High Availability Replication Strategy for Deduplication Storage System

Size: px
Start display at page:

Download "High Availability Replication Strategy for Deduplication Storage System"

Transcription

1 Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, Abstact As the amount of digital data gowing explosively, data deduplication becomes an attactive technique to conseve the stoage and netwok equiements fo the mass stoage systems. Howeve, data deduplication achieves data compession at the cost of eo esilience. A high availability data eplication stategy is poposed to impove data availability fo the deduplication stoage systems. Fistly, data availability optimization model is poposed to calculate the optimal eplication degees fo the individual data object. Then seveal acceleation techniques ae poposed to educe the computational cost of the model and make the poposed scheme feasible and effective. Lastly, the evaluation expements demonstated the poposed stategy has impoved the data availability significantly fo the deduplication stoage systems.. Intoduction Keywods: Deduplication, Data Availability, Stoage System As the volume of stoed digital data expanding explosively, stoage systems confont challenges to stoe and manage the massive digital data in an efficient way. By the yea of 00, the amount of digital infomation will be 44 times as lage as it was in 009. [] To meet the exponentially inceasing stoage equiement, the deduplication technology povides a solution to the stoage efficiency issues fo moden stoage systems. The stoed data in the stoage systems contains plenty of duplicates: identical files o sub-file egions, and obviously, eliminating the duplicates in stoed data can educe the stoage space ovehead and impove the stoage efficiency. The deduplication technology is a specialized data compession technique to impove stoage and netwok utilization. The stoage system divides the data into non-intesecting chunks o stoage objects and assigns the digital fingepnts by the cyptogaphic hash function, typically SHA o MD5, befoe stong the data on the physical media. Consequently, the chunks o stoage objects which thei contents ae identical ae supposed to shae the same digital fingepnt, and then the duplicated chunks o stoage objects can be detected and eliminated easily. Howeve, the deduplication stoage system achieves stoage space savings at the cost of data availability. The client data is divided into chunks dung the deduplication pocessing, and the duplicate data chunks just stoe one copy. Since a data chunk can be shae by many files o clients, the loss of a single data chunk will possibly bng much moe loss of client data than the case befoe the deduplication pocessing. Theefoe, the diffeent data chunks have diffeent influences on the availability and integality of the total data set. Specifically, the data chunks with a highe commonality tend to have moe influences on the total data set. In this pape, ou objective is to achieve an optimum level of data availability at minimum stoage space ovehead. We ague that it is an efficient method to impove the oveall data availability by exploiting the statistical chaactestic of the commonality of the data chunks in the deduplication stoage system. To achieve this, we build a data availability optimization model in the context of the deduplication stoage system. And we poposed some acceleation techniques to impove the feasibility and efficiency of the poposed scheme. The emainde of this pape is oganized as follows. The next section discusses the motivation fo ou eseach. Section 3 poposes a novel eplication scheme fo the deduplication stoage systems. Then, section 4 poposes some acceleation techniques to impove the feasibility and efficiency of the poposed scheme. The section 5 pesents the expemental methodology, datasets and discusses the expemental esults. Section 6 povides some elated woks. Section 7 concludes the pape. Advances in infomation Sciences and Sevice Sciences(AISS) Volume4, umbe8, May 0 doi: 0.456/AISS.vol4.issue8.5 5

