DSEC: A Data Stream Engine Based Clinical Information System *

Size: px
Start display at page:

Download "DSEC: A Data Stream Engine Based Clinical Information System *"

Transcription

1 DSEC: A Data Stream Engine Based Clinical Information System * Yu Fan, Hongyan Li **, Zijing Hu, Jianlong Gao, Haibin Liu, Shiwei Tang, and Xinbiao Zhou National Laboratory on Machine Perception, School of Electronics Engineering and Computer Science, Peking University, Beijing, , P.R. China {efan, lihy, huzijing, jlgao, liuhaibin, tsw, Zhouxb}@cis.pku.edu.cn Abstract. This demo paper describes a clinical information system: Data Stream Engine based Clinical information system (DSEC). In DSEC, data stream technology as well as traditional computer mechanism is used to process medical data and improve the quality of service in hospitals. The novel features of DSEC include: 1) A complete data stream processing and querying architecture for medical application 2) being able to detect data changes in a simple and effective way; 3) a load shedding mechanism used to avoid system crash when high data rate occurs. Keywords: Data stream, Change detection, Load shedding, Clinical Information System. 1 Introduction Medical organization is an important application area of data stream technology [1] [2]. A number of streaming data called medical data stream are generated by equipments and sensors all over the hospital, especially in the ICU (Intensive Care Unit) with many digital equipments and seriously ill patients. Medical data stream mainly comes from the patient pathology value got by sensors, such as blood pressure, heart rate, breathe volume etc. However, it is difficult to satisfy the application requirement of with existing mechanisms. The reasons are illustrated below: Noisy: The noise made by treatment or the equipment imprecision will cause misrepresentation. If not processed properly, incorrect data will lead improper diagnoses that may result in medical accidents since doctors rely on data to make treatment. * This work was supported by Natural Science Foundation of China(NSFC) under grant number ** Corresponding author. X. Zhou et al. (Eds.): APWeb 2006, LNCS 3841, pp , Springer-Verlag Berlin Heidelberg 2006

2 DSEC: A Data Stream Engine Based Clinical Information System 1169 Requiring rapid response: The rapid changes of pathology data streams should be recognized as soon as it occurs for treatment. Heavy system cost: High cost of the system: The processing and representation of data streams always need such costly reference of system resource as memory, storage, CPU. In order to offer better data stream management mechanism and to improve the data quality, we have integrated a Data Stream Management System (DSMS) as data processing engine in our Clinical Information System (CIS). With the help of the latest data stream research production, we successfully meet the medical application requirement and implement the following functions: Stream query and storage: Besides the basic query operators such as select, join and union, some processing methods are also implemented for particular medical application. Change detection: Monitoring the data patterns, eliminate noisy data effect, find out the abnormity and trigger data alert when necessary. Load shedding: Guided by control theory, we have designed load shedding module to avoid system crash when the data rate exceeds the process capability. In addition to CPU availability, we concern more about memory resources. Besides an efficient data stream management engine, the system presented in this paper offers the functions of medical order, Electronic Medical Record (EMR), patient management. The detailed structure and features are described in the author s other papers [3] [4] [5] [6]. 2 Related Work Data stream applications such as network monitoring, online transaction, and sensor processing pose tremendous challenges to traditional database systems. Many projects such as STREAM, Aurora are working on it for different application requirements. In DSMS for general purpose, some ideas are helpful for the problems in medical environment. Monitoring the pattern changes and trends of the data stream online is a fundamental challenge. As data stream mining algorithm MAIDS [7] is correspondingly complex, and will cause unacceptable delay in the actual application, the VDDM [8] proposed the concept of velocity density estimation, a technique used to understand, visualize, and determine trends in the evolution of fast data streams. The survey [1] [2] contains a wide overview of work in the field while load shedding is also proposed. The corresponding output in Aurora is associated with a QoS specification function, chosen among a latency graph, a value-based graph and a loss-tolerance graph. Some other approaches to dealing with data stream rates, which temporarily exceed system capacity, focus on limiting the memory utilization of the system. Improving the efficiency of the allocation of memory among query operators or among inter-operator queues are alternatives to load shedding that can improve system performance when limited main memory is the primary resource bottleneck.

