• Title/Summary/Keyword: Component framework

Search Result 515, Processing Time 0.028 seconds

An Anomaly Detection Framework Based on ICA and Bayesian Classification for IaaS Platforms

  • Wang, GuiPing;Yang, JianXi;Li, Ren
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3865-3883
    • /
    • 2016
  • Infrastructure as a Service (IaaS) encapsulates computer hardware into a large amount of virtual and manageable instances mainly in the form of virtual machine (VM), and provides rental service for users. Currently, VM anomaly incidents occasionally occur, which leads to performance issues and even downtime. This paper aims at detecting anomalous VMs based on performance metrics data of VMs. Due to the dynamic nature and increasing scale of IaaS, detecting anomalous VMs from voluminous correlated and non-Gaussian monitored performance data is a challenging task. This paper designs an anomaly detection framework to solve this challenge. First, it collects 53 performance metrics to reflect the running state of each VM. The collected performance metrics are testified not to follow the Gaussian distribution. Then, it employs independent components analysis (ICA) instead of principal component analysis (PCA) to extract independent components from collected non-Gaussian performance metric data. For anomaly detection, it employs multi-class Bayesian classification to determine the current state of each VM. To evaluate the performance of the designed detection framework, four types of anomalies are separately or jointly injected into randomly selected VMs in a campus-wide testbed. The experimental results show that ICA-based detection mechanism outperforms PCA-based and LDA-based detection mechanisms in terms of sensitivity and specificity.

A Fault-Tolerant Mobile Agent Framework and Replication Study for Internet Applications (인터넷 응용을 위한 고장 감내 이동 에이전트 프레임워크와 레플리케이션 연구)

  • Park, Kyeong-mo
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.701-708
    • /
    • 2003
  • This paper addresses the issue involved in dependability of distributed mobile agents in the Internet environment. We propose an architectural framework for the Internet applications making mobile agents into fault-tolerant. The replication of agents and data is of great importance to achieve fault tolerance in distributed systems over the Internet. This research focuses on the replication component for the proposed fault-tolerant mobile agent framework. We present and analyze the performance results obtained when doing simulation study on the effects of the degree of replication, the active and passive replication strategies, and the replication scale.

Matching Sourcing Destination with Fashion Brands' Business Model: Comparative Advantages of Bangladesh and Vietnam Apparel Industries

  • Jacobs, Bertha;Simpson, Leslie;Nelson, Sara;Karpova, Elena
    • Fashion, Industry and Education
    • /
    • v.14 no.2
    • /
    • pp.11-23
    • /
    • 2016
  • This study investigated the comparative advantages of the Bangladeshi and Vietnamese apparel industries using Global Value Chain (GVC) framework. In this study, the GVC framework was expanded to include social and environmental sustainability issues. Secondary data, for the 2012 - 2013 period, were collected and analyzed for each component of the apparel GVC. The findings indicated that while both countries have unique comparative advantages, Vietnam clearly emerged as a leader on many GVC components. Bangladesh's comparative advantage lies in lower wages, producing high volume orders, and lean manufacturing. In spite of Vietnam's higher labor costs, it has comparative advantages in higher productivity, skilled and trained workers, manufacturing of intricate styles of high quality, agility and flexible manufacturing, more developed infrastructure and logistic services as well as greater social and environmental compliances. This study contributes towards insight into best sourcing fit for fashion brand business models. Based on the findings, fashion driven companies offering more complex styles at a faster rate will benefit from choosing Vietnam. In contrast, Bangladesh might be a better choice for high volume driven companies that offer basic apparel and better value for their consumers. From theoretical perspective, the research makes an important contribution by expanding the GVC framework.

ObjectPeerWork : Framework for the Development of Peer-to-Peer Applications based on Shared Object Model (ObjectPeerWork : 공유 객체 모델 기반의 피어투피어 어플리케이션 개발을 위한 프레임워크)

  • Kang, Un-Gu;Wang, Chang-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.630-640
    • /
    • 2001
  • In this paper, we describe the design and implementation of ObjectPeerWork, which is a framework for the development of shared object model-based P2P(Peer-to-Peer) applications. The shared object model can prevent the computing power decrease on the way of resource management by incorporating the resource management function into resources themselves, and raise reliability on shared resources by improving the security problems. Also this model assures expandability by means of distributed component-based request broker manager and module container. The ObjectPeerWork based on this shared object model is a framework which makes the implementation of the enterprise information system possible, and makes distribution of the computing power and efficient resource management possible by improving the weakness in the general P2P model.

