SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

Size: px
Start display at page:

Download "SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE"

Transcription

1 SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore, India 3 College of Engineering, JNTUH, Hyderabad, India ravikgullapalli@gmail.com 1, chelgeetha@yahoo.com 2, dravinayababu@yahaoo.com 3 Abtract - High performance i alway a deired objective in computing ytem. Managing performance through manual intervention i a well-known and obviou mechanim. The attempt to elf-manage performance with minimal human intervention are predominant in the recent advance of reearch. Control Sytem theory i playing a ignificant role in building uch intelligent and autonomic computing ytem. We are invetigating in building Intelligent Application Server by enabling control ytem a a firt cla feature in component oftware, at deign time and runtime. In thi direction, it i important to build efficient data acce mechanim that capture the control ytem model, performance data, analyze the data efficiently, identify pattern and build a knowledge bae. In thi paper we propoe a data organization and architecture a a building block of developing Intelligent Application Server. Keyword - elf-managing performance; Intelligent Application Server; Control Sytem; modeling and data architecture; I. INTRODUCTION High performance i mot deired non-functional requirement of any computing ytem. The rapidly increaing uage of IT reource triggered elfmanaging and elf-correcting IT architecture from hardware to the application layer. Such elf-managing and elf-correcting olution are referred a Autonomic Computing. There are variou olution in providing uch autonomic and elf-managing mechanim in the recent reearch invetigation [1]. Control Sytem i obviou choice due to the inherent feedback and adaptive control capabilitie to build uch autonomic IT ytem [2], upported by mathematical foundation. Control Sytem proved ucceful application in networking, databae ytem, and data center. There i a great emphai of control ytem application in application layer involving Application and Web Server [3]. Mot of the reearch i around uing claic controller, building hybrid controller for automated performance management. In thi paper we intend to exploit generic modeling and data architecture providing imple way to model, capture, organize and analyze the real time data that help in building more robut elf-managing abilitie in Application Server. II. PROBLEM AND RELATED WORK Application Layer play a ignificant role in today IT environment. They hot application and provide ervice ranging from individual conumer to the Enterprie uer. It i obviou that uch Application Server exhibit high performance all the time. There are olution applying control ytem to elf-manage the performance uing adaptive controller. Many of them are pecific olution to manage the performance of web erver [4][5], web ervice [6], web caching [7][8], EJB Server [9], JMS Server [10], JDBC driver [11][12]. Mot of uch olution are pecific to the component in the Enterprie Application Server tack. Although the controller, control algorithm are important in building elfmanaging computing ytem, it i even more neceary to provide imple, fater, efficient data organization mechanim that upport generic data modeling, data analyi, and pattern identification mechanim and contruct knowledge bae. In thi paper we addre the above aid iue by a imple Data Architecture for efficient functioning of thee controller. The propoed Data Architecture i a building block of a bigger reearch problem where we are invetigating to build an Expert Control Sytem for Application Server [13][14]. III. INTELLIGENT CONTROL ARCHITECTURE OVERVIEW The Fig 1 below how Intelligent Control Architecture coniting of Data Architecture block in the outer loop and a Feedback block in the inner loop. The Feedback block conit of a et of claic controller uch a P, PI, PID [15] and advanced controller uch a Time-Serie, Fuzzy and other intelligent controller. The Data Architecture block contain the functional block to capture the performance data of the Application Server component control ytem model, analyze data, identify pattern and create knowledge bae. The ubequent ection explain thi block in detail and the data that i exchanged between thee block. 16

