Virtual Machine Migration based on Trust Measurement of Computer Node
|
|
- Barrie Washington
- 5 years ago
- Views:
Transcription
1 Appled Mechancs and Materals Onlne: ISSN: , Vols , pp do: / Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on Trust Measurement of Computer Node Lang Zhhong 1, a, Lang Zhqang 1, b, Tan Ymng 2, c, Lv Xuecheng 2, d, 1 Chna Southern Power Grd Co., Ltd,Guangzhou ,Chna 2 Chna Standard Software Co., Ltd, Shangha ,Chna a langzh@csg.cn, b bbq1018@alyun.com, c ymng.tan@cs2c.com.cn d xuecheng.lv@cs2c.com.cn Keywords: trusted computng, vrtual machne mgraton, trust measurement, load balancng Abstract. Currently, the study of vrtual machne mgraton n cloud computng platform whch usually dd not consder the trustworthness of target physcal machne. For ths, the paper proposes a trusted vrtual machne mgraton wth performance constrants algorthm (TVM 2 PC). The trustworthness of target physcal machne ncludes drect trustworthness and ndrect trustworthness. By ths method, a vrtual machne wll be mgrated to a trusted physcal machne. A large of experment shows that the proposed method can gve a better result than the exstng method n load balancng and trustworthness. Introducton Currently, as a new computng paradgm, cloud computng has the advantages of hgh scalablty and hgh avalablty, whch quckly become a hot topc n academa and ndustry. The vrtualzaton technology s a key technology to realze the capacty of elastc scalablty. In the runnng process of cloud computng, vrtual machne mgraton s what often happens, when the load s mbalance among physcal nodes, or the falure of physcal nodes, or somethng wrong happen. For ths phenomenon, many experts and scholars have proposed varous methods of vrtual machne mgraton. In 2011, Jnjun LIU et al [1] presented a schedulng strategy of vrtual machne mgraton based on load characterstc. Ths strategy ams at the trgger types of nodes and the load characterstcs of vrtual machnes, usng mult-threshold mode to trgger the mgraton, the vrtual machne to be mgrated s selected and the destnaton node s postoned. In 2012, Yong LIU et al [2] proposed an energy-aware and trust-drven vrtual machne schedulng algorthm. The algorthm matched the task and vrtual machne by the trust mechansm between resources and tasks,reached the purpose of ensurng the user task performance and energy-aware n data centers. In 2013, We Huang et al [3] presented a vrtual machne schedulng algorthm based on K-means clusterng.the correlaton of vrtual machne resource allocaton s used as the standard of clusterng,and a vrtual machne s placed on the physcal node complementary to t on resource, so that ts resource s used fully and t s effectve and stable. However, there s also a problem when the vrtual machne mgrates whch s whether the target physcal node s safe and trusted. For an example, when a vrtual machne wll mgrate, although a physcal node s performance meet the needs of the vrtual machne, but ths physcal node has a poor relablty, for example, ths physcal node has a hgh probablty of crash. So ths physcal node wll not be an approprate target node. Therefore, n order to ensure that the target physcal node s trusted. Ths paper presents a vrtual machne mgraton method based on the trust measurement of physcal node. All rghts reserved. No part of contents of ths paper may be reproduced or transmtted n any form or by any means wthout the wrtten permsson of Trans Tech Publcatons, (# , Pennsylvana State Unversty, Unversty Park, USA-15/09/16,20:08:56)