2 . Motivation The deduplication technology helps the stoage system to incease stoage utilization by eliminating data edundancy. As the duplicates in data ae eliminated, the stoage systems have educed the actual stoage capacity demands, and the eduction of the TCO (Total cost of owneship) of stoage infastuctue becomes the immediate benefit. Howeve, the deduplication technology achieves high stoage space efficiency at the cost of data availability. The issue of data availability becomes moe inteesting when the taget datasets pefomed deduplication pocessing. The duplicate data chunks can be detected by thei fingepnts and only stoe one copy on the physical media. Thus the data chunks actually eoganized in a patially ovelap way. Obviously, the loss of a data chunk may bng dispopotionately lage client data o files unavailability. In othe wod, the moe files ae efeed to a specific data chunk; the moe loss bngs to the total dataset if the data chunk is unavailable. The figue illustates the poblem. Chunks Chunks Refeences A 3 File A B C B File D A B C A E F D File 3 E F Deduplication Figue. Illustation of elationship between files and data chunks in deduplication stoage systems As shown in the Figue, File, File and File 3 ae divided into chunks which ae ecoded with capital lettes A to F. Afte the deduplication pocess, the data chunks ae stoed on the physical stoage media. If the data chunk A is lost, all the thee files ae unavailable. Similaly if the data chunk C is lost, only the File is unavailable. Thus, the data chunks ae not equally valuable in the tems of data availability. Theefoe, we conside finding a way to impove the oveall availability of the datasets stoed in a deduplication stoage system by exploiting the commonality of data chunks. 3. A novel data eplication scheme As the failue is inevitable, data eplication is the common solution to impove availability is to keep the data edundant. The poposed scheme aims at maximizing data availability at minimal stoage space ovehead by calculating the optimal eplicated degee fo evey individual data object in deduplication stoage system. The poposed scheme is suitable fo both file-level deduplication and chunk-level deduplication. The basic deduplication units, files fo file-level mode and chunks fo chunk-level mode, ae efeed to as stoage object in the pape. The poposed scheme assumes that stoage node failues ae independent and identical distbuted. The eplicas ae stoed in a distbuted stoage systems andomly, and no two same eplicas ae stoed in the same stoage node. All the stoage nodes ae supposed to shae the same availability distbution, which implies that the expected availability of a stoage node is a constant in the model. Moeove, the failue event occus on a stoage node independently and andomly, hence the binomial distbution can be employed to detemine the pobability of obtaining exactly i available stoage nodes in all the stoage nodes which a specific data object ae stoed on. This model only consides the conventional eplication case; hence the data object is available if at least one eplica can be accessed. The availability function fo an individual data object can be given as follows: A k C i 0 k i k i ( ) i () whee μ is the availability of a stoage node and k is the numbe of eplicas. The availability function can be used to calculate the availability of an individual data object in the distbuted stoage system by giving the eplication degee k. 6

3 In a deduplication stoage system, a data object is pobably shaed by a numbe of files o diffeent client due to deduplication pocessing. Accoding to the analysis above, the data objects ae not equally valuable in tem of the availability of data set. A lost data object with a highe commonality causes moe data lost than the one with a lowe commonality. In ode to evaluate the value of a data object in deduplication stoage system, we define a cost function as follows: () P (k ) ( A ) whee the total numbe of files and the numbe of efeences ae denoted by and espectively; the facto (-A) is the pobability the data object with k eplicas ae unavailable, and the facto / is the weight based on the data object commonality in the data set. Theefoe, the cost function fo the data set can be given as follows: (3) P ( k, k k ) i ( A i ) The individual data object size is given and denoted by s, hence the total stoage space ovehead S can be computed as follows: S k i si (4) Then, the poblem is how to find the value of k fo each data object to minimize the cost function by given a toleant stoage space ovehead. Fo this pupose, we employ the Lagangian multiplie method to deve the solution of the poblem. Fistly, the maximum value of S is given and denoted by Smax. Then, one Lagange multiplie λ is intoduced, and the Lagange function is constucted to incopoate the cost function and the constaint condition togethe as follows: (5) ( k, k k, ) i ( Ai ) ( k i si S max ) i ( ) ki ( k i si S max ) The ctical point of Λ is obtained when its gadient is equal to 0. + equations ae obtained as follows: k k ( ) ln( ) s 0 k k ( ) ln( ) s 0 k i si S max 0 As above, fo the vey k in (6), the following equations can be satisfied si ( ) k i ln ( ) k i lo g Let L ( ) lo g ln ( ) (6) (7) si lo g ln ( ) (8) Applying (8) to the constaint condition in (6), we have the following equation: s S m ax s i k i s i ( L ( ) lo g i ) The oginal total stoage space ovehead is denoted by Sog. Sog can be computed as follows: S og s i (9) (0) Combining (9) to (0), we can obtain the following equation to calculate L ( ) : 7

