scholarly journals Virtual Infrastructure Orchestration For Cloud Service Deployment

2019 ◽  
Vol 63 (2) ◽  
pp. 295-307 ◽  
Author(s):  
Arslan Qadeer ◽  
Asad Waqar Malik ◽  
Anis Ur Rahman ◽  
Hamayun Mian Muhammad ◽  
Arsalan Ahmad

Abstract Cloud adoption has significantly increased using the infrastructure-as-a-service (IaaS) paradigm, in order to meet the growing demands of computing, storage and networking, in small as well as large enterprises. Different vendors provide their customized solutions for OpenStack deployment on bare metal or virtual infrastructure. Among these many available IaaS solutions, OpenStack stands out as being an agile and open-source platform. However, its deployment procedure is a time-taking and complex process with a learning curve. This paper addresses the lack of basic infrastructure automation in almost all of the OpenStack deployment projects. We propose a flexible framework to automate the process of infrastructure bring up for deployment of several OpenStack distributions, as well as resolving dependencies for a successful deployment. Our experimental results demonstrate the effectiveness of the proposed framework in terms of automation status and deployment time, that is, reducing the time spent in preparing a basic virtual infrastructure by four times, on average.

2018 ◽  
Vol 2018 ◽  
pp. 1-18 ◽  
Author(s):  
Enrique Chirivella-Perez ◽  
Jose M. Alcaraz Calero ◽  
Qi Wang ◽  
Juan Gutiérrez-Aguado

The progress in realizing the Fifth Generation (5G) mobile networks has been accelerated recently towards deploying 5G prototypes with increasing scale. One of the Key Performance Indicators (KPIs) in 5G deployments is the service deployment time, which should be substantially reduced from the current 90 hours to the target 90 minutes on average as defined by the 5G Public-Private Partnership (5G-PPP). To achieve this challenging KPI, highly automated and coordinated operations are required for the 5G network management. This paper addresses this challenge by designing and prototyping a novel 5G service deployment orchestration architecture that is capable of automating and coordinating a series of complicated operations across physical infrastructure, virtual infrastructure, and service layers over a distributed mobile edge computing paradigm, in an integrated manner. Empirical results demonstrate the superior performance achieved, which meets the 5G-PPP KPI even in the most challenging scenario where 5G services are installed from bare metal.


Author(s):  
Nina Dasari ◽  
Austin Jiang ◽  
Anna Skochdopole ◽  
Jayer Chung ◽  
Edward Reece ◽  
...  

AbstractDiabetic patients can sustain wounds either as a sequelae of their disease process or postoperatively. Wound healing is a complex process that proceeds through phases of inflammation, proliferation, and remodeling. Diabetes results in several pathological changes that impair almost all of these healing processes. Diabetic wounds are often characterized by excessive inflammation and reduced angiogenesis. Due to these changes, diabetic patients are at a higher risk for postoperative wound healing complications. There is significant evidence in the literature that diabetic patients are at a higher risk for increased wound infections, wound dehiscence, and pathological scarring. Factors such as nutritional status and glycemic control also significantly influence diabetic wound outcomes. There are a variety of treatments available for addressing diabetic wounds.


2020 ◽  
Vol 6 (51) ◽  
pp. eabd3590
Author(s):  
Yongkun Ji ◽  
Xingan Li ◽  
Ting Ji ◽  
Junbo Tang ◽  
Lifei Qiu ◽  
...  

Animals with recent shared ancestry frequently adapt in parallel to new but similar habitats, a process often underlined by repeated selection of the same genes. Yet, in contrast, few examples have demonstrated the significance of gene reuse in colonization of multiple disparate habitats. By analyzing 343 genomes of the widespread Asian honeybee, Apis cerana, we showed that multiple peripheral subspecies radiated from a central ancestral population and adapted independently to diverse habitats. We found strong evidence of gene reuse in the Leucokinin receptor (Lkr), which was repeatedly selected in almost all peripheral subspecies. Differential expression and RNA interference knockdown revealed the role of Lkr in influencing foraging labor division, suggesting that Lkr facilitates collective tendency for pollen/nectar collection as an adaptation to floral changes. Our results suggest that honeybees may accommodate diverse floral shifts during rapid radiation through fine-tuning individual foraging tendency, a seemingly complex process accomplished by gene reuse.


Author(s):  
Edwin D. Du Plessis ◽  
Henri J. Du Plessis ◽  
Henco C. Nel ◽  
Inge Oosthuizen ◽  
Suzahn Van der Merwe ◽  
...  

Background: The crime rate in South Africa is extraordinarily high. The problem of crime is further complicated when a person, who suffers from a mental illness, becomes involved in a crime. Furthermore, the forensic evaluation of a person suspected of having a mental illness involved in alleged criminal behaviour can be challenging. However, a dearth of information exists in South African literature regarding the link between crime and mental illness.Aim: To determine the percentage of alleged offenders, referred to the Free State Psychiatric Complex (FSPC) for observation, found accountable and not accountable, and to compare the biographical, diagnosis and offence profiles of these two groups. The analysis of differences can contribute to a better understanding of the complex process of forensic assessments.Setting: Forensic Observation Ward, FSPC, Bloemfontein.Methods: In this comparative, retrospective study, all 505 trial-awaiting alleged offenders (observati) referred from 2009 to 2012 for a 30-day observation period, according to Sections 77 and/or 78 of the Criminal Procedures Act, were included. Results were summarised as frequencies and percentages, and means or percentiles. Significant differences between the groups were determined by sample t-tests or chi-squared tests.Results: Observati found not accountable were in the majority (64.5%). Significant differences were found regarding marital and employment status, substance abuse, type of offence and diagnoses between the two groups. Almost all of the observati found to be not accountable were diagnosed with mental illness at the time of the assessment, whereas most observati found to be accountable for their actions at the time of the alleged offence were not found to be mentally ill. Observati found not accountable were significantly more likely to be diagnosed with schizophrenia, intellectual disability and substance-induced psychotic disorder, and committed mostly assault, murder and vandalism. Observati found accountable committed mostly rape, murder and theft.Conclusion: The majority of observati were found not accountable, with significant differences found between the two groups regarding demographic characteristics, type of diagnosis and offences committed. The identified differences can be used to assist in establishing criteria for the appropriate referral of alleged offenders by courts. Unnecessary referrals have a serious financial impact on the Department of Health. Furthermore, the high incidence of substance abuse among persons referred to the FSPC highlights the need for more substance rehabilitation centres in the Free State Province.


