A Novel Virtual Machine Placement in Cloud Computing

Size: px
Start display at page:

Download "A Novel Virtual Machine Placement in Cloud Computing"

Transcription

1 Autralia Joural of Baic ad Applied Sciece, 5(10): , 2011 ISSN A Novel Virtual achie Placeet i Cloud Coputig 1 Ela ohaadi, 2 ohaadbager Karii, 3 Saeed aouli Heikalabad 1,2 Techical ad Egieerig Dept., Tabriz Brach, Ilaic Azad Uiverity, Tabriz, Ira. 3 Youg eearcher Club, Tabriz Brach, Ilaic Azad Uiverity, Tabriz, Ira. Abtrac: I thi paper a ovel virtual achie placeet echai for cloud coputig i propoed baed o etwork-aware virtual achie (V). V are widely applied to oder data ceter for cloud coputig a a key techology to realize eergy-efficiet operatio of erver. I uch a ceario, applicatio ad data thereof ca be hoted by variou etworked virtual achie. A applicatio, epecially data-iteive applicatio, ofte eed to couicate with data frequetly, the etwork iput ad output perforace would affect the overall applicatio perforace igificatly. Therefore, placeet of virtual achie which hot a applicatio ad igratio of thee virtual achie while the uexpected etwork latecy or cogetio occur i critical to achieve ad aitai the applicatio perforace. Our paper propoe a virtual achie placeet to iiizig the data trafer tie couptio. The iulatio reult how that the propoed approach i effective i optiizig the data trafer betwee the virtual achie ad data, thu helpig optiize the overall applicatio perforace. Key word: cloud coputig; virtual achie; etwork; placeet. INTODUCTION Cloud coputig (Arbrut et al., 2009) ha recetly received coiderable attetio i both acadeic couity ad idutrial couity a a ew coputig paradig to provide dyaically calable ad virtualized reource a a ervice over the Iteret. By thi ea, uer will be able to acce the reource, uch a applicatio ad data, fro the cloud aywhere ad aytie o dead. Curretly, everal large ifratructure copaie, uch Aazo (2010) Google (2010) Yahoo! (Cooper et al., 2009) icrooft (2010) IB (2010) ad Su, are developig cloud platfor for couer ad eterprie to acce the cloud reource through ervice. Data ceter i traditioal cocept that provide powerful coputig ad torage capacity for crucial area, uch a particle phyic, cietific coputig ad iulatio, earth obervatio ad oil propectig ad o o. A data ceter uually deploy hudred or thouad of blade erver which are deely packed to axiize the pace utilizatio ad aageet efficiecy. A the rapid growth of erver quatity ad cale, the eergy coued by the data ceter, which i directly related to the uber of hoted erver ad their workload, i becoig a great challege. A reported i (aghavedra et al., 2008) the power couptio of worldwide eterprie exceed $30 billio i The rated power couptio of erver have icreaed by 10 tie over the pat te year. What ore, it worth otig that the erver aageet ad aiteace cot ad electricity ad coolig cot i oder data ceter have exceeded the erver equipet cot. Due to the huge eergy cot i data ceter, there i a urget eed of deigig ad deployet of eergy-efficiet techologie for buildig a gree data ceter (Liu et al., 2009) Fortuately, The eergy couptio proble ha already attracted eough attetio (The gree 2010) ay effort have bee ade to iprove the eergy efficiecy of data ceter fro differet apect icludig proceor eergy efficiecy (Brook ad artooi 2001) torage power aageet (Carrera Piheiro ad Biachii 2003) ad etwork power aageet (Nedevchi et al., 2008). ecetly, with the rapid developet of virtualizatio techology, uch a Vware (Waldpurger 2002) Xe (Barha et al., 2003) KV (Kivity 2007) OpeVZ (Opevz 2010) ore ad ore data ceter ue thi techology to build ew geeratio data ceter architecture to upport cloud coputig due to the beefit uch a iprovig reource utilizatio, reducig cot, eaig erver aageet. What ore, erver coolidatio ad live igratio of virtual achie are two crucial ethod to achieve load balacig ad eergy avig. Server coolidatio which allowig ultiple erver ruig i a igle phyical erver iultaeouly i a ai approach to achieve better eergy efficiecy of data ceter. It i becaue i doig o, erver coolidatio allow ore phyical erver to be tured off via live igratig the virtual achie to other uaturated phyical erver. I uch a eviroet, the V that execute a applicatio i placed o a phyical achie i order to ue the local coputatio reource to execute the required tak. At the ae tie, data ca be tored with oe geographical or logical ditace (i.e. Aazo S3 etc) ad thee data are acceible to cloud-baed applicatio (Brook ad artooi 2001) For a data-iteive applicatio i cloud coputig, the requeted data ight be pread i a uber of vatly ditributed data ceter. A a applicatio, epecially a data-iteive applicatio, ofte eed to couicate with related data frequetly, the etwork I/O perforace betwee the data ceter that tore the data ad V that execute the applicatio could affect the perforace of the applicatio Correpodig Author: Ela ohaadi, Techical ad Egieerig Dept., Tabriz Brach, Ilaic Azad Uiverity, Tabriz, Ira E-ail: [email protected] 1549

