Security Analysis of IMA Primary Processing System Based on DFTA
|
|
- Eileen Norton
- 5 years ago
- Views:
Transcription
1 Internatonal Conference on Mechatroncs, Electronc, Industral and Control Engneerng (MEIC 2014) Analyss of IMA Based on DFTA Ygang Sun Hao L haol0508@163.com Zhen Zhao zhenzhao0523@gmal.com Zhyong Fan Avoncs Engneerng Faculty, Cvl Avaton, Chna Abstract In order to realze the archtectural benefts (ncreased system scalablty, decreased workload, and etc.), the securty of the IMA archtecture should be put on the frst poston. IMA archtectures utlze shared, confgurable computng, communcaton, and I/O resources. These archtectures do lots of benefts to the avoncs system ntegrators. By learnng from GENIS (a new style of synthess computng platform that comprses IMA and other computng platform, and provdes computng, communcaton and I/O resources for the tme-embedded system known as Hosted ), ths paper focuses on the composton, functon, structure and prncple of the prmary processng system of IMA platform, and enumerates one model about ts characters n component number, communcaton ways, and placed locatons. From the perspectve of ntegrty and avalablty, the securty of IMA archtecture s analyzed usng the Dynamc Fault Tree Analyss n ths paper. The analyss results provde gudance for mplementaton of Hosted n IMA prmary Keywords-; Archtecture; DFTA; processng system; IMA I. INTRODUCTION Integrated Modular Avoncs (IMA) archtectures are based upon a set of modular systems that share computng, communcaton, I/O resources, and etc. In order to conserve computng resources, power resources, and module for the collectve set of avoncs onboard, IMA archtectures ncreased levels of avoncs ntegraton. Thus, the use of ntersystem resources can be a new way n the world of systems ntegraton. An open systems archtecture known as GENIS (Generc Networked Element for Synthess of Integrated ) was mplemented on the Boeng 787 as the Common Core (CCS) [1]. The 787 CCS s one of the frst examples of an open system IMA archtecture that was put nto practce, ths IMA platform can ntally host about 70 applcatons for ndependent supplers, but s capable of hostng over 100 applcatons [2]. Snce a lot of avoncs functons are ntegrated together usng the shared platform resources, the use of ntersystem resources would be a new paradgm n the world of systems ntegraton. Then the complexty of the ntegraton process s ncreased due to the sharng of ntersystem resources. So the securty of IMA platform appears partcularly mportant. Prevous work has addressed modular certfcaton arguments [3], mechansms for compostonal reasonng and modular systems [4], besdes, automated selecton, szng, and mappng of IMA modules had dscussed n [5]. Ths paper has a detal descrpton about the composton and ntegraton of IMA prmary By analyzng the ntegrty and avalablty of IMA prmary processng system, ths paper provdes gudance for mplementaton of Hosted n IMA prmary II. PRIMARY PROCSING SYSTEM OF IMA PLATFORM A. Prncples of IMA IMA archtectures are dfferent from tradtonal federated archtectures for whch each system contans ts own dedcated processor, communcaton channels, and I/O resources. IMA archtectures provde a more effcent soluton by sharng resources and mnmzng resource waste. Multple systems can be archtected and overlad on the parttoned platform resources to form a hghly ntegrated system wth the unque characterstcs of full solaton and ndependence of each ndvdual system. Hosted s s referred to that avoncs systems hosted on an IMA platform. The shared resources must be allocated among the Hosted s wthn the IMA archtecture. For Hosted s, they can own unque sensors,, devces and non-platform LRUs that become part of the functonal system archtecture. Multple Hosted s share the platform resources wthn a logcal system envronment enforced by parttonng mechansms that are mplemented as part of the platform desgn. The logcal system parttonng envronment guarantees that Hosted functons are solated from each other. Fg 1 depcts a type of IMA system archtecture [6]. To mtgate the error propagaton, hgh The authors - Publshed by Atlants Press 534