4 L ( ) S max S og s i log si () S og Applying () to (7), we obtain the solution of k, k i log si S max S og s log i si () S og Accoding to the equation (), the solution of k consists of thee pats. The fist pat is log-usi/, which depends on the popeties of the data object i. (the value ofμis egaded as a constant in the model as mentioned above) The second pat Smax/Sog is the edundancy degee which indicates the stoage space ovehead fo the eplication elative to the oginal stoage space ovehead. The value of this pat is egaded as a constant when the constaint condition in (6) is detemined. The thid pat depends on the popeties of the tageted dataset. The influence of the popeties of an individual data object to the value of the thid pat is consideably small, thus, it can be egaded as a constant when calculating k fo an individual data object. Both the cost function (3) and the constaint condition in (5) ae stctly convex. Theefoe, the solution is globally minimal since a local ctical point of a stctly convex function is also its global minimal point. 4. Acceleation techniques The optimization model can obtain the set of optimal eplication degees fo each data object theoetically, howeve, this model meet some challenges to be employed by actual systems fo some easons. Due to the lage scale of the dataset in an actual stoage system, the model can impose a heavy buden to the system computational equiement. If the computational complexity is not impoved, the negative effects on system pefomance can make the model impactical in many applications. In ode to elieve computational buden fo implementation of the model, we popose two techniques below. 4.. Sample-based leaning algothm The pupose of the sample-based leaning algothm is to educe computational buden by exploiting statistical chaactestics of the data objects. Accoding to the equation (), the value of the thid pat depends on the statistical chaactestics of the tageted data set. In othe wod, the value can be egad as a constant, if the distbution of object size and efeence is stationay. Based on the obsevation, ou idea is to sample a sufficient subset fom the tageted dataset to apply the model instead of the whole dataset. The othe data objects can estimate thei optimal eplication degees by empical data. Because only the sample dataset is applied to the model, the poposed algothm can obtain optimal eplication degees fo each data object at much lowe computational cost. Choosing a pope subset fom the taget dataset is impotant to the poposed algothm. The pope subset must be a epesentative subset which shaes the same statistical distbution with the entie data set. Specifically, the empical distbutions of the object size and the efeence ae obtained fom the subset must appoximate the tue distbutions of entie data set adequately, o else the excessive sampling eos can lead to the inaccuate esults eventually. To educe the sampling eos, the sample method employed by the poposed algothm must satisfy two equiements. Fistly, the samples must be chosen andomly and independently, ensued that the empical distbution conveges unifomly to the tue distbution. Secondly, the sample size must be sufficient in ode to educe the sample eos. In the deduplication stoage system, the data is divided into data objects which ae assigned the IDs by hash functions. Because the employed hash functions ae pseudo andom numbe geneatos, the object IDs ae mapped to addess ange unifomly. Theefoe, the andom and independent sample can be implemented easily by pefix-based ID sampling method. The object ID which is a hash key geneated by hash function can be viewed as fixed-size stngs of bits in the space coveng all possible combinations of such stngs. A pefix can be used to select a sample zone. If the object ID is a -bit key, then a given M-bit pefix ( M<) 8

