• Title/Summary/Keyword: VMS

Search Result 292, Processing Time 0.03 seconds

Parallel task scheduling under multi-Clouds

  • Hao, Yongsheng;Xia, Mandan;Wen, Na;Hou, Rongtao;Deng, Hua;Wang, Lina;Wang, Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.39-60
    • /
    • 2017
  • In the Cloud, for the scheduling of parallel jobs, there are many tasks in a job and those tasks are executed concurrently on different VMs (Visual machines), where each task of the job will be executed synchronously. The goal of scheduling is to reduce the execution time and to keep the fairness between jobs to prevent some jobs from waiting more time than others. We propose a Cloud model which has multiple Clouds, and under this model, jobs are in different lists according to the waiting time of the jobs and every job has different parallelism. At the same time, a new method-ZOMT (the scheduling parallel tasks based on ZERO-ONE scheduling with multiple targets) is proposed to solve the problem of scheduling parallel jobs in the Cloud. Simulations of ZOMT, AFCFS (Adapted First Come First Served), LJFS (Largest Job First Served) and Fair are executed to test the performance of those methods. Metrics about the waiting time, and response time are used to test the performance of ZOMT. The simulation results have shown that ZOMT not only reduces waiting time and response time, but also provides fairness to jobs.

Preparation and Properties of Polyorganosiloxane Modified Maleated EPDM/EPDM Rubber Vibration Isolator (Polyorganosiloxane 변성 말레화 EPDM/EPDM 방진고무의 제조와 그 특성)

  • Kang, Doo-Whan;Kim, So-Mi
    • Applied Chemistry for Engineering
    • /
    • v.21 no.5
    • /
    • pp.581-585
    • /
    • 2010
  • The surface of Alnico, one of the industrial dust waste, was treated with 1,3,5-trivinyl-1,3,5-trimethylcyclotrisilazane (VMS) as a surface treating agent and used as the filler for vibration isolator rubber. Maleated EPDM prepared from bulk polymerization of EPDM with maleic anhydride was copolymerized with ${\alpha},{\omega}$-bis(3-aminopropyl)polydimethylsiloxane to obtain maleated EPDM-polydimethylsiloxane copolymer (MEPDM-PDMS). EPDM/Alnico/MEPDM-PDMS vibration isolator rubber was prepared from compounding with Alnico treated with surface treating agent, 25 and 50 phrs to EPDM, respectvely based on 1 to 10 wt% of MEPDM-PDMS to EPDM. From the measurement of the thermal properties to the rubber, the glass transition temperatures (Tg) for the rubber containing maleated EPDM-PDMS copolymer was slightly lower temperature, $33^{\circ}C$ than EPDM rubber, and also DMA results showed higher tan ${\delta}$ peak to the rubber prepared from compounding with EPDM-PDMS copolymer. From the results, rubber prepared using EPDM-PDMS copolymer had better vibration isolator property.

Performance and Energy Oriented Resource Provisioning in Cloud Systems Based on Dynamic Thresholds and Host Reputation (클라우드 시스템에서 동적 임계치와 호스트 평판도를 기반으로 한 성능 및 에너지 중심 자원 프로비저닝)

  • Elijorde, Frank I.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.39-48
    • /
    • 2013
  • A cloud system has to deal with highly variable workloads resulting from dynamic usage patterns in order to keep the QoS within the predefined SLA. Aside from the aspects regarding services, another emerging concern is to keep the energy consumption at a minimum. This requires the cloud providers to consider energy and performance trade-off when allocating virtualized resources in cloud data centers. In this paper, we propose a resource provisioning approach based on dynamic thresholds to detect the workload level of the host machines. The VM selection policy uses utilization data to choose a VM for migration, while the VM allocation policy designates VMs to a host based on its service reputation. We evaluated our work through simulations and results show that our work outperforms non-power aware methods that don't support migration as well as those based on static thresholds and random selection policy.

