A Novel Information Lifecycle Management Scheme for a Web-Based Database System

Size: px
Start display at page:

Download "A Novel Information Lifecycle Management Scheme for a Web-Based Database System"

Transcription

1 Journal of Scientific & Industrial Research Vol. 76, February 2017, pp A Novel Information Lifecycle Management Scheme for a Web-Based Database System Jui-Pin Yang 1 * and Ying-Chin Chen 2 *1 Department of Information Technology and Communication, Shih Chien University, Kaohsiung City, Taiwan 2 Department of Electrical Engineering, National Chung Cheng University, Chiayi City, Taiwan Received 28 October 2015; revised 22 August 2016; accepted 24 November 2016 In this paper, we provide details regarding the design, analysis and experiments of a new information lifecycle management scheme for a web-based database system referred to as Adaptive Information Lifecycle Management (AILM). AILM is a novel scheme because it simultaneously considers variations in time and data usage. In addition, AILM consists of four main components: data collection, information valuation, information classification, and growth prediction. In this paper, 2255 teaching cases over eight years are managed using the AILM scheme from the life.edu.tw web site. Using AILM, the growth in storage capacity increases by almost 6~7% per year, and the number of teaching cases is projected to increase by almost 160 per year in the next five years. To enhance the performance of the web-based database system, we further classify the data into three groups, namely, Class_1, Class_2 and Class_3. The experiments demonstrate that Class_1 includes approximately 50% of the teaching cases but only uses approximately 40% of the storage capacity. In addition, the hit rate has increased to 75%. Moreover, we can delete the teaching cases with a 2.5% hit rate in Class_3, which contributes to saving approximately 10% of the storage capacity. In other words, the AILM scheme is useful because it not only expedites search time but also improves storage utilization in a web-based database system. Keywords: Lifecycle Management, Database System, Information Valuation, Information Classification, Storage Utilization Introduction The Internet has been widely integrated into daily life, and therefore, the growth in data significantly increases every year. In general, users can easily share data, but it is difficult to efficiently utilize data. Based on such demand, a large number of web sites efficiently manage user data and also provide search functionality. Accordingly, users can quickly obtain their required data. To provide users with differentiated services, many web sites are capable of supporting systematic information management. The simplest way to resolve this issue is to establish a database system. Unfortunately, the importance of data changes over time, and therefore the information lifecycle management scheme plays a key role. An Information Lifecycle Management (ILM) scheme, which involved software and hardware changes, was proposed to address the data explosion 1. A file lifecycle management policy describes the design and innovative implementation of a file system in a storage area network 2. The policy is used to leverage a key abstraction in the file system and support the *Author for Correspondence juipinyang@gmail.com location independence of files by using an innovative implementation technique that combines the concurrent policy execution and the policy decisions cache. However, this policy is only suitable for billions of files under normal conditions. An automated information lifecycle management scheme differentiates information according to its value 3. Furthermore, it accounts for the value changes. This scheme first presents an information valuation approach that quantifies the value of a given piece of information based on its usage over time. Second, it captures the changing nature of the file value throughout its lifecycle, which reflects the individual values of different files. By mapping the value classes to corresponding sets of attributes, storage systems can predict the lifecycle steps of each file. Based on file valuation, classification, and class membership prediction, the storage system is optimized. Service- Oriented Architecture (SOA) was proposed and is widely viewed as an innovative business solution 4. Service is a fundamental component of SOA and represents the repeatable business functionalities to develop applications. To build a scalable and reliable service, service lifecycle management is one of the critical mechanisms to ensure service quality. To