Author(s):  
Jana ROZMARINOVÁ

Health Technology Assessment (HTA) is one of the tools that can be used to support rational and objective decision-making in healthcare in the endeavour to contain public expenditure while maintaining the availability of healthcare interventions. The complex process of HTA often struggles to find its place in public policies and faces pressure from various stakeholders. HTA has existed since the 1970s and as a formal process has its roots in the United States. During the 1980s, HTA began to spread outside the US and over the next twenty years, reached almost all European countries, including some countries in Central Europe. The rise of HTA brought about an exponential increase in the empirical studies of HTA available in academic databases. This study reviews the available literature to analyse the development and research topics and the potential pitfalls of HTA implementation.


Despite the numerous benefits of cloud computing, concerns around security, trust and privacy are holding back the cloud adoption. Lack of visibility and tangible measurement of the security posture of any cloud hosted application is a disadvantage to cloud service customers. Decision to migrate workloads on the Cloud requires thoughtful analysis about security implications and ability to measure the security controls after hosting. In this paper, we propose a framework to quantitatively measure different aspects of information security for Cloud applications. This framework has a system through which we can define applications specific controls, gather information on control implementation, calculate the security levels for applications and present them to stakeholders through dashboards. Framework also includes detailed method to quantify the security of a Cloud application considering different aspects of security, control criticalities, stakeholder responsibilities and cloud service models. System and method provide visibility to Cloud customer on the security posture of their cloud hosted applications.


2021 ◽  
Author(s):  
Ivana Stupar ◽  
Darko Huljenić

Abstract Many of the currently existing solutions for cloud cost optimisation are aimed at cloud infrastructure providers, and they often deal only with specific types of application services, leaving the providers of cloud applications without the suitable cost optimization solution, especially concerning the wide range of different application types. In this paper, we present an approach that aims to provide an optimisation solution for the providers of applications hosted in the cloud environments, applicable at the early phase of a cloud application lifecycle and for a wide range of application services. The focus of this research is development of the method for identifying optimised service deployment option in available cloud environments based on the model of the service and its context, with the aim of minimising the operational cost of the cloud service, while fulfilling the requirements defined by the service level agreement. A cloud application context metamodel is proposed that includes parameters related to both the application service and the cloud infrastructure relevant for the cost and quality of service. By using the proposed optimisation method, the knowledge is gained about the effects that the cloud application context parameters have on the service cost and quality of service, which is then used to determine the optimised service deployment option. The service models are validated using cloud application services deployed in laboratory conditions, and the optimisation method is validated using the simulations based on proposed cloud application context metamodel. The experimental results based on two cloud application services demonstrate the ability of the proposed approach to provide relevant information about the impact of cloud application context parameters on service cost and quality of service, and use this information in the optimisation aimed at reducing service operational cost while preserving the acceptable service quality level. The results indicate the applicability and relevance of the proposed approach for cloud applications in the early service lifecycle phase since application providers can gain useful insights regarding service deployment decision without acquiring extensive datasets for the analysis.


2017 ◽  
Vol 8 (1) ◽  
pp. 52-60
Author(s):  
Shikha Gupta ◽  
Anil K. Saini

Cloud has revolutionized the entire landscape of IT usage, storage and maintenance. It has shifted the focus from owning physical IT infrastructure, facility and storage to the use of same in an abstract form with pay per use facility. This has led to economizing the entire IT infrastructure. Cloud's various characteristics including on demand pay per use, scalability and flexibility of computing highly depends on cloud service provider which can often lead to low results and serious issues. These issues may include concerns about losses due to non-compliance with the promises made. Hence selection of cloud service provider can play a positive or negative role in establishing an initial trust between the cloud service client and provider. The authors propose a model of Trust based Risk management of cloud adoption which can be used by cloud users. The model provides the functioning of comparing service providers using calculated trust ratings.


2016 ◽  
pp. 1848-1872 ◽  
Author(s):  
Ramanathan Venkatraman ◽  
Sitalakshmi Venkatraman

This chapter proposes a security and migration framework with business strategic implementation guidelines for successfully adopting cloud services, namely Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) in contemporary organisations. As a foundation to achieve this, the authors give emphasis to the importance of considering the security, privacy, and governance issues related to cloud implementations, along with the possible benefits of adopting cloud services in businesses. They discuss the various types of cloud, their deployment models, and service levels as these form the basis for strategically planning the security and migration framework implementation of cloud in an organization. In addition, the authors provide a step-wise security and migration framework that could serve as a business strategic guideline for a successful cloud service adoption in enterprises.


Sign in / Sign up

Export Citation Format

Share Document