2 Appled Mechancs and Materals Vols Trust Concepts and Computng Method of Trust Accordng to the experts research of trusted computng [4,5], trusted computng descrbes an entty can be trusted f t always behaves n the expected manner for the ntended purpose. A trusted node should have hgh ntegrty, hgh dependablty, hgh avalablty and hgh operatng system (OS) securty level. Defnton 1 (Integrty): Integrty descrbes the degree of physcal node confguraton nformaton, system software, user data and other nformaton has not been tampered or destroyed. The ntegrty of physcal node c s denoted by n (0 n 1). Defnton 2 (Dependablty): Dependablty descrbes the ablty of a physcal node to functon under stated condtons for a specfed perod of tme. The dependablty of physcal node c s denoted by de (0 de 1). Defnton 3 (Avalablty): Avalablty descrbes the proporton of tme a physcal node s n a functonng condton. It s often descrbed as a msson capable rate. Mathematcally, the rato of the total tme a physcal node s capable of beng used durng a gven nterval to the length of the nterval. The avalablty of physcal node c s denoted by av (0 av 1). Defnton 4 (OS securty level): OS securty level descrbes the securty level of physcal node s operatng system (OS). The OS securty level of physcal node c s denoted by se (se {1, 0.75, 0.5, 0.25, 0.1}) [6], the bgger the value, the hgher the OS securty level. Defnton 5 (Drect trustworthness): Drect trustworthness s depended on ntegrty, dependablty, avalablty and OS securty level, the drect trustworthness of physcal node c s denoted by t (0 t 1). In mathematcal sense, drect trustworthness s a functon of ntegrty, dependablty, avalablty and OS securty level, that s t = f (n, de, av, se ). In cloud computng system, f a vrtual machne mgrates from node c to c j, we suppose the node c trusts c j. Smlarly, f a vrtual machne mgrates from node c j to c k, we suppose the node c j trusts c k. So a trust chan (c > c j > c k ) s formed. Usually, n cloud computng system, there are many physcal nodes, and many vrtual machnes have been mgrated n the past perod. So all these trust chans wll form a trust network. Defnton 6 (Trust network): Trust network descrbes the trust relaton between any two physcal nodes, the trust network s drected weghted graph (DWG), trust network s denoted by G=(C, T, E, W). C={c 1, c 2,, c N } s the set of physcal nodes, T ={ t 1, t 2,, t k ) s the set of drect trustworthness of physcal nodes, E={e 1, e 2,, e K }s set of edges, descrbes the trust relaton between two physcal nodes, W={w 1, w 2,, w K ) s the set of edge s weght, descrbes the frequency of vrtual machne mgraton from one node to another. Defnton 7 (In-degree): In trust network, n-degree of a vertex c descrbes the number of edges wth ths vertex c as the termnated vertex. In-degree of vertex c s denoted by d. Defnton 8 (Indrect trustworthness): Indrect trustworthness of physcal node c s depended on the n-degree of c, weghts of ncomng edge whch wth node c as the termnated vertex, and the drect trustworthness of the ncomng edges ntal vertex. Indrect trustworthness s denoted byt (0 t 1). Defnton 9(Comprehensve trustworthness): Comprehensve trustworthness s depended on drect trustworthness and ndrect trustworthness, t s denoted by t (0 t 1). In mathematcal sense, t = f( t, t ). Because the drect trustworthness s depended on ntegrty, dependablty, avalablty and OS securty level, the drect trustworthness of physcal node c can be calculated by the Eq. 1: = α n + α de + α av + se (1) t α2 4 where α = 1. = 1
3 680 Advances n Mechatroncs, Robotcs and Automaton II Because ndrect trustworthness of physcal node c s depended on the n-degree of c ; weghts w k of ncomng edge e k whch wth node c as the termnated vertex, c j as the ntal vertex; and the drect trustworthness t j of the ntal vertex c j. The concept of ndrect trustworthness works by countng the number and qualty of mgraton to a node to determne how trusted the node s. The underlyng assumpton s that more trusted nodes are lkely to receve more vrtual machnes from other nodes. The ndrect trustworthness t of physcal node c can be calculated by the Eq. 2: 1 w j Max{ w j} 2 t = t j [ EXP( )] (2) Vn c j V Max{ w n j} where EXP() represents exponental functon. Accordng to the above analyss, the comprehensve trustworthness s depended on the drect and ndrect trustworthness, the comprehensve trustworthness t of