3 1170 Y. Fan et al. 3 System Architecture As illustrated in Fig 1.,DSEC is a prototype information system from the perspectives of doctors and a J2EE project developed in IBM WSAD and deployed on Websphere Application Server. Besides the data stream processing engine, we have developed patient management, visual medical record interface, patient situation evaluation, etc, which are able to satisfy the medical requirement. The entire system structure can be seen in the author s previous works [4].As the core module of our system, data stream engine has the data preprocessing, data queues, and query network, change detection and query output. Operator Scheduler Preprocessing Data queues Query network Query Output Patient Doctor Change Detection Changes Load Shedder Qos Monitor Fig. 1. Data stream engine architecture 3.1 Data Preprocessing: Wrapper and Filter for Data Stream There are two parts in the preprocessing module: data wrapper and data filter. Data filter is used to get rid of unnecessary data because some data gathered by the medical machines will never be used in the application. We use project operator to take out the useless data filed such as machine type, connection mode, etc. Another function of data filter is to manage the system buffer in which filtered data is stored.data wrapper is a module to convert the data from different data sources to a structured, parse-able unit. We generate some xml files to define the data structure and the wrapper is able to find the proper xml file for parsing. 3.2 Detecting Changes: Find Out the Abnormal Data Patterns In contrast to previously proposed tools, our method almost requires no prior assumption and we do not need that the streaming time series following any specified model. SWAB algorithm given by Keogh et al [9], using sliding window, is particularly

4 DSEC: A Data Stream Engine Based Clinical Information System 1171 popular with the medical community, since patient monitoring is inherently an online task. With the help of some SWAB ideas, we separate the data stream to be a set of data linear segment in which data points follows the same linear function. After segmentation, the slope differences between current segment and its neighbors are symbols of the data changes. If the different exceeds the predefined threshold, a change will be announced by our system. 3.3 Load Shedding: Avoid System Crash by Limiting Resource Abuse Various system resources such as CPU, memory, and network bandwidth may become the bottleneck in DSMS query processing. Mainly focusing on the memory availability, our project shed system load with the help of control theory. Controlled variable is the performance metric controlled by the real-time search engine system. Performance reference represents the desired system performance in terms of the controlled variable. I(k) C(k) Data stream + E(k) Controller AR(k) Query - Networ M(k) Monitor Fig. 2. Framework of load shedding model Fig. 2 illustrates the framework of our feedback on the basis of DSMS load shedding model. The monitor measures the controlled variable M(k) and feeds back the samples back to the controller. The controller compares the performance references Mref with M(k) to get the current error E(k), and computes a change D(k), called control input, to the data arrival rate I(k), then we get respected data arrival rate - R(k). The controller uses a simple P (proportional) control function to compute the respected data arrival rate to keep the total memory utilization decrease to the reference Mref. The filter manager dynamically changes the data arrival rate at each sampling instant k according to the control input D(k) by adjusting the filter proportion of filters. The goal of the filter manager is to enforce the new data arrival rate R(k+1)=R(k)-D(k). 4 Conclusions and Future Works With an efficient data stream engine, DSEC is a patient central clinical information prototype system. It has the following contribution:

5 1172 Y. Fan et al. A universal data wrapper to preprocess data stream and an integrated data stream query engine. A more accurate and faster data trend change detection mechanism based on linear segment and vector search. Being able to protect the system and balance the system load by control theory based load shedding module. In the future, the following work maybe our objectives: Improve the above mechanism based on the semantic data stream. Find out some new applications for our stream engine and extend its scope. References 1. B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom. Models and Issues in Data Stream Systems. In Proc ACM Symp. on Principles of Database Systems, June D Carney, U Cetintemel, M Cherniack, C Convey, S Lee, G Seidman, M tonebraker, N Tatbul, and S Zdonik. Monitoring Streams: a New Class of Data Management Applications. In: Proc. 28th Intl. Conf. on Very Large Data Bases. Hong Kong, China, August Yu Fan, Hongyan Li. ICUIS A Rule-Based Intelligent ICU Inform ation System. In IEEE Proc.IDEAS-DH2004, IEEE Computer Society, Sep Yongsheng Tan, Yibin Wang, Hongyan Li. A Management Strategy of Monitoring Data in ICU Based on Data Stream Technology. In IEEE Proc.IDEAS-DH2004, IEEE Computer Society, Sep Hu Zijing, Li Hongyan, Yu Fan, etc. Using Control Theory to Guide Load Shedding in Medical Data Stream Management System. Accepted as regular paper by Asian 2005 LNCS. 6. Yin Ting,Li Hongyan,Yu Fan, etc. A Hybrid Method for Detecting Data Stream Changes with Complex Semantics in Intensive Care Unit. accepted as short paper by Asian 2005 LNCS 7. Y. Dora Cai,J. Han,et.al., MAIDS: Mining Alarming Incidents from Data Streams, Proc. ACM SIGMOD C.C. Aggarwal, On Change Diagnosis in Evolving Data Streams, In Proc. ACM SIGMOD Conf., E. J. Keogh, S. Chu, D. Hart, and M. J. Pazzani. An Online Algorithm for Segmenting Time Series. In Proc.of ICDM, 2001.

