scholarly journals Proactive Mitigation of the Revocation Risk for Preemptible Virtualized Resources

Author(s):  
Panagiotis Oikonomou ◽  
Kostas Kolomvatsos ◽  
Christos Anagnostopoulos

<div>The provision of resources at the Cloud follows two generic models. The first model guarantees the provided resources for the requested time while the second involves unreliable resources with lower price compared to the former scheme but with no guarantees concerning an unexpected revocation due to a high demand. In this paper, we focus on the latter model and propose a scheme that monitors the course of execution of tasks placed at unreliable resources and decides when to store their current progress avoid jeopardizing intermediate outcomes in unexpected revocations. We rely on the principles of Optimal Stopping Theory (OST) to manage multiple tasks and decide for which task and when we have to save its current status. The outcome is a novel checkpointing mechanism fully aligned with the needs of the dynamics of an unreliable environment. The proposed model builds upon the heterogeneity of the available services in the Cloud and concludes a proactive mitigation approach of the revocation risk for unreliable virtualized resources. We present the theoretical basis of our mechanism and describe the solution of the identified problem. The pros and cons of our approach are evaluated through extensive simulations and a set of performance metrics.</div>

2021 ◽  
Author(s):  
Panagiotis Oikonomou ◽  
Kostas Kolomvatsos ◽  
Christos Anagnostopoulos

<div>The provision of resources at the Cloud follows two generic models. The first model guarantees the provided resources for the requested time while the second involves unreliable resources with lower price compared to the former scheme but with no guarantees concerning an unexpected revocation due to a high demand. In this paper, we focus on the latter model and propose a scheme that monitors the course of execution of tasks placed at unreliable resources and decides when to store their current progress avoid jeopardizing intermediate outcomes in unexpected revocations. We rely on the principles of Optimal Stopping Theory (OST) to manage multiple tasks and decide for which task and when we have to save its current status. The outcome is a novel checkpointing mechanism fully aligned with the needs of the dynamics of an unreliable environment. The proposed model builds upon the heterogeneity of the available services in the Cloud and concludes a proactive mitigation approach of the revocation risk for unreliable virtualized resources. We present the theoretical basis of our mechanism and describe the solution of the identified problem. The pros and cons of our approach are evaluated through extensive simulations and a set of performance metrics.</div>


Author(s):  
Honghai LI ◽  
Jun CAI

The transformation of China's design innovation industry has highlighted the importance of design research. The design research process in practice can be regarded as the process of knowledge production. The design 3.0 mode based on knowledge production MODE2 has been shown in the Chinese design innovation industry. On this cognition, this paper establishes a map with two dimensions of how knowledge integration occurs in practice based design research, which are the design knowledge transfer and contextual transformation of design knowledge. We use this map to carry out the analysis of design research cases. Through the analysis, we define four typical practice based design research models from the viewpoint of knowledge integration. This method and the proposed model can provide a theoretical basis and a path for better management design research projects.


2021 ◽  
Vol 13 (2) ◽  
pp. 168781402199530
Author(s):  
Bixiong Huang ◽  
Shuci Wang ◽  
Shuanglong Geng ◽  
Xintian Liu

To more accurately predict the fatigue life of components under the action of random loads, it is necessary to explore the influence of the interaction between the load sequence and the load on the life prediction. Based on the Manson-Halford method and Corten-Dolan model, this paper establishes a fatigue cumulative damage model that takes into account both the load order and the interaction between loads, and also takes into account the loads near the fatigue limit. The fatigue life of mechanical parts under random load can be calculated through this model, which provides a theoretical basis for life prediction under random load spectrum. The fatigue life of mechanical parts under random load can be calculated through this model, which provides a theoretical basis for life prediction under random load spectrum. Comparing the calculation results of the proposed model with the results of Palmgren Miner, Manson-Halford method, and Corten-Dolan model, it is found that the fatigue damage model established can reasonably predict the fatigue life of parts. Comparison and verification of examples further prove the accuracy and reliability of the proposed model.


2016 ◽  
Vol 145 (5) ◽  
pp. 925-941 ◽  
Author(s):  
G. MURPHY ◽  
C. D. PILCHER ◽  
S. M. KEATING ◽  
R. KASSANJEE ◽  
S. N. FACENTE ◽  
...  

SUMMARYIn 2011 the Incidence Assay Critical Path Working Group reviewed the current state of HIV incidence assays and helped to determine a critical path to the introduction of an HIV incidence assay. At that time the Consortium for Evaluation and Performance of HIV Incidence Assays (CEPHIA) was formed to spur progress and raise standards among assay developers, scientists and laboratories involved in HIV incidence measurement and to structure and conduct a direct independent comparative evaluation of the performance of 10 existing HIV incidence assays, to be considered singly and in combinations as recent infection test algorithms. In this paper we report on a new framework for HIV incidence assay evaluation that has emerged from this effort over the past 5 years, which includes a preliminary target product profile for an incidence assay, a consensus around key performance metrics along with analytical tools and deployment of a standardized approach for incidence assay evaluation. The specimen panels for this evaluation have been collected in large volumes, characterized using a novel approach for infection dating rules and assembled into panels designed to assess the impact of important sources of measurement error with incidence assays such as viral subtype, elite host control of viraemia and antiretroviral treatment. We present the specific rationale for several of these innovations, and discuss important resources for assay developers and researchers that have recently become available. Finally, we summarize the key remaining steps on the path to development and implementation of reliable assays for monitoring HIV incidence at a population level.