2 ntegrty fault contanment mechansms should be mplemented and ensure that when a fault n one Hosted or platform component wll not ntate falures n all Hosted s. Redundancy mechansms are also requred to deal wth the error propagaton across multple Hosted s. Logcal Boundares Physcal Boundares Module 1 Infrastructure O/S Processor Communcatons Network I/O Module Fgure 1 parttons A B C A type of IMA system archtecture B. The prmary processng system Module 2 Infrastructure O/S Processor I/O Module As descrbed above, the prmary processng system of IMA platform can be obtaned. It s proposed to dealng wth relevant avoncs tasks and provdng servces for hosted functons. The system s comprsed of sngle or multple IMA cabnets, data transmsson networks and nterfaces. To ensurng that each system applcaton can share computng, network, I/O resources, the allocaton of these resources s predetermned. The prmary processng system of IMA platform can hold the functons of data processng, data transmsson, and data converson based on these shared resources. It s a real-tme dstrbuted computer system whch can manage a synthess processng on data, sgnal and mage. For the expectaton of beng generally used n any avoncs system, at the hardware aspect, IMA prmary processng systems should be desgned as standard modules and combned wth external non-commonly sensors frontend, and applcaton software va nterfaces, fnally mprove nteroperablty and lower the total costs of equpment lfespan[7]. In vew of the mentoned functons, the man components of the IMA prmary processng system can be concluded as GPM, AFDX and RDIU [8]. III. SYSTEM FUNCTION AND CORRPONDING COMPONENTS A. The functon of data processng and General Module (GPM) The data processng functon covers hardware as well as software requrements. It provdes resources for Hosted for the mplementaton of arcraft s Data processng functon can be realzed by resources (enough processng tme, memory and etc.) suppled for Hosted. GPM s system processng resource, whose man task s realzng the data processng It also provdes robust classfcaton for envronment and nfrastructure servces (e.g. I/O, health montorng, the storage and retreval of non-volatle fles based on the ARINC653 standard). Besdes, core software s hosted on t. The realtme operatng system based on ARINC653 s hosted on every GPM whch supples operatng control and resources management n tme-spatal dvson (workng tme dvson, space dvson) for GPM. s lke data processng, health management, data loadng, confguraton management and system recovery are hosted on GPM. The hardware used for GPM can realze fault passve protecton, there s no sngle falure can lead to an ncorrect acton, meanwhle, there s no stuaton that not detected fault leads to an ncorrect acton. GPM owes ts ndependent ntegrty and redundancy whch can meet the avalablty of Hosted. B. The functon of data transmsson and Avoncs Full Duplex Swtched Ethernet (AFDX) The system provdes resources for the data transmsson network whch makes a connecton between data processng resources and other arcraft subsystems based on the ARINC664-P7 standard. The data transmsson network s conssted of End (), Swtch () and AFDX. Each of the n the AFDX s connected wth two redundancy channels and each channel s desgned matched wth the, thus, t can mprove the avalablty of data transmsson. can manage the work status based on the transmsson and recevng of data stream n every logcal channel. Structure of the AFDX network s shown n Fg 2. AFDX network s the communcaton channel of IMA prmary Its structure s dsposed n dual star topology. As for each termnal node n topology structure there wll be a backup node, the two nodes wll connected n a pont-to-pont way wth two ndependent communcaton path (channel A and channel B). Controller Sensor Actuator Controller Sensor Actuator Subsystem Subsystem Arborne Computer Avoncs Internet AFDX Swtch Gateway Fgure 2 Structure of the AFDX network Research on optmal desgn of vrtual lnks n AFDX network was proposed n [9]. So long as the End s meet the requrement of avalablty, they could be separately connected to AFDX network va sngle swtch. Every network channel s desgned to contan all the falures probably taken placed between transmttng and recevng ports. The fault sealng property s realzed by usng complete algorthm that runnng n the End. These wll lead to hgher avalablty n redundancy channels and ensure ntegrty not affected by the network. C. The functon of data converson and Remote DataInterface Unte (RDIU) RDIU s used to complete data converson functon n IMA prmary Its man task s 535