Aurora: a new model and architecture for data stream management

Aurora: a new model and architecture for data stream management Aurora: a new model and architecture for data stream management Daniel J. Abadi 1, Don Carney 2, Ugur Cetintemel 2, Mitch Cherniack 1, Christian Convey 2, Sangdon Lee 2, Michael Stonebraker 3, Nesime Tatbul

More information

Management of Human Resource Information Using Streaming Model

Management of Human Resource Information Using Streaming Model , pp.75-80 http://dx.doi.org/10.14257/astl.2014.45.15 Management of Human Resource Information Using Streaming Model Chen Wei Chongqing University of Posts and Telecommunications, Chongqing 400065, China

More information

Combining Sequence Databases and Data Stream Management Systems Technical Report Philipp Bichsel ETH Zurich, 2-12-2007

Combining Sequence Databases and Data Stream Management Systems Technical Report Philipp Bichsel ETH Zurich, 2-12-2007 Combining Sequence Databases and Data Stream Management Systems Technical Report Philipp Bichsel ETH Zurich, 2-12-2007 Abstract This technical report explains the differences and similarities between the

More information

Control-Based Load Shedding in Data Stream Management Systems

Control-Based Load Shedding in Data Stream Management Systems Control-Based Load Shedding in Data Stream Management Systems Yi-Cheng Tu and Sunil Prabhakar Department of Computer Sciences, Purdue University West Lafayette, IN 4797, USA Abstract Load shedding has

More information

RTSTREAM: Real-Time Query Processing for Data Streams

RTSTREAM: Real-Time Query Processing for Data Streams RTSTREAM: Real-Time Query Processing for Data Streams Yuan Wei Sang H Son John A Stankovic Department of Computer Science University of Virginia Charlottesville, Virginia, 2294-474 E-mail: {yw3f, son,

More information

Efficient Data Streams Processing in the Real Time Data Warehouse

Efficient Data Streams Processing in the Real Time Data Warehouse Efficient Data Streams Processing in the Real Time Data Warehouse Fiaz Majeed fiazcomsats@gmail.com Muhammad Sohaib Mahmood m_sohaib@yahoo.com Mujahid Iqbal mujahid_rana@yahoo.com Abstract Today many business

More information

Effective Parameters on Response Time of Data Stream Management Systems

Effective Parameters on Response Time of Data Stream Management Systems Effective Parameters on Response Time of Data Stream Management Systems Shirin Mohammadi 1, Ali A. Safaei 1, Mostafa S. Hagjhoo 1 and Fatemeh Abdi 2 1 Department of Computer Engineering, Iran University

More information

An ECG Monitoring and Alarming System Based On Android Smart Phone

An ECG Monitoring and Alarming System Based On Android Smart Phone Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Control-Based Quality Adaptation in Data Stream Management Systems

Control-Based Quality Adaptation in Data Stream Management Systems Control-Based Quality Adaptation in Data Stream Management Systems Yi-Cheng Tu 1, Mohamed Hefeeda 2, Yuni Xia 1, Sunil Prabhakar 1, and Song Liu 1 1 Purdue University, West Lafayette, IN 47906, U.S.A.