VirtAV: an Agentless Runtime Antivirus System for Virtual Machines

  • Tang, Hongwei;Feng, Shengzhong;Zhao, Xiaofang;Jin, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5642-5670
    • /
    • 2017
  • Antivirus is an important issue to the security of virtual machine (VM). According to where the antivirus system resides, the existing approaches can be categorized into three classes: internal approach, external approach and hybrid approach. However, for the internal approach, it is susceptible to attacks and may cause antivirus storm and rollback vulnerability problems. On the other hand, for the external approach, the antivirus systems built upon virtual machine introspection (VMI) technology cannot find and prohibit viruses promptly. Although the hybrid approach performs virus scanning out of the virtual machine, it is still vulnerable to attacks since it completely depends on the agent and hooks to deliver events in the guest operating system. To solve the aforementioned problems, based on in-memory signature scanning, we propose an agentless runtime antivirus system VirtAV, which scans each piece of binary codes to execute in guest VMs on the VMM side to detect and prevent viruses. As an external approach, VirtAV does not rely on any hooks or agents in the guest OS, and exposes no attack surface to the outside world, so it guarantees the security of itself to the greatest extent. In addition, it solves the antivirus storm problem and the rollback vulnerability problem in virtualization environment. We implemented a prototype based on Qemu/KVM hypervisor and ClamAV antivirus engine. Experimental results demonstrate that VirtAV is able to detect both user-level and kernel-level virus programs inside Windows and Linux guest, no matter whether they are packed or not. From the performance aspect, the overhead of VirtAV on guest performance is acceptable. Especially, VirtAV has little impact on the performance of common desktop applications, such as video playing, web browsing and Microsoft Office series.

Finite element analysis of stress distribution on supporting bone of cement retained implant by loading location (하중 위치에 따른 시멘트 유지형 임플란트 지지골의 유한요소법 응력 분석)

  • Kim, Kap-Jin
    • Journal of Technologic Dentistry
    • /
    • v.38 no.3
    • /
    • pp.143-149
    • /
    • 2016
  • Purpose: The purpose of this study is to evaluate the effect of two different oblique mechanical loading to occlusal surfaces of cement retained implant on the stress distributions in surrounding bone, using 3-dimensional finite element method. Methods: A 3-dimensional finite element model of a cement retained implant composed of three unit implants, simplified ceramic crown and supporting bone was developed according to the design of ement retained implant for this study. two kinds of surface distributed oblique loads(100 N) are applied to following occlusal surfaces in the single crowns; 1) oblique load on 2 occlusal points(50N for each buccal cusp, 2 buccal cusps exist), 2) oblique load on 4 occlusal points(25N for each buccal and lingual cusp, 2 buccal and 2 lingual cusps exist) Results: The results of the comparison of the stress distributions on surrounding bone are as follows. In the condition of oblique load on 2 occlusal points, VMS was 741.3 Mpa in the M1(Ø$4.0{\times}13mm$) model and 251.2 Mpa in the M2(Ø$5.0{\times}13mm$) model. It means the stress on the supporting bone is decreased. The results of oblique load on 4 occlusal points are similar to this one. Conclusion: Increasing the diameter of the implant fixture is helpful to distribute the stress on the supporting bone. Also, to obtain the structural stability of the supporting bone, it is effective to distribute the load evenly on the occlusal surface of crown in producing single crown implant.

Priority-based Hint Management Scheme for Improving Page Sharing Opportunity of Virtual Machines (가상머신의 페이지 공유 기회를 향상시키기 위한 우선순위 큐 기반 힌트 관리 기법)

  • Nam, Yeji;Lee, Minho;Lee, Dongwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.947-952
    • /
    • 2016
  • Most data centers attempt to consolidate servers using virtualization technology to efficiently utilize limited physical resources. Moreover, virtualized systems have commonly adopted contents-based page sharing mechanism for page deduplication among virtual machines (VMs). However, previous page sharing schemes are limited by the inability to effectively manage accumulated hints which mean sharable pages in stack. In this paper, we propose a priority-based hint management scheme to efficiently manage accumulated hints, which are sent from guest to host for improving page sharing opportunity in virtualized systems. Experimental results show that our scheme removes pages with low sharing potential, as compared with the previous schemes, by efficiently managing the accumulated pages.

A Tool for Analyzing VM Creation Failure caused by Virtual Disk Faults (가상 디스크 결함에 의한 가상 머신 생성 실패 진단 및 분석 도구)

  • Ku, Min-O;Min, Dug-Ki
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.127-138
    • /
    • 2012
  • In this paper, we present a tool (named VMBootFailMonitor) to detect and analyze a failure of a VM boot creation caused by faults on virtual disks of a Xen-based VM. Also, we presents an architecture and detail analysis process of the virtual disk faults in our tool. Especially, VMBootFailMonitor provides a causual analysis result for a case of VM creation failure based on three modules which performs virtual disk analysis, virtualized system analysis and system log analysis. We also support a comparison result between boot times of normal VMs and fault detection times of VM creation based on abnormal virtual disks. At result, our tool detects VM boot failures (3~6 seconds) within normal VM boot times (8~16 seconds).

