A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

Size: px
Start display at page:

Download "A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing"

Transcription

1 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton Engneerng College, Henan Unversty of Scence and Technology Luoyang , Chna Abstract The Internet has evolved from an academc network to a broad commercal platform and become an ntegral and ndspensable part of our daly lfe, economc operaton, and socety over forty years. However, many techncal and non-techncal challenges have emerged durng ths process. In order to address these challenges, we analyze the three features pervasveness, heterogenety and ntellgence that the future Internet possesses, and present a novel problem-solvng metrc for future Internet routng whch can ntellgently deal wth the applcaton requrements that current Internet cannot meet. The new routng metrc possesses the capablty of both Store-and-forward and servce provder, the latter of whch s ntroduced by us nnovatvely. Fnally, we detal the routng metrc whch can provde a useful reference for the researches of future Internet routng. Keywords: Future Internet, Network Archtecture, Cognton, Cooperaton;Cross-Layer, Vrtualzaton, Cloud-computng. 1. Introducton The Internet has evolved from an academc network to a broad commercal platform and become an ntegral and ndspensable part of our daly lfe, economc operaton, and socety over forty years. However, many techncal and non-techncal challenges have emerged durng ths process. In the aspect of flexblty, the Internet was orgnally desgned for data transmsson and ts layers are toughly coupled. Its nner runnng state, parameter confguraton and process method cannot be changed, but though the specal nterfaces, whereas the nterfaces seldom change the nformaton. Thus, tradtonal Internet s a knd of statc network essentally, so t cannot confgure Internet dynamcally and meet varous needs of dynamc servce. In the aspect of dversty, today s Internet bulds around the narrow wast of IP, whch makes t hard to change the IP layer to adapt for future requrements, but adapt varous upper and lower layers protocols. Wth the multplcty of Internet busness and sharp expanson of user s requrements, the coexstence of dfferent heterogeneous network s formed under the drve of technology nnovaton and applcaton requrement. Thus, today s Internet can be seen as the logc combnaton of varous network devces n dfferent medum, frequency and space. To add a new applcaton or servce, the Internet needs to be modfed correspondngly, whch forms a messy structure of a forest of chmneys and severely restrcts the sustanng development of Internet. In the aspect of ntellgence, the desgn pattern of tradtonal Internet s decouplng whch s that a knd of network supportng a knd of man servce. The Internet s a closed network runnng n statc mode and lacks ntellgent sensng and respondng mechansm. Its network unt (e.g. host computers, routers, servers) cannot adjust automatcally. However, ntellgent network can sense changeable outer crcumstance and busness taken on to realze automatc adaptaton. Therefore, the decouplng pattern whch used to promote the rapd development of the Internet has become the key obstacle for development of future ntellgent Internet. The problems of tradtonal Internet make t face great nnovaton, especally n the network archtecture whch s the research focus of academy. In the Unted States, early research projects of future Internet manly ncluded Clean Slate 100*100[1], SING[2] and NGN[3]. Later, GENI[4] FIND[5] plan were present. In 2009, the NSF started NetSE project whch merged FIND, SING and NGNI, hopng to make breakthrough n future Internet archtecture by the researches of crossng subject and doman. In 2010, the NSF start FIA plan[6] whch ncludes NDN, MobltyFrst, NEBULA, and XIA projects. In European Unon, the projects facng future Internet nclude FIRE[7] and FIA (EU) [8] whch s a project group of FP7. Besdes, Germany started G-Lab[9] project and France started RNRT[10] project. In Asa, Japan started NWGN[11] project and AKARI[12] project whch s dvded nto three stages (JGN2 JGN2+ JGN3) to construct test bed. In 2003, the 973 project of Chna sponsored the Research of Next-Generaton Internet