2 <inputparam2> </inputparam2> <inputparam3> </inputparam3> <inputparam4> </inputparam4> </component-name> </model> Fig. 2 : Sample MISO Model Template in xml B. Example Model JMS Provider The following Fig 3 how the xml definition of repreenting the ARMA model of JMS Provider. Fig. 1: Intelligent Control Architecture At every ample interval the control loop hown are run, where the data architecture block analyze the real time data, end a Context Pattern to the Feedback block. The context pattern object contain the controller to be ued and other information required for tuning the controlled input to the Application Server to achieve the deired performance. IV. MODEL TEMPLATES UML DESIGN Control Sytem olution require the Application Server component model to tune their performance. The typical model adopted are ARMA model [16]. Equation (1) below how a imple SISO ytem model. y(t + 1) = ay(t) + bu(t) (1) A. Model Template The feedback control ytem ue ARMA model and we have conidered the ame to repreent the Application Server component in our olution. The model of different JEE erver [17] component uch a JMS Provider [18], EJB Server [19], Web Server are captured a SISO or MISO model [20] template coniting of all poible output parameter for the erver component. Thee are pre-defined model ued to capture the aociated performance data in the fater acce databae. The pre-built model template are eparately packaged a XML reource file by the erver component developer along with the compiled ource. Thee template are ued at the Application Server initialization to create the databae and etimate the different model parameter at runtime. The Fig 2 below how the definition of a model template <model> <component-name> <outputparam> </outputparam> <inputparam1> </inputparam1> <model> <jm> <outputparam> mgtput </outputparam> <inputparam1>nosub</inputparam1> </jm> </model> Fig. 3 : JMS Provider SISO Model Template.. The above hown model template can be repreented by the following (2) a SISO model mgtput (t + 1) = a mgtput(t) + b nosub(t) (2) a and b are the model parameter. Thi model will be tranformed into a column oriented databae during the initialization of the Application Server. V. DATA ARCHITECTURE Thi ection explain the Data Architecture block of the Intelligent Control Architecture in the Fig 1. Effective data organization i important for analyzing the performance data; infer meaningful pattern to enable tuning the managed ytem. We propoe to ue a Column oriented databae to capture performance data and will be periodically moved to a peritent torage when it pattern are defined a rule in the knowledge bae. The Fig 4 below how the propoed Data Architecture with two part in it Data Organization: It deal with the paring the model template and capturing the data. The Data Modeler deal with tranforming model template of the Application Server component into the column oriented databae. The Data Monitor update the performance data. Data Analyi: It ha a generic data acce layer to fetch the performance data, which will be conumed by the Data Analyzer to analyze the data, identify pattern and generate Context Pattern. 17

3 Fig. 4 : Data Architecture A. Context Pattern Context Pattern i an object that contain the predicted value for the future output parameter value, that reflect the behavior of the component of the Application Server. Additional parameter are alo predicted uch a percentage of CPU uage, Memory uage. Additionally for uch a predicted behavior the uitable controller required to be applied i alo et. The Fig 5 below how a ample Context Pattern. <ContextPattern> <Pattern>SuddenVariation</Pattern> <OutParam>MeageThroughput</OutParam> <OutParamVal>50</OutParamVal> <InParam>Smax</InParam> <InParamVal>75</InParamVal> <ControllerType>Fuzzy</ControllerType> <CPU>75</CPU> <MEM>68</MEM> </ContextPattern> Fig. 5 : Context Pattern The context pattern either determine to chooe an appropriate controller or it ugget an action to be taken to cater to the future need. The Table I below how the action to be taken baed on the context pattern generated. The mapping between the Context Pattern value and the Controller to be choen or the action to be taken i tored a control election rule in the Data Architecture block in Fig 1. Table I : Context Pattern Controller Mapping Context Pattern Sl. No Controller Pattern Identified Action Type 1. Sudden Variation Fuzzy 2. Quick Adaptation PID 3. Gradual Increae Time- Serie 4. Contant Time- Serie 5. Reource hortage 6. Dratic Performance Degrdation New Server Intance Sytem Audit B. Data Organiation Performance Data The model template defined for different erver component will have a lot of data aociated during runtime. It i deired that there i a fater data query mechanim, and the growing data volume hould not be an overhead on the elf-managing architecture. The firt challenge of fater data acce i addreed by chooing a column oriented databae [21]. It i ued to capture the data that provide data equence for a given parameter which i a ueful input for eaier data analyi and identifying the pattern. The econd challenge i handled by moving the data to a peritent torage periodically. The data analyzer generate context pattern periodically, generate rule from thoe context pattern, capture in the knowledge bae. Such rule repreent the pattern aociated with the data and hence the data will be moved to a peritent torage. Thu the amount of data aociated to tudy the pat data; the mechanim to analyze and predict the future pattern i much impler and light weight mechanim. The following are the different data element involved baed on the model template: Input parameter Output parameter Model Parameter Contant Controller Gain The Column oriented databae upport SQL [22] and fetche the data column wie rather than row wie thereby providing fater data acce. Such a data tructure enable the Pattern Analyi algorithm to eaily extract the behavior. The following Table II below how a ample Table tructure of a column oriented databae for a JMS Provider. TABLE II : JMS PROVIDER COLUMN ORIENTED DATA Meage Throughpu t Subcriber Publiher broker CP U It i eay to add additional input parameter at runtime when it i oberved that there are other factor affecting the ytem performance. C. Data Analyi - Knowledge bae Data Analyi and Pattern Identification i another important functional building block of the Data Architecture hown in Fig 1. Once the performance data i available in the databae, through generic data acce layer, the Data Analyzer fetche the data. Initially the knowledge bae i empty and every time a Context Pattern i generated it i written to the knowledge bae. We ued a imple cutom rule mechanim which i XML baed that tore condition and action to be taken. The following Fig 6 how a XML rule template Context Pattern ued to tore a a rule. <rule> <component> </component> 18

