How To Write A Powerline
|
|
|
- Steven Perry
- 5 years ago
- Views:
Transcription
1 The Stragegy for Fat I/O in Degrae Moe of RAID-5 *DONG-JAE, KANG *CHANG-SOO, KIM **BUM-JOO,SHIN *Comuter & Sytem Lab. ETRI 161 Gajeong-Dong, Yueong-Gu, Deajeon, KOERA **125-1 Naei-Dong Miryang Gyeongnam KOREA Abtract: - RAID ha been ue for high erformance an high availability of ata, but it ha roblem that cot of ata regeneration for uorting high availability in ik failure moe(egrae moe) an cot of ata rebuiling for recovery of faile ik are very exenive. In thi aer, we uoe the tragegy for fat I/O in egrae moe of RAID5. For rooe metho, we a a are ik to traitional RAID5 architecture, an ue it for getting better erformance in egrae moe an reucing the cot at ik recovery time. When I/O requet, rea an write oeration, occurre for block in faile ik, requet block can be regenerate correctly by reaing correoning block from urviving member ik an comuting the excluive OR of their content. An regenerate block i ave aitional are ik. then, mark recovery-information to S.D(Sare Dik) recovery bitma. Requet after thi roce can ue the block recovere in are ik an it i one reeatly. Thi trategy allow ata to be rea or written with normal erformance by acceing to are ik block, not faile ik block. an require only non-accee ata in egrae moe to be recovere on rebuiling time. By uing uoe trategy, we have everal avantage, better erformance in egrae moe of RAID5,low cot at ik recovery time an hort reone time. Key-Wor: - RAID5, Degrae moe, I/O erformance, Sare ik, Rebuiling, Regeneration 1 Introuction RAID imrove I/O erformance becaue they ten to balance tream of either equential or ranom I/O requet aroximately acro the member ik an rogre ata availability by toring reunant ata that allow uer ata to be regenerate if the ik on which it i tore fail. Aitionally, it imlify torage management by aggregating multile hyical ik into one large virtual ik an treating more torage caacity a a ingle management entity. RAID5 mot frequently ue to minimize the write erformance bottleneck an uort fault-tolerance by the itribution of ucceive arity trie acro ome or all ik member cyclically. But it ha roblem that cot of ata regeneration for offering high availability in ik failure moe(egrae moe) an cot of ata rebuiling for recovery of faile ik are very exenive. Degrae moe refer to the ituation that in the cae of one ik failure an no attemt ha been mae to rebuil the ta to lace it on anther ik, ytem can till work without interrute[7]. But it ha a ignificant increae in the ytem loa when ingle ik i faile, egrae moe. Becaue rea oeration for the faile ik caue n-1 rea accee to the relative block on urviving ik to regenerate lot ata block. An write oeration for the faile ik caue n-1 rea accee to the relative block on urviving member ik to comute the arity block an one write acce to write the comute arity information to the block of the correoning ik. Like uer ecrition, RAID5 ha eriou efect in egrae moe. In thi aer, we uoe the trategy for fat I/O in egrae moe an reuce recovery cot at ata rebuiling of faile ik 2 Relate Work When ingle ik failure i occurre in RAID5, faile ik houl be relace with a new ik to rebuil ata. Otherwie, RAID5 erformance will be very low own to regenerate ata uing the urviving member ik in triing et for every rea / write oeration[1]. For the at everal year, many reearche for metho to imrove egrae erformance of RAID5 have been roceee. When all ik in an array are oerational, it i calle to be normal moe, the array i ai to be in egrae