2 160 Archtecture whch s contnuously sponsored by 973 of Chna n In the same year, 973 of Chna sponsored the Research of Unversal Trust Network and Pervasve Servces Archtecture. Besdes, the 863, NSF and CNGI of Chna also sponsored a seres of research projects facng to future Internet. By analyzng the projects mentoned above, we fnd that the comprehenson and research contents for future Internet of many countres are the same. There are two dfferent approaches to future Internet research. One s based on the present Internet archtecture and deals wth the major technologcal problems through technology nnovaton. The other s to desgn new network archtecture to settle the major technologcal problems from the begnnng. Whatever approaches they adopt, researchers must acknowledge the technologcal kernel and successful experence of current Internet whch are the root of the boom of the Internet over decades and the man contents of Internet archtecture formed by long-term techncal experment, such as dstrbuted archtecture, packet swtchng, and extensble routng addressng. Based on the nvestgaton on the popular researches of future Internet, we consder that the problems of future Internet should be solved not through desgnng a completely new network but through mprovng current networks The reasons are that the tme cost and economcal cost are ggantc for overthrowng a huge exstent network, such as constructng new nfrastructure, desgnng new applcatons, and tranng users habts. Thus, we present a novel routng metrc based on current varous technologes to provde a helpful reference for the research of future Internet routng technology. Cloud-computng: t provdes technologcal support to the pervasveness. Pervasve servce: t provdes pervasve computng servce for ntellgent termnals. Network securty: t guarantees users rghts. (2) Heterogenety The future Internet wll be a heterogeneous network wth the coexstence of varous access technologes. Because of the followng techncal dversty, the heterogenety of future Internet wll exst n a long term. Communcaton protocol and lnk: dfferent communcaton protocols and lnks are adopted from endedge network, access network to core network. Wreless protocol: there are varous wreless communcaton protocols, such as 2G/3G, WF, Bluetooth and Zgbee. Access lnk: there are varous access lnks, such xdsl, xpon, Ethernet, Cable and prvate communcaton system. Besdes, varous networks dffer n authentcaton mode, QoS, confgurable capablty, and applcaton nterface. 2. Descrpton of Future Internet We consder that future Internet should nclude three mportant characterstcs accordng to nvestgaton and analyss. Core Internet (1) Pervasveness Future Internet s a pervasve network and can realze convenent and fast access at anytme and anywhere for any devces. Because of the followng technologes, the pervasveness of the future Internet s possble. Intellgent termnal: t s the basc medum to acheve ubqutous characterstc. Moble access: t provdes convenent and effcent access mode at anytme and anywhere for ntellgent termnals. (3) Intellgence Fg. 1 Sketch map of topology for future Internet Future Internet also should be an ntellgent network. The researches facng the ntellgence of future Internet nclude cogntve wreless rado, cogntve network, self-adaptve network, autonomc network, bo-nspred network, multagent network, etc. Those researches am to mprove the

3 161 ntellgence of future Internet whch s the man feature dstngushng from tradtonal Internet. Accordng to the above dscusson, we beleve that the future Internet s a complcated dstrbuted network wth the coexstence of varous technologes and devces. In order to aval for our dscusson, we propose the topology of future Internet whch s shown n Fg. 1. The topology ncludes the man components of future Internet, such as computers, ntellgent devces, routers, and servers. 3. Challenges and Meetng Technologes for Future Internet The future Internet wll emerge new challenges n the network connecton of lower layer, data transmsson of mddle layer and ntellgent servce of upper layer. (1) Network Connecton Heterogeneous nterconnecton: because heterogeneous network and devces are always the man components of Internet, heterogeneous nterconnecton mechansm s a challenge of the future Internet. Informaton percepton: the acqurement, transmsson, storage and process of nformaton are also a challenge of the future Internet n physcal/logcal sensng unts deployed n a large scale. Ubqutous access: how to access Internet and ensure the performance of connecton for many portable devces s another challenge of the future Internet. (2) Data Transmsson Tradtonal Internet bulds around the narrow wast of IP, whch makes t hard to provde more abundant functonal support for ts upper and lower layers. Therefore, how to enhance the functon of network layer to adapt the varous access technologes of lower layer and support more luxurant servces of upper layer s an mportant challenge of the future Internet. (3) Intellgent Servce The future Internet s not only data transmsson network, but also support platform whch merges varous heterogeneous networks (e.g. wreless sensor network, vehcle network and Internet of thngs) and burdens a lot of new applcatons (e.g. cloud servce, flow medum and moble computng). How to provde more and better support for these new applcatons s another mportant challenge of the future Internet. For these challenges, researchers put forward a great many solvng technologes, such as vrtual technology, cloudcomputng, autonomc computng, ntellgent decson and machne learnng. We present the routng metrc manly based on the technology of vrtualzaton and Cloudcomputng. (1) Vrtualzaton Vrtualzaton[13, 14] s present to deal wth the rgdty of tradtonal Internet and stmulate research nnovaton of future Internet. It s used to construct robust, credtable and manageable vrtual crcumstance of network and assgn proper vrtual resource for varous vrtual networks to share resources and mprove the usng rato of network nfrastructure. Vrtualzaton can sheld the lower layer heterogenety of networks and devces and support the upper layer dversty of servce. It resolves the pervasveness and heterogenety of future Internet. (2) Cloud-computng Cloud computng[15, 16] derves from Google 101 Plan and mgrate storage and computng to Cloud to construct a computng publc servce and establsh a new global resource share mode lease mode. It manly resolves the pervasveness of future Internet and supports heterogenety and ntellgence. The new technologes (.e. vrtualzaton and cloudcomputng) collaborate wth each other to acheve the pervasveness, pervasveness and ntellgence of future Internet. Ther mergence wll resolve the problems of current Internet and form a new generaton Internet. 4. Proposed routng cloud metrc Routng cloud s a new layer to substtute the network layer of TCP/IP model and OSI model, the compare of staton of whch s shown n Fg. 2. In tradtonal networks, the man functon of network layer s to transmt data packets. In order to extend the functons of network layer, we propose a new desgn blue prnt of network layer routng cloud layer based on vrtual technology and cloud computng. The Routng Cloud layer ncludes the followng functons. The routng cloud layer conceals the dversty of networks and devces of access nfrastructure layer downwards.