2 igificatly. Curret V placeet policy aily focue o the effectivee ad efficiecy of the coputig reource utilizatio (Buyya aja ad Calheiro 2009: Tag et al., 2007: Va Tra ad eaud 2009). wherea the etwork apect are largely igored. Thi ight ake a V that execute a applicatio be placed o phyical achie that are far away fro the data ceter that tore the related data. A a reult, the overall applicatio perforace ad the yte overhead would evetually deteriorate due to the cotly data trafer tie betwee the applicatio ad the data torage. Furtherore, the virtualizatio ad proceor harig over phyical achie ofte reult i the itability of the couicatio withi a cloud coputig eviroet. For exaple, the TCP/UDP throughput betwee the all itace i Aazo EC2 varie betwee 1Gb/ ad 0 frequetly (Guohui et al., 2010). The uaticipated etwork cogetio ad latecy place aother challege to optiizig the data trafer tie betwee V ad the related data. Thi reearch addree the above iue ad propoe a policy to place the V with coideratio of the etwork I/O requireet. I additio, a V igratio policy i preeted to deal with the ituatio i which the utable etwork coectio deteriorate the applicatio perforace ad likely to jeopardize the exitig agreeet betwee the cloud ervice provider ad the ed uer. The ret of thi paper i orgaized a follow. I Sectio 2, the related work i dicued. Sectio 3 explai the propoed etwork-aware V placeet ad igratio approach. After that, Sectio 4 preet the experietal reult, followed by the cocluio ad future work i Sectio 5. Backgroud Ad otivatio: Variou aageet trategie have bee developed to effectively reduce the power couptio fro differet apect; however they caot be directly applied to today data ceter that rely o virtualizatio techologie. Virtual achie techology ca efficietly aage the erver coolidatio, ad iprove the total power efficiecy i data ceter (Nathuji ad K. Schwa 2007). Uually, coteporary V placeet approache focu o optiizig the efficiecy ad effectivee of coputatio reource utilizatio, allowig V to hare the capacity of coputatio reource o the phyical hot. The V placeet proble i odeled a either the Cotrait Satifactio Proble (CSP) (Va Tra ad eaud 2009) or the Cotrait ultiple Kapack Proble (CKP) (Tag et al., 2007) to axiize the utility of coputig reource. Other approache focu o iiizig the cot of uig coputig reource (Ki ad Elli 2005). Thee approache largely igored the etwork perforace ad it ipact o the overall applicatio perforace. V would be allocated with a o-optiized phyical ditace to the relevat data. Thi would the caue a extra data trafer overhead ad evetually lead to the degradatio of applicatio copletio tie. Thi drawback ake the tatitic ethod baed V allocatio or igratio approache hard to fit a rutie circutace. The optiizatio approach hould be ipleeted o the applicatio that iteract with certai data i a relatively log ter. Yet, if the applicatio couicate with data i a hort tie, the lack of tatitic ay caue thee allocatio or igratio approache iapplicable. Propoed Approache: Proble Stateet: Our proble tateet ca be briefly decribed a follow: 1- phyical achie are available ad their reource capacitie give alog eory, CPU ad Network badwidth dieio. 2- There are N virtual achie to be placed. The requireet of thee virtual achie are give alog the dieio of eory, CPU ad etwork badwidth. 3- We have to fid a appig betwee V ad P that atifie the V reource requireet while iiizig the uber of phyical achie ued. While fidig uch a appig, we have to take care that the total reource requireet of the V placed o a P hould ot exceed it capacity. Alo, we pla to iclude the iforatio of affiity betwee two virtual achie while obtaiig uch a appig. We alo pla to hadle the cae of availability of oly a retricted et of P for a give V for placeet. Sceario: Data ceter that are operated by a cloud ot oly provide a flexible data torage pace (e.g Aazo S3 etc.) but alo upport the uderlyig virtualizatio ifratructure. Thi iovated techology facilitate the uer to requet data torage pace ad coputatio reource to for oe or ore V with arbitrary coputatioal capacity. Figure 1 how the ceario i which uer requet the data torage pace ad V to tore data ad hot applicatio to proce thee data, repectively. I thi ceario, the applicatio requet to acce the related data acro the Iteret or Itraet ad the lik betwee the cloud ight be logical or phyical. 1550