physcal node c can be calculated by the Eq. 3: t = αt + ( 1 α) t (3) Where α denotes trust factor, and 0 α 1. Trusted Vrtual Machne Mgraton Algorthm wth Performance Constrants Accordng to the problem of how vrtual machne mgrates to a trusted physcal node, we desgn a trusted vrtual machne mgraton algorthm wth performance constrants (TVM 2 PC). Although we focus on how to mplement a trusted vrtual machne mgraton, n the actual cloud computng platform, performance and load balancng s stll the most mportant factor that we must consder. So we not only take account of the trustworthness of target physcal node, but also the performance before vrtual machne mgraton. If we only consder the trustworthness of target physcal node, a large number of vrtual machnes may mgrate to a few physcal nodes whch have hgher trustworthness, whch wll result n load mbalance. The man dea of TVM 2 PC s descrbed as follow: Accordng to the load of physcal node, all the physcal nodes are dvded nto three sets C={C lght, C normal, C heavy }, where C lght ={c j 1 j N, 0 l j l lght }, C normal ={c j 1 j N, l lght <l j <l heavy }, C heavy ={c j 1 j N, l heavy l j 1}. Where l j denotes load of physcal node c j, l lght denotes lght load threshold, l heavy denotes heavy load threshold. When a vrtual machne wll mgrate, 1 If C lght, these physcal nodes n C lght have a prorty wth vrtual machne mgraton, and the lghter the load, the hgher the prorty; 2 If C lght = and C normal, these physcal nodes n C normal have a prorty wth vrtual machne mgraton, and the hgher the trustworthness, the hgher the prorty; 3 If C lght =, C normal = and C heavy, these physcal nodes n C heavy wll be consdered when vrtual machnes mgrate, and the lghter the load, the hgher the prorty; The seudo-code of TVM 2 PC s descrbed as follow: L1:for each Mgraton Vrtual Machne vm { L2: for each computer c j C{ L3: l j load(c j ); L4: t j trusted(c j ); L5: } L6: C lght, C normal, C heavy dvde(l 1, l 2,, l N ); L7: f C lght { L8: for each computer c j C lght { L9: l mn= l 1 ; L10: f l j < l mn then L11: l mn = l j ; L12: }
4 Appled Mechancs and Materals Vols L13: return c j ; L14: } L15: else f (C lght = ) (C normal ){ L16: for each computer c j C normal { L17: t max= t 1 ; L18: f t max < t j then L19: t max= t j ; L20: } L21: return c j ; L22: } L23: else f (C lght = ) (C normal = ) (C heavy ){ L24: for all computer c j C heavy { L25: l mn= l 1 ; L26: f l j < l mn then L27: l mn = l j ; L28: } L29: return c j ; L30: } L31: } In order to prove the superorty of the proposed TVM 2 PC algorthm, we desgn another two algorthms, lghtest load prorty (LLP) and hghest trustworthness prorty (HTP). The man dea of LLP s to mgrate the vrtual machne to node of the lghtest load. Smlarly, the man dea of HTP s to mgrate the vrtual machne to the node of hghest trustworthness. Experment Results and Analyss In ths secton we present the smulaton results that show the behavor, regardng vrtual machne mgraton, of three vrtual machne mgraton algorthms that are examned. In the experments, these parameters value s descrbed as follow: the number of physcal nodes N=16; the number of vrtual machnes that need to be mgrated M=1000; the trustworthness of each physcal node t [0, 1], whch s generated randomly; the load of each physcal node l [0, 1], whch s generated randomly; trust factor α=0.6; lght load threshold l lght =0.3; heavy load threshold l heavy =0.8; the dependablty of physcal node de [0.99, 1] and avalablty av [0.99, 1], whch are generated randomly. The experment results are shown n Fg. 1 and 2. Fg. 1 Load of each vrtual machne Fg. 2 The number of addtonal vrtual machne mgraton Fg. 1 presents the load of the 16 nodes for the three vrtual machne mgraton algorthms. Frst of all, we observe that the load of the 16 nodes s mbalance for LLP and HTP algorthms, that s, the curves of LLP and HTP algorthms are dramatc ups and downs. But the curve of TVM 2 PC algorthm s smoother than LLP and HTP.