2 moe when ingle ik in the RAID5 ha faile an no attemt ha been mae to rebuil the ata that ue to be on that ik an lace it on another ik. An the array i ai to be in rebuil moe uring the time that ata on the faile ik i being rebuilt an lace on another ik[7]. To recover the ata in faile ik, RAID ue are ik cheme, eicate aring cheme, itribute aring cheme an arity aring cheme. Deicate aring i o that ata on faile ik can be immeiately rebuilt to a are rive. An itribute aring ha the itribute are ace among the ik in a RAID, the arity aring i milar to the itribute aring but it ha not are ace,when ingle ik i faile, trie unit in ifferent ik are combine to form larger trie et an ik[2][7]. The itribute aring an arity aring imrove the ata write bottleneck, when faile ata i recover. Sare ik cheme ecribe uer are recovery metho for ata in faile ik, an they on't guarantee I/O erformance in egrae moe. But there i many metho to imrove erformance in egrae moe[5][7]. If ingle ik i faile, arity block in RAID5 i change to normal ata block an it i ue a ace for ata of faile ik. The metho can uort erformance in normal moe. But when ata in faile ik i rebuil on recovery time, till the cot of recovery that ata i regenerate by excluive-or an written to new ik i very exenive. 3 The Strategy for Fat I/O Fig.1 i the architecture which i for uoe trategy in thi aer. For reente trategy, are ik i ae to traitional RAID5 architecture, an it ha a S.D(Sare Dik) Recovery Bitma to check whether a block in faile ik i recovere or not. RAID-5 trie unit arity unit ata unit S.D Recovery Bitma Fig.1 Architecture for uoe metho Sare Dik Firt, let' efine terminologie ue in thi aer. Data unit mean the unit of ata acce uorte by the array, an arity unit rereent reunancy information generate from the bitwie excluive-or of the collection of ata unit. The ize of ata unit an arity unit i ame. The reunancy grou forme by ata unit an arity unit i calle trie unit. Suoe metho i for imroving I/O erformance in egrae moe. So, in thi aer, we ecribe only I/O trategy in ingle ik failure moe, egrae moe. 3.1 Rea Strategy In thi ectrion, we ecribe rea trategy in the egrae moe of RAID READ requet ik ik1 ik2 ik3 faile ik S.D recovery Bitma / Sare ik Fig.2 Rea oeration in egrae moe of RAID5 Fig.2 reent the metho of rea oeration in egrae moe, in ytem aate by uoe trategy. Let' aume ik1 i faile to exlain rea oeration in egrae moe. If a requet for ata block, 1, in faile ik i occurre, S.D Recovery Bitma i invetigate to enure whether the faile block i recovere or not before rea oeration i execute. Bitma i marke a "not recovere", rea oeration that ma to faile ik regenerate requete ata from urviving ik member a illutrate in [Fig. 2]. To regenerate the block, it rea ata unit(, 2) an arity unit(), then execute excluive-or among rea ata. The reult i returne to uer alication. Aitionally it i ave on block() in are ik inclue to ame trie unit. If it i finihe, the correoning bitma(s.d Recovery Bitma) i marke a "recovere". Otherwie, if bitma i checke a "recovere" on rea oeration,, it mean re-acce to the block after ingle ik i faile. In thi cae, rea oeration that ma to the block in faile ik rea the ata from ame block in are ik, without the cot of regeneration for faile ata. So, re-acce
3 requet for ata in faile ik i rocee in normal moe erformance. It ha everal avantage, no nee of regeneration cot for faile block, revention from uen fall of erformance, etc. An it imrove the roblem in egrae moe of RAID Write Strategy In thi chater, we ecribe write trategy in the egrae moe of RAID5. Fig.2 reent the metho of write oeration in egrae moe, in ytem aate by uoe trategy. Let u aume that ik1 i failure to ecribe write oeration in egrae moe, an a requet for ata(5) in faile ik i occurre. WRITE requet New Block S.D recovery Bitma oeration. In next rea oeration, the ata block recovere in write oeration time can i ue, too. It uort normal moe erformance in egrae moe by amitting inut an outut from/to are ik an imrove elaye reone time an uen fall of ytem erformance in egrae moe. 3.3 Data Rebuiling Strategy Fig.4 reent rebuiling roce of ata in faile ik after aating uoe cheme., 1 an 4 