More information

A Service-oriented Dual-bus BAM System Model

A Service-oriented Dual-bus BAM System Model I.J. Engineering and Manufacturing, 2012,2, 1-7 Published Online April 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijem.2012.02.01 Available online at http://www.mecs-press.net/ijem A Service-oriented

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

Data Stream Management System

Data Stream Management System Case Study of CSG712 Data Stream Management System Jian Wen Spring 2008 Northeastern University Outline Traditional DBMS v.s. Data Stream Management System First-generation: Aurora Run-time architecture

More information

Preprocessing Web Logs for Web Intrusion Detection

Preprocessing Web Logs for Web Intrusion Detection Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer

More information

Preemptive Rate-based Operator Scheduling in a Data Stream Management System

Preemptive Rate-based Operator Scheduling in a Data Stream Management System Preemptive Rate-based Operator Scheduling in a Data Stream Management System Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandros Labrinidis Department of Computer Science University of Pittsburgh Pittsburgh,

More information

Department of Computer Science, University of Illinois at Urbana-Champaign 2 School of Electronics Engineering and Computer Science, Peking University

Department of Computer Science, University of Illinois at Urbana-Champaign 2 School of Electronics Engineering and Computer Science, Peking University PGG: An Online Pattern Based Approach for Stream Variation Management Lu-An Tang 1 ( 唐 绿 岸 ), Bin Cui 2,4 ( 崔 斌 ), Hongyan Li 2,3* ( 李 红 燕 ), Gaoshan Miao 2,3 ( 苗 高 杉 ) Dongqing Yang 2,4 ( 杨 冬 青 ), and

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

Real Time Business Performance Monitoring and Analysis Using Metric Network

Real Time Business Performance Monitoring and Analysis Using Metric Network Real Time Business Performance Monitoring and Analysis Using Metric Network Pu Huang, Hui Lei, Lipyeow Lim IBM T. J. Watson Research Center Yorktown Heights, NY, 10598 Abstract-Monitoring and analyzing

More information

ANALYTICS IN BIG DATA ERA

ANALYTICS IN BIG DATA ERA ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut

More information

A Neural Network and Web-Based Decision Support System for Forex Forecasting and Trading

A Neural Network and Web-Based Decision Support System for Forex Forecasting and Trading A Neural Network and Web-Based Decision Support System for Forex Forecasting and Trading K.K. Lai 1, Lean Yu 2,3, and Shouyang Wang 2,4 1 Department of Management Sciences, City University of Hong Kong,

More information

Inferring Fine-Grained Data Provenance in Stream Data Processing: Reduced Storage Cost, High Accuracy

Inferring Fine-Grained Data Provenance in Stream Data Processing: Reduced Storage Cost, High Accuracy Inferring Fine-Grained Data Provenance in Stream Data Processing: Reduced Storage Cost, High Accuracy Mohammad Rezwanul Huq, Andreas Wombacher, and Peter M.G. Apers University of Twente, 7500 AE Enschede,

More information

An Implementation of Active Data Technology

An Implementation of Active Data Technology White Paper by: Mario Morfin, PhD Terri Chu, MEng Stephen Chen, PhD Robby Burko, PhD Riad Hartani, PhD An Implementation of Active Data Technology October 2015 In this paper, we build the rationale for

More information

Data Mining Governance for Service Oriented Architecture

Data Mining Governance for Service Oriented Architecture Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY alibek@tr.ibm.com Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Exploration and Visualization of Post-Market Data

Exploration and Visualization of Post-Market Data Exploration and Visualization of Post-Market Data Jianying Hu, PhD Joint work with David Gotz, Shahram Ebadollahi, Jimeng Sun, Fei Wang, Marianthi Markatou Healthcare Analytics Research IBM T.J. Watson

More information

White Paper. How Streaming Data Analytics Enables Real-Time Decisions

White Paper. How Streaming Data Analytics Enables Real-Time Decisions White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream

More information

Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems

Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems Baochun Li Electrical and Computer Engineering University of Toronto bli@eecg.toronto.edu Klara Nahrstedt Department of Computer

More information

Outlier Detection in Stream Data by Machine Learning and Feature Selection Methods

Outlier Detection in Stream Data by Machine Learning and Feature Selection Methods International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 2, No. 3, 2013, Page: 17-24, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com Outlier Detection

More information

Medical Image Segmentation of PACS System Image Post-processing *

Medical Image Segmentation of PACS System Image Post-processing * Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

Real Time Monitoring System based on Embedded Linux Application

Real Time Monitoring System based on Embedded Linux Application Real Time Monitoring System based on Embedded Linux Application 1 Unnati Patel, 2 Vijay N. Chavda 1 ME Scholar, 2 Assistant Professor, VLSI and Embedded system, GTU PG School, Gandhinagar, India 1 patelunnu27@gmail.com,

More information

A Near Real-Time Personalization for ecommerce Platform Amit Rustagi arustagi@ebay.com