5 682 Advances n Mechatroncs, Robotcs and Automaton II In the real cloud computng platform, some physcal nodes may crash sometmes. So when a node crashes, all the vrtual machnes, whch are runnng on ths node, need to be mgrated to other nodes. As a result, the crash of physcal nodes wll lead to the addtonal vrtual machne mgraton. Fg. 2 presents the condton of addtonal vrtual machne mgraton for the three vrtual machne mgraton algorthms n fve experments. We observe that the number of addtonal vrtual machne mgraton for HTP algorthm s less than TVM 2 PC and LLP, that s, HTP algorthm s better than TVM 2 PC and LLP n ths regard. LLP algorthm s the worst, but the dfference between TVM 2 PC and HTP s not too many. So, takng nto account the factor of load balancng, TVM 2 PC s a good vrtual machne mgraton algorthm, Conclusons In ths paper, for the problem of vrtual machne mgraton n the cloud computng platform, we desgned a trusted vrtual machne mgraton algorthm wth performance constrants (TVM 2 PC), whch consder the trustworthness and performance when choose a target physcal machne. The algorthm not only acheves the load balancng of cloud computng platform, but also mplements a trusted mgraton, that s, vrtual machne wll be mgrated to a trusted physcal machne. Experment results showed that the proposed method can acheve a better effect n load balancng and trustworthness. Acknowledgements Ths work was fnancally supported by the Natonal Hgh Technology Research and Development Program of Chna (2012AA050212). References [1]J.J. LIU, G.L CHEN, C.X HU. Vrtual machne mgraton schedulng strategy based on load characterstc. Computer Engneerng, 2011, 37 (17): [2]Y. LIU, X.H. WANG, Z. WANG, et al. Energy-aware and trust-drven vrtual machne schedulng. Applcaton Research of Computers, 2012, 29 (7): [3]W. Huang, Z.P. Wen, C, Cheng. Vrtual machne schedulng algorthm based on K-means clusterng n cloud computng. Journal of Nanjng Unversty of Scence and Technology, 2013, 37 (6): [4]Trusted Computng Group (TCG ). TCPA Man Specfcaton, Verson 1.lb [5]C.X. SHEN, H.G. ZHANG, H.M. WANG, et al. Research and development on trusted computng technology. SCIENTIA SINICA Informatons, 2010,40(2): [6]Standardzaton Admnstraton of the Peoples Republc of Chna, GB/T , Informaton securty technology-securty technques requrement for operatng system, Standard Press of Chna, 2006.
Solving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationDesign of Structure Optimization with APDL
Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationReal-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems
Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,
More informationSpecifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationOn-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System
00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationMaintaining temporal validity of real-time data on non-continuously executing resources
Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationResearch on a Method of Geographical Information Service Load Balancing
Research on a Method of Geographcal Informaton Servce oad Balancng Heyuan a, Yongxng a, Xue Zhyong a, Feng Tao a a X an Research Insttute of Surveyng and Mappng, X an, Shaanx, Chna; 305789861@qq.com; yongxngl2017@163.com;
More informationA high precision collaborative vision measurement of gear chamfering profile
Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng
More informationBIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING
An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationAn Adaptive Virtual Machine Location Selection Mechanism in Distributed Cloud
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 12, Dec. 2015 4776 Copyrght c2015 KSII An Adaptve Vrtual Machne Locaton Selecton Mechansm n Dstrbuted Cloud Shukun Lu 1, Wea Ja 2 1 School
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationHybrid Job Scheduling Mechanism Using a Backfill-based Multi-queue Strategy in Distributed Grid Computing
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.12 No.9, September 2012 39 Hybrd Job Schedulng Mechansm Usng a Backfll-based Mult-queue Strategy n Dstrbuted Grd Computng Ken Park
More informationDistributed Resource Scheduling in Grid Computing Using Fuzzy Approach
Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationSoftware Trustworthiness Static Measurement Model and the Tool
Avalable onlne at www.jpe-onlne.com vol. 13, no. 7, November 2017, pp. 1101-1110 DOI: 10.23940/jpe.17.07.p13.11011110 Software Trustworthness Statc Measurement Model and the Tool Yan L, Zhqang Wu, Yxang
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationComparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet
Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More information5.0 Quality Assurance