i re-accee block by rea an write oeration in egrae moe, an it ha recovere block for faile ik. If a block in faile ik i accee by I/O oeration, when the block i re-accee, it i recovere on ame block in are ik, an it can be erve like normal ik tate. S.D Recovery Bitma faile ik / 1 1 / Sare ik Fig.3 Write oeration in egrae moe of RAID5 Like rea oeration, write oeration invetigate S.D Recovery Bitma before it i execute wether it i marke a "recovere" or not. In cae that checke a "not recovere", it rea ata(4, 6) from member ik in trie unit to uate correoning arity ata(1). If it i comlete, then execute excluive-or oeration between rea ata an buffer ata to be written to faile ik block. The reult i ientical with 5 ata an it i ave 1 to uate the arity ata. Aitionally, it i ave to 1 block in are ik to recover the faile ik block. Finally, it mark the correoning S.D recovery bitma a "recovere". In cae that bitma i checke a "recovere", it mean re-acce to a block after the ik i faile. In thi cae, a i the ame with normal write oeration, rea the correoning ata block(4, 6) to uate arity block(1), an then execute excluive-or oeration. If it i comlete, uate the arity block, an requete ata block in are ik. In cae requete block in faile ik i re-acce block, rea oeration for 4, 6 ata block i not nee. So, more econ acce for ame block in faile ik i ientical with normal moe ik ik1 ik2 ik / 1 1 / / faile ik Sare ik Fig.4 Rebuiling faile ik in uoe Strategy If I/O oeration are rocee for faile ik in egrae moe, more ata block for faile ik are recovere in are ik. So the erformance of the ytem aate by uoe trategy aroximate to normal moe erformance, an the cot of I/O in egrae moe i reuce. Rebuiling or recontruction mean that make a relacement ik' content conitent with thoe of the remaining normal member ik. To o it, reaing correoning trie unit ata from each of the urviving original memver ik an comuting the excluive-or of thee trie unit' content, then writing the reult to relacement ik. Rebuiling i time-conuming job. It can lat u to everal hour for large ik. So RAID ytem mut be caable of oerating while it i occurring. Oeration while rebuiling roce ten to increae rebuil time, but rovie the comenating benefit of continuou ata availability to alication. In traitional RAID5 ytem, rebuiling i rocee through whole block in faile ik, it overhea i very eriou.
4 But, in reente trategy, we ha a avantage that can execute elective rebuiling for only not-accee block, not-recovere block in are ik, in egrae moe. In [Fig. 4],, 1 an 4 mean recovere block, after ingle ik, ik1, i faile. So, when ata rebuiling i neee to recover faile ik. Only 2, 3 an 5 i electe. Rebuiling roce in uoe trategy i the ame with traitional RAID5 ytem, excet uorting elective rebuiling, If elective rebuiling i comlete, are ik i relace with faile ik to make the RAID5 ytem a normal. Selective rebuiling ha low cot for ik recovery comaring of traitional ytem, an imrove uen fall of ytem erformance in recovery time. 3.4 Avantage of Suoe Strategy In thi ection, we ecribe everal avantage that aring ik cheme uort. Aume the number of ik coniting of RAID5 array i N. Firt, when rea oeration i rocee in egrae moe, regeneration for faile ik block alway require N-1 ik acce in traitional RAID5 ytem, reaing N-2 ata block an 1 arity block from correoning member ik. In uoe metho, firt rea oeration to a faile ik block require N ik acce, but rea oeration for re-accee faile ik block nee 1 ik acce, a rea oeration i rocee in normal moe. Secon, when write oeration i execute in egrae moe, write on faile ik block alway require N ik accee an bitwie oeration, reaing N-2 ata unit an 1 arity unit in trie unit, an excluive-or oeration among ata unit an arity unit, an 1 ik acce to write uate arity block to relative ik. In uoe metho, when firt write to a faile ik block require N+1 ik