3 Fig. 1: The Studied Sceario. Uder curret V allocatio policy, it ca be ee that the data i tored arbitrarily ad ca be ditributed vatly acro the whole torage cloud or eve over everal torage cloud. The applicatio are allocated by the broker regardle of the data acce tie. Thi will reult i the proble that the applicatio ay acce it related data over a ueceary ditace. To olve thi proble, the propoed V placeet ad igratio approach could be deployed i the hot broker to allocate the V to the phyical achie with a iiized data acce tie. The V placeet Approach: Withi the cotext of cloud coputig, the data for a give applicatio could be ditributed i everal block ad the block could be tored with logical/phyical ditace. Accordig to the tatu of data ditributio, a data ditribute atrix i,j ca be ipleeted a: i, j i 1,1 2,1,1 1,2 2,2 i,2 1, j 2, j i, j Here, the colu uber j repreet the total uber of data which will be acceed by the applicatio ad the row uber repreet the uber of data torage ode. I additio, for each colu of the atrix D i,j each data hould atify the followig relatiohip: i c 1 Size j (1) c, j The etwork peed betwee a phyical achie which hot the V ad a data torage ode i repreeted by fuctio Speed, aely S Data trafer rate, t (2) Here, repreet the ize of the package ad Δt i the package trafer tie lot. Withi a certai tie iterval, the etwork peed could be fluctuated. I additio, the data trafer peed could be differet for differet applicatio. The value of each eleet i atrix S, i the ivere of the Speed(, Δt) betwee the phyical achie ad the data torage ode. Therefore, the atrix S, ca be obtaied a follow: 1551

4 S, 1,1 2,1,1 1,2 2,2,2 1, 2,, Oe of our atrixe are the reource requireet of each virtual achie to be placed. To capture thee requireet alog variou dieio, we defie a requireet atrix a follow: equiree t atrix 1,1 2,1,1 1,2 2,2,2 1, d 2, d, d Where each r ij idicate the requireet of V i alog the dieio j. A aple requireet atrix i how below: I thi atrix, each row correpod to oe virtual achie requireet alog the dieio of CPU, eory ad etwork I/O. For exaple, the firt row pecifie that the correpodig V ue 20% of CPU, 40% of eory ad 30% of etwork capacity of a phyical achie. The data acce tie atrix T,i repreet the data acce tie fro each phyical achie to the related data. The atrix T,i ca be obtaied by followig forula: T, i i, j S,, d (3) Auig that the coputig reource et: C P, (4) Idicate the total coputatio capacity o a phyical achie, where the otatio P repreet the proceor capacity o the phyical achie ad deote the eory capacity o the phyical achie. The et: occupied Vi Vi C P, (5) epreet the coputatio capacity requireet of Vi. Therefore, the available coputig reource et ca be repreeted a: C P, i1, P Pvi (6) vi i1 Where idicate the uber of ruig V. Uig C P, (7) 1552

5 Deote the coputatio capacity requireet of the arrivig V, if the available coputatio reource o the phyical achie atifie P P vi P i1 vi (8) Ad vi i1 vi (9) The the V would be placed o thi phyical achie. For iplicity, we ue C C VArrivig to idicate the relatiohip i (10) ad (11). After the placeet of the arrivig V, the ew available coputatio reource ca be obtaied by the forula: C P P Vi, Vi (10) For α give applicatio _ that requet data d1, d2,, d_, the proce of propoed etwork-aware V placeet algorith ca be deotrated by the followig peudo code: Iput: data torage atrix i,j Iput: etwork tatu atrix S, Iput: etwork tatu atrix, d Iput: a coig applicatio requeted data et 1. Calculatig data trafer tie atrix 2. Travere all of the colu i the atrix T,i to fid the iiu y 1 T x, y & & C C retur x; Allocatig the arrivig V o the hot h x. if (the V i allocated ucceed ) C P P, ed if Vi Vi Experiet: To evaluate the effectivee of the propoed approach, a experiet ha bee deiged ad coducted. The propoed V placeet policy i ipleeted ad teted uig Cloudi 2.0 which upport odelig ad tiulatig oe or ore V o a tiulated data ceter (Arbrut et al., 2009; ). I the experiet, we focued o the average tak copletio tie ad copared our policy with the default V placeet policy adopted by Cloudi 2.0. Beide, the atrix (S, ) i odified i the experiet to tiulate a degradatio of data acce tatu. I the iitial phae of the experiet, 2 file (i.e., data), file1, file2, are tored i 2 torage, torage0 ad torage1. The ize of the file i 6000B, 8000B repectively. Here, file1 i tored i torage0, wherea file2 tored i torage1. We ipleeted oe data ceter, dataceter0, with 2 hot (i.e., phyical achie), hot0, hot1. Each hot ha a fixed coputatio capacity. The coectio peed betwee the hot ad torage are repreeted by a 3x 2 atrix, ad the torage of data i defied by a 2x3 atrix. Baed o the V allocatio policy, we ca calculate a 3x3 data trafer tie atrix. I thi experiet, the data trafer tie i et a: The copario of the average tak copletio tie i two group are how i Figure 2, 3, repectively. It i clear that the propoed approach reulted i horter average tak copletio tie i all two group. I fact, the declie of the average tak copletio tie i caued by the optiized locatio of the hoted V, coparig 1553