2 86 J SCI IND RES VOL 76 FEBRUARY 2017 achieve this goal, this study proposes a conceptual stakeholder analysis framework to associate stakeholders with different lifecycle stages. This method provides deep insight into service lifecycle management from the stakeholder s viewpoint. However, it is unsuitable for deployment in webbased storage systems. Industry Foundation Classes (IFC) provide useful information structures for data sharing 5. However, they do not specify how to capture, exchange or synchronize the information between distinct entities throughout the building lifecycle. In other words, this study only investigates existing messaging protocols to identify which is the most appropriate for supporting the construction of a lifecycle management system. Moreover, a platform was built on a university campus using the selected messaging protocol. Intelligent Storage Tiering Manager (ISTM) is an analytic storage tiering tool that automates load balancing on data across and within different storage tiers in virtualized storage environments 6. Using administrator policies, ISTM identifies data from specified performance profiles and then automatically migrates the data to the appropriate storage tier. As a result, ISTM can minimize the performance impact by limiting the overall migration load and keeping data accessible during migration. Furthermore, this study introduces existing solutions related to ILM and implements the ISTM scheme within a data center. This tool could consume a great deal of resources while executing data migration. Exponential increases in stored data are putting pressure on Information Technology (IT) infrastructure in terms of cost, performance, scalability and manageability. It has become imperative to identify an efficient system for storing and managing data that corresponds to the growing demands on IT systems. Consequently, organizations are attempting to store increasing quantities of data for the lowest possible cost while meeting increasingly stringent regulatory requirements for data retention and protection. Accordingly, the ILM scheme is a solution that can resolve these IT demands 7-8. Compared with existing schemes, AILM is the first system that considers the effect of information lifecycle management on a webbased database system. More importantly, AILM can efficiently manage the information lifecycle according to variations in time and data usage. We conclude that the proposed scheme has three main advantages. AILM is an effective and complete solution for information lifecycle management; it consists of data collection, information valuation, and information classification and growth prediction. In other words, we propose complete procedures to manage the information lifecycle. Experiments demonstrate that AILM achieves efficient information lifecycle management by evaluating the information values. AILM can automatically delete unnecessary data to enhance overall storage utilization. As web content accumulates in the database system, storage capacity should be extended on a yearly basis. This extension increases both costs and data search time. By using AILM, we can effectively manage unnecessary data; for instance, the data can be deleted or migrated to cheaper storage devices on demand. AILM uses a cache to expedite search time by efficiently caching the most frequently accessed data. Design, Analysis and Experiments of AILM There are two common methods for managing the information lifecycle; one is to use the latest rankings of recently uploaded data, which means that the users wish to obtain new information with the least amount of elapsed time; the other is the rankings of the most widely used data, which means that the user wants to obtain information with the highest hit rate. To satisfy the above requirements, we propose the AILM scheme, which efficiently performs information lifecycle management for existing database systems by considering the variations in both time and data usage. The details of the AILM scheme include four components, which differ from the proposal 3. There are two key differences. First, we consider the priority and storage policy of each class in the information classification component. Second, we further design a growth prediction component to enhance the accuracy of information after the information valuation component. Next, we describe each component in AILM as follows: Data Collection: The goal of this component is to collect the required information from the webbased database system and transfer it into a predefined format. Next, this information will be quantitated according to the values in the information valuation phase. Information Valuation: The goal of this component is to evaluate the formatted information and obtain quantitative trends. With these trends established, AILM can adjust the quantitated values further. Next, the results will be classified in the information classification phase.