4 <if> <property-1> </property-1> <property-2> </property-2> <property-3> </property-3> <property-n> </property-n> </if> <then> <ControllerType></ControllerType> </then> </rule> Fig. 6 : Sample Rule Template There i a rich collection of Pattern Recognition [23] and Data Mining [24] technique and we ue ome of them in our olution uch a Time-Serie, Epiode Dicovery, Outlier Analyi, and Aociation Rule. D. Model and Data Organiation - Algorithm The following Fig 7 how the algorithm of creating template the knowledge bae i created. The control loop i run periodically and in each loop n column of the output parameter i analyzed. After each loop context pattern i tranformed into a rule, written to the knowledge bae. Create model template Set the periodicity of control loop (p) For every interval p o Read n column of output param o Analyze the data and generate Context Pattern(prediction algorithm are run) o Convert the Context Pattern into rule of the knowledge bae o After m control loop, call Data Mover to move all the performance data into a peritent torage A. Data Model The Data Modeler i a imple Java cla implemented to read model template and create table in the column oriented databae. We have ued MonetDB [25] to tore the model template. But we are exploring to identify a light weight in memory column databae. Currently the XML model template have to be created manually. A tool implementation i in progre that allow creating the template eaily. B. Knowledge bae A imple cutom rule engine i developed that tore the knowledge bae in XML format. A et of java clae are implemented to create the rule uing the context pattern object generated. The following Fig 8 how a ample knowledge bae that i created for a context pattern of JMS Provider. <rule> <name>jms-mgtput-pattern1</name> <component>jm</component> <if> <property-1> <name>smax</name> <value>125</value> </property-1> <property-2> <name>mgtput</name> <value>160</value> </property-2> <property-3> <name>pattern</name> <value>suddenvariation</value> </property-3> <property-4> <name>cpu</name> <value>64</value> </property-4> <property-4> <name>threholdviolation</name> <value>ye</value> </property-4> </if> <then> <ControllerType>Fuzzy</ControllerType> <NwSrvrIntance>Fale</NwSrvrIntance> <modelparam-1>1</modelparam-1> <modelparam-2>0.28</modelparam-2> </then> </rule> Fig. 7 : Data Organiation Algorithm VI. IMPLEMENTATION A primitive implementation of the propoed olution i implemented uing Java and XML. Fig. 8 : A ample Rule for JMS Provider tuning VII. DISCUSSION AND FUTURE WORK In thi paper we propoed control ytem model and data architecture that provide template to repreent 19