A Near Real-Time Personalization for ecommerce Platform Amit Rustagi arustagi@ebay.com A Near Real-Time Personalization for ecommerce Platform Amit Rustagi arustagi@ebay.com Abstract. In today's competitive environment, you only have a few seconds to help site visitors understand that you

More information

A Framework for Personalized Healthcare Service Recommendation

A Framework for Personalized Healthcare Service Recommendation A Framework for Personalized Healthcare Service Recommendation Choon-oh Lee, Minkyu Lee, Dongsoo Han School of Engineering Information and Communications University (ICU) Daejeon, Korea {lcol, niklaus,

More information

A Stock Pattern Recognition Algorithm Based on Neural Networks

A Stock Pattern Recognition Algorithm Based on Neural Networks A Stock Pattern Recognition Algorithm Based on Neural Networks Xinyu Guo guoxinyu@icst.pku.edu.cn Xun Liang liangxun@icst.pku.edu.cn Xiang Li lixiang@icst.pku.edu.cn Abstract pattern respectively. Recent

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

RUBA: Real-time Unstructured Big Data Analysis Framework

RUBA: Real-time Unstructured Big Data Analysis Framework RUBA: Real-time Unstructured Big Data Analysis Framework Jaein Kim, Nacwoo Kim, Byungtak Lee IT Management Device Research Section Honam Research Center, ETRI Gwangju, Republic of Korea jaein, nwkim, bytelee@etri.re.kr

More information

A Prediction-Based Transcoding System for Video Conference in Cloud Computing

A Prediction-Based Transcoding System for Video Conference in Cloud Computing A Prediction-Based Transcoding System for Video Conference in Cloud Computing Yongquan Chen 1 Abstract. We design a transcoding system that can provide dynamic transcoding services for various types of

More information

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2 Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue

More information

Load Balancing Algorithm Based on Services

Load Balancing Algorithm Based on Services Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao

More information

Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast

Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast International Conference on Civil, Transportation and Environment (ICCTE 2016) Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast Xiaodong Zhang1, a, Baotian Dong1, b, Weijia Zhang2,

More information

Rackspace Cloud Databases and Container-based Virtualization

Rackspace Cloud Databases and Container-based Virtualization Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many

More information

Understanding traffic flow

Understanding traffic flow White Paper A Real-time Data Hub For Smarter City Applications Intelligent Transportation Innovation for Real-time Traffic Flow Analytics with Dynamic Congestion Management 2 Understanding traffic flow

More information

COMPUTING SCIENCE. Scalable and Responsive Event Processing in the Cloud. Visalakshmi Suresh, Paul Ezhilchelvan and Paul Watson

COMPUTING SCIENCE. Scalable and Responsive Event Processing in the Cloud. Visalakshmi Suresh, Paul Ezhilchelvan and Paul Watson COMPUTING SCIENCE Scalable and Responsive Event Processing in the Cloud Visalakshmi Suresh, Paul Ezhilchelvan and Paul Watson TECHNICAL REPORT SERIES No CS-TR-1251 June 2011 TECHNICAL REPORT SERIES No

More information

A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm

A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm

More information

USING COMPLEX EVENT PROCESSING TO MANAGE PATTERNS IN DISTRIBUTION NETWORKS

USING COMPLEX EVENT PROCESSING TO MANAGE PATTERNS IN DISTRIBUTION NETWORKS USING COMPLEX EVENT PROCESSING TO MANAGE PATTERNS IN DISTRIBUTION NETWORKS Foued BAROUNI Eaton Canada FouedBarouni@eaton.com Bernard MOULIN Laval University Canada Bernard.Moulin@ift.ulaval.ca ABSTRACT

More information

A Dynamic Attribute-Based Load Shedding Scheme for Data Stream Management Systems

A Dynamic Attribute-Based Load Shedding Scheme for Data Stream Management Systems Brigham Young University BYU ScholarsArchive All Faculty Publications 2007-07-01 A Dynamic Attribute-Based Load Shedding Scheme for Data Stream Management Systems Amit Ahuja Yiu-Kai D. Ng ng@cs.byu.edu

More information

An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple Data Streams

An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple Data Streams An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple Data Streams Susan D. Urban 1, Suzanne W. Dietrich 1, 2, and Yi Chen 1 Arizona