3 provdng data nterfaces va AFDX data bus for seres of tradtonal sensors, and man processng resources. It works as a data-to-data gateway among AFDX network, analog devce, tradtonal ARINC 429 and lnear CAN subnet. RDIU accumulates data from data bus n every buffer area and mappng these data to specally apponted ARINC 664-P7 ports whch located n AFDX End. In order to ensure the separaton between functon sgnals of I/O and avod error propagaton between nterfaces, the parttonng method of I/O n RDIU s physcal separaton method. The structure of RDIU s conssted of two dfferent ntegrty areas, one s shared by all resources users and another s provded ndependently for dedcated users. The mportance of ths structure s to ensure that when falures exst n publc resources, the falures wll not lead to falures n dedcated resources or the functon that s usng the resources smultaneously. Output from each RDIU wll be forced n a safe state when falures or not vald commands exst n output nterface. A fault wll be marked when t s detected and data n transmttng packets n a network wll be regarded as nvald. D. composte structure For the sake of formng a specfed IMA prmary processng system and achevng mplementaton n physcal, the components can nstalled n vares of ways. These components can be assembled n the style of LRU, LRM or PCB, besdes, the LRM and PCB can be combned n the cabnet of IMA to share publc resources lke power and refrgeraton. As n Boeng 787 arcraft, ts CCS s a specfc physcal mplementaton of IMA system. Many GPM and AFDX network swtches are assembled n one cabnet. RDIU s made as RDC n CCS and other AFDX network swtches are made n the style of LRM [10]. The scale of the IMA prmary processng system s changed over the dfferent securty level of Hosted. Fg 3 descrbes one model structure of IMA prmary processng system [11]. Each resource n module can be ncreased or decreased based on the requrement of Hosted n a gven group. When the scale of these modules changed over tme, the system operaton and functon structure wll not be affected, as the resources allocaton whch lnked to functons reman unchanged and have no effect on exstng Hosted. Fgure 3 The left cabnet of IMA ACS-LA GPM-L1 ARS-1A ACS-LB Sgnal Resources (sensors) Hot Backup The rght cabnet of IMA ACS-RA ARS-1B GPM-R1 Sgnal Resources (sensors) Hot Backup ACS-RB One model structure of IMA prmary processng system In Fg 3, GPM and part of network swtches are placed separately n rght/left cabnets and components can be mutual backup f they are n same types. Network swtches are classfed nto two types: AFDX Cabnet Swtch (ACS) and AFDX Remote Swtch (ARS). AFDX s a full meshed network, every swtch connected to another. The data transmtted n channel A s the same as channel B, ntegrty testng and the elmnaton of nvald frames can operated n the then redundant frames can be elmnated by redundancy management. The resource module of IMA prmary processng system can be confgured. To make sure there wll be enough processng tme, memory capacty, I/O port and nterface resource, each Hosted acqures requred resources based on the safety level n the system. The dstrbuton of these resources modules are realzed by the specfc confguraton tables whch loaded to every system component. IV. ANALYSIS AND RULTS In order to ensure the securty of IMA prmary processng system, falure state should be put n the frst place. By usng the Hazard Assessment (FHA), falure state that caused by the potental hazard when system n falure or workng state can be dentfed whlst classfcaton on system falure state should be executed to match wth the level that system expected to be. The FHA results are separately showed n Table I and Table II Table I s about the system avalablty and Table II the system ntegrty. TABLE I THE FHA RULTS ABOUT AVAILABILITY Provdng General Resources for Arcraft RELATED TO IMA SYSTEM State ablty for a crtcal crtcal crtcal Lost the ablty to restart a crtcal Hosted. functon to a hgh necessty hgh necessty hgh necessty Lost the confguraton management functon of system. ablty for a low necessty low necessty low necessty Level s lsted n Table I and Table II are matched wth the functon realzed by IMA prmary processng system, nclude data processng, data transmsson, data converson, and etc. Generally, undetected error data or acton belongs to the doman of system ntegrty whle lost ablty or resource belongs to the doman of system 536