3 YANG & CHEN: A NOVEL INFORMATION LIFECYCLE MANAGEMENT SCHEME 87 Information Classification: The goal of this component is to classify the results from the information valuation phase, and hence, AILM determines the priority and adequate storage device for each class. Growth Prediction: The goal of this component is to analyze the quantitative trends and results of classification. With this step, AILM can adjust the quantitative trends and reduce the processing time under the Data Collection phase. The experimental data are collected from the Life Education Learning web site in Taiwan. In addition, the database system uses MySQL, and the operating system is Linux. After systematically describing AILM, we will explain the details of the proposed scheme as follows. Data Collection Before collecting the required information, we introduce the sources of information and their meanings. In this paper, AILM is used to execute efficient information lifecycle management on the database system by considering the variations in time and data usage. Moreover, the proposed scheme can improve storage utilization and expedite the search time; therefore, it needs to obtain information related to time, storage capacity and data usage. The information associated with time is the creation time, modification time, and last access time. In addition, the information associated with storage capacity is the file size. Both types of information can be obtained through the operating system. In practice, we develop a program to obtain the required information by utilizing the commands of the Linux operating system. Furthermore, this program can transfer the results into a predefined format. Finally, the information related to data usage is the statistics concerning hits. All information can be obtained from MySQL. Similarly, we utilize the commands of MySQL to obtain the required attributes including file number, file name, hit rate and creation time. In our experiments, the total number of hits is , and the amount of teaching cases is In addition, the file size is 1742 MB, and the average existing duration of each teaching case is 5.6 years. Furthermore, the average file size is 0.77 MB, and the average hit for each teaching case is 175. Information Valuation After the data collection component, AILM evaluates the information value by quantification. Avg.hit denotes the average hit for each teaching case per year. Accordingly, Avg.hit is in our experiments. The accumulated percentage of teaching cases, storage capacity and the approaching curve of storage capacity versus Avg.hit are depicted in Fig. 1. In Fig. 1, the purple curve represents the variations in the accumulated teaching case ratio versus Avg.hit, and the blue curve represents the variations in storage capacity versus Avg.hit. AILM derives a function to address the changes in storage capacity, namely, the AH function, which is depicted as a red dashed curve. In addition, f denotes a function. In particular, the AH function in (1) represents the square of the standard deviation over 0.99 associated with the blue curve. AH=f(Avg.hit)=0.0003*Avg.hit *Avg.hit *Avg.hit (1) Information Classification When the storage space is insufficient to accommodate new teaching cases, some teaching cases should be deleted according to their values. Therefore, AILM needs to estimate the data growth. The changes in storage capacity per year are analyzed, and an S function is used to predict the growth rate in the next five years. The S function is shown in (2), and the experimental results are depicted in Table 1. Furthermore, n denotes the nth year, and ln denotes a natural logarithm. According to Table 1, there will be an approximately 6~7% increase in capacity demand per year. The average file size is 0.77 MB, so the increment of teaching cases is approximately 160 per year. If we do not increase the available storage capacity, then 7% of the storage capacity should be deleted to make room for the new, incoming teaching cases. S=f(n)=892.32*ln(n) (2) Fig. 1 Accumulated percentage of teaching cases and storage capacity and an approaching curve of storage capacity versus Avg.hit

4 88 J SCI IND RES VOL 76 FEBRUARY 2017 Next, we analyze the relationship between the AH value and storage capacity as depicted in Fig. 2. When the AH value is 2.5, the storage capacity is 8.71%. In other words, we can satisfy the storage capacity demand in the future without adding new storage devices. Relationship between the AH value and storage capacity To enhance the efficiency of the cache, we consider the file access probability in the cache. H denotes the probability of file access; hence, H is equal to the hit number in the cache divided by total hits. Assume that the amount of teaching cases is ma and there are ml teaching cases in the cache. The value of ma can be obtained from the statistics of the database system. Assume that the access time in the cache is t1 and the access time in the storage devices is t2. We then obtain the expected processing time of T, where T is equal to H*ml*t1+(1-H)*(ma-m1)*t2 divided by ma. Here, we consider a worse condition, where t1=t2, while the total number of teaching cases Table 1 Storage capacity and prediction percentages nth year Capacity Prediction Percentage % % % % % % % % % % % % Fig. 2 Relationship between AH value and storage capacity is Accordingly, we obtain variations in T, which are related to AH, H and ml in Table 2. From Table 2, when the cache is at 30% storage capacity, the processing time can be reduced by approximately 47%. Therefore, we suggest that the cache size be set at 30% storage capacity and the AH value be Based on the analysis, we classify the files into three levels, whose characteristics are described as follows. Class_1:AH is larger than 32.67, and the storage capacity is 522 MB. In addition, H is 60.1%, and the number of total teaching cases is 784. Class_2:AH is between 2.5 and 32.67, and the storage capacity is 1068 MB. In addition, H is 39.84%, and the number of total teaching cases is 421. Class_3:AH is smaller than 2.5, and the storage capacity is 152 MB. In addition, H is 0.06%, and the number of total teaching cases is 50. Growth Prediction In the information classification component, the data are classified according to their importance. When the storage space is insufficient, AILM will delete the teaching cases belonging to Class_3. However, this action could change the distributions of teaching cases. As a result, the AH function should be modified accordingly. A common method is to invoke the Data Collection component, but this method is too complicated to implement. To design a useful method, we list the changes under different number percentages in Fig. 3. From Fig. 3, if the deletion ratio increases from 0% to 20%, the required storage capacity decreases relatively. Based on these observations, we would like to consider the deletion ratio in the AH function. d denotes the deletion ratio, and D(d) denotes the curve of the AH function when the deletion ratio is d. In addition, we obtain the Table 2 Expected processing time related to AH, H and m1 space AH H ml T 0% % % 10% % % 20% % % 30% % % 40% % % 50% % % 60% % % 70% % % 80% % % 90% % % 100% % %