6 with two differet V allocatio policie. The reult proved that the propoed etwork aware V allocatio policy ca lead to iproved tak copletio tie. Fig. 2: The eult of Cloudlet equetig file1. Fig. 3: The eult of Cloudlet equetig file2. Cocluio ad Future Work: While the data-iteive applicatio iteract with ditributed data i a cloud coputig eviroet, the etwork tatu betwee the applicatio ad data could ifluece the perforace of the applicatio igificatly. Thu, it i eceary to cotrol the locatio of the V o that the applicatio hoted by the V ca obtai a horter data acce tie. To addre thi iue, thi paper preet a etwork aware V placeet ad igratio approach for data iteive applicatio i cloud coputig eviroet. The propoed approach place the V o phyical achie with coideratio of the etwork coditio betwee the phyical achie ad the data torage. Therefore, it i poible that a hot i perfect for everal requet iultaeouly but the yte would ot be able to chedule all of the tak i the cloud. Thi ay lead to a poibility that oe uer tak alway occupy a fater lik o the etwork. To olve thi iue, it i eceary to exted a payet echai o that the yte ca et priority to the uer accordig to their payet. EFEENCES Aazo elatic copute cloud (ec2), Google app egie, Ib blue cloud project, icrooft 2010 azure cloud platfor, Opevz: Server virtualizatio ope ource project, The gree 500 lit, Arbrut,,. A. Fox,. Griffith, A. Joeph,. Katz, A. Kowiki, G. Lee, D. Pattero, A. abki, I. Stoica, et al., Above the cloud: A berkeley view of cloud coputig, EECS Departet, Uiverity of Califoria, Berkeley, Tech. ep. Barha, P., B. Dragovic, K. Fraer, S. Had, T. Harri, A. Ho,. Neugebauer, I. Pratt, ad A. Warfield, Xe ad the art of virtualizatio, i Proceedig of the ieteeth AC ypoiu o Operatig yte priciple, p: 177. Brook, D. ad. artooi, Dyaic theral aageet for high-perforace icroproceor, i The Seveth Iteratioal Sypoiu o High-Perforace Coputer Architecture, pp:

7 Buyya,.,. aja ad.n. Calheiro, odelig ad iulatio of calable Cloud coputig eviroet ad the CloudSi toolkit: Challege ad opportuitie. High Perforace Coputig & Siulatio, HPCS '09. Iteratioal Coferece o. Carrera, E., E. Piheiro, ad. Biachii, Coervig dik eergy i etwork erver, i Proceedig of the 17th aual iteratioal coferece o Supercoputig, p: 97. Cooper, B., E. Baldechwieler,. Foeca, J. Kitler, P. Naraya, C. Neerdael, T. Negri,. aakriha, A. Silbertei, U. Srivatava, et al., Buildig a Cloud for Yahoo! Data Egieerig, p: 36. Guohui, W. ad T.S.E. NG, The Ipact of Virtualizatio o Network Perforace of Aazo EC2 Data Ceter. INFOCO, Proceedig IEEE. Ki, J.L. ad.d. Elli, A Fraework for Itegratio odel of eource-cotraied Schedulig uig Geetic Algorith. Siulatio Coferece, Proceedig of the Witer, , Orlado, Florida, USA. Kivity, A., Y. Kaay, D. Laor, U. Lubli, ad A. Liguori, kv: the Liux virtual achie oitor, i Proceedig of the Liux Sypoiu, 1: Liu, L., H. Wag, X. Liu, X. Ji, W. He, Q. Wag, ad Y. Che, GreeCloud: a ew architecture for gree data ceter, i Proceedig of the 6th iteratioal coferece idutry eio o Autooic coputig ad couicatio idutry eio, pp: Nathuji,. ad K. Schwa, VirtualPower: coordiated power aageet i virtualized eterprie yte, i Proceedig of twety-firt AC SIGOPS ypoiu o Operatig yte priciple. AC, p: 278. Nedevchi, S., L. Popa, G. Iaaccoe, S. ataay, ad D. Wetherall, educig etwork eergy couptio via leepig ad rate-adaptatio, i Proceedig of the 5 th USENIX Sypoiu o Networked Syte Deig ad Ipleetatio, pp: aghavedra,., P. agaatha, V. Talwar, Z. Wag, ad X. Zhu, No power truggle: Coordiated ulti-level power aageet for the data ceter, AC SIGPLAN Notice, 43(3): Tag, C.,. Steider,. Spreitzer, ad G. Pacifici A Scalable Applicatio Placeet Cotroller for Eterprie Data Ceter. Proceedig of the 16th iteratioal coferece o World Wide Web, , Baff, Alberta, Caada. Va, H.N., F.D. Tra, ad J.. eaud, Autooic Virtual eource aageet for Service Hotig Platfor. Software Egieerig Challege of Cloud Coputig, CLOUD '09. ICSE Workhop o, Vacouver, Caada, 1-8. Waldpurger, C., eory reource aageet i Vware ESX erver, AC SIGOPS Operatig Syte eview, 36:SI, p