accee, but write oeration for re-accee faile ik block have the ame ik accee in comare with write of normal moe. Thir, when ik recovery, rebuiling, i rocee, traitional RAID ytem require recovery of whole block in faile ik. but, in uoe metho, require recovery of elective block, not accee block by rea or write oeration in egrae moe. Decribe avantage, uer, can imrove the uen fall of ytem erformance in egrae moe, an reuce the cot of rebuiling on recovery time. It guarantee that the ytem erformance in egrae moe aroximate to that of normal moe. 4. Evaluation an Analyi In thi ection, we reort the exerimental reult obtaine in uoe trategy. The exeriment were eigne to comare the erformance in between egrae moe an normal moe of RAID5 an to analyze cot of rebuiling roce. The environment for tet i ecribe in ection Environment for Envaluation We ue SANtoiaVM(SANtoia Volume Manager), logical volume manager, to tet uoe trategy, it ha been imlemente at Comuter & Sytem De. ETRI in Korea. Dik Array Switch HBA Hot Machine Fiber channel DataDataDik Fig.5 Environment for teting the trategy Table 1 Detaile environmental value for teting Env. element Secification Comuter Comaq Server(m) O.S Linux 6.2(kernel ) RAM 512 Tet Sytem SANtoia Volume Manager Switch to StoragSAN(Fibre channel) Hot to Switch LAN Storage RAID-5(5M * 4) Strie unit 128K SANtoiaVM(SVM) reent the hyical torage a one or more virtual ik, volume, by converting I/O requet irecte to a virtual ik to I/O oeration on the unerlying member of hyical ik. it can imly the management of many torage. SVM uort variou RAID-level, Linear, triing, mirroring, an arity RAID. Fig. 5 rereent environment for tet. Whole ytem conit of hot machine, witch an torage grou. An they are connecte with fiber
5 channel or ethernet. The connection between hot machine an witch conit of LAN, ue to tranfer TCP/IP bae meage among the hot. An connection between witch an torage grou i fiber channel, ue to tranfer SCSI bae I/O ata. The etaile ec refer to Table Performance Evaluation We reent the erformance of rea / write oeration in egrae moe an in normal moe, an analyze it. Then, we comare two cae, to enure that uoe metho can imrove the erformance in egrae moe an reuce the cot of rebuiling. Each tet i erforme three time to obtain correct teting value Performance of Rea Oeration Fig.6 reent erformance of rea oeration in each moe, normal moe, egrae moe an S.D moe. In thi tet, egrae moe mean that of traitional RAID5 not-aating aring ik cheme. An S.D moe mean egrae moe aating uoe metho, aring ik cheme. Fig.6 how that I/O cot in egrae moe require three time more than normal moe. Rea oeraton in normal moe i atifie a 1 ik acce, but that in egrae moe require N-1 ik accee when RAID5 array conit of N-ik. Require Time( ec ) Normal moe Failure moe S.D moe 1M 1M 1M 5M 1G I/O Block Size( 1KB / block ) Fig.6 Rea erformance in each moe That i, rea oeration in egrae moe rea ata unit an arity unit to regenerate the requete block. So, rea oeration in egrae moe ha roblem, uen fall of ytem erformance. But, Suoe metho imrove it by uorting I/O through aitional are ik. Suoe trategy regenerate the faile ik block an ave it in aring ik. Then, next rea oeration for the ame block in faile ik i erve by recovere block in are ik. It guarantee that erformance in egrae moe i imrove. Aitionally, on rebuiling time, it i ue to reuce the cot of recovery. In Fig.6, rea erformance grah for 1M ata in S.D moe ha low erformance than that of egrae moe, becaue of aitional write to aring ik. But a execution of rea oeration i continue, it aroximate to normal tate Performance of Write Oeration Fig.7 reent erformance of write oeration in each moe. Require Time( ec ) Normal moe Failure moe S.D moe 1M 1M 1M 5M 1G I/O Block Size( 1KB / block ) Fig.7 Write erformance in each moe Like the grah of rea erformance, write erformance in S,D moe i lower than egrae moe for le 1M ata becaue of aitional write to are ik. But we have a goo erformance through one more ik acce. Re-accee for faile ik block can be rocee like a normal moe oeration by writing ata to are ik. The hae of grah can be effecte by trie unit ize, ata ize to be written, acce frequency for ame ata an etc. Many re-accee for ame ata make ytem ha a goo erformance. Acce Rate to the Same Block(%) Acce Rate to the Same Block M 1M 1M 5M 1G I/ O Block Size Fig.8 Acce Rate to the Same Block