4 avalablty. Only when the requrement of ntegrty and avalablty are fully met can system acheve the requred securty level. TABLE II THE FHA RULTS ABOUT INTEGRITY Provdng General Resources for Arcraft RELATED TO IMA SYSTEM State Undetected error transmsson n network data. nterface resource to a crtcal Undetected error data processng n a processng component. Undetected error behavor n IMA health management Undetected error behavor n data loadng Undetected fault n system confguraton management nterface resource to a hgh necessty nterface resource to a low necessty Level l The classfcaton of securty level n falure state has a drect connecton to the mportance of Hosted, for example, the securty level of falure state s catastrophc so as to the corresponded Hosted. TABLE III RELATIONSHIP BETWEEN SECURITY LEVEL AND THE MAXIMUM PROBABILITY Hazard The Maxmum allowable Class probablty( per Flght Hour) Level Ⅰ 9 Hazard Ⅱ 7 Ⅲ 5 Secondary Ⅳ 3 The correspondng relatonshp between securty level and the maxmum probablty s showed n Table III. A. Fault tree modelng Because of the dynamc characterstcs of IMA prmary processng system, dynamc logcal gates are adopted to establsh the dynamc fault tree wth the help of conventonal method. Combned wth possble falure states, the fault tree model of the ntegrty and the avalablty can be establshed. The dynamc fault tree analyss model s shown as Fg 4 and Fg 5. Fg 4 s ntegrty DFTA model, Fg 5 s avalablty DFTA model. s stand for Undetected Erroneous Data. Loss of ntegrty E1:ARS 1A G1:ARS Falure E2:ARS 1B E3:ACS LA G4:ACS L Fgure 5 E4:ACS LB E5:CCR L G3:CCR L G2:CCR E6:GPM L1 B. Analyss based on DFTA R:Loss of avalablty E7:ACS RA G5:CCR R G6:ACS R E8:ACS RB E9:CCR R avalablty DFTA model E11:RDIU- 1 E10:GPM R1 G7:RDIU Falure E12: Modularzaton s an effectve way to deal wth DFTA. By decomposng the Dynamc Fault Tree nto many ndependent modules, then, numercal combnaton or BDD can be used to analyze statc module and Markov Model used to analyze dynamc module. There the DFTA model n Fg 5 s used to show the process of analyss. Modular decomposton: accordng to the characters of DFTA, a search method based on lnear DFLM s used to modular decomposton. Conductng DFLM search n fault tree module, the result s as TABLE IV. TABLE IV DFLM RULT Event R1 G1 G2 G3 G4 G5 G6 G7 #1 #2 Last Mn Max Mod Yes Yes Yes Yes Yes Yes Yes Yes Statc/Dynamc Dynamc Dynamc Dynamc Statc Statc Statc Statc Dynamc Results can be got form TABLE IV that the statc modules nclude G3, G4, G5 and G6; dynamc modules nclude R, G1, G2 and G7. Statc modules analyss: BDD analyss method s used to analyze statc modules: G3, G4 converted G3, G4 nto BDD chart as Fg 6. E3 E4 G3 BBD E6 E5 E3 G4 BBD E4 GPM GPM OR The probablty of GPM usng one of the GPM s 0.5 GPM L1 GPM L1 GPM L2 GPM L2 Fgure 4 ntegrty DFTA model 0 1 Fgure 6 BDD chart From the BDD chart, the cut-sets of G3 can be descrbed as {E3}, {E4}, {E5} and {E6}. The probablty of top event n G3 can be calculated as: P(G 3) 1 P( E 3) P( E 4) P( E 5) P( E 6) (1)
5 P( G 4) 1 P( E 3) P( E 4) (2) Dynamc Modules Analyss: Markov state-transton method s used to analyze dynamc modules. G1, G2 and G7 contan logc gate n ther structures and the number of backup s one, the corresponded Markov statetranston fgure s as Fg t 1 t 1 t t t Fgure 7 Markov state-transton dagram The prmary component n logc gate has the same falure rate as backup n and the probablty of dynamc module s: PG e e 2 t t (t) 1 2 (3) : the falure rate of the module under the logc gate. Comprehensve Analyss: R can be regarded as an ndependent sub-tree whch takes ndependent sub-tree G1, G2 and G7 as bottom events. Then R can be treated as statc module and converted used BDD method. Then the probablty of R s: P(R) P(G 1) P(G 2) P(G 7) (4) Calculaton: wth the probablty of bottom events provde as TABLE V. TABLE V PROBABILITY OF BOTTOM EVENTS Bottom event Probablty(per hour) Undetected error data n GPM 10 Undetected error data n the of GPM 10 Undetected error data n RDIU 6 Undetected error data n the of RDIU 6 ACS falure Cabnet falure 7 GPM falure ARS falure RDIU falure 5 The probablty of losng ntegrty and avalablty can be ganed as TABLE VI shows. TABLE VI CALCULATION RULTS Loss ntegrty Loss avalablty Level Sut to the degree of Hosted Low necessty Compared the results n TABLE VI wth the securty levels n TABLE III, t s clear that whch structure s sut to the securty level of Hosted and ths wll do benefts to the mplementaton of Hosted n IMA prmary For example, the structure showed n ths paper reaches the prmary securty level and t s appled to low necessty Hosted. V. CONCLUSION Ths paper has a deep study n IMA archtecture especally the prmary processng system of t. A clear structure and composton s showed. From the perspectve of ntegrty and avalablty analyzed by DFTA, ths paper analyses the securty of IMA prmary processng system, the results can be beneft to the mplementaton of Hosted n IMA prmary However, there are stll lots of work should be done to expand the deeper study n the securty of IMA archtecture. One typcal model of IMA prmary processng system was enumerated n ths paper, but t s not necessarly sutable for all avoncs systems. The model should be changed wth the system structure and the revsed system should be re-analyzed. In addton, because of the restorablty of system components and the software securty level were dscounted, the securty analyss s lmted n IMA prmary ACKNOWLEDGMENT Ths work was supported by the project 973 (Grant No. 2014CB744904), the Natonal Scence Foundaton of Chna (Grant No ), the Cvl Avaton Unversty of Chna (CAUC) Research Enablng Foundaton (Grant No. 2012QD22X). REFERENC [1] Chrstopher B Watkns, Smths Aerospace LLC, Grand Rapds. Integrated modular avoncs: Managng the allocaton of shared ntersystem resources [J]. 