4 162 The routng cloud layer conceals the dversty of QoS of servce layer upwardly. The routng cloud layer can store and transmt data packets. The routng cloud layer can provde servce for applcatons. Applcaton Layer Presentaton Layer Sesson Layer Transport Layer Network layer Data Lnk Layer Physcal Layer Routng Cloud Layer Applcaton Layer Transport Layer IP Layer Network Interface Layer OSI model TCP/IP model Fg. 2 Staton of routng cloud layer 4.1 Archtecture of Routng Cloud Layer Routng cloud layer s made up of physcal router sub-layer and vrtual router sub-layer, whch are closely related by mappng relatonshp and whose basc prncple s shown n Fg. 3. Routng cloud Vrtual routng layer VR 1 Routng mappng Physcal routng layer PR 2 PR 1 VR 2 VR 3 Upper layer PR 3 VR 4 VR 5 Lower layer PR 5 PR 4 VR 6 Fg. 3 Archtecture of routng cloud VR 7 VR PR PR 6 VR m The routng cloud layer conssts of physcal routng layer, vrtual routng layer and mappng relatonshp. The physcal routng layer ncludes routers, lnk, topology etc. The vrtual routng layer provdes dfferent servce for dfferent applcatons, whch seems to a group of Vrtual Prvate Networks. The routng mappng addresses the PR n mappng between physcal routng layer and vrtual routng layer. 4.2 Organzng Model of Physcal Routers Organzng model of physcal routers uses Pearson correlatvty prncple to map dscrete physcal routers to a logcal overall. Based on the characterstc nformaton physcal routers, we obtan r n 1 ( X X )( Y Y) n n 2 2 ( X X ) ( Y Y) 1 I 1 where X, Y are the characterstc nformaton of two physcal routers n dfferent tme (the specfc nformaton s determned by the requrements of applcaton). XY, are the average of X, Y. The doman s parttoned by calculatng correlatve coeffcent r, and the routers whose correlatve degree s hgh are parttoned nto a doman. For doman, ts routers are descrbed by Z { L, L,..., L,..., L } 1 2 n. If we chose the router whose operatng factor s the lowest as the reference pont L, the dfference degree of each router s calculated by 2 2 ( X X j ) +(Y Y j ), X,Y Y 2 2 X j j d j ( X X j ) +(Y Y j ) 0, X X j,y Yj Based on the doman of router L, we map the dfferent domans nto one dmensonal space by where c s a constant. L (1) (2) P c d, After mappng physcal routers nto one dmensonal space, they can be denoted n unform method,.e. a physcal router dentfer (PhyRouterID) can only denotes a physcal router. 4.3 Vrtual Routers and Ther Mappng Relatonshp We present the new vrtual router to adapt routng cloud layer. Besdes tradtonal functons of router, the vrtual router possesses two man new functons servce supply and vrtualzaton whch are ntroduced as follows. The vrtual router possesses hgh-powered CPU, MSF, effectve queue, and so on. Apart from transmttng data packets, t can perform busness process lke servers. If the