6 Fig.8 how acce ratio to ame block accoring to increae the number of block to be written. It i tete for 5M caacity ik an other environmental value i ame. In cae 5M ata block i written, the re-acce ratio i about 37%, an that of 1G ata block i about 57%. So, if oeration in egrae moe i execute continuouly, re-acce ratio to ame block i increae. An the erformance in S.D moe i imrove becaue faile ik block i recovere in are ik an I/O requet for faile ik block i erve by are ik block Performance in Rebuiling moe Suoe trategy imrove erformance in egrae moe by recovering faile ik ata to are ik an uorting I/O through it. When ingle ik i faile in RAID, it i require to be relace a new normal ik. In thi aer, while uoe metho erform I/O requet, it rebuil the faile ik block. So, on recovery time, elective rebuiling i neee, not rebuiling of whole ata block in faile ik, it can reuce cot of recovery. Fig.9 how recovery ratio accoring to increaing the number of I/O block in egrae moe. We ue 5M caacity ik to tet recovery ratio. In cae I/O of 5M ata i erforme, the recovery ratio of faile ik aroach about 63%, an that of 1G ata block ha about 86% recovery ratio. So, by recovery time, if 5M ata block i alreay written or rea, Only 37% ata block of whole ik i neee to be rebuilt. Recovery Rate( % ) Dik Recovery Rate M 1M 1M 5M 1G I/O Block Size( 1KB / block ) Fig.9 Recovery ratio accoring to the number of I/O block In reente metho, if re-accee to a faile ik block i rare, I/O erformance in egrae moe will be ba. But recovery ratio for faile ik block will be high. While, if re-accee to a faile block i frequent, the reult will be revere. So I/O erformance in egrae moe an recovery ratio for faile ik block have a relationhi of invere roortion. Reorte reult will be change by many teting variable, that i, the number of array ik, trie unit ize, the caacity of ik, etc. 5. Concluion an Future Work RAID5 i ue for high erformance an high availability of ata, but it ha roblem that cot of ata regeneration for offering ata availability in egrae moe an of ata rebuiling for recovery of faile ik i very exenive. In thi aer, we uoe trategy to reolve the roblem an imrove the erformance in egrae moe. It uort the fat I/O roceing by recovering faile ik block to are ik an erving I/O requet throuth it. Aitionally, on recovery time, it can reuce the cot of recovery by uing ata block regenerate in are ik. Suoe metho can roce the I/O in egrae moe a like normal moe oeration after firt acce to the faile block. So it make the ytem to get better erformance in egrae moe. In future work, tet houl be erforme for variou environmental item, the number of array ik, variou trie unit ize, variou caacity of ik, etc. An the etaile reult i require to be reorte an analyze. Reference : [1] Paul Maiglia, "The RAID book" 6th eition, RAID Aviory Boar, [2] Sanghoon Jeon, Byoungchul Ahn, A Cot - Effective Solution to the Single ik Failure in RAID Architecture, Communication, Comuter an Signal Proceing, 1997, vol.1. [3] Hai Jin, Kai hwang, Jiangling Zhang, A RAID Reconfiguration Scheme for Gracefully Degrae Oeration, Parallel an Ditribute Proceing, 1999, PDP 99. Proceeing of the Seventh Euomicro Workho, 1999, [4] M.Hollan, G,Gibon, an D.Siewiorek, Fat, On-line Failure Recovery in Reunant Dik Array, In 23r Annual International Symoium on Fault-Tolerant Comuting, [5] Mualaneni, N, Goinath, K, A multi-tier I/O RAID torage ytem with RAID1 an RAID5, Parallel an Ditribute Proceing Symoium, 2. IPDPS 2. Proceeing. 14th International, 2, [6] Davi A. Patteron, Garth A. Gibon, Rany H. Katz, A Cae for Reunant Array of Inexenive