5 YANG & CHEN: A NOVEL INFORMATION LIFECYCLE MANAGEMENT SCHEME 89 cases amount to approximately 160 per year. Additionally, AILM predicts case distributions, which is helpful for modifying the AH equation. Briefly, AILM is very useful for web-based database systems and can expedite search time and reduce storage space. In the future, we would like to consider the access behavior of users, types of teaching cases, and storage cost and subsequently develop a more efficient and practical information lifecycle management scheme for web-based database systems. Fig. 3 Statistics of deletion ratio changes of the R function within D (0%)-D (20%). Finally, we derive the R function that is associated with the AH value using (3). R=-0.004*AH (3) Conclusion In this paper, we propose an efficient and novel information lifecycle management scheme, namely, AILM. This paper offers two important contributions via AILM. First, AILM considers variations in both time and storage usage so that it can effectively improve system performance. Second, AILM consists of four phases: data collection, information valuation, information classification and growth prediction. In other words, AILM is a complete solution to achieve effective information lifecycle management. Based on the AILM analysis, data belonging to Class_1 should be placed in the cache, and data belonging to Class_2 should be placed in general storage devices. Finally, data belonging to Class_3 can be deleted on demand while considering the required storage space over the next few years. According to the function S, AILM predicts that the annual growth rate of the storage space is approximately 6 7% and that new teaching Acknowledgments The author acknowledges financial support from Shih Chien University under grant number USC References 1 Govil J, Kaur N, Kaur H & Govil J, Data/Information lifecycle management: a solution for taming data beast, In Proc Int Conf on Info Technol: New Gen, (2008) Beigi M, Devarakonda M, Jain R, Kaplan M, Pease D, Rubas J, Sharma U & Verma A, Policy-based information lifecycle management in a large-scale file system, In Proc IEEE Pol, (2005) Chen Y, Information valuation for information lifecycle management, In Proc IEEE Int Conf on Auto Comput, (2005) Rong W, Wu Q, Ouyang Y, Liu K & Xiong Z, Prioritised stakeholder analysis for software service lifecycle management, In Proc IEEE Int Conf on Services Comput, (2013) Kubler S, Madhikermi M, Buda A, Framling K, Derigent W & Thomas A, Towards data exchange interoperability in building lifecycle management, In Proc IEEE Int Conf on Emerg Technol and Fact Auto, (2014) Alatorre G, Singh a, Mandagere N, Butler E, Gopisetty S & Song Y, Intelligent information lifecycle management in virtualized storage environments, In Proc SRII Glob Conf, (2014) Implementing information lifecycle management (ILM) with Oracle Database 12c, Oracle White Paper, (2015) SAP Information lifecycle management to reduce business risk and costs, SAP, (2104) 1-26.

SOME stereo image-matching methods require a user-selected

SOME stereo image-matching methods require a user-selected IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, VOL. 3, NO. 2, APRIL 2006 207 Seed Point Selection Method for Triangle Constrained Image Matching Propagation Qing Zhu, Bo Wu, and Zhi-Xiang Xu Abstract In order

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

An Improved Document Clustering Approach Using Weighted K-Means Algorithm

An Improved Document Clustering Approach Using Weighted K-Means Algorithm An Improved Document Clustering Approach Using Weighted K-Means Algorithm 1 Megha Mandloi; 2 Abhay Kothari 1 Computer Science, AITR, Indore, M.P. Pin 453771, India 2 Computer Science, AITR, Indore, M.P.

More information

A VLSI Architecture for H.264/AVC Variable Block Size Motion Estimation

A VLSI Architecture for H.264/AVC Variable Block Size Motion Estimation Journal of Automation and Control Engineering Vol. 3, No. 1, February 20 A VLSI Architecture for H.264/AVC Variable Block Size Motion Estimation Dam. Minh Tung and Tran. Le Thang Dong Center of Electrical

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News Selecting Model in Automatic Text Categorization of Chinese Industrial 1) HUEY-MING LEE 1 ), PIN-JEN CHEN 1 ), TSUNG-YEN LEE 2) Department of Information Management, Chinese Culture University 55, Hwa-Kung

More information

International Journal of Software and Web Sciences (IJSWS) Web service Selection through QoS agent Web service

