scholarly journals The enhancement of logging system accuracy for infrastructure as a service cloud

2020 ◽  
Vol 9 (4) ◽  
pp. 1558-1568
Author(s):  
Surapong Wiriya ◽  
Winai Wongthai ◽  
Thanathorn Phoka

We introduce the novel technical results of the enhanced logging system for customer virtual machines (VMs) in an Infrastructure as a Service (IaaS) cloud. The main contribution is that the enhanced system can work with a better system's accuracy and speed, with the simplicity of the design and implementation. We measure the accuracy of the unenhanced logging system, then find a quick solution to enhance the system based on the results of the measurement. To measure and enhance the unenhanced system, we increase the main memory and CPU cores of the VMs then collect the accuracy results from each increment configuration. We analyze the results and propose to use the taskset tool to enhance the accuracy of the system. Found three main findings include: firstly, the accuracy of the enhanced system is about 20% on maximum better than the unenhanced one;  the enhanced system accuracy becomes 100%; lastly, the enhanced system can detect a file with the smaller file size as almost 12% smaller. The findings can be a basis to design the logging systems in an IaaS cloud, to decrease hardware and energy investment. To the best of our knowledge, the contribution and findings are not in the literature.

2014 ◽  
Vol 5 (1) ◽  
pp. 24-43 ◽  
Author(s):  
T.R.V. Anandharajan ◽  
M.A. Bhagyaveni

Infrastructure as a Service is an important component in the cloud building block. The authors present a Cloud Simulation experience with an objective to handle the performance and energy tradeoff in an Infrastructure as a Service (IaaS) environment. The authors present the orchestration of statistical, machine learning and energy model based Minimum Power Performance (MPP) algorithm to validate simulation using PlanetLab VMs real world traces from real systems. Their proposed algorithm consolidates virtual machines (VMs) in the Processing Elements (PE or Host or Server) and is 39% better than the legacy algorithms.


IET Networks ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 326-337
Author(s):  
Khiet Thanh Bui ◽  
Hung Dac Ho ◽  
Tran Vu Pham ◽  
Hung Cong Tran

2020 ◽  
Vol 176 (3-4) ◽  
pp. 349-384
Author(s):  
Domenico Cantone ◽  
Marianna Nicolosi-Asmundo ◽  
Daniele Francesco Santamaria

In this paper we consider the most common TBox and ABox reasoning services for the description logic 𝒟ℒ〈4LQSR,x〉(D) ( 𝒟 ℒ D 4,× , for short) and prove their decidability via a reduction to the satisfiability problem for the set-theoretic fragment 4LQSR. 𝒟 ℒ D 4,× is a very expressive description logic. It combines the high scalability and efficiency of rule languages such as the SemanticWeb Rule Language (SWRL) with the expressivity of description logics. In fact, among other features, it supports Boolean operations on concepts and roles, role constructs such as the product of concepts and role chains on the left-hand side of inclusion axioms, role properties such as transitivity, symmetry, reflexivity, and irreflexivity, and data types. We further provide a KE-tableau-based procedure that allows one to reason on the main TBox and ABox reasoning tasks for the description logic 𝒟 ℒ D 4,× . Our algorithm is based on a variant of the KE-tableau system for sets of universally quantified clauses, where the KE-elimination rule is generalized in such a way as to incorporate the γ-rule. The novel system, called KEγ-tableau, turns out to be an improvement of the system introduced in [1] and of standard first-order KE-tableaux [2]. Suitable benchmark test sets executed on C++ implementations of the three mentioned systems show that in several cases the performances of the KEγ-tableau-based reasoner are up to about 400% better than the ones of the other two systems.


2021 ◽  
Vol 18 (3) ◽  
pp. 1-25
Author(s):  
Weijia Song ◽  
Christina Delimitrou ◽  
Zhiming Shen ◽  
Robbert Van Renesse ◽  
Hakim Weatherspoon ◽  
...  