5 163 requrements of data packet can be met by a vrtual router, t wll drectly respond to and serve the requrements to mprove servce effcency wthout transmttng the data packet to server. Vrtualzaton s the foundaton of realzng the solaton of applcatons of upper layer and hardware of lower layer. It refers to map physcal routers nto ndependent vrtual logcal routers, each of whch possess ndependent bandwdth, CPU and cache. The mappng of vrtualzaton ncludes partte mappng, convergent mappng and mxed mappng. There s only one physcal router and multple vrtual routers n partte mappng whose prncple s llustrated n Fg. 4. The partte mappng s appled to provde elaborate servce, for example, assgnng an ndvdual vrtual router for a specfc knd of applcaton. The vrtual router possesses ndependent confguraton, management authorty, process, forwardng table, etc. The mappng relatonshp s mantaned by physcal router and vrtual routers, respectvely, and s shown as n Table I and Table II. We assgn unque physcal router dentfer PhyRouterID for each physcal router. In one mappng, we also assgn unque mappng dentfer MappngID and unque vrtual router dentfer VrRouterID(s) for each vrtual router. Thus, each vrtual router can be ascertaned by MappngID+VrRouter_ID. The three mappngs are ntroduced as follows respectvely. VrRouter 1 VrRouter 2 PhyRouter VrRouter VrRouter n (1) Partte mappng Fg. 4 Partte mappng mode for routers Table I Partte mappng for physcal router 2 PhyRouterID Identfer of physcal router 3 VrRouterIDs Lst of dentfer of vrtual routers There are one physcal router and multple vrtual routers n the mappng. One physcal router assocate to multple One vrtual router assocate to one mappng and one physcal router. Table II Partte mappng for vrtual router 2 PhyRouterID Identfer of physcal router 3 VrRouterID Lst of dentfer of vrtual routers 4 ServceSupplyLst The provded servce of the vrtual router. There are one physcal router and multple vrtual routers n the mappng. One physcal router assocate to multple One vrtual router assocate to one mappng and one physcal router. 5 pfs The packet forwardng speed of the vrtual router 6 nocl The number of concurrent lnk of the vrtual router 7 nonlps The number of new lnks per second of the vrtual router

6 164 (2) Convergent mappng There are multple physcal routers and one vrtual router n convergent mappng whose prncple s llustrated n Fg. 5. The convergent mappng s appled to provde hghpowered servce for applcaton requrng hgh process capablty. In convergent mappng, each physcal router mantans the mappng relatng to a vrtual router, and the vrtual router mantans the physcal routers that t contans. The mappng relatonshp s shown as n Table III and Table IV. (3) Mxed mappng There are multple physcal routers and multple vrtual routers n convergent mappng whose prncple s llustrated n Fg. 6. The mxed mappng s appled to more complcated applcaton and ts mappng relatonshp s shown as n Table V and Table VI. VrRouter 1 VrRouter 2 VrRouter VrRouter m VrRouter Mappng Relatonshp PhyRouter 1 PhyRouter 2 PhyRouter PhyRouter n PhyRouter 1 PhyRouter 2 PhyRouter PhyRouter n Fg. 5 Convergent mappng mode for routers Fg. 6 Mxed mappng mode for routers Table III Convergent mappng for physcal router 2 PhyRouterID Identfer of physcal router 3 VrRouterID Identfer of vrtual router There are multple physcal routers and one vrtual router n the mappng. One physcal router assocate to multple The vrtual router only assocates to one mappng and one physcal router. Table IV Convergent mappng for physcal router 2 PhyRouterIDs Lst of dentfer of physcal routers 3 VrRouterID Identfer of vrtual router There are multple physcal routers and one vrtual router n the mappng. One physcal router assocate to multple The vrtual router only assocates to one mappng and one physcal router.