International Journal of Software and Web Sciences (IJSWS)   Web service Selection through QoS agent Web service International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

A Guide to Architecting the Active/Active Data Center

A Guide to Architecting the Active/Active Data Center White Paper A Guide to Architecting the Active/Active Data Center 2015 ScaleArc. All Rights Reserved. White Paper The New Imperative: Architecting the Active/Active Data Center Introduction With the average

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Global Journal of Engineering Science and Research Management

Global Journal of Engineering Science and Research Management CONFIGURATION FILE RECOMMENDATIONS USING METADATA AND FUZZY TECHNIQUE Gnanamani.H*, Mr. C.V. Shanmuka Swamy * PG Student Department of Computer Science Shridevi Institute Of Engineering and Technology

More information

Design and Implementation of Computer Room Management System in University

Design and Implementation of Computer Room Management System in University Design and Implementation of Computer Room Management System in University YOUwen Zhang, Dong Kang* {Zhangyouwen521@163.com} HaiNan college of Economics and Business Haikou 571127, China Abstract. With

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Understanding Large Transport Network Performance Subject to Unexpected Traffic Demand

Understanding Large Transport Network Performance Subject to Unexpected Traffic Demand Understanding Large Transport Network Performance Subject to Unexpected Traffic Demand Hassan Sabzehali 1, Majid Sarvi 2, Iradj Ouveisy 3 1,2 Institute of Transport Studies, Department of Civil Engineering,

More information

Power-Mode-Aware Buffer Synthesis for Low-Power Clock Skew Minimization

Power-Mode-Aware Buffer Synthesis for Low-Power Clock Skew Minimization This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Power-Mode-Aware Buffer Synthesis for Low-Power

More information

<Insert Picture Here> Enterprise Data Management using Grid Technology

<Insert Picture Here> Enterprise Data Management using Grid Technology Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility

More information

Improved Information Retrieval Performance on SQL Database Using Data Adapter

Improved Information Retrieval Performance on SQL Database Using Data Adapter IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Improved Information Retrieval Performance on SQL Database Using Data Adapter To cite this article: M Husni et al 2018 IOP Conf.

More information

Dell OpenManage Power Center s Power Policies for 12 th -Generation Servers

Dell OpenManage Power Center s Power Policies for 12 th -Generation Servers Dell OpenManage Power Center s Power Policies for 12 th -Generation Servers This Dell white paper describes the advantages of using the Dell OpenManage Power Center to set power policies in a data center.

More information

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE 2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average

More information

Construction Scheme for Cloud Platform of NSFC Information System

Construction Scheme for Cloud Platform of NSFC Information System , pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

Common approaches to management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C.

Common approaches to  management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C. Common approaches to email management Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C. Agenda 1 2 Introduction and Objectives Terms and Definitions 3 Typical

More information

Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment

Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, August 216 17 Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment Puneet

More information

A Level-wise Priority Based Task Scheduling for Heterogeneous Systems

A Level-wise Priority Based Task Scheduling for Heterogeneous Systems International Journal of Information and Education Technology, Vol., No. 5, December A Level-wise Priority Based Task Scheduling for Heterogeneous Systems R. Eswari and S. Nickolas, Member IACSIT Abstract

More information

Semi supervised clustering for Text Clustering

Semi supervised clustering for Text Clustering Semi supervised clustering for Text Clustering N.Saranya 1 Assistant Professor, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore 1 ABSTRACT: Based on clustering

More information

Advances in Natural and Applied Sciences. Information Retrieval Using Collaborative Filtering and Item Based Recommendation

Advances in Natural and Applied Sciences. Information Retrieval Using Collaborative Filtering and Item Based Recommendation AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/anas Information Retrieval Using Collaborative Filtering and Item Based Recommendation

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Nowadays data-intensive applications play a

Nowadays data-intensive applications play a Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted

More information

Oracle Database 10g Resource Manager. An Oracle White Paper October 2005

Oracle Database 10g Resource Manager. An Oracle White Paper October 2005 Oracle Database 10g Resource Manager An Oracle White Paper October 2005 Oracle Database 10g Resource Manager INTRODUCTION... 3 SYSTEM AND RESOURCE MANAGEMENT... 3 ESTABLISHING RESOURCE PLANS AND POLICIES...