Automation of Inventory Checking System for Outdoor Warehouse (야외창고 재고실사 자동화를 위한 시스템 개발)

  • Bae, Sung Moon;Han, Kwan Hee;Lee, Hwa Yong;Hong, Kum Suk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.138-144
    • /
    • 2018
  • Inventory inspection is an important task to eliminate the inconsistency between real assets and inventory management systems, and it is performed periodically at the site. In the case of a large-sized property, it is mainly managed in an outdoor workshop or a warehouse. However, due to the large area of the outdoor area, it is relatively difficult to identify the quantity and location of the property and is also vulnerable to theft. To solve this problem, we proposed a method and system for performing a warehouse inventory inspection using an unmanned aerial vehicle (UAV) and Bluetooth low energy (BLE) beacons. The proposed method has the following advantages. First of all, if we carry out inventory inspection by utilizing UAV, we can minimize user's effort compared to existing methods. The method of recognizing the asset by attaching the BLE beacon is more costly than using the existing RFID technology, but it is advantageous because the recognition distance is increased and the battery life of the tag is drastically increased. We also designed a BLE beacon reader for the system and implemented a prototype to show the feasibility of the proposed system. The prototype is based on Genuino 101, which is a kind of arduino, and adds HM-10 and Neo-6m modules to provide Bluetooth and GPS functions. The BLE beacon reader was tested in outdoor, and attached in drone. We also developed an inventory checking system based on the web to display results of inventory checking. The proposed approach enables the users to automate the operation of inventory checking on an outdoor warehouse.

Analysis on Effects of Visual Messages and Auditory Messages on Pedestrian Safety Behavior (시각적 메시지와 시각적-청각적 메시지가 보행자의 안전행동에 미치는 효과분석)

  • Kim, Jin kwan;Oah, She Zeen
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.5
    • /
    • pp.138-150
    • /
    • 2020
  • Pedestrians are the most vulnerable road users. According to one analysis of traffic accidents over a five year period, pedestrians accounted for about 40% of all road traffic deaths in South Korea. Although some policy and engineering approaches have been taken to reduce and prevent traffic accidents, the annual accident change rate is -0.7%, which is insufficient. This study verifies the effectiveness of presenting visual messages to pedestrians and the effect from adding auditory messages to the visual messages. The experiment was conducted on crosswalks adjacent to an intersection, and safety behaviors were recorded for a total of 898 pedestrians and considered sufficient. As a result of the study, overall pedestrian safety behavior improved when both visual and auditory messages were presented, rather than just visual messages. Therefore, the results indicate it is more effective to provide a mixed visual/auditory form of messages, rather than providing single stimulus messages.

Network vision of disaster prevention management for seashore reclaimed u-City (해안매립 신도시의 재해 예방관리 네트워크 비젼)

  • Ahn, Sang-Ro
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.09a
    • /
    • pp.117-129
    • /
    • 2009
  • This paper studied the safety management network system of infrastructure which constructed smart sensors, closed-circuit television(CCTV) and monitoring system. This safety management of infrastructure applied to bridge, cut slop and tunnel, embankment etc. The system applied to technologies of standardization guidelines, data acquirement technologies, data analysis and judgment technologies, system integration setup technology, and IT technologies. It was constructed safety management network system of various infrastructure to improve efficient management and operation for many infrastructure. Integrated safety management network system of infrastructure consisted of the real-time structural health monitoring system of each infrastructure, integrated control center, measured data transmission using i of tet web-based, collecting data using sf ver, early alarm system which the dangerous event of infrastructure occurred. Integrated control center consisted of conference room, control room to manage and analysis the data, server room to present the measured data and to collect the raw data. Early alarm system proposed realization of warning and response within 5 minute or less through development of sensor-based progress report and propagation automation system using the media such as MMS, VMS, EMS, FMS, SMS and web services of report and propagation. Based on this, the most effective u-Infrastructure Safety Management System is expected to be stably established at a less cost, thus making people's life more comfortable. Information obtained from such systems could be useful for maintenance or structural safety evaluation of existing structures, rapid evaluation of conditions of damaged structures after an earthquake, estimation of residual life of structures, repair and retrofitting of structures, maintenance, management or rehabilitation of historical structures.

  • PDF