• Title/Summary/Keyword: VM-Based Behavior Analysis

Search Result 8, Processing Time 0.018 seconds

A Quantitative Approach to Minimize Energy Consumption in Cloud Data Centres using VM Consolidation Algorithm

  • M. Hema;S. KanagaSubaRaja
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.312-334
    • /
    • 2023
  • In large-scale computing, cloud computing plays an important role by sharing globally-distributed resources. The evolution of cloud has taken place in the development of data centers and numerous servers across the globe. But the cloud information centers incur huge operational costs, consume high electricity and emit tons of dioxides. It is possible for the cloud suppliers to leverage their resources and decrease the consumption of energy through various methods such as dynamic consolidation of Virtual Machines (VMs), by keeping idle nodes in sleep mode and mistreatment of live migration. But the performance may get affected in case of harsh consolidation of VMs. So, it is a desired trait to have associate degree energy-performance exchange without compromising the quality of service while at the same time reducing the power consumption. This research article details a number of novel algorithms that dynamically consolidate the VMs in cloud information centers. The primary objective of the study is to leverage the computing resources to its best and reduce the energy consumption way behind the Service Level Agreement (SLA)drawbacks relevant to CPU load, RAM capacity and information measure. The proposed VM consolidation Algorithm (PVMCA) is contained of four algorithms: over loaded host detection algorithm, VM selection algorithm, VM placement algorithm, and under loading host detection algorithm. PVMCA is dynamic because it uses dynamic thresholds instead of static thresholds values, which makes it suggestion for real, unpredictable workloads common in cloud data centers. Also, the Algorithms are adaptive because it inevitably adjusts its behavior based on the studies of historical data of host resource utilization for any application with diverse workload patterns. Finally, the proposed algorithm is online because the algorithms are achieved run time and make an action in response to each request. The proposed algorithms' efficiency was validated through different simulations of extensive nature. The output analysis depicts the projected algorithms scaled back the energy consumption up to some considerable level besides ensuring proper SLA. On the basis of the project algorithms, the energy consumption got reduced by 22% while there was an improvement observed in SLA up to 80% compared to other benchmark algorithms.

A simplified framework for estimation of deformation pattern in deep excavations

  • Abdollah Tabaroei;Reza Jamshidi Chenari
    • Geomechanics and Engineering
    • /
    • v.37 no.1
    • /
    • pp.31-48
    • /
    • 2024
  • To stabilize the excavations in urban area, soil anchorage is among the very common methods in geotechnical engineering. A more efficient deformation analysis can potentially lead to cost-effective and safer designs. To this end, a total of 116 three-dimensional (3D) finite element (FE) models of a deep excavation supported by tie-back wall system were analyzed in this study. An initial validation was conducted through examination of the results against the Texas A&M excavation cases. After the validation step, an extensive parametric study was carried out to cover significant design parameters of tie-back wall system in deep excavations. The numerical results indicated that the maximum horizontal displacement values of the wall (δhm) and maximum surface settlement (δvm) increase by an increase in the value of ground anchors inclination relative to the horizon. Additionally, a change in the wall embedment depth was found to be contributing more to δvm than to δhm. Based on the 3D FE analysis results, two simple equations are proposed to estimate excavation deformations for different scenarios in which the geometric configuration parameters are taken into account. The model proposed in this study can help the engineers to have a better understanding of the behavior of such systems.

Analysis of Influencing Factors of Traveler Detour Making Behavior for Providing Freeway VMS Information (고속도로 VMS 정보 제공 시 우회율 산출에 관한 연구)

  • Choi, Jai-Sung;Sung, Hyun-Jin;Kim, Sang-Youp;Park, Jun;Kang, Weon-Eui
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.3
    • /
    • pp.41-50
    • /
    • 2010
  • This paper presents an investigation result that is made to determine dominant influencing factors and their specific impacts on motorist detour makings for VMS placements on freeway. This was necessary to provide engineers with a tool for evaluating VMS cost-effectiveness and its feasibility. This research found that additional travel time delay is the most influential variable in determining motorist detour makings. Also, more than 70% freeway motorists recognize the adjacent national roads as their detour routes, and both AADT and the distance to the entering point of the detour path are found to be dominating factors. Motorist detour ratio model by VMS placement on freeway is developed based on the Stated Preference. In model validation, actual detour making behaviors observed by the Revealed Preference values verify the detour ratio on the Stated Preference. These research findings should be useful for cost-effective placements of VMS on freeway, and it is recommended that the results be tested by practicing engineers in the ITS sector.

An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents (악성코드 은닉 문서파일 탐지를 위한 이메일 백신 클라우드 시스템)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.754-762
    • /
    • 2010
  • Nowadays, email-based targeted attacks using malcode-bearing documents have been steadily increased. To improve the success rate of the attack and avoid anti-viruses, attackers mainly employ zero-day exploits and relevant social engineering techniques. In this paper, we propose an architecture of the email vaccine cloud system to prevent targeted attacks using malcode-bearing documents. The system extracts attached document files from email messages, performs behavior analysis as well as signature-based detection in the virtual machine environment, and completely removes malicious documents from the messages. In the process of behavior analysis, the documents are regarded as malicious ones in cases of creating executable files, launching new processes, accessing critical registry entries, connecting to the Internet. The email vaccine cloud system will help prevent various cyber terrors such as information leakages by preventing email based targeted attacks.

Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 리얼머신 기반의 바이너리 자동실행 환경)

  • Cho, Homook;Yoon, KwanSik;Choi, Sangyong;Kim, Yong-Min
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • There exist many threats in cyber space, however current anti-virus software and other existing solutions do not effectively respond to malware that has become more complex and sophisticated. It was shown experimentally that it is possible for the proposed approach to provide an automatic execution environment for the detection of malicious behavior of active malware, comparing the virtual-machine environment with the real-machine environment based on user interaction. Moreover, the results show that it is possible to provide a dynamic analysis environment in order to analyze the intelligent malware effectively, through the comparison of malicious behavior activity in an automatic binary execution environment based on real-machines and the malicious behavior activity in a virtual-machine environment.

A Methodology for Estimating Diversion Flows on Expressways (고속도로 우회교통량 추정방법론에 관한 연구)

  • Choi, Yoon-Hyuk;Choi, Kee-Choo
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.1
    • /
    • pp.79-88
    • /
    • 2008
  • VMS based dispersion of traffic flows enables to decrease delay and congestion. Such being the case, there has been growing interests in VMS operation strategy. The strategy is based on driver's behavior or diversion rate. However, it was not easy to obtain each in practice. The diversion rate, thus far, was investigated by stated preference analysis or simulators. As an alternative, in this paper, a new method to obtain diversion flow rate was suggested using the toll collection system and freeway traffic management system data. A large gap of diversion rate between stated preference analysis and field survey was observed. Out of surveyed 8 tollgate data, the diversion rate was about 7% and was quite lower compared with that of 21%${\sim}$87% from stated preference analysis or simulators. With this at hand, a more careful information provision strategy should be devised and employed to correctly account this kind of differences.

Effect of Prior Information Given by Video type VMS on Reduction of Secondary Accidents in Tunnels (동영상식 VMS로 사전정보제공시 터널 내 2차사고 감소효과에 관한 연구)

  • Shin, So Myoung;Lee, Soo Beom;Kim, Hyung Kyu;Park, Min Jai;Kim, Kyoung Tae
    • Journal of the Korean Society of Safety
    • /
    • v.34 no.2
    • /
    • pp.56-62
    • /
    • 2019
  • Secondary accident is common type of accident which occurs in Korean highway tunnels. Fatality rate of secondary accidents in highway tunnels is six time higher than primary accidents. Video type VMS is a new way of providing information to road users which was recently introduced by Korean government to prevent secondary accidents in highway tunnels. In this study we compared changes in driver's behavior when information is provided by Text type and Video Type VMS. In addition to analyze effects of secondary accident reduction, driving behavior was analyzed based on providing advance information by video type VMS at tunnel entrance. Analysis showed that both text type and video type VMS has similar effect on driver behavior. Video type VMS showed positive effect on driver's behavior to prevent secondary accident when information is provided 1km ahead of accident. Considering there results and the short-term memory characteristics of driver, it was determined that information should be provide at about 650m from the entrance of the tunnel. The results of this study are consistent with the requirement that VMS should be installed at least 500m ahead of tunnel and produce more accurate providing information points. 650m is also appropriate interval for providing information in tunnel to cope with an accident ahead.

Preparation and Oxygen Permeability of True-IPN's based on Silicone Rubber and Polystyrene (실리콘 고무와 폴리스틸렌을 이용한 True-IPNs의 제조 및 산소투과 특성)

  • Kim, Jun-Hyun;Byun, Hong-Sik
    • Membrane Journal
    • /
    • v.10 no.4
    • /
    • pp.205-212
    • /
    • 2000
  • The true-lPN's based on silicone rubber(SR)rrubbery polymer) and polystyrenc(PS)(glass polymer) were prepared by using the sequential IP!\' method_ The characteristic of permeability of oxygen/nitrogen was investigated with the control of the amount of PSOO-70 wt%) in the true-lPN, As a results of fTlR and N1Vm. the SRIPS membrane was synthesised successfully with the IPN synthetic method, Thermal analysis resulls indicated that the degree of mixing of IPN increased with increase of the amount of PS in the IPN. Regarding the characteristic of gas permeability, the membrane showed a trend of decrease in oxygen permeability as the PS content increased, The oxygen permeability of membrane having 50 wt% of PS. however, increased momentarily, Selectivity, meanwhile, increased slightly as the contents of I'S increased. However, the maximum value of oxygen selectivity, which is 20.6% enhanced Value, was obtained with the membrane containing 50 wt% of PS. This can be explained that the behavior of lPN, i.e. mutual assistance, is pronounced in the membrane having 50 wt% of PS.

  • PDF