More information

Datasheet FUJITSU Cloud Monitoring Service

Datasheet FUJITSU Cloud Monitoring Service Datasheet FUJITSU Cloud Monitoring Service FUJITSU Cloud Monitoring Service powered by CA Technologies offers a single, unified interface for tracking all the vital, dynamic resources your business relies

More information

Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data

Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data Hiroshi Sato 1, Hisashi Kurasawa 1, Takeru Inoue 1, Motonori Nakamura 1, Hajime Matsumura 1, and Keiichi Koyanagi 2 1 NTT Network

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

RiMONITOR. Monitoring Software. for RIEGL VZ-Line Laser Scanners. Ri Software. visit our website www.riegl.com. Preliminary Data Sheet

RiMONITOR. Monitoring Software. for RIEGL VZ-Line Laser Scanners. Ri Software. visit our website www.riegl.com. Preliminary Data Sheet Monitoring Software RiMONITOR for RIEGL VZ-Line Laser Scanners for stand-alone monitoring applications by autonomous operation of all RIEGL VZ-Line Laser Scanners adaptable configuration of data acquisition

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

WAITER: A Wearable Personal Healthcare and Emergency Aid System

WAITER: A Wearable Personal Healthcare and Emergency Aid System Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping

More information

Circle Object Recognition Based on Monocular Vision for Home Security Robot

Circle Object Recognition Based on Monocular Vision for Home Security Robot Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang

More information

Flexible Data Streaming In Stream Cloud

Flexible Data Streaming In Stream Cloud Flexible Data Streaming In Stream Cloud J.Rethna Virgil Jeny 1, Chetan Anil Joshi 2 Associate Professor, Dept. of IT, AVCOE, Sangamner,University of Pune, Maharashtra, India 1 Student of M.E.(IT), AVCOE,

More information

Task Scheduling in Hadoop

Task Scheduling in Hadoop Task Scheduling in Hadoop Sagar Mamdapure Munira Ginwala Neha Papat SAE,Kondhwa SAE,Kondhwa SAE,Kondhwa Abstract Hadoop is widely used for storing large datasets and processing them efficiently under distributed

More information

Design and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb

Design and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb College

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

Research and Application of Redundant Data Deleting Algorithm Based on the Cloud Storage Platform

Research and Application of Redundant Data Deleting Algorithm Based on the Cloud Storage Platform Send Orders for Reprints to reprints@benthamscience.ae 50 The Open Cybernetics & Systemics Journal, 2015, 9, 50-54 Open Access Research and Application of Redundant Data Deleting Algorithm Based on the

More information

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com

More information

Energy-Saving Information Multi-agent System with Web Services for Cloud Computing

Energy-Saving Information Multi-agent System with Web Services for Cloud Computing Energy-Saving Information Multi-agent System with Web Services for Cloud Computing Sheng-Yuan Yang 1, Dong-Liang Lee 2, Kune-Yao Chen 2, and Chun-Liang Hsu 3 1 Dept. of Computer and Communication Engineering,

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Load Balancing in Fault Tolerant Video Server

Load Balancing in Fault Tolerant Video Server Load Balancing in Fault Tolerant Video Server # D. N. Sujatha*, Girish K*, Rashmi B*, Venugopal K. R*, L. M. Patnaik** *Department of Computer Science and Engineering University Visvesvaraya College of

More information

Automatic Extraction of Signatures from Bank Cheques and other Documents

Automatic Extraction of Signatures from Bank Cheques and other Documents Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,

More information

Dynamic resource management for energy saving in the cloud computing environment

Dynamic resource management for energy saving in the cloud computing environment Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Enterprise Organization and Communication Network

Enterprise Organization and Communication Network Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: e28193@jp.ibm.com Fusashi Nakamura

More information

Past Experiences and Future Challenges using Automatic Performance Modelling to Complement Testing. Paul Brebner, CTO

Past Experiences and Future Challenges using Automatic Performance Modelling to Complement Testing. Paul Brebner, CTO Past Experiences and Future Challenges using Automatic Performance Modelling to Complement Testing Paul Brebner, CTO A NICTA/Data61/CSIRO Spin-out Company 16/03/2016 Performance Assurance Pty Ltd 1 Performance

More information

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

Big Data: An Introduction, Challenges & Analysis using Splunk

Big Data: An Introduction, Challenges & Analysis using Splunk pp. 464-468 Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Big : An Introduction, Challenges & Analysis using Splunk Satyam Gupta 1 and Rinkle Rani 2 1,2 Department of Computer