7 165 Table V Mxed mappng for physcal router 2 PhyRouterID Identfer of physcal router 3 VrRouterIDs Lst of dentfer of vrtual routers There are multple physcal routers and multple vrtual routers n the mappng. One physcal router can nclude multple The vrtual router only assocates to one mappng and multple physcal routers. Table VI Mxed mappng for physcal router 2 PhyRouterIDs Lst of dentfer of physcal router 3 VrRouterID Lst of dentfer of vrtual routers There are multple physcal routers and multple vrtual routers n the mappng. One physcal router can nclude multple The vrtual router only assocates to one mappng and multple physcal routers. 4.3 Servce Supply Mode of Routng Cloud Layer Compared wth tradtonal network layer, the man new functon s supply applcaton servce whch means that routers replace the partal/whole functons of applcaton servers to realze applcaton busness. In order to acheve supply applcaton servce of routng cloud layer, t s needed to establsh unform dentfers for runnng applcatons, whch s accomplshed by vrtual servce layer. The man thought of supply applcaton servce s shown n Fg.7. We llustrate the basc prncple of supply applcaton servce from the vews of physcal routers and vrtual routers accordng to Fg.7 as follows. (1) Vew of Physcal Router From the vew of physcal routers, user1 vsts the applcaton server A through physcal routers PRL1 (PR6- PR4-PR1), and user2 vsts the applcaton server A through physcal routers PRL2 (PR8-PR7-PR5-PR3-PR2). In the vew of tradtonal router, the router PRL1 and PRL2 only acheve the storage and transmsson of the data between server and user. In the vew of our routers, a physcal router downloads the correspondng servce when transmttng data packets. If the same requrements pass by the physcal router, t drectly responds to the requrements by tself wthout transmttng to server A. It wll form a supply servce tree of server A shown n Fg. 8 (a). Server A VR 1 PR 2 PR 1 VR 2 Vrtual router layer VR 3 Mappng Physcal router layer PR 3 (2) Vew of Vrtual Router VR 4 VR 5 PR 4 PR 5 VR 6 VR 7 VR 8 PR 7 PR 6 Fg. 7 Theory of Servce supply VR 9 PR 8 Vew of vrtual router User 1 User 2 Vew of physcal router From the vew of vrtual routers, user1 vsts the applcaton server A through vrtual routers VRL1 (VR9- VR6-VR5-VR3-VR1), and user2 vsts the applcaton

8 166 server A through vrtual routers VRL2 (VR7-VR4-VR3- VR1). In the vew of tradtonal router, the router VRL1 and VRL2 only acheve the storage and transmsson of the data between server and user. In the vew of our routers, a vrtual router downloads the correspondng servce when transmttng data packets. If the same requrements pass by the vrtual router, t drectly responds to the requrements by tself wthout transmttng to server A. It wll form a supply servce tree of server A shown n Fg. 8 (b). PR8 PR7 PR5 PR3 PR2 PR6 server PR4 PR1 (a) Servce supply tree of physcal router VR9 VR6 VR5 Fg. 8 Tree of Servce supply VR3 VR1 VR4 VR7 server (b) Servce supply tree of vrtual router Wth tme passng by, t wll generate a ggantc supply servce tree of the server A n whole network. Each router of the tree mantans a servce supply table to ensure the coherence and valdty of servce between the router and server A. 6. Conclusons The future Internet s regarded as an nevtable developmental trend to resolve the problems of tradtonal Internet. Compared wth tradtonal Internet, future Internet wll get mproved greatly n performance and functons. Thus, the future Internet faces a good many challenges n network access, network transmsson and network servce. In ths paper, we propose a thought of soluton and relevant archtecture for future Internet through convergng cognton, cross-layer, cooperaton, vrtualzaton and cloud computng. The archtecture conssts of protocol plane, cogntve plane and control plane whch collaborate wth each other to acheve the performance and functons. Acknowledgments Ths work s supported by the Natonal Natural Scence Foundaton of Chna (NSFC) under Grant No.U , No and No References [1] [2] [3] [4] Global Envronment for Networkng Investgatons (GENI), /cse/gen/. [5] NSF NeTS FIND Intatve, [6] NSF Future Internet Archtecture Project, [7] Future Internet Assembly, home/ future-nternet-assembly.html [8] FIRE: Future Internet Research and Expermentaton, [9] [10] [11] New Generaton Network(NWGN) Beyond NGN n Japan, [12] New Generaton Network Archtecture AKARI Conceptual Desgn (ver1.1), _verson_1_1.pdf [13] W. Louat, D. Zeghlache, Network-Based Vrtual Personal Overlay Networks Usng Programmable Vrtual Routers, IEEE Communcatons Magazne, 45(7): 51-57, July [14] A. Karma, B. Mohammed, B. Azeddne, New vrtual coordnate system for mproved routng effcency n sensor network, Internatonal Journal of Computer Scence Issues, Vol. 9, No. 3, 2012, pp [15] M. Armbrust, A. Fox, R. Grffth, A vew of cloud computng, Communcatons of the ACM, 53(4):50-58, Apr [16] B. Al, H. Sohrab, J. Al, B. Akbar, A cloud computng collaboratve archtecture model, Internatonal Journal of Computer Scence Issues, Vol. 9, No. 3, 2012, pp Rujuan Zheng receved her B.S. degree from Henan Unversty n 2003, studed n Harbn Engneerng Unversty from 2003 to 2008, and receved Ph.D. degree. She works as an Assocate Professor n Henan Unversty of Scence and Technology from 2008 to now. In partcular, her research nterests nclude bo-nspred networks, Internet of Thngs, future Internet and computer securty. Mngchuan Zhang receved hs B.S. degree from Luoyang Insttute of Technology n 2000 and M.S degree from Harbn Engneerng Unversty n He works as a Lecturer n Henan Unversty of Scence and Technology from 2005 to now. In partcular, hs research nterests nclude ad hoc network, Internet of Thngs, cogntve network and future Internet technology. Qngtao Wu receved hs Ph.D. degree from East Chna Unversty of Scence and Technology. He works as an Assocate Professor n Henan Unversty of Scence and Technology from Mar 2006 to now. Hs research nterests nclude component technology, computer securty and future Internet securty. Wangyang We receved hs B.S. degree from Zhengzhou Unversty n 2001 and M.S degree from Sun Yat-Sen Unversty n He works as a Lecturer n Henan Unversty of Scence and Technology from 2004 to now. In partcular, hs research nterests nclude component technology, mage processng, database theory and technology etc. Haxa Zhao receved her B.S. degree from South West Normal Unversty n 1998 and M.S degree from Natonal Unversty of Defense Technology n She works as a Lecturer n Henan Unversty of Scence and Technology from 1998 to now. In partcular, her research nterests nclude wreless sensor networks, Internet of Thngs, cogntve network, database theory and technology etc.