5 the variou erver component of the Application Server. Alo, the olution exploited the mechanim to capture, organize and ue the data aociated with thee model for effective prediction of the future pattern of the component. The current olution i a ubet of the bigger reearch problem that we are trying to addre dealing with development of a generic end-to-end framework that enable in creating robut Application Server that are more adaptive and elf-managing in performance management. We have implemented variou controller for the JEE erver component with encouraging reult [10][11]112] but mot of the implementation i imulation baed. We intend to extend our work in validating our theory by running in actual Application Server environment. The end goal our reearch i to enable the deign, modeling and runtime of Application Server with inherent elf-managing capabilitie. We have implemented a prototype olution that upport control ytem concept a firt cla element in UML modeling [26]. We inted to integrate the model template creation dicued in thi paper during the UML deign of the erver component.. Additionally we want to explore Java baed rule engine uch a Je [27] and evaluate againt our cutom rule engine. The propoed architecture implementation i primitive and it require enahancement to complete the implemenation of all the component hown and evalute the reult in different run time environment. REFERENCES [1] Mohammad Reza Nami, Koen Bertel, "A Survey of Autonomic Computing Sytem", ICAS '07 [2] What Doe Control Theory Bring to Sytem Reearch? Xiaoyun Zhu, Mutafa Uyal, Zhikui, Wang, Sharad Singhal, Arif Merchant, Pradeep Padala, Kang Shin, ACM SIGOPS Operating Sytem Review, Volume 43 Iue 1, January 2009 [3] Ravi Kumar G, C.Muthuamy, A.Vinaya Babu, Control Sytem application in Java baed Enterprie and Cloud Environment A Survey, IJACSA Vol 2 No 8, 2011 [4] N. Gandhi and D. M. Tilbury, Y. Diao, J. Hellertein, and S. Parekh MIMO Control of an Apache Web Server, Modeling and Controller Deign, IEEE American Control Conference, 2002 [5] C. Lu, T.F. Abdelzaher, J.A. Stankovic and S.H. Son, A feedback control approach for guaranteeing relative delay in web erver Proc. of the 7th IEEE Real-Time Technology and Application Sympoium, pp 51-62, 2001 [6] Tarek Abdelzaher. Yina Lu, Ronahua Zhana, Dan Henrikon, Practical Application of Control Theory to Web Service, American Control Conference, 2004 [7] Ying Lu, Avneeh Saxena and Tarek E Abdelzaher Differentiated Caching Service; A Control-Theoretical Approach, IEEE International Conference on Ditributed Syytem, [8] Ying Lu, Tarek Abdelzaher and Gang Tao, Direct Adaptive Control of A Web Cache Sytem, Proceeding of the American Control Conference, Denver, Colorado, 2003 [9] Yan Zhang, Wei Qu, Anna Liu, Adaptive Self- Configuration Architecture for J2EE-baed Middleware, Vol 9, HICSS 06 [10] Ravi Kumar G, Dr.Chelliah Muthuamy and Dr.A.Vinaya Babu, Self-regulating Meage Throughput in Enterprie Meaging Server A Feedback Control Solution, IJACSA, Volume 3, No 1, Jan2012 [11] Ravi Kumar Gullapalli, Dr.Chelliah Muthuamy, Dr.A.Vinaya Babu and Raj N. Marndi, A FEEDBACK CONTROL SOLUTION IN IMPROVING DATABASE DRIVER CACHING, IJEST, Vol 3, No 7, July 2011 [12] Ravi Kumar G, Dr.Chelliah Muthuamy, Dr.A.Vinaya Babu and Raj N. Marndi, Autonomic Databae Driver An Adaptive Control Solution, Proc. ICITEC 2012, Mar 2012,pp 40-44, Ravi Kumar G, Dr.Chelliah Muthuamy, Dr.A.Vinaya Babu Intelligent Application Server A Viion of Self-managing of performance unpublihed, accepted in ICAdC 2012 [13] Ravi Kumar G, Dr.Chelliah Muthuamy, Dr.A.Vinaya Babu SELF-MANAGING THE PERFORMANCE OF DISTRIBUTED COMPUTING SYSTEMS AN EXPERT CONTROL SYSTEM SOLUTION - unpublihed [14] Z.Vukic, Ognejen Kuljaca: Lecture on PID Controller, ontroller.pdf, Apr 2002 [15] ARMA: Autoregreive_moving_average_model [16] JEE Specification : technetwork/ java/javaee/tech/index.html [17] JMS Provider : Java_Meage_Service [18] EJB: Enterprie_JavaBean [19] Sytem Analyi and Modeling: [20] DJ.Abadi, PA.Boncz, S. Harizopoulo, Column-oriented Databae Sytem, Proc ACM, VLDB 09 [21] SQL:, [22] Robert J. Scholkoff Pattern Recognition: Statitical, Structured, Neural Approache, John Wiley 1992 [23] Jiawei Han, Micheline Kamber,, Data Mining Concept and Technique, Morgan Kaufmann Publiher, 2006 [24] MonetDB: [25] Ravi Kumar Gullapalli, Dr.Chelliah Muthuamy, Dr.A.Vinaya Babu, Deign and Modeling Autonomic aware Software in UML A Control Sytem Solution, ICCIT,July inpre [26] Je Rule Engine, 20