Confidence Intervals for Linear Regression Slope

Confidence Intervals for Linear Regression Slope Chapter 856 Cofidece Iterval for Liear Regreio Slope Itroductio Thi routie calculate the ample ize eceary to achieve a pecified ditace from the lope to the cofidece limit at a tated cofidece level for

More information

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay At Coloy Algorith Based Schedulig for Hadlig Software Project Delay Wei Zhag 1,2, Yu Yag 3, Juchao Xiao 4, Xiao Liu 5, Muhaad Ali Babar 6 1 School of Coputer Sciece ad Techology, Ahui Uiversity, Hefei,

More information

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling : A Global -based Redistributio Approach to Accelerate RAID-5 Scalig Chetao Wu ad Xubi He Departet of Electrical & Coputer Egieerig Virgiia Coowealth Uiversity {wuc4,xhe2}@vcu.edu Abstract Uder the severe

More information

Data Layout Optimization for Petascale File Systems

Data Layout Optimization for Petascale File Systems Data Layout Optimizatio for Petacale File Sytem Xia-He Su Illioi Ititute of Techology [email protected] Yog Che Illioi Ititute of Techology [email protected] Yalog Yi Illioi Ititute of Techology [email protected] ABSTRACT

More information

INTEGRATED TRANSFORMER FLEET MANAGEMENT (ITFM) SYSTEM

INTEGRATED TRANSFORMER FLEET MANAGEMENT (ITFM) SYSTEM INTEGRATED TRANSFORMER FLEET MANAGEMENT (ITFM SYSTEM Audrius ILGEVICIUS Maschiefabrik Reihause GbH, [email protected] Alexei BABIZKI Maschiefabrik Reihause GbH [email protected] ABSTRACT The

More information

Article Writing & Marketing: The Best of Both Worlds!

Article Writing & Marketing: The Best of Both Worlds! 2612 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER 213 C-Cell: A Efficiet ad Scalable Network Structure for Data Ceters Hui Cai Logistical Egieerig Uiversity of PLA, Chogqig, Chia Eail: caihui_cool@126co ShegLi

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class A Electroic Tool for Measurig Learig ad Teachig Perforace of a Egieerig Class T.H. Nguye, Ph.D., P.E. Abstract Creatig a egieerig course to eet the predefied learig objectives requires a appropriate ad

More information

How To Calculate Stretch Factor Of Outig I Wireless Network

How To Calculate Stretch Factor Of Outig I Wireless Network Stretch Factor of urveball outig i Wireless Network: ost of Load Balacig Fa Li Yu Wag The Uiversity of North arolia at harlotte, USA Eail: {fli, yu.wag}@ucc.edu Abstract outig i wireless etworks has bee

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Digital Interactive Kanban Advertisement System Using Face Recognition Methodology

Digital Interactive Kanban Advertisement System Using Face Recognition Methodology Coputatioal Water, Eergy, ad Eviroetal Egieerig, 2013, 2, 26-30 doi:10.4236/cweee.2013.23b005 Published Olie July 2013 (http://www.scirp.org/joural/cweee) Digital Iteractive Kaba Advertiseet Syste Usig