7 Dik(RAID), ACM SIGMOD Conference Proceeing, 1988, [7] Jai Menon, Dick Matton, Comarion of Saring Alternative for Dik Array, Proceeing of International Symoium on Comuter Architecture, 1992, [8] Peter M. Chen an Ewar K. Lee, Striing in a RAID Level 5 Dik Array, In Proceeing of the Joint International Conference on Meaurement an Moeling of Comuter Sytem, 1995, [9] Kai Hwang, Hai Jin, Roy Ho, RAID-x: A New Ditribute Dik Array for I/O-Centric Cluter Comuting, High-Performance Ditribute Comut ing, 2. Proceeing, 2, [1] P. M. Chen, E. K. Lee, G. A. Gibon, R. H. Katz an D. A. Patteron, RAID: High- Performance, Reliable Seconary Storage, ACM Comuting Survey, Vol. 26, No.2, 1994, [11] G. Gibon an D. Patteron, Deigning Dik Array for High Data Reliability, Journal of Parallel an Ditribute Comuting, January, 1993, 4-27 [12] Technology Forum, Lt., I RAID Five Level of Confuion?, Comuter Technology Revi ew, February, 1993, 37. [13] N. H. Vaiya, A Cae for Two-Level Ditribute Recovery Scheme, Proc. ACM International Conf. on Meaurement an Moeling of Comuter Sytem(Sigmetric '95), [14] P. Cao, S. B. Lim, S. Venkataraman, an J. Wilke, The TickerTAIP Parallel RAID Architecture, ACM Tran. on Comuter Sytem, Vol.12, No.3, 1994, [15] G. A. Alvarez, W. A. Burkhar, an F. Critian, Tolerating Multile Failure in RAID Architecture with Otimal Storage an Uniform Declutering, Proceeing of the 24th Annual ACM/IEEE International Symoium on Comuter Architecture, 1997, [16] A. Thomaian, an J. Menon, RAID 5 Performance with Ditribute Saring, IEEE Tranaction on Parallel an Ditribute Sytem, Vol.8, No.6, 1997, [17] M. Y. Lee, M. S. Park, Double Parity Saring for Performance Imrovement in Dik Array, Proceeing of the International Conference on Parallel an Ditribute Sytem, 1966.
Cluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
Supply Chain Coordination for Strong Retailer with Extended Warranty under Network Externality
Journal of Service Science an Management, 015, 8, 393-409 Publihe Online June 015 in SciRe. htt://www.cir.org/journal/jm htt://x.oi.org/10.436/jm.015.83041 Suly hain oorination for Strong Retailer with
Performance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding
On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets
On Secure Network Coing with Unequal Link Capacitie an Retricte Wiretapping Set Tao Cui an Tracey Ho Department of Electrical Engineering California Intitute of Technology Paaena, CA 9115, USA Email: {taocui,
Using Overlay Networks to Resist Denial-of-Service Attacks
Uing Overlay Network to Reit Denial-of-Service Attack Ju Wang an Anrew A. Chien Deartment of Comuter Science an Engineering Univerity of California, San Diego {jwang,achien}@c.uc.eu Abtract Proy-network
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
Tripping Current and Short Circuit Current of High Voltage Tester
Tripping Current an Short Circuit Current of igh oltage Teter Xu hezhun Wang Keqin Abtract: Tripping current an hort circuit current are iportant technical pecification of high voltage teter, an frequently
A Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
DECISION SUPPORT SYSTEM IMPROVES SUPPLY CHAIN OPERATIONS
DECISION SUPPORT SYSTEM IMPROVES SUPPLY CHAIN OPERATIONS Ro Parga, Clemon Univerit, [email protected] Chri Jarvi, Clemon Univerit, [email protected] J. Steve Davi, Clemon Univerit, [email protected] John C.
Performance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
An Approach to Optimizations Links Utilization in MPLS Networks
An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.
Warehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
Magnetic levitation technique for active vibration control
Magnetic levitation technique for active vibration control 41 X 3 Magnetic levitation technique for active vibration control Md. Emdadul Hoque and Takehi Miuno Saitama Univerity Jaan 1. Introduction Thi
Numerical Simulation and Experimental Verification of Air Flow through a Heated Pipe
International Journal of Mechanical & Mechatronic Engineering IJMME-IJENS Vol:0 No:02 7 Numerical Simulation and Exerimental Verification of Air Flow through a Heated Pie Qaier Abba, M. Mahabat Khan, Rizwan
SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE
SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE Selin Özçıra Nur Bekiroğlu Engin Ayçiçek e-mail: [email protected] e-mail: [email protected] e-mail: [email protected]
FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
Application of Improved SSL in Data Security Transmission of Mobile Database System
Alication of Imrove SSL in Data Security Transmission of Mobile Database System RUIFENG WANG, XIAOHUA ZHANG, DECHAO XU College of Automation & Electrical Engineering Lanzhou Jiaotong University Lanzhou,
DoSAM Domain-Specific Software Architecture Comparison Model *
DoSAM Domain-Specific Software Architecture Comparion Moel * Klau Bergner 1, Anrea Rauch 2, Marc Sihling 1, Thoma Ternité 2 1 4Soft GmbH Mitterertraße 3 D-80336 Munich, Germany {bergner ihling}@4oft.e
ACTION: Breaking the Privacy Barrier for RFID Systems
ACTION: Breaking the Privacy Barrier for RFID Sytem Li Lu, Jinong Han, Renyi Xiao, and Yunhao Liu Deartment of Comuter Science & Engineering, Hong Kong Univerity of Science & Technoogy, Hong Kong, China
T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D
The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from
REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
A New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
Bi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management
The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an
International Journal of Heat and Mass Transfer
International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note
Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
How To Improve Performance On A Single Chip Computer
: Redundant Arrays of Inexpensive Disks this discussion is based on the paper:» A Case for Redundant Arrays of Inexpensive Disks (),» David A Patterson, Garth Gibson, and Randy H Katz,» In Proceedings
A note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
Bio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
A Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware
Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in
Electronic Commerce Research and Applications
Electronic Commerce Reearch an Application 8 (009) 16 7 Content lit available at ScienceDirect Electronic Commerce Reearch an Application journal homepage www.elevier.com/locate/ecra Pricing iplay a an
License & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service [email protected] www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
Algorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto
Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System
Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department
Utility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
The Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
Control Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
Emergency, Standby and Backup Power Connection Solutions
Emergency, Standby and Backup Power Connection Solution Don t be in the dark. Enuring that you are open for buine i within your power. Blackout, hurricane, lightning, flood, high wind. Power outage caued
A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
Availability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
Firewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
A technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
Cost Models for Selecting Materialized Views in Public Clouds
International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière
Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human
Storage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES
Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,
DUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
A Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *
GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications
SHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
TRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
Nimble Storage Exchange 2013 100,000-Mailbox Resiliency Storage Solution
Nimble Stor Exchan 213 1,-Mailbox Reilie Stor Solution Teted with: ESRP Stor Verion. Tet date: May 2, 21 Overview Thi document provide information on Nimble Stor' iscsi tor olution for Microoft Exchan
How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
QoS-based Virtual Private Network Design for an MPLS network
QoS-bae Virtua Private Networ Deign for an MPLS networ Anotai Sriitja an Davi Tier Det. of Information Science an Teecommunication Univerity of Pittburgh 5 N. Beefie Avenue, Pittburgh, PA 560 emai: [email protected],
A new definition of the fractional Laplacian
A new efinition of the fractional Laplacian W. Chen imula Reearch Laboratory, P. O. Box. 34, NO-325 Lyaker, Norway (9 eptember 2002) Keywor: fractional Laplacian, fractional erivative, Riez potential,
RAID-x: A New Distributed Disk Array for I/O-Centric Cluster Computing
: A New Distributed Disk Array for I/O-Centric Cluster Computing Kai Hwang 1, Hai Jin 1,, and Roy Ho University of Southern California 1 The University of Hong Kong Email: {kaihwang, hjin}@ceng.usc.edu
Project Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
Development Progress
H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M
Improving the Performance of Web Service Recommenders Using Semantic Similarity
Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica
Energy consumption in pumps friction losses
Energy consumtion in ums friction losses In this secon article in a series on energy savings in ums, Hans Vogelesang, irector of Netherlans-base esign consultancy PumSuort, eals with some ractical asects
Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts
Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function
Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load
Salesforce Compensation: An Analytical and Empirical Examination of the Agency Theoretic Approach
Saleforce Compenation: An Analytical an Empirical Examination of the Agency Theoretic Approach Sanjog Mira, Anne Coughlan an Charavarthi Naraimhan 1 Forthcoming in Quantitative an Mareting Economic 1 Sanjog
1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.
12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy
6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