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards I.J. Information Technology and Computer Science, 2013, 07, 1-11 Publihed Online June 2013 in MECS (http://www.mec-pre.org/) DOI: 10.5815/ijitc.2013.07.01 Integration of Independent Application and EAI

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

INSIDE REPUTATION BULLETIN

INSIDE REPUTATION BULLETIN email@inidetory.com.au www.inidetory.com.au +61 (2) 9299 9979 The reputational impact of outourcing overea The global financial crii ha reulted in extra preure on Autralian buinee to tighten their belt.

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible. Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Requirements Engineering Databases: The Good, The Bad, and The Ugly

Requirements Engineering Databases: The Good, The Bad, and The Ugly New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

www.brindleytech.com Insurance Solutions

www.brindleytech.com Insurance Solutions Inurance Solution Agenda 1 2 3 4 5 Buine Value Solution Overview Capabilitie Cutomer Succe Storie Inurance Product in Nut Shell Buine Value Cutomer Buine Value Achieved through Winure Increae Efficiency

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1 Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S

SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S Chinatu Aone, Doug McKee, Sandy Shinn, Hatte Bleje r Sytem Reearch and Application (SRA ) 2000 15th Street North Arlington, VA 2220 1 aonec@ra.com INTRODUCTION

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Combining Supervised and Unsupervised Monitoring for Fault Detection in Distributed Computing Systems

Combining Supervised and Unsupervised Monitoring for Fault Detection in Distributed Computing Systems Combining Supervied and Unupervied Monitoring for Fault Detection in Ditributed Computing Sytem Haifeng Chen Guofei Jiang Critian Ungureanu Kenji Yohihira NEC Laboratorie America, Inc. Independence Way

More information

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006 ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

Cost Models for Selecting Materialized Views in Public Clouds

Cost Models for Selecting Materialized Views in Public Clouds International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

How To Understand The Hort Term Power Market

How To Understand The Hort Term Power Market Short-term allocation of ga network and ga-electricity input forecloure Miguel Vazquez a,, Michelle Hallack b a Economic Intitute (IE), Federal Univerity of Rio de Janeiro (UFRJ) b Economic Department,

More information

Products and Services

Products and Services Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product

More information

Thank you for attending the MDM for the Enterprise Seminar Series!

Thank you for attending the MDM for the Enterprise Seminar Series! Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

Distributed Monitoring and Aggregation in Wireless Sensor Networks

Distributed Monitoring and Aggregation in Wireless Sensor Networks Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu

More information

A Novel Web-Based Student Academic Records Information System

A Novel Web-Based Student Academic Records Information System A Novel Web-Baed Student Record Information Sytem Nmaju Obai, E. O. Nwachukwu, and C. Ugwu Department of Computer Science, Univerity of Port Harcourt, Port Harcourt, River State, Nigeria nmajuobai@yahoo.com,

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing 1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing

More information

January 21, 2015. Abstract

January 21, 2015. Abstract T S U I I E P : T R M -C S J. R January 21, 2015 Abtract Thi paper evaluate the trategic behavior of a monopolit to influence environmental policy, either with taxe or with tandard, comparing two alternative

More information

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation Benchmarking Bottom-Up and Top-Down Strategie for SPARQL-to-SQL Query Tranlation Kahlev a, Chebotko b,c, John Abraham b, Pearl Brazier b, and Shiyong Lu a a Department of Computer Science, Wayne State

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

A COMPARATIVE STUDY OF THREE-PHASE AND SINGLE-PHASE PLL ALGORITHMS FOR GRID-CONNECTED SYSTEMS

A COMPARATIVE STUDY OF THREE-PHASE AND SINGLE-PHASE PLL ALGORITHMS FOR GRID-CONNECTED SYSTEMS A COMPARATIE STUDY OF THREEPHASE AND SINGLEPHASE PLL ALGORITHMS FOR GRIDCONNECTED SYSTEMS Ruben Marco do Santo Filho Centro Federal de Educação Tecnológica CEFETMG Coord. Eletrônica Av. Amazona 553 Belo

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information