5 p p pm (whee p denotes a specific bit )is used to detemine the sample zone whee all the object ID stating with this pefix, i.e. of the fom p p pm bm bm b whee b denotes a vaable bit. The pefix-based ID sampling method has two advantages. Fistly, since the object ID follows the unifom distbution, the method is efficient and simple. Secondly, most distbuted stoage systems also employed the pefix-based method to distbute the data objects, hence this method make the poposed algothm moe feasible and scalable. To detemine a pope sample size, we poposed an eo contol method. Accoding to the equation (), only the thid pat depends on the statistical distbution of the data set. Hence, we define an obseved paamete T as follows: n s s i log i (3) T ( n ) n si whee the sample size is denoted by n. As the n gows lage, the value of T conveges to the T(), whee is the total numbe of data objects in the data set. Ou goal is to obtain appoximate value of T() unde a toleate eo. We poposed a heustic algothm to find the pope appoximate value of T() by an optimal sample size. The poposed algothm estimates the value of T() by the moving aveage and vaance analysis in a successive appoximation appoach. Figue. The Flowchat of the poposed heustic method Figue shows the flowchat of the poposed method. The method is summazed as follows: Step : Initialize the paametes. The initial sample size and the step size ae given and denoted by n0 and m espectively; hence, the ith sample size is ni=n0+m*i. Step : The size of moving aveage window is denoted by w. T(ni) ae calculated by (3). Step 3: Calculating the simple moving aveage of the subset T(n0),T(n) T(nw-) by fomula as follows: w MA T (n i ) (4) w Step 4: Calculating vaance by fomula as follows and compaed with theshold K w [T ( n i ) MA ] (5) w If is less than K, the optimal sample size is set to nw- and the appoximate value of T() is set to T(nw-). Othewise n0 is incemented by n0 = n0+m and the new T(nw-) is calculated by (3), then go 9

6 to the step 3 and the MA and is calculated epeatedly. The poposed heustic method impoves the scalability and feasibility of the optimization model significantly. 4.. Fast decision table The fast decision table is anothe method to educe computational buden of the optimization model. Afte the statistical chaactestics of the tageted data set is obtained by sample-based leaning algothm, othe data objects in tageted dataset estimate thei optimal eplication degees by the equation (). Accoding to analysis above, only the fist pat in the equation () is an individual deviation pat, thus the fomula used to calculate optimal eplication degees can be wtten as follows: s K ( s, ) log C (6) whee C is a constant. Since the amount of data objects is vey lage, calculating the optimal eplication degees fo evey data objects is still a heavy computing task. To educe the computational complexity futhe, we poposed an optimized method which applies a fast decision table to lookup the optimal eplication degee instead of calculating diectly by the equation (). The poposed method has the advantage ove the calculating method. Due to the computational complexity of the logathm calculation fo the equation (), the fast decision table can achieve the same accuacy by lookup opeations at a lowe computational cost. In addition, the calculating method can bng in the ound-off eos and epesentation eos to the intemediate esults easily, which can accumulate in the ill-conditioned case and make the esult meaningless. To establish the fast decision table efficiently, the poposed method must satisfy two equiements. Fistly, the table ought to achieve adequate accuacy in value estimation. Secondly, the size of the table ought to be small enough in the context of lage-scale dataset, so that the stoage system can affod the stoage ovehead of the table and the computational cost of lookup opeations. Actually, the fast decision table is a feasible and efficient method. On the one hand, since only the conventional eplication is consideed fo data edundancy scheme, the feasible solutions of the optimal eplication degees ae intege. The efeed calculations in the model employ float point calculation and the ound-off opeation can achieve adequate accuacy easily. On the othe hand, the fomula (6) is monotonic fo both the individual data object size s and the numbe of efeences, which facilitates the ceation of the fast decision table. The poposed method does the following steps to establish the fast decision table: Step : Set the ange of the final solutions. The lowe bound of the solution is theoetically. And an uppe bound is given by U accoding to the system equiements. Obviously, the final solution is a intege in the ange of [,U]. Step : Calculate the coesponding value of s/ fo evey possible solution by the invese function of (6). The fomula can be wtten as follows: s (, ) ( ) K s C (7) Step 3: Choose a subset R fom value ange of by a binay logathmic scale. Hence the subset of is {,,4,8. }. The maximum of is in the ange of [ -, ]. Step 4: Calculate the coesponding value of s by given and s/; and establish the fast decision table. Step 5: Mege adjacent inteval of and s which shae the same eplication degee. The method to establish the table is pesented above. In addition, the method can be optimized futhe by exploiting the statistical distbution of the and s. Since the optimization depends on the intnsic popety of the data-set itself, we do not discuss this issue in detail hee. 5. Evaluation In ode to evaluate the feasibility and effectiveness of the poposed scheme, we built a simulato that allows us to expement with some impotant paametes. The simulato can pefom both file level and chunk level deduplication on taget data sets. The simulato applies the SHA- algothm to geneate the data object IDs and goup them in the pefix-based method. In the expements, the goups 0

