Management intelligence for optimal resource allocations in network server systems

Author(s):  
Kaliappa Ravindran ◽  
Mohammad Rabby ◽  
Shereef Elmetwaly
2018 ◽  
Vol 17 (10) ◽  
pp. 2349-2365 ◽  
Author(s):  
Yuan Wu ◽  
Yanfei He ◽  
Li Ping Qian ◽  
Jianwei Huang ◽  
Xuemin Shen

2019 ◽  
Vol 67 (10) ◽  
pp. 2775-2790 ◽  
Author(s):  
Mark Eisen ◽  
Clark Zhang ◽  
Luiz F. O. Chamon ◽  
Daniel D. Lee ◽  
Alejandro Ribeiro

Author(s):  
Lars Peter Hansen ◽  
Thomas J. Sargent

This chapter describes a planning problem that generates competitive equilibrium allocations and compares two methods for solving it. The first method uses state- and date-contingent Lagrange multipliers; the second uses dynamic programming. The first method reveals a direct connection between the Lagrange multipliers and the equilibrium prices in a competitive equilibrium to be analyzed in Chapter 7. The second method provides good algorithms for calculating both the law of motion for the optimal quantities and the Lagrange multipliers. The chapter also describes a set of MATLAB programs that solve the planning problem and represent its solution in various ways. These programs are used to solve the planning problem for six sample economies formed by choosing particular examples of the ingredients from Chapter 4.


Author(s):  
Maxwell Scale Uwadia Osagie ◽  
C. I. Okoye ◽  
Amenze Joy Osagie

Botnet as it is popularly called became fashionable in recent times owing to it embedded force on network servers. Botnet has an exponential growth of about 170, 000 within network server and client infrastructures per day. The networking environment on monthly basis battle over 5 million bots. Nigeria as a country loses above one hundred and twenty five (N125) billion naira to network fraud annually, end users such as Banks and other financial institutions battle daily the botnet threats. The most worrisome part of the botmaster’s botnet is it propagation as an entity even when it is known to be large pool of malicious threats. The attacks leave end users (clients) to the risk of losing valuable credentials when connected to the affected infrastructure. It is on the above premise that this paper sort to expose the botnet method of propagation through proactive mechanism called Encapsulated Detection Mechanism (EDM) for botnet on Server Systems with further operations on conceptual framework, structural modules, usability and application of botnet. The mechanism uses one dimensional data stream evolutionary window approach of Distance Base Model (DBM) as an Outlier Analysis (OA). The Captcha, Username password and EDM Analyzer act as the front end of the data stream checker using Bot-Stream OutlieR Miner (B-STORM) algorithm and B-Exact Algorithm. The research work showed high level of data entering compliance efficiency on the server end network by neutralizing and mitigating botnet attack that falls short of the predefined data order within the networking signature.  


2020 ◽  
Vol 4 (3) ◽  
pp. 914-926 ◽  
Author(s):  
Ganesh Prasad ◽  
Deepak Mishra ◽  
Kamel Tourki ◽  
Ashraf Hossain ◽  
Merouane Debbah

Sign in / Sign up

Export Citation Format

Share Document