25 th Dgtal Avoncs Conference, October 15, [2] Jensen, Davd, 1 November 2005, B787 Cockpt: Boeng s Bold Move, Avaton Today. [3] Rushby, John, December 2002, Modular Certfcaton, NASA Contractor Report, CR , NASA Langley Research Center. [4] Namjosh, Kedar S., Rchard J. Trefler, July2000, On the Completeness of Compostonal Reasonng, Computer-Aded Verfcaton, CAV 2000 Vol of Lecture Notes n Computer Scence, Chcago, IL, Sprnger-Verlag, pp [5] Björn Annghöfer, Ernst Kleemann, Frank Thelecke. Automated Selecton,Szng,and Mappng of Integrated Modular Avoncs Modules [J]. 32nd Dgtal Avoncs s Conference October 6-10, 2013, pages 2E2-1 2E2-14. [6] Chrstopher B Watkns, Smths Aerospace LLC, Grand Rapds. Modular Verfcaton: Testng a Subset of Integrated Modular Avoncs n Isolaton [J]. 25 th Dgtal Avoncs Conference, October 15, [7] Zhengqu Xe, Mngwang Wu. Analyss of Arborne Equpment and Its Key Technologes on Large Arcraft [J]. Aeronautcal Manufacturng Technology, 2009(2): [8] Cary R.Sptzer. Dgtal Avoncs Handbook: Avoncs Development and Implementaton [M].Bejng: Avaton Industry Press, [9] Al Shekh, Ahmad, Olver Brun, Maxme Chéramy, and Perre- Emmanuel Hladk, Optmal Desgn of Vrtual Lnks n AFDX networks. Real-Tme s, pages [10] Xaozhe Sun, Song Han, Zongj Chen. Research on avoncs system of and vrtual prototype technology of cvl arcraft [C]. Shangha: Chnese Socety of Aeronautcs and Astronautcs, [11] Hongyan Zheng. Dynamc Fault Tree Analyss for the IMA Core of Cvl Arcraft [D].Nanjng: Nanjng Unversty of Aeronautcs and Astronautcs, 2013:
Cluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationSolution Brief: Creating a Secure Base in a Virtual World
Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationDesign and Realization of Open CNC System Based on Software Motion Controller
Internatonal Forum on Management, Educaton and Informaton Technology Applcaton (IFMEITA 2016) Desgn and Realzaton of Open CNC System Based on Software Moton Controller Xu Ran1, a, Janqun Lu2, b, Weqang
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationReliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm
Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationan assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han
UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationApplication of Clustering Algorithm in Big Data Sample Set Optimization
Applcaton of Clusterng Algorthm n Bg Data Sample Set Optmzaton Yutang Lu 1, Qn Zhang 2 1 Department of Basc Subjects, Henan Insttute of Technology, Xnxang 453002, Chna 2 School of Mathematcs and Informaton
More informationTWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG*
TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS W. HU*, A. G. STARR* and A. Y. T. LEUNG* * Manchester School of Engneerng, The Unversty of Manchester, Manchester M13 9PL, UK To
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationSession 5.3. Switching/Routing and Transmission planning
ITU Regonal Semnar Belgrade Serba and Montenegro 20-24 24 June 2005 Sesson 5.3 Swtchng/Routng and Transmsson plannng volvng nfrastructures to NGN and related Plannng Strateges and Tools I.S. Sesson 5.3-1
More informationA new segmentation algorithm for medical volume image based on K-means clustering
Avalable onlne www.jocpr.com Journal of Chemcal and harmaceutcal Research, 2013, 5(12):113-117 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCRC5 A new segmentaton algorthm for medcal volume mage based
More informationCS 268: Lecture 8 Router Support for Congestion Control
CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationDAQ-Middleware: Data Acquisition Middleware based on Internet of Things
DAQ-Mddleware: Data Acquston Mddleware based on Internet of Thngs Zhjn Qu, Zhongwen Guo, Shua Guo, Yngjan Lu and Yu Wang Ocean Unversty of Chna, Qngdao, Shandong, Chna Unversty of North Carolna at Charlotte,
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More information4/11/17. Agenda. Princeton University Computer Science 217: Introduction to Programming Systems. Goals of this Lecture. Storage Management.