7 of data objects ae supposed to be diffeent stoage nodes and the goup IDs ae set to the coesponding pefix. The simulato can eplicate the data object in successive goups, fo instance, if the data object t with eplication degee n is distbuted in goup G, the simulato eplicates it fom the goup G+ to goup G+n-. We apply the simulato to two ealistic data sets in the expements. The fist data set was collected all the document files in the pdf, doc, txt fomats and the media files in mp3, avi, mkv and mbv fomats fom the desktop PCs of 30 gaduate students in ou eseach team. Thee ae 00,83 files which amount to a total of.86tb data in the data set. The second data set was collected fom the backups of souce code ove the couse of two yeas in the lab. The backup policy is to do full backups if a new vesion is developed. Thee ae.7 million files which amount to a total of data in the data set. The fist data set was employed to the simulato in file-level depduplication mode and then pefomed the poposed scheme. Fo the compason, the unifom eplication method which all the data objects shaed the same eplication degee was also pefomed on the data set. Figue. The ate of available files compason in file depduplication mode Fo evaluating the effectiveness of the poposed scheme, we compae the ate of available files unde the same numbe of lost stoage nodes. The edundancy degee R is set to o 3 in the expements. In the figue, the vetical axis epesents the aveage client file lost ate and the hozontal axis epesents the numbe of unavailable stoage nodes. Fo a specific numbe of unavailable stoage nodes, thee can be seveal possible combinations. In the expement, the total numbe of the stoage nodes was set to 8 and all the possible combinations of lost nodes enumeated exhaustedly and the aveage client file lost ates ae summazed by athmetic means. (fo evey possible combination ae equally pobable.) As shown in the figue, the aveage client file lost ates fo the poposed scheme is lowe than the ate fo the unifom eplication in most case. Howeve since the eplication degees of some files fo the poposed scheme ae less than the edundancy degee R, the aveage client file lost ates fo the poposed scheme ae a bit highe than the lost ates fo the unifom eplication when the numbe of unavailable stoage nodes is less than R. In the expement, we measue the actual stoage ovehead fo both eplication schemes. Table compaes the actual stoage ovehead (afte deduplicaton pocess) fo the two eplication schemes unde diffeent edundancy degees. The data in the table shows the space ovehead of two schemes have toleated diffeence. Table. The actual stoage ovehead fo the two eplication schemes Redundancy degee The poposed scheme The unifom eplication Δ ΔRate 05.00% 05.8% 04.07% The second data set was employed to the simulato in chunk-level deduplication mode and then pefomed the poposed scheme. Similaly, fo the compason, the unifom eplication method was also pefomed on the data set fo the compason.