More information

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING Joural of Theoretical ad Applied Iforatio Techology 5 th Deceber 202. Vol. 46 No. 2005-202 JATIT & LLS. All rights reserved. ISSN: 992-8645 www.jatit.org E-ISSN: 87-395 GOAL PROGRAMMING BASED MASTER PLAN

More information

MODELS AND METHODS OF RESOURCE MANAGEMENT FOR VPS HOSTING MODELE I METODY ZARZĄDZANIA ZASOBAMI DLA VPS HOSTING

MODELS AND METHODS OF RESOURCE MANAGEMENT FOR VPS HOSTING MODELE I METODY ZARZĄDZANIA ZASOBAMI DLA VPS HOSTING SERGII TELENYK, OLEKSANDR ROLIK, МAKSYM BUKASOV, DMYTRO HALUSHKO MODELS AND METHODS OF RESOURCE MANAGEMENT FOR VPS HOSTING MODELE I METODY ZARZĄDZANIA ZASOBAMI DLA VPS HOSTING Abstract The paper suarizes

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

A Cyclical Nurse Schedule Using Goal Programming

A Cyclical Nurse Schedule Using Goal Programming ITB J. Sci., Vol. 43 A, No. 3, 2011, 151-164 151 A Cyclical Nurse Schedule Usig Goal Prograig Ruzzaiah Jeal 1,*, Wa Rosaira Isail 2, Liog Choog Yeu 3 & Ahed Oughalie 4 1 School of Iforatio Techology, Faculty

More information

CDAS: A Crowdsourcing Data Analytics System

CDAS: A Crowdsourcing Data Analytics System CDAS: A Crowdsourcig Data Aalytics Syste Xua Liu,MeiyuLu, Beg Chi Ooi, Yaya She,SaiWu, Meihui Zhag School of Coputig, Natioal Uiversity of Sigapore, Sigapore College of Coputer Sciece, Zhejiag Uiversity,

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

A virtual life cycle structured platform for building applications

A virtual life cycle structured platform for building applications A virtual life cycle structured platfor for buildig applicatios Petra Both, Niklaus Kohler, Robi Gessa Istitute for Idustrial Buildig Productio, Uiversity of Karlsruhe (TH), Geay ([email protected]) Suary

More information

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability A Supply Chai Gae Theory Fraework for Cybersecurity Ivestets Uder Network Vulerability Aa Nagurey, Ladier S. Nagurey, ad Shivai Shukla I Coputatio, Cryptography, ad Network Security, N.J. Daras ad M.T.

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Distributed Storage Allocations for Optimal Delay

Distributed Storage Allocations for Optimal Delay Distributed Storage Allocatios for Optial Delay Derek Leog Departet of Electrical Egieerig Califoria Istitute of echology Pasadea, Califoria 925, USA derekleog@caltechedu Alexadros G Diakis Departet of

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Three Phase Theory - Professor J R Lucas

Three Phase Theory - Professor J R Lucas Three Phae Theory - Profeor J Luca A you are aware, to tranit power with ingle phae alternating current, we need two wire live wire and neutral. However you would have een that ditribution line uually

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES

SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES Jural Mekaikal Jue 2009, No. 28, 1-15 SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES Chow Ki Paw, Reugath Varatharajoo* Departet of Aerospace Egieerig Uiversiti Putra Malaysia 43400 Serdag,

More information

Optimizing Result Prefetching in Web Search Engines. with Segmented Indices. Extended Abstract. Department of Computer Science.

Optimizing Result Prefetching in Web Search Engines. with Segmented Indices. Extended Abstract. Department of Computer Science. Optiizig Result Prefetchig i Web Search Egies with Segeted Idices Exteded Abstract Roy Lepel Shloo Mora Departet of Coputer Sciece The Techio, Haifa 32000, Israel eail: frlepel,[email protected] Abstract

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Desktop Management. Desktop Management Tools

Desktop Management. Desktop Management Tools Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig

More information

Comparative Analysis of Round Robin VM Load Balancing With Modified Round Robin VM Load Balancing Algorithms in Cloud Computing

Comparative Analysis of Round Robin VM Load Balancing With Modified Round Robin VM Load Balancing Algorithms in Cloud Computing Iteratioal Joural of Egieerig, Maagemet & Scieces (IJEMS) Comparative Aalysis of Roud Robi Balacig With Modified Roud Robi Balacig s i Cloud Computig Areeba Samee, D.K Budhwat Abstract Cloud computig is