5.0 Dr. Fred Omega Garces Analytcal Chemstry 25 Natural Scence, Mramar College Bascs of s what we do to get the rght answer for our purpose QA s planned and refers to planned and systematc producton processes
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationEfficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications
Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationOntology Generator from Relational Database Based on Jena
Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34
More informationAn Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems
S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,
More informationA Fair MAC Algorithm with Dynamic Priority for e WLANs
29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationA QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target
A QoS-aware Schedulng Scheme for Software-Defned Storage Orented SCSI Target Xanghu Meng 1,2, Xuewen Zeng 1, Xao Chen 1, Xaozhou Ye 1,* 1 Natonal Network New Meda Engneerng Research Center, Insttute of
More informationDiscrete and Continuous Time High-Order Markov Models for Software Reliability Assessment
Dscrete and Contnuous Tme Hgh-Order Markov Models for Software Relablty Assessment Vtaly Yakovyna and Oksana Nytrebych Software Department, Lvv Polytechnc Natonal Unversty, Lvv, Ukrane vtaly.s.yakovyna@lpnu.ua,
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationBehavioral Model Extraction of Search Engines Used in an Intelligent Meta Search Engine
Behavoral Model Extracton of Search Engnes Used n an Intellgent Meta Search Engne AVEH AVOUSI Computer Department, Azad Unversty, Garmsar Branch BEHZAD MOSHIRI Electrcal and Computer department, Faculty
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league
More informationA Novel Fault Tolerant Scheduling Technique In Real-Time Heterogeneous Distributed Systems Using Distributed Recovery Block
Proceedngs of Natonal Conference VISION 07 on Hgh Performance Computng 2 nd Aprl 07 Government College of Engneerng, Department of CSE, Trunelvel, Taml Nadu, INDIA A Novel Fault Tolerant Schedulng Technque
More informationEnhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms
Enhancng Class-Based Servce Archtectures wth Adaptve Rate Allocaton and Droppng Mechansms Ncolas Chrstn, Member, IEEE, Jörg Lebeherr, Senor Member, IEEE, and Tarek Abdelzaher, Member, IEEE Abstract Class-based
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationCS 268: Lecture 8 Router Support for Congestion Control
CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationPricing Network Resources for Adaptive Applications in a Differentiated Services Network
IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationImproved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School
More informationBuffer Management Algorithm Design and Implementation Based on Network Processors
(IJCSIS) Internatonal Journal of Computer Scence and Informaton Securty, Buffer Management Algorthm Desgn and Implementaton Based on Network Processors Yechang Fang, Kang Yen Dept. of Electrcal and Computer
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationATYPICAL SDN consists of a logical controller in the
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 25, NO. 6, DECEMBER 2017 3587 Mnmzng Flow Statstcs Collecton Cost Usng Wldcard-Based Requests n SDNs Hongl Xu, Member, IEEE, Zhuolong Yu, Chen Qan, Member, IEEE,
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationTHere are increasing interests and use of mobile ad hoc
1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationAssembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.
IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language
More informationTransit Networking in ATM/B-ISDN based on Service Category
Transt Networkng n ATM/B-ISDN based on Servce Category Young-Tak Km Dept. of Informaton and Communcaton Engneerng, College of Engneerng, YeungNam Unv. E-mal : ytkm@ynucc.yeungnam.ac.kr ABSTRACT The ATM
More informationThe Comparison of Calibration Method of Binocular Stereo Vision System Ke Zhang a *, Zhao Gao b
3rd Internatonal Conference on Materal, Mechancal and Manufacturng Engneerng (IC3ME 2015) The Comparson of Calbraton Method of Bnocular Stereo Vson System Ke Zhang a *, Zhao Gao b College of Engneerng,
More informationParallel Implementation of Classification Algorithms Based on Cloud Computing Environment
TELKOMNIKA, Vol.10, No.5, September 2012, pp. 1087~1092 e-issn: 2087-278X accredted by DGHE (DIKTI), Decree No: 51/Dkt/Kep/2010 1087 Parallel Implementaton of Classfcaton Algorthms Based on Cloud Computng
More informationTransaction-Consistent Global Checkpoints in a Distributed Database System
Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback
More information