More information

Load Shedding for Aggregation Queries over Data Streams

Load Shedding for Aggregation Queries over Data Streams Load Shedding for Aggregation Queries over Data Streams Brian Babcock Mayur Datar Rajeev Motwani Department of Computer Science Stanford University, Stanford, CA 94305 {babcock, datar, rajeev}@cs.stanford.edu

More information

Design for Management Information System Based on Internet of Things

Design for Management Information System Based on Internet of Things Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, 413789256@qq.com Abstract

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

ecommerce Web-Site Trust Assessment Framework Based on Web Mining Approach

ecommerce Web-Site Trust Assessment Framework Based on Web Mining Approach ecommerce Web-Site Trust Assessment Framework Based on Web Mining Approach ecommerce Web-Site Trust Assessment Framework Based on Web Mining Approach Banatus Soiraya Faculty of Technology King Mongkut's

More information

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 Over viewing issues of data mining with highlights of data warehousing Rushabh H. Baldaniya, Prof H.J.Baldaniya,

More information

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt> Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.

More information

Evolution of Interests in the Learning Context Data Model

Evolution of Interests in the Learning Context Data Model Evolution of Interests in the Learning Context Data Model Hendrik Thüs, Mohamed Amine Chatti, Roman Brandt, Ulrik Schroeder Informatik 9 (Learning Technologies), RWTH Aachen University, Aachen, Germany

More information

International Journal of Management and Sustainability

International Journal of Management and Sustainability International Journal of Management and Sustainability Special Issue: Economic, Finance and Management outlooks journal homepage: http://pakinsight.com/?ic=journal&journal=11 AN ARCHITECTURE FOR PERSONAL

More information

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

Data Mining & Data Stream Mining Open Source Tools

Data Mining & Data Stream Mining Open Source Tools Data Mining & Data Stream Mining Open Source Tools Darshana Parikh, Priyanka Tirkha Student M.Tech, Dept. of CSE, Sri Balaji College Of Engg. & Tech, Jaipur, Rajasthan, India Assistant Professor, Dept.

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

A Novel Solution on Alert Conflict Resolution Model in Network Management

A Novel Solution on Alert Conflict Resolution Model in Network Management A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom FrankChan2005@gmail.com Ramaswamy D.Thiyagu University of East London United

More information

Middleware support for the Internet of Things

Middleware support for the Internet of Things Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

A Web-based Interactive Data Visualization System for Outlier Subspace Analysis

A Web-based Interactive Data Visualization System for Outlier Subspace Analysis A Web-based Interactive Data Visualization System for Outlier Subspace Analysis Dong Liu, Qigang Gao Computer Science Dalhousie University Halifax, NS, B3H 1W5 Canada dongl@cs.dal.ca qggao@cs.dal.ca Hai

More information

Remote Usability Evaluation of Mobile Web Applications

Remote Usability Evaluation of Mobile Web Applications Remote Usability Evaluation of Mobile Web Applications Paolo Burzacca and Fabio Paternò CNR-ISTI, HIIS Laboratory, via G. Moruzzi 1, 56124 Pisa, Italy {paolo.burzacca,fabio.paterno}@isti.cnr.it Abstract.

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM

CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM 1 G.VIJAY, 2 S.PORKAMALAM 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

An Efficient Knowledge Base Management Scheme for Context Aware Surveillance

An Efficient Knowledge Base Management Scheme for Context Aware Surveillance An Efficient Knowledge Base Management Scheme for Context Aware Surveillance Soomi Yang Department of Information Security, The University of Suwon, San 2-2, Wau-ri, Bongdam-eup, Hwangseong-si, Gyeonggi-do,

More information

Integration of Heterogeneous Databases based on XML

Integration of Heterogeneous Databases based on XML ISSN:2249-5789 Integration of Heterogeneous Databases based on XML Venciya.A Student, Department Of Computer Science And Engineering, SRM University,Kattankulathur, Venciya.a@gmail.com Abstract As companies

More information

With Bosch Software Innovations ConnectedManufacturing Solutions.

With Bosch Software Innovations ConnectedManufacturing Solutions. Production Performance Manager How to systematically improve machine availability. www.bosch-si.com/production-performance-manager With Bosch Software Innovations ConnectedManufacturing Solutions. Software

More information

Personal Identification Techniques Based on Operational Habit of Cellular Phone

Personal Identification Techniques Based on Operational Habit of Cellular Phone Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular

More information