More information

Filtering Bug Reports for Fix-Time Analysis

Filtering Bug Reports for Fix-Time Analysis Filtering Bug Reports for Fix-Time Analysis Ahmed Lamkanfi, Serge Demeyer LORE - Lab On Reengineering University of Antwerp, Belgium Abstract Several studies have experimented with data mining algorithms

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

ANNUAL REPORT Visit us at project.eu Supported by. Mission

ANNUAL REPORT Visit us at   project.eu Supported by. Mission Mission ANNUAL REPORT 2011 The Web has proved to be an unprecedented success for facilitating the publication, use and exchange of information, at planetary scale, on virtually every topic, and representing

More information

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics Helmut Berger and Dieter Merkl 2 Faculty of Information Technology, University of Technology, Sydney, NSW, Australia hberger@it.uts.edu.au

More information

Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst

Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst Executive Summary Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst December 2014 This ESG White Paper

More information

Design and Implementation of a Random Access File System for NVRAM

Design and Implementation of a Random Access File System for NVRAM This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Design and Implementation of a Random Access

More information

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method.

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPROVED ROUGH FUZZY POSSIBILISTIC C-MEANS (RFPCM) CLUSTERING ALGORITHM FOR MARKET DATA T.Buvana*, Dr.P.krishnakumari *Research

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Continuous auditing certification

Continuous auditing certification State of the Art in cloud service certification Cloud computing has emerged as the de-facto-standard when it comes to IT delivery. It comes with many benefits, such as flexibility, cost-efficiency and

More information

K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors

K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors Shao-Tzu Huang, Chen-Chien Hsu, Wei-Yen Wang International Science Index, Electrical and Computer Engineering waset.org/publication/0007607

More information

Face Detection CUDA Accelerating

Face Detection CUDA Accelerating Face Detection CUDA Accelerating Jaromír Krpec Department of Computer Science VŠB Technical University Ostrava Ostrava, Czech Republic krpec.jaromir@seznam.cz Martin Němec Department of Computer Science

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

FORECASTING INITIAL POPULARITY OF JUST-UPLOADED USER-GENERATED VIDEOS. Changsha Ma, Zhisheng Yan and Chang Wen Chen

FORECASTING INITIAL POPULARITY OF JUST-UPLOADED USER-GENERATED VIDEOS. Changsha Ma, Zhisheng Yan and Chang Wen Chen FORECASTING INITIAL POPULARITY OF JUST-UPLOADED USER-GENERATED VIDEOS Changsha Ma, Zhisheng Yan and Chang Wen Chen Dept. of Comp. Sci. and Eng., State Univ. of New York at Buffalo, Buffalo, NY, 14260,

More information

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 7, NO. 2, APRIL 1997 429 Express Letters A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation Jianhua Lu and

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Reliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query

Reliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query Reliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query Takuya Funahashi and Hayato Yamana Computer Science and Engineering Div., Waseda University, 3-4-1

More information

Reducing Costs in the Data Center Comparing Costs and Benefits of Leading Data Protection Technologies

Reducing Costs in the Data Center Comparing Costs and Benefits of Leading Data Protection Technologies Reducing Costs in the Data Center Comparing Costs and Benefits of Leading Data Protection Technologies November 2007 Reducing Costs in the Data Center Table of Contents The Increasingly Costly Data Center...1

More information

BOOK RECOMMENDATION INTERNET BROWSER SYSTEM (BRIB)

BOOK RECOMMENDATION INTERNET BROWSER SYSTEM (BRIB) BOOK RECOMMENDATION INTERNET BROWSER SYSTEM (BRIB) Rosnin Mustaffa (rosnin.mustaffa@mimos.my), Goon Wooi Kin (wk.goon@mimos.my), Muhammad Awis Jamaluddin Johari (awis.johari@mimos.my), Amru Yusrin Amruddin

More information

Text Document Clustering Using DPM with Concept and Feature Analysis

Text Document Clustering Using DPM with Concept and Feature Analysis Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 10, October 2013,

More information

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs Journal of Computer Science 2 (12): 872-876, 26 ISSN 1549-3636 26 Science Publications Evaluating the Effect of Inheritance on the Characteristics of Object Oriented 1 Thabit Sultan Mohammed and 2 Hayam

More information

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers , October 20-22, 2010, San Francisco, USA Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers I-Lun Tseng, Member, IAENG, Huan-Wen Chen, and Che-I Lee Abstract Longest-path routing problems,

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid Demin Wang 2, Hong Zhu 1, and Xin Liu 2 1 College of Computer Science and Technology, Jilin University, Changchun

More information

Best Practices. Deploying Optim Performance Manager in large scale environments. IBM Optim Performance Manager Extended Edition V4.1.0.