Infrastructure-as-a-Service cloud providers sell virtual machines that are only specified in terms of number of CPU cores, amount of memory, and I/O throughput. Performance-critical aspects such as cache sizes and memory latency are missing or reported in ways that make them hard to compare across cloud providers. It is difficult for users to adapt their application’s behavior to the available resources. In this work, we aim to increase the visibility that cloud users have into shared resources on public clouds. Specifically, we present CacheInspector , a lightweight runtime that determines the performance and allocated capacity of shared caches on multi-tenant public clouds. We validate CacheInspector ’s accuracy in a controlled environment, and use it to study the characteristics and variability of cache resources in the cloud, across time, instances, availability regions, and cloud providers. We show that CacheInspector ’s output allows cloud users to tailor their application’s behavior, including their output quality, to avoid suboptimal performance when resources are scarce.


2020 ◽  
Vol 11 (1) ◽  
pp. 39
Author(s):  
Eric Järpe ◽  
Mattias Weckstén

A new method for musical steganography for the MIDI format is presented. The MIDI standard is a user-friendly music technology protocol that is frequently deployed by composers of different levels of ambition. There is to the author’s knowledge no fully implemented and rigorously specified, publicly available method for MIDI steganography. The goal of this study, however, is to investigate how a novel MIDI steganography algorithm can be implemented by manipulation of the velocity attribute subject to restrictions of capacity and security. Many of today’s MIDI steganography methods—less rigorously described in the literature—fail to be resilient to steganalysis. Traces (such as artefacts in the MIDI code which would not occur by the mere generation of MIDI music: MIDI file size inflation, radical changes in mean absolute error or peak signal-to-noise ratio of certain kinds of MIDI events or even audible effects in the stego MIDI file) that could catch the eye of a scrutinizing steganalyst are side-effects of many current methods described in the literature. This steganalysis resilience is an imperative property of the steganography method. However, by restricting the carrier MIDI files to classical organ and harpsichord pieces, the problem of velocities following the mood of the music can be avoided. The proposed method, called Velody 2, is found to be on par with or better than the cutting edge alternative methods regarding capacity and inflation while still possessing a better resilience against steganalysis. An audibility test was conducted to check that there are no signs of audible traces in the stego MIDI files.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 3120 ◽  
Author(s):  
Shanshan Hu ◽  
Huaiyang Wang ◽  
Yong Wang ◽  
Zhengshi Liu

A novel elastic body design idea of six-axis wrist force sensor with a floating beam was raised based on the analysis of the robot six-axis wrist force sensor with a floating beam. The design ideas improve the sensor’s dynamic performance significantly, while not reducing its sensitivity. First, the design ideas were described in detail, which were analyzed by mechanical modeling and were verified by finite element analysis. Second, the static simulation analysis of the novel elastomer of sensor was carried out. According to the strain distribution performance, the position of the strain gauges pasted and the connection mode of the full-bridge circuits were decided, which can achieve theoretical decoupling. Finally, the comparison between the static and dynamic performance of the novel sensor and the original sensor with floating beams was done. The results show that the static and dynamic performance of the novel six-axis wrist sensor are all better than the original sensor.


2013 ◽  
Vol 694-697 ◽  
pp. 2003-2008
Author(s):  
Ming Hong Dai

The paper introduces Laplace pyramid, Ridgelet and Curvelet principle, structure and methods, and their denoising experimental studies. It also introduces the traditional direction filter of principle, structure and methodology, and the simulation experiments show that its image denoising PSNR is slightly lower than wavelet but denoising image visual quality is better than former. To that end, proposed a new direction filters that uniform direction filter banks and non-uniform direction filters, proved filter passband condition and related design and implementation issues were discussed. nonlinear experiment shows that the new direction filter bank was better than the wavelet.


Author(s):  
S.Tamil Selvan ◽  
M. Sundararajan

In this paper presented Design and implementation of CNTFET based Ternary 1x1 RAM memories high-performance digital circuits. CNTFET Ternary 1x1 SRAM memories is implement using 32nm technology process. The CNTFET decresase the diameter and performance matrics like delay,power and power delay, The CNTFET Ternary 6T SRAM cell consists of two cross coupled Ternary inverters one is READ and another WRITE operations of the Ternary 6T SRAM cell are performed with the Tritline using HSPICE and Tanner tools in this tool is performed high accuracy. The novel based work can be used for Low Power Application and Access time is less of compared to the conventional CMOS Technology. The CNTFET Ternary 6T SRAM array module (1X1) in 32nm technology consumes only 0.412mW power and data access time is about 5.23ns.


Sign in / Sign up

Export Citation Format

Share Document