Author(s):  
Murray E. Jennex ◽  
Lorne Olfman

This paper describes a knowledge management, KM, Success Model that is derived from observations generated through a longitudinal study of KM in an engineering organization, KM success factors found in the literature, and modified by the application of these observations and success factors in various projects. The DeLone and McLean (1992, 2003) IS Success Model was used as a framework for the model as it was found to fit the observed success criteria and it provided an accepted theoretical basis for the proposed model.


Author(s):  
Matthew W. Guah

This article reviews the development of institutional theory in direct relations to historical changes within the UK’s National Health Service (NHS) with an eye to contributing to the theoretical specification of healthcare information processes. This is done partly by extending certain paradigms (see Meyer & Rowan, 1991; Powell & DiMaggio, 1991; Tolbert & Zucker, 1994) through a proposed model of causes and consequences of variations in levels of institutionalisation in the healthcare industry. It reports findings from a 5-year study on the NHS implementation of the largest civil ISs worldwide at an estimated cost of $10 billion over a 10-year period. The theoretical basis for analysis is developed, using concepts drawn from neo-institutionalism, realisation of business value, and organisational logic, as well as mixed empirical results about the lack of IT investments value in the NHS. The findings suggest that large scale, IT change imposed upon a highly institutionalised healthcare industry is fraught with difficulty mainly because culturally embedded norms, values, and behavioural patterns serve to impede centrally imposed initiatives to automate clinical working practices. It concludes with a discussion about the nature of evaluation procedures in relation to the process of institutionalising IS in healthcare.


Author(s):  
Preethi D. ◽  
Neelu Khare

This chapter presents an ensemble-based feature selection with long short-term memory (LSTM) model. A deep recurrent learning model is proposed for classifying network intrusion. This model uses ensemble-based feature selection (EFS) for selecting the appropriate features from the dataset and long short-term memory for the classification of network intrusions. The EFS combines five feature selection techniques, namely information gain, gain ratio, chi-square, correlation-based feature selection, and symmetric uncertainty-based feature selection. The experiments were conducted using the standard benchmark NSL-KDD dataset and implemented using tensor flow and python. The proposed model is evaluated using the classification performance metrics and also compared with all the 41 features without any feature selection as well as with each individual feature selection technique and classified using LSTM. The performance study showed that the proposed model performs better, with 99.8% accuracy, with a higher detection and lower false alarm rates.


Author(s):  
Murray E. Jennex ◽  
Lorne Olfman

This article describes a knowledge management (KM) success model that is derived from observations generated through a longitudinal study of KM in an engineering organization and KM success factors found in the literature, which were modified by the application of these observations and success factors in various projects. The De- Lone and McLean (1992, 2003) IS Success Model was used as a framework for the model, since it was found to fit the observed success criteria and provided an accepted theoretical basis for the proposed model.


2011 ◽  
Vol 7 (2) ◽  
pp. 147-163 ◽  
Author(s):  
Tarek R. Sheltami ◽  
Elhadi M. Shakshuki ◽  
Hussein T. Mouftah

Sensor network can be used in a numerous number of applications. However, implementing wireless sensor networks present new challenges compared with theoretical networks. In addition, implementing a sensor network might provide results different from that derived theoretically. Some routing protocols when implemented might fail to perform. In this paper, we implement three routing protocols, namely: Dynamic MANET on-demand, Collection Tree and Dissemination protocols. To compare the performance of these protocols, they are implemented using a Telosb sensor network. Several performance metrics are carried out to demonstrate the pros and cons of these protocols. A telemedicine application is tested in top of the implemented Telosb sensor network at King Fahd University of Petroleum and Minerals Clinic in Saudi Arabia, utilizing Alive ECG sensors.


Author(s):  
Shensheng Tang ◽  
Yi Xie

Power line communication (PLC) is a promising technique for information transmission using existing power lines. We analytically model a finite-source PLC network subject to channel noise (disturbance) and evaluate its call-level performance through a queueing theoretic framework. The proposed PLC network model consists of a base station (BS), which is located at a transformer station and connected to the backbone communication networks, and a number of subscriber stations that are interconnected with each other and with the BS via the power line transmission medium. An orthogonal frequency division multiplexing based transmission technique is assumed to be used for providing the transmission channels in a frequency spectrum. The channels are subject to failure during service due to disturbance. We determine the steady-state solution of the proposed model and derive a set of performance metrics of interest. Numerical and simulation results are presented to show the derived metrics with respect to different system parameters. The proposed modeling method can be used for evaluation and design of future PLC networks.


Sign in / Sign up

Export Citation Format

Share Document