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Resource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid

Resource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid Proceedngs of the 200 4th Internatonal Conference on Computer Supported Cooperatve Work n Desgn Resource Schedulng Based on Dynamc Dependence Injecton n Vrtualzaton-based Smulaton Grd Hanbng Lu,Hongy Su,

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM 1 WEIZHI LIAO, 2 LINFU SUN 1 School of Electromechancal Engneerng, UESTC of Chna, Chengdu 610054, Chna 2 CAD Engneerng Center, Southwest JIAOTONG

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Data security in Intelligent Transport Systems

Data security in Intelligent Transport Systems Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing Internatonal Journal of Securty and Its Applcatons, pp.343-352 http://dx.do.org/10.14257/sa.2015.9.12.33 Cross-Doman Authorzaton Management Model for Mult- Levels Hybrd Cloud Computng L Na 1, Dong Yun-We

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 1 2011 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information

Scalability of a Mobile Cloud Management System

Scalability of a Mobile Cloud Management System Scalablty of a Moble Cloud Management System Roberto Bfulco Unversty of Napol Federco II roberto.bfulco2@unna.t Marcus Brunner NEC Laboratores Europe brunner@neclab.eu Peer Hasselmeyer NEC Laboratores

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Daily Mood Assessment based on Mobile Phone Sensing

Daily Mood Assessment based on Mobile Phone Sensing 2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

An agent architecture for network support of distributed simulation systems

An agent architecture for network support of distributed simulation systems An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

A new anonymity-based protocol preserving privacy based cloud environment

A new anonymity-based protocol preserving privacy based cloud environment Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

A powerful tool designed to enhance innovation and business performance

A powerful tool designed to enhance innovation and business performance A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued

More information

Introduction CONTENT. - Whitepaper -

Introduction CONTENT. - Whitepaper - OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

VIP X1600 M4S Encoder module. Installation and Operating Manual

VIP X1600 M4S Encoder module. Installation and Operating Manual VIP X1600 M4S Encoder module en Installaton and Operatng Manual VIP X1600 XFM4 VIP X1600 Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual 7 1.3 Intended

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Load Balancing By Max-Min Algorithm in Private Cloud Environment Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution

A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution A Cluster Based Replcaton Archtecture for Load Balancng n Peer-to-Peer Content Dstrbuton S.Ayyasamy 1 and S.N. Svanandam 2 1 Asst. Professor, Department of Informaton Technology, Tamlnadu College of Engneerng

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan

More information