  • PDF

The Components of Environment and Their System (환경의 구성요소와 그 체계)

  • Jeong, Dai-Yeun
    • Journal of Environmental Impact Assessment
    • /
    • v.10 no.3
    • /
    • pp.175-194
    • /
    • 2001
  • The environment is composed of at least two components, the natural and the human-made one. Nonetheless, the environment is being used to connote the natural environment. Moreover, even though the components of environment exist in a mutual relationship as a mechanism, it is rare to study the components of environment and their system as a mechanism. With such an implication, this paper aims to identify the components of environment and their system. The components of environment can be categorized by two criteria. One is the subject of creating environment, and the other is the visuality of environment. The former categorizes the environment into the natural and the human-made one, and the latter into physical and nonphysical one. Integrating the two criteria into a framework, the environment can be categorized into the natural, the human-made physical, and the human-made nonphysical environment. The three categories of environment exist interrelatedly in a mechanism being characterized as a mutual impact. The mechanism may be called the environmental system. The environmental system can be analyzed in terms of two dimensions. One is a human-inclusive system. The other is a human-centered system. The former is a framework that includes humans as a component of environment. The latter is a framework that humans are the subject of the environment, and the others surrounding human life are the object of the environment. The former is defined as a circular system of material and energy, while the latter is defined as a mutual subjective-objective system.

  • PDF

A Message Monitoring Framework for Tracing Messages on JBI-based Enterprise Service Bus (JBI 기반 ESB 환경에서 효과적인 메시지 추적을 위한 메시지모니터링 프레임워크)

  • Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.179-192
    • /
    • 2010
  • In order to resolve the problems of traditional Enterprise Application Integration (EAI) for system integration and to establish flexible enterprise IT environments, Enterprise Service Bus(ESB) which have distributed architecture and support Service Oriented Architecture(SOA) has introduced. Particularly, JBI which developed by the Java Community Process is most widely used to implement ESB for advantages of Java technology. In ESB based on JBI, reliable message delivery is very important to ensure stability of services and systems because it is a message driven architecture. But, it is difficult to verify messages and trace messages when system fault or service error occurred because JBI specification is not enough to address them. In this paper we has proposed the Message Monitoring Framework for JBI-based ESBs which for using in monitoring messages efficiently. It provides foundations for gathering and tracing message-related information about component installation, message exchange, service deploy by using proxy-based change tracking and delegation mechanism for data processing. The proxy which used in our solutions collects data about message automatically when it changed, and the delegation mechanism provides users flexibility for data processing. Also, we describe the performance evaluation results of our solution which is acceptable. We expect to it enables users to ensure reliability and stability of the JBI-based ESB by systematic monitoring and managing messages being used to interact among components.

Design Mobile Cross Framework Based MDA (MDA 기반의 모바일 크로스 프레임워크 설계)

  • Song, Yujin;Lee, Eun-Joo;Han, Deok-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1445-1452
    • /
    • 2016
  • Recently Mobile Software Applications are developed in various languages and stored in App Store. App Users selectively use appropriate apps for the owned hardware. In other words, it depends on the kinds of operating systems of the apps whether to use or not to use the applications in various languages. The apps should be differently implemented according to the kind of the user's device, though they provide the same functions. To solve these problems, it is necessary to define an independent function specification method which is not dependent to a specific system environment. In this paper, the Mobile Application Developing Framework is suggested, which incorporates all of the development process. Standardized models are proposed which can be used in the analysis and design steps. In implementation phase, a technique for cross framework design is suggested so as to implement a platform dependent mobile app.

An Internet-based computing framework for the simulation of multi-scale response of structural systems

  • Chen, Hung-Ming;Lin, Yu-Chih
    • Structural Engineering and Mechanics
    • /
    • v.37 no.1
    • /
    • pp.17-37
    • /
    • 2011
  • This paper presents a new Internet-based computational framework for the realistic simulation of multi-scale response of structural systems. Two levels of parallel processing are involved in this frame work: multiple local distributed computing environments connected by the Internet to form a cluster-to-cluster distributed computing environment. To utilize such a computing environment for a realistic simulation, the simulation task of a structural system has been separated into a simulation of a simplified global model in association with several detailed component models using various scales. These related multi-scale simulation tasks are distributed amongst clusters and connected to form a multi-level hierarchy. The Internet is used to coordinate geographically distributed simulation tasks. This paper also presents the development of a software framework that can support the multi-level hierarchical simulation approach, in a cluster-to-cluster distributed computing environment. The architectural design of the program also allows the integration of several multi-scale models to be clients and servers under a single platform. Such integration can combine geographically distributed computing resources to produce realistic simulations of structural systems.

Computer vision monitoring and detection for landslides

  • Chen, Tim;Kuo, C.F.;Chen, J.C.Y.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.2
    • /
    • pp.161-171
    • /
    • 2019
  • There have been a few checking frameworks intended to ensure and improve the nature of their regular habitat. The greater part of these frameworks are constrained in their capacities. In this paper, the insightful checking framework intended for debacle help and administrations has been exhibited. The ideal administrations, necessities and coming about plan proposition have been indicated. This has prompted a framework that depends fundamentally on ecological examination so as to offer consideration and security administrations to give the self-governance of indigenous habitats. In this sense, ecological acknowledgment is considered, where, in light of past work, novel commitments have been made to help include based and PC vision situations. This epic PC vision procedure utilized as notice framework for avalanche identification depends on changes in the normal landscape. The multi-criteria basic leadership strategy is used to incorporate slope data and the level of variety of the highlights. The reproduction consequences of highlight point discovery are shown in highlight guide coordinating toward discover steady and coordinating component focuses and effectively identified utilizing these two systems, by examining the variety in the distinguished highlights and the element coordinating.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.