8 Figue 3. The ate of available files compason in chunk-level depduplication mode In the figue 3, the vetical axis epesents the aveage file lost ate and the hozontal axis epesents the numbe of unavailable stoage nodes. Since the file is split into many chunks fo deduplication pocessing, one chunk lost can cause the whole file useless. Theefoe, the file availability in chunk-level deduplication is moe vulneable. In the expement, the total numbe of the stoage nodes was set to 56, and in ode to educe the computation cost and make the expement feasible, we chose 00 possible combinations andomly fo evey lost node numbe and summazed the file lost ates by athmetic means. As shown in the figue 3, the file lost ates fo the poposed scheme is lowe than the ate fo the unifom eplication in most case. Table below compaes the actual stoage ovehead fo the two eplication schemes unde diffeent edundancy degees. The data in the table shows the space ovehead of two schemes have toleated diffeence. Table. The actual stoage ovehead fo the two eplication schemes Redundancy degee The poposed scheme The unifom eplication Δ ΔRate 03.% 03.5% 0.97% Expemental esults above show that the poposed scheme can impove the data availability at the simila stoage ovehead unde both the file-level deduplication mode and chunk-level deduplication mode. 6. Related woks As data have been gowing explosively, the data deduplication technology widely employed in the moden stoage systems. A numbe of solutions have been poposed and developed in both industy and academia. Venti[] is a content-addessable netwok stoage system. Venti povides inheent integty checking mechanism fo the data couption detection and employs RAID to impove the data eliability. HYDRAsto[3] is a moe ecent commecial implementation of a content addessable stoage deliveng global deduplication. HYDRAsto impoves the data eliability by employing the geneal eplication and easue coding methods. All the data in the two systems shae the same data edundancy scheme simply egadless of the popeties of data itself. Deep stoe[4] is also a block-level stoage system fo achival data, which employs a vitual content addessable stoage with multiple methods fo inte-file and inta-file compession. The pape [4] discussed side effects of data compession on data eliability which is vey simila to ou eseach, and poposed a eplication scheme based on chunk weight. In the pape [5], a high eliability povision mechanism fo lage-scale deduplication achival stoage systems is poposed. It packs vaable length data chunks into fixed sized objects, and exploits ECC codes to encode the objects and distbutes them among the stoage nodes in a edundancy goup. Howeve, without a theoetical model, the eplication scheme mentioned in the [4] and [5]

9 cannot obtain the optimal eplication degee fo evey individual data chunk. The pape [6] has outlined a few eliability analysis poblems that ase fom the deduplication of a easue-coded key-value stoe. Howeve, they have not discussed the solutions in detail. Besides, thee ae seveal othe studies have investigated on deduplication techniques in the academia. Some of them focus on fast duplicate data detection techniques[7], some of them focus on paallel deduplication pocessing[8][9], and some othes focus on content defined chunking techniques[0] []. But most of them ignoed the data availability issues in deduplication stoage and leave the poblem to the opeation systems o hadwae simply. Unlike the mentioned elated woks above, we focus on the data availability issues in deduplication stoage systems and popose the optimized schemes by exploiting the popeties of data itself. Analyzed both data compession and data edundancy synthetically, the poposed scheme aims to achieve high data availability at the least stoage ovehead. 7. Conclusion A data availability optimization model in the context of deduplication stoage system is pesented in this pape. The novel eplication scheme based on the model is poposed to the oveall data availability by exploiting the statistical chaactestic of the data object commonality fo the deduplication stoage system. In ode to make the scheme moe feasible, seveal fast algothms ae poposed to elieve computational buden of the poposed scheme. To vefy the feasibility and effectiveness of the poposed scheme, we pefomed the evaluation expements and the expemental esult shows that the data availability has significantly impoved by ou poposed stategy. 8. Refeences [] "The Digital Univese Decade Ae You Ready?" IDC white pape, May 00. [] Sean Quinlan, Sean Dowad. "Venti: a new appoach to achival stoage", In Poceedings of the st USEIX confeence on File and Stoage Technologies, pp.89-0, 00. [3] Cezay Dubnicki, Leszek Gyz, Lukasz Heldt, Michal Kaczmaczyk, Wojciech Kilian, Pzemyslaw Stzelczak, Jezy Szczepkowski, Cstian Ungueanu, Michal Welnicki, "HYDRAsto: a Scalable Seconday Stoage", in Poceedings of the 7th USEIX Confeence on File and Stoage Technologies, pp.97-0, 009. [4] Deepavali Bhagwat, Kstal Pollack, Daell D. E. Long, Thomas Schwaz, Ethan L. Mille, "Poviding High Reliability in a Minimum Redundancy Achival Stoage System", in Poceedings of the 4th IEEE Intenational Symposium on Modeling, Analysis, and Simulation of Compute and Telecommunication Systems, pp. 43-4, 006. [5] Chuanyi Liu, Yu Gu, Linchun Sun, Bin Yan, Dongsheng Wang, "R-ADMAD: High eliability povision fo lage-scale de-duplication achival stoage systems", In Poceedings of the 3d intenational confeence on Supecomputing, pp , 009. [6] Xiaozhou Li, Mak Lillibdge, "Reliability Analysis of Deduplicated and Easue-Coded Stoage", ACM SIGMETRICS Pefomance Evaluation Review, vol.38, no.3, pp.4-9, 0. [7] Benjamin Zhu, Kai Li, Hugo Patteson, "Avoiding the Disk Bottleneck in the Data Domain Deduplication File System", In Poceedings of the 6th USEIX Confeence on File and Stoage Technologies, pp. 69-8, 008. [8] Wei Dong, Fed Douglis, Kai Li, Hugo Patteson, Sazzala Reddy, Philip Shilane, "Tadeoffs in scalable data outing fo deduplication clustes", In Poceedings of the 9th USEIX Confeence on File and Stoage Technology, pp.5-9, 0. [9] Yujuan Tan, Dan Feng, Fangting Huang, Zhichao Yan, "SORT: A Similaty-Owneship Based Routing Scheme to Impove Data Read Pefomance fo Deduplication Clustes", IJACT, Vol. 3, o. 9, pp , 0 [0] Ek Kuus, Cstian Ungueanu, Cezay Dubnicki, "Bimodal content defined chunking fo backup steams", In Poceedings of the 8th Confeence on File and Stoage Technologies, pp. 8-3, 00. [] Jiansheng Wei, Ke Zhou, Lei Tian, Hua Wang, Dan Feng, "A Fast Dual-level Fingepnting Scheme fo Data Deduplication", JDCTA, Vol. 6, o., pp. 7-8, 0 3