More information

Combined make-to-order/make-to-stock supply chains

Combined make-to-order/make-to-stock supply chains IIE Tranaction 2009 41, 103 119 Copyright C IIE ISSN: 0740-817X print / 1545-8830 online DOI: 10.1080/07408170801975065 Cobined ake-to-order/ake-to-tock upply chain PHILIP KAMINSKY 1, and ONUR KAYA 2 1

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

CHAPTER 4: NET PRESENT VALUE

CHAPTER 4: NET PRESENT VALUE EMBA 807 Corporate Fiace Dr. Rodey Boehe CHAPTER 4: NET PRESENT VALUE (Assiged probles are, 2, 7, 8,, 6, 23, 25, 28, 29, 3, 33, 36, 4, 42, 46, 50, ad 52) The title of this chapter ay be Net Preset Value,

More information

GIS and analytic hierarchy process for land evaluation

GIS and analytic hierarchy process for land evaluation GIS ad aalytic hierarchy process for lad evaluatio Dr. Le Cah DINH Sub-Natioal Istitute of Agricultural Plaig ad Proectio Vieta [email protected] Assoc. Prof. Dr. Tra Trog DUC Vieta Natioal Uiversity -

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

3D BUILDING MODEL RECONSTRUCTION FROM POINT CLOUDS AND GROUND PLANS

3D BUILDING MODEL RECONSTRUCTION FROM POINT CLOUDS AND GROUND PLANS 3D BUILDING MODEL RECONSTRUCTION FROM POINT CLOUDS AND GROUND PLANS George Voelma ad Sader Dijkma Departmet of Geodey Delft Uiverity of Techology The Netherlad [email protected] KEY WORDS: Buildig

More information

TI-83, TI-83 Plus or TI-84 for Non-Business Statistics

TI-83, TI-83 Plus or TI-84 for Non-Business Statistics TI-83, TI-83 Plu or TI-84 for No-Buie Statitic Chapter 3 Eterig Data Pre [STAT] the firt optio i already highlighted (:Edit) o you ca either pre [ENTER] or. Make ure the curor i i the lit, ot o the lit

More information

Topic 5: Confidence Intervals (Chapter 9)

Topic 5: Confidence Intervals (Chapter 9) Topic 5: Cofidece Iterval (Chapter 9) 1. Itroductio The two geeral area of tatitical iferece are: 1) etimatio of parameter(), ch. 9 ) hypothei tetig of parameter(), ch. 10 Let X be ome radom variable with

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Republic of Korea KOREA INFORMATIZED

Republic of Korea KOREA INFORMATIZED Republic of Korea KOREA INFORMATIZED progress ad status overview 21 Progress ad Achieveet ICT service users / subscribers Lauch of ICT service Plas for atioal iforatizatio Plas for ICT ifrastructure 1999

More information

TI-89, TI-92 Plus or Voyage 200 for Non-Business Statistics

TI-89, TI-92 Plus or Voyage 200 for Non-Business Statistics Chapter 3 TI-89, TI-9 Plu or Voyage 00 for No-Buie Statitic Eterig Data Pre [APPS], elect FlahApp the pre [ENTER]. Highlight Stat/Lit Editor the pre [ENTER]. Pre [ENTER] agai to elect the mai folder. (Note:

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Ladar-Based Detection and Tracking of Moving Objects from a Ground Vehicle at High Speeds

Ladar-Based Detection and Tracking of Moving Objects from a Ground Vehicle at High Speeds Ladar-aed Detection and Tracing of Moving Object fro a Ground Vehicle at High Speed Chieh-Chih Wang, Charle Thorpe and rne Suppe Robotic Intitute Carnegie Mellon niverity Pittburgh, P, 15213S Eail: {bobwang,

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding

More information

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement roceedigs of the 2014 Iteratioal oferece o Idustrial Egieerig ad Oeratios Maageet Bali, Idoesia, Jauary 7 9, 2014 Suly hai Network Desig with referetial ariff uder Ecooic artershi greeet eichi Fuaki Yokohaa

More information

The Binomial Multi- Section Transformer

The Binomial Multi- Section Transformer 4/15/21 The Bioial Multisectio Matchig Trasforer.doc 1/17 The Bioial Multi- Sectio Trasforer Recall that a ulti-sectio atchig etwork ca be described usig the theory of sall reflectios as: where: Γ ( ω

More information

CCH Accountants Starter Pack

CCH Accountants Starter Pack CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

The Wider Role and Benefits of Investors in People

The Wider Role and Benefits of Investors in People RESEARCH The Wider Role ad Beefit of Ivetor i People Mark Cox ad Rod Spire PACEC Reearch Report RR360 Reearch Report No 360 The Wider Role ad Beefit of Ivetor i People Mark Cox ad Rod Spire PACEC The view