//7 Prnceton Unversty Computer Scence 7: Introducton to Programmng Systems Goals of ths Lecture Storage Management Help you learn about: Localty and cachng Typcal storage herarchy Vrtual memory How the
More informationAdvances in Engineering Research, volume 104 7th International Conference on Mechatronics, Control and Materials (ICMCM 2016)
7th Internatonal Conference on Mechatroncs, Control and Materals (ICMCM 6) ynamcs Modelng and valuaton of etermnstc ynamcs n Advanced Avoncs Networks Guoquan Zhang,Qfeng Ren,b,Qmng Yang,Jandong Zhang,a,Yan
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationRADIX-10 PARALLEL DECIMAL MULTIPLIER
RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com
More informationParallelization of a Series of Extreme Learning Machine Algorithms Based on Spark
Parallelzaton of a Seres of Extreme Machne Algorthms Based on Spark Tantan Lu, Zhy Fang, Chen Zhao, Yngmn Zhou College of Computer Scence and Technology Jln Unversty, JLU Changchun, Chna e-mal: lutt1992x@sna.com
More informationFPGA-based implementation of circular interpolation
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 04, 6(7):585-593 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 FPGA-based mplementaton of crcular nterpolaton Mngyu Gao,
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationVISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
More informationAn IPv6-Oriented IDS Framework and Solutions of Two Problems
An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationMultigranular Simulation of Heterogeneous Embedded Systems
Multgranular Smulaton of Heterogeneous Embedded Systems Adtya Agrawal Insttute for Software Integrated Systems Vanderblt Unversty Nashvlle, TN - 37235 1 615 343 7567 adtya.agrawal@vanderblt.edu Akos Ledecz
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.
More informationOutline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011
9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationGeneral Description. Description
June 0 Sheet 0 Metal-Enclosed Swtchgear MVS Medum Voltage Load Interrupter Fusble Swtch General Descrpton.0- Motor Operated MVS Swtches Applcaton Eaton s Cutler-Hammer MVS Pow-R- Drve motor operator makes
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationIf you miss a key. Chapter 6: Demand Paging Source:
ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationAn Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems
S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,
More informationA Saturation Binary Neural Network for Crossbar Switching Problem
A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com
More informationAnnales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization
Annales Informatca AI 1 (2003) 277-284 Annales Informatca Lubln-Polona Secto AI http://www.annales.umcs.lubln.pl/ Desgnng of multchannel optcal communcaton systems topologes crtera optmzaton Mrosław Hajder,
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationGame Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers
Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,
More informationResearch Article. ISSN (Print) s k and. d k rate of k -th flow, source node and
Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com
More information3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method
NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationDesign of intelligent sensor based on BP neural network and ZigBee wireless sensor network
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 204, 6(6):820-826 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Desgn of ntellgent sensor based on BP neural network and
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationEnergy-Efficient Workload Placement in Enterprise Datacenters
COVER FEATURE CLOUD COMPUTING Energy-Effcent Workload Placement n Enterprse Datacenters Quan Zhang and Wesong Sh, Wayne State Unversty Power loss from an unnterruptble power supply can account for 15 percent
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationNeeded Information to do Allocation
Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to
More informationSynchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation
Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationAdvanced Computer Networks
Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans
More informationA fault tree analysis strategy using binary decision diagrams
Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More information