Best Practices. Deploying Optim Performance Manager in large scale environments. IBM Optim Performance Manager Extended Edition V4.1.0. IBM Optim Performance Manager Extended Edition V4.1.0.1 Best Practices Deploying Optim Performance Manager in large scale environments Ute Baumbach (bmb@de.ibm.com) Optim Performance Manager Development

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Overlay control methodology comparison: field-by-field and high-order methods

Overlay control methodology comparison: field-by-field and high-order methods Overlay control methodology comparison: field-by-field and high-order methods Chun-Yen Huang a, Chui-Fu Chiu a, Wen-Bin Wu a, Chiang-Lin Shih a, Chin-Chou Kevin Huang* b, Healthy Huang c, DongSub Choi

More information

Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER

Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER Table of Contents Executive Overview...1 Problem Resolution A Major Time Consumer...2 > Inefficiencies of the Problem

More information

Statistical roll pass design: Case study

Statistical roll pass design: Case study Statistical roll pass design: Case study Introduction The initial (break-down passes) are frequently conducted in so-called box grooves. At this stage of the technological process, the steel temperature

More information

Verification and Validation of X-Sim: A Trace-Based Simulator

Verification and Validation of X-Sim: A Trace-Based Simulator http://www.cse.wustl.edu/~jain/cse567-06/ftp/xsim/index.html 1 of 11 Verification and Validation of X-Sim: A Trace-Based Simulator Saurabh Gayen, sg3@wustl.edu Abstract X-Sim is a trace-based simulator

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

Performance Extrapolation for Load Testing Results of Mixture of Applications

Performance Extrapolation for Load Testing Results of Mixture of Applications Performance Extrapolation for Load Testing Results of Mixture of Applications Subhasri Duttagupta, Manoj Nambiar Tata Innovation Labs, Performance Engineering Research Center Tata Consulting Services Mumbai,

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Eight units must be completed and passed to be awarded the Diploma.

Eight units must be completed and passed to be awarded the Diploma. Diploma of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

Exploring Campus Netflow for Managing Network

Exploring Campus Netflow for Managing Network Exploring Campus Netflow for Managing Network Hung-Jen Yang, Miao-Kuei Ho, Lung-Hsing Kuo, Hsieh-Hua Yang, Hsueh-Chih Lin Abstract The purpose of this study was to monitoring and modeling netflows on a

More information

E-Agricultural Services and Business

E-Agricultural Services and Business E-Agricultural Services and Business A Conceptual Framework for Developing a Deep Web Service Nattapon Harnsamut, Naiyana Sahavechaphan nattapon.harnsamut@nectec.or.th, naiyana.sahavechaphan@nectec.or.th

More information

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed 1 Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy Miroslav Bures and Bestoun S. Ahmed arxiv:1802.08005v1 [cs.se] 22 Feb 2018 Abstract Executing various sequences of system

More information

Load Balancing with Minimal Flow Remapping for Network Processors

Load Balancing with Minimal Flow Remapping for Network Processors Load Balancing with Minimal Flow Remapping for Network Processors Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,

More information

The 5G consumer business case. An economic study of enhanced mobile broadband

The 5G consumer business case. An economic study of enhanced mobile broadband The 5G consumer business case An economic study of enhanced mobile broadband Enhancing today s services for tomorrow 5G has the potential to drive new revenue streams. Much focus has been on the innovative

More information

Web Information Retrieval using WordNet

Web Information Retrieval using WordNet Web Information Retrieval using WordNet Jyotsna Gharat Asst. Professor, Xavier Institute of Engineering, Mumbai, India Jayant Gadge Asst. Professor, Thadomal Shahani Engineering College Mumbai, India ABSTRACT

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Technology Watch. Data Communications 2 nd Quarter, 2012

Technology Watch. Data Communications 2 nd Quarter, 2012 Technology Watch Data Communications 2 nd Quarter, 2012 Page 1 Commercial Version Technology Watch DCCC August 2012 Table of Contents 1.0 Introduction... 1 2.0 Internet Traffic Growth Analysis... 1 3.0