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

THE PRINCIPLE OF THE ACTIVE JMC SCATTERER. Seppo Uosukainen

THE PRINCIPLE OF THE ACTIVE JMC SCATTERER. Seppo Uosukainen THE PRINCIPLE OF THE ACTIVE JC SCATTERER Seppo Uoukaie VTT Buildig ad Tapot Ai Hadlig Techology ad Acoutic P. O. Bo 1803, FIN 02044 VTT, Filad [email protected] ABSTRACT The piciple of fomulatig the

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Impacts of the Collocation Window on the Accuracy of Altimeter/Buoy Wind Speed Comparison A Simulation Study. Ge Chen 1,2

Impacts of the Collocation Window on the Accuracy of Altimeter/Buoy Wind Speed Comparison A Simulation Study. Ge Chen 1,2 Ge Che Ipacts of the Collocatio Widow o the ccuracy of ltieter/uoy Wid Speed Copariso Siulatio Study Ge Che, Ocea Reote Sesig Istitute, Ocea Uiversity of Qigdao 5 Yusha Road, Qigdao 66003, Chia E-ail:

More information

the product of the hook-lengths is over all boxes of the diagram. We denote by d (n) the number of semi-standard tableaux:

the product of the hook-lengths is over all boxes of the diagram. We denote by d (n) the number of semi-standard tableaux: O Represetatio Theory i Coputer Visio Probles Ao Shashua School of Coputer Sciece ad Egieerig Hebrew Uiversity of Jerusale Jerusale 91904, Israel eail: [email protected] Roy Meshula Departet of Matheatics

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised

More information

Patentability of Computer Software and Business Methods

Patentability of Computer Software and Business Methods WIPO-MOST Itermediate Traiig Course o Practical Itellectual Property Issues i Busiess November 10 to 14, 2003 Patetability of Computer Software ad Busiess Methods Tomoko Miyamoto Patet Law Sectio Patet

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

A Balanced Scorecard

A Balanced Scorecard A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao [email protected] amih Abdul-Nabi

More information

Market Effects of Changes in Consumers Social. Responsibility

Market Effects of Changes in Consumers Social. Responsibility Market Effect of Chage i Couer Social Reoibility Aurora García-Gallego * LEE ad Ecooic Det., Uiveritat Jaue I (Catelló-Sai Nikolao Georgatzí LEE/LINEEX ad Ecooic Det., Uiveritat Jaue I (Catelló-Sai Abtract

More information

Towards Efficient Load Balancing and Green it Mechanisms in Cloud Environment

Towards Efficient Load Balancing and Green it Mechanisms in Cloud Environment World Applied Scieces Joural 29 (Data Miig ad Soft Computig Techiques): 159-165, 2014 ISSN 1818-4952 IDOSI Publicatios, 2014 DOI: 10.5829/idosi.wasj.2014.29.dmsct.30 Towards Efficiet Load Balacig ad Gree

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand [email protected]

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service [email protected] www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

BENEFIT-COST ANALYSIS Financial and Economic Appraisal using Spreadsheets

BENEFIT-COST ANALYSIS Financial and Economic Appraisal using Spreadsheets BENEIT-CST ANALYSIS iacial ad Ecoomic Appraisal usig Spreadsheets Ch. 2: Ivestmet Appraisal - Priciples Harry Campbell & Richard Brow School of Ecoomics The Uiversity of Queeslad Review of basic cocepts

More information

How to use what you OWN to reduce what you OWE

How to use what you OWN to reduce what you OWE How to use what you OWN to reduce what you OWE Maulife Oe A Overview Most Caadias maage their fiaces by doig two thigs: 1. Depositig their icome ad other short-term assets ito chequig ad savigs accouts.

More information

Controller Area Network (CAN) Schedulability Analysis with FIFO queues

Controller Area Network (CAN) Schedulability Analysis with FIFO queues Cotroller Area Network (CAN) Schedulability Aalysis with FIFO queues Robert I. Davis Real-Tie Systes Research Group, Departet of Coputer Sciece, Uiversity of York, YO10 5DD, York, UK [email protected]

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n [email protected]. 30 Day FREE Trial. IT Support from 8p/user

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our

More information

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony , March 12-14, 2014, Hog Kog Virtual Machie Schedulig Maagemet o Cloud Computig Usig Artificial Bee Coloy B. Kruekaew ad W. Kimpa Abstract Resource schedulig maagemet desig o Cloud computig is a importat

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Ekkehart Schlicht: Economic Surplus and Derived Demand

Ekkehart Schlicht: Economic Surplus and Derived Demand Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information