

Smarter Transportation: The power of Big Data and Analytics Smate Tanspotation: The powe of Big Data and Analytics Eic-Mak Huitema, Global Smate Tanspotation Leade IBM 1 Intelligent Tanspot Systems (ITS) fo the futue 2 BECAUSE WE WANT IT FOR THE FUTURE. How? The

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

Trading Volume and Serial Correlation in Stock Returns in Pakistan. Abstract

Trading Volume and Serial Correlation in Stock Returns in Pakistan. Abstract Tading Volume and Seial Coelation in Stock Retuns in Pakistan Khalid Mustafa Assistant Pofesso Depatment of Economics, Univesity of Kaachi e-mail: khalidku@yahoo.com and Mohammed Nishat Pofesso and Chaiman,

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson pp@kth.se Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

Instituto Superior Técnico Av. Rovisco Pais, 1 1049-001 Lisboa E-mail: virginia.infante@ist.utl.pt

Instituto Superior Técnico Av. Rovisco Pais, 1 1049-001 Lisboa E-mail: virginia.infante@ist.utl.pt FATIGUE LIFE TIME PREDICTIO OF POAF EPSILO TB-30 AIRCRAFT - PART I: IMPLEMETATIO OF DIFERET CYCLE COUTIG METHODS TO PREDICT THE ACCUMULATED DAMAGE B. A. S. Seano 1, V. I. M.. Infante 2, B. S. D. Maado

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

College of Engineering Bachelor of Computer Science

College of Engineering Bachelor of Computer Science 2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

A Comparative Analysis of Data Center Network Architectures

A Comparative Analysis of Data Center Network Architectures A Compaative Analysis of Data Cente Netwok Achitectues Fan Yao, Jingxin Wu, Guu Venkataamani, Suesh Subamaniam Depatment of Electical and Compute Engineeing, The Geoge Washington Univesity, Washington,

More information

Physics 235 Chapter 5. Chapter 5 Gravitation

Physics 235 Chapter 5. Chapter 5 Gravitation Chapte 5 Gavitation In this Chapte we will eview the popeties of the gavitational foce. The gavitational foce has been discussed in geat detail in you intoductoy physics couses, and we will pimaily focus

More information

Skills Needed for Success in Calculus 1

Skills Needed for Success in Calculus 1 Skills Needed fo Success in Calculus Thee is much appehension fom students taking Calculus. It seems that fo man people, "Calculus" is snonmous with "difficult." Howeve, an teache of Calculus will tell

More information

Integrating Net2 with an intruder alarm system

Integrating Net2 with an intruder alarm system Net AN035 Integating Net with an intude alam system Oveview Net can monito whethe the intude alam is set o uet If the alam is set, Net will limit access to valid uses who ae also authoised to uet the alam

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run End-to-End Qo Mapping and Aggegation fo electing Cloud evices Raed Kaim, Chen Ding, Ali Mii Depatment of Compute cience Ryeson Univesity, Toonto, Canada 2kaim@yeson.ca, cding@scs.yeson.ca, ali.mii@yeson.ca

More information