More information

Storage Networking Strategy for the Next Five Years

Storage Networking Strategy for the Next Five Years White Paper Storage Networking Strategy for the Next Five Years 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Top considerations for storage

More information

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director Modernizing the Grid for a Low-Carbon Future Dr. Bryan Hannegan Associate Laboratory Director Aspen Energy Policy Forum July 5, 2016 40 YEARS OF CLEAN ENERGY RESEARCH Founded as Solar Energy Research Institute

More information

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Performance of Optical Burst Switching Techniques in Multi-Hop Networks Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,

More information

IPv6 Migration Framework Case of Institutions in Ethiopia

IPv6 Migration Framework Case of Institutions in Ethiopia IPv6 Migration Framework Case of Institutions in Ethiopia Kidist Mekonnen Zemen Bank, Addis Ababa, Ethiopia kidistmt@yahoo.com Taye Abdulkadir HiLCoE School of Computer Science and Technology, Addis Ababa,

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Keeping the lid on storage

Keeping the lid on storage Keeping the lid on storage Drive significant cost savings through innovation and efficiency Publication date: December 2011 Optimising storage performance & costs through innovation As the compute power

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

Data analysis using Microsoft Excel

Data analysis using Microsoft Excel Introduction to Statistics Statistics may be defined as the science of collection, organization presentation analysis and interpretation of numerical data from the logical analysis. 1.Collection of Data

More information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Liu Chun College of Computer Science and Information Technology Daqing Normal University Daqing, China Sun Bishen Twenty-seventh

More information

Image Matching Using Run-Length Feature

Image Matching Using Run-Length Feature Image Matching Using Run-Length Feature Yung-Kuan Chan and Chin-Chen Chang Department of Computer Science and Information Engineering National Chung Cheng University, Chiayi, Taiwan, 621, R.O.C. E-mail:{chan,

More information

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments Send Orders for Reprints to reprints@benthamscience.ae 368 The Open Automation and Control Systems Journal, 2014, 6, 368-373 Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing

More information

Computers and Mathematics with Applications. An embedded system for real-time facial expression recognition based on the extension theory

Computers and Mathematics with Applications. An embedded system for real-time facial expression recognition based on the extension theory Computers and Mathematics with Applications 61 (2011) 2101 2106 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa An

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2008

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2008 Rapid Bottleneck Identification A Better Way to do Load Testing An Oracle White Paper June 2008 Rapid Bottleneck Identification A Better Way to do Load Testing. RBI combines a comprehensive understanding

More information

Supervisory System Design and Implementation of Automatic Illumination Control for Dimmable Flat LED Lighting Devices in Buildings

Supervisory System Design and Implementation of Automatic Illumination Control for Dimmable Flat LED Lighting Devices in Buildings Sensors and Materials, Vol. 29, No. 4 (2017) 379 386 MYU Tokyo 379 S & M 1330 Supervisory System Design and Implementation of Automatic Illumination Control for Dimmable Flat LED Lighting Devices in Buildings

More information

Caching & Tiering BPG

Caching & Tiering BPG Intro: SSD Caching and SSD Tiering functionality in the StorTrends 3500i offers the most intelligent performance possible from a hybrid storage array at the most cost-effective prices in the industry.

More information

Meshlization of Irregular Grid Resource Topologies by Heuristic Square-Packing Methods

Meshlization of Irregular Grid Resource Topologies by Heuristic Square-Packing Methods Meshlization of Irregular Grid Resource Topologies by Heuristic Square-Packing Methods Uei-Ren Chen 1, Chin-Chi Wu 2, and Woei Lin 3 1 Department of Electronic Engineering, Hsiuping Institute of Technology

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 FLASH 1 ST THE STORAGE STRATEGY FOR THE NEXT DECADE Iztok Sitar Sr. Technology Consultant EMC Slovenia 2 Information Tipping Point Ahead The Future Will Be Nothing Like The Past 140,000 120,000 100,000

More information

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2 ISSN 2319-8885 Vol.04,Issue.34, August-2015, Pages:6786-6790 www.ijsetr.com SOUMYA. K 1, CHANDRA SEKHAR. M 2 1 Navodaya Institute of Technology, Raichur, Karnataka, India, E-mail: Keerthisree1112@gmail.com.

More information