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

Supporting Efficient Top-k Queries in Type-Ahead Search

Supporting Efficient Top-k Queries in Type-Ahead Search Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

Multiband Microstrip Patch Antenna for Microwave Applications

Multiband Microstrip Patch Antenna for Microwave Applications IOSR Jounal of Electonics and Communication Engineeing (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 5 (Sep. - Oct. 2012), PP 43-48 Multiband Micostip Patch Antenna fo Micowave Applications

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system Electicity tansmission netwok optimization model of supply and demand the case in Taiwan electicity tansmission system Miao-Sheng Chen a Chien-Liang Wang b,c, Sheng-Chuan Wang d,e a Taichung Banch Gaduate

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

Multicriteria analysis in telecommunications

Multicriteria analysis in telecommunications Poceedings of the 37th Hawaii Intenational Confeence on System Sciences - 2004 Multiciteia analysis in telecommunications Janusz Ganat and Andze P. Wiezbicki National Institute of Telecommunications Szachowa

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning Gavitational Mechanics of the Mas-Phobos System: Compaing Methods of Obital Dynamics Modeling fo Exploatoy Mission Planning Alfedo C. Itualde The Pennsylvania State Univesity, Univesity Pak, PA, 6802 This

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

AMB111F Financial Maths Notes

AMB111F Financial Maths Notes AMB111F Financial Maths Notes Compound Inteest and Depeciation Compound Inteest: Inteest computed on the cuent amount that inceases at egula intevals. Simple inteest: Inteest computed on the oiginal fixed

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

Valuation of Floating Rate Bonds 1

Valuation of Floating Rate Bonds 1 Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned

More information

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring

Automatic Closed Caption Detection and Filtering in MPEG Videos for Video Structuring JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1145-116 (006) Automatic Closed Caption Detection and Filteing in MPEG Videos fo Video Stuctuing Depatment of Compute Science and Infomation Engineeing National

More information

Magnetic Bearing with Radial Magnetized Permanent Magnets

Magnetic Bearing with Radial Magnetized Permanent Magnets Wold Applied Sciences Jounal 23 (4): 495-499, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.23.04.23080 Magnetic eaing with Radial Magnetized Pemanent Magnets Vyacheslav Evgenevich

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run End-to-End Qo Mapping and Aggegation fo electing Cloud evices Raed Kaim, Chen Ding, Ali Mii Depatment of Compute cience Ryeson Univesity, Toonto, Canada 2kaim@yeson.ca, cding@scs.yeson.ca, ali.mii@yeson.ca

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices Chapte 2 Valiant Load-Balancing: Building etwoks That Can Suppot All Taffic Matices Rui Zhang-Shen Abstact This pape is a bief suvey on how Valiant load-balancing (VLB) can be used to build netwoks that

More information

Experiment 6: Centripetal Force

Experiment 6: Centripetal Force Name Section Date Intoduction Expeiment 6: Centipetal oce This expeiment is concened with the foce necessay to keep an object moving in a constant cicula path. Accoding to Newton s fist law of motion thee

More information

The Detection of Obstacles Using Features by the Horizon View Camera

The Detection of Obstacles Using Features by the Horizon View Camera The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks An Enegy Efficient and Accuate Slot Synchonization Scheme fo Wieless Senso Netwoks Lillian Dai Pithwish asu Jason Redi N Technologies, 0 Moulton St., Cambidge, MA 038 ldai@bbn.com pbasu@bbn.com edi@bbn.com

More information

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011 Maket inefficiency identified by both single and multiple cuency tends T.Toká 1, and D. Hováth 1, 1 Sos Reseach a.s., Stojáenská 3, 040 01 Košice, Slovak Republic Abstact axiv:1110.2612v1 [q-fin.st] 12

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

Definitions and terminology

Definitions and terminology I love the Case & Fai textbook but it is out of date with how monetay policy woks today. Please use this handout to supplement the chapte on monetay policy. The textbook assumes that the Fedeal Reseve

More information

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research RAIRO Rech. Opé. (vol. 33, n 1, 1999, pp. 29-45) A GOOD APPROXIMATION OF THE INVENTORY LEVEL IN A(Q ) PERISHABLE INVENTORY SYSTEM (*) by Huan Neng CHIU ( 1 ) Communicated by Shunji OSAKI Abstact. This

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes How Much Should a Fim Boow Chapte 19 Capital Stuctue & Copoate Taxes Financial Risk - Risk to shaeholdes esulting fom the use of debt. Financial Leveage - Incease in the vaiability of shaeholde etuns that

More information

A Comparative Analysis of Data Center Network Architectures

A Comparative Analysis of Data Center Network Architectures A Compaative Analysis of Data Cente Netwok Achitectues Fan Yao, Jingxin Wu, Guu Venkataamani, Suesh Subamaniam Depatment of Electical and Compute Engineeing, The Geoge Washington Univesity, Washington,

More information

The Role of Gravity in Orbital Motion

The Role of Gravity in Orbital Motion ! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Exam #1 Review Answers

Exam #1 Review Answers xam #1 Review Answes 1. Given the following pobability distibution, calculate the expected etun, vaiance and standad deviation fo Secuity J. State Pob (R) 1 0.2 10% 2 0.6 15 3 0.2 20 xpected etun = 0.2*10%

More information

NBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING?

NBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING? NBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING? Daia Bunes David Neumak Michelle J. White Woking Pape 16932 http://www.nbe.og/papes/w16932

More information

Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures

Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures 2012 IEEE Fifth Intenational Confeence on Cloud Computing Self-Adaptive and Resouce-Efficient SLA Enactment fo Cloud Computing Infastuctues Michael Maue, Ivona Bandic Distibuted Systems Goup Vienna Univesity

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to . Simplify: 0 4 ( 8) 0 64 ( 8) 0 ( 8) = (Ode of opeations fom left to ight: Paenthesis, Exponents, Multiplication, Division, Addition Subtaction). Simplify: (a 4) + (a ) (a+) = a 4 + a 0 a = a 7. Evaluate

More information

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application Real Time Tacking of High Speed Movements in the Context of a Table Tennis Application Stephan Rusdof Chemnitz Univesity of Technology D-09107, Chemnitz, Gemany +49 371 531 1533 stephan.usdof@infomatik.tu-chemnitz.de

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information