1,341 research outputs found

    Disaster Recovery Services in Intercloud using Genetic Algorithm Load Balancer

    Get PDF
    Paradigm need to shifts from cloud computing to intercloud for disaster recoveries, which can outbreak anytime and anywhere. Natural disaster treatment includes radically high voluminous impatient job request demanding immediate attention. Under the disequilibrium circumstance, intercloud is more practical and functional option. There are need of protocols like quality of services, service level agreement and disaster recovery pacts to be discussed and clarified during the initial setup to fast track the distress scenario. Orchestration of resources in large scale distributed system having muli-objective optimization of resources, minimum energy consumption, maximum throughput, load balancing, minimum carbon footprint altogether is quite challenging. Intercloud where resources of different clouds are in align, plays crucial role in resource mapping. The objective of this paper is to improvise and fast track the mapping procedures in cloud platform and addressing impatient job requests in balanced and efficient manner. Genetic algorithm based resource allocation is proposed using pareto optimal mapping of resources to keep high utilization rate of processors, high througput and low carbon footprint.  Decision variables include utilization of processors, throughput, locality cost and real time deadline. Simulation results of load balancer using first in first out and genetic algorithm are compared under similar circumstances

    Multi-Queue Request Scheduling for Profit Maximization in IaaS Clouds

    Full text link
    [EN] In cloud computing, service providers rent heterogeneous servers from cloud providers, i.e., Infrastructure as a Service (IaaS), to meet requests of consumers. The heterogeneity of servers and impatience of consumers pose great challenges to service providers for profit maximization. In this article, we transform this problem into a multi-queue model where the optimal expected response time of each queue is theoretically analyzed. A multi-queue request scheduling algorithm framework is proposed to maximize the total profit of service providers, which consists of three components: request stream splitting, requests allocation, and server assignment. A request stream splitting algorithm is designed to split the arriving requests to minimize the response time in the multi-queue system. An allocation algorithm, which adopts a one-step improvement strategy, is developed to further optimize the response time of the requests. Furthermore, an algorithm is developed to determine the appropriate number of required servers of each queue. After statistically calibrating parameters and algorithm components over a comprehensive set of random instances, the proposed algorithms are compared with the state-of-the-art over both simulated and real-world instances. The results indicate that the proposed multi-queue request scheduling algorithm outperforms the other algorithms with acceptable computational time.This work was supported in part by the National Key Research and Development Program of China under Grant 2017YFB1400800, in part by the National Natural Science Foundation of China under Grants 61872077 and 61832004, and in part by the Collaborative InnovationCenter of Wireless Communications Technology. The work of Quan Z. Sheng was supported in part by Australian Research Council Future Fellowship under Grant FT140101247 and in part by Discovery Project under Grant DP180102378. The work of Ruben Ruiz was supported in part by the Spanish Ministry of Science, Innovation, and Universities through the project OPTEP-Port Terminal Operations Optimization under Grant RTI2018-094940-B-I00 financed with FEDER fundsWang, S.; Li, X.; Sheng, QZ.; Ruiz GarcĂ­a, R.; Zhang, J.; Beheshti, A. (2021). Multi-Queue Request Scheduling for Profit Maximization in IaaS Clouds. IEEE Transactions on Parallel and Distributed Systems. 32(11):2838-2851. https://doi.org/10.1109/TPDS.2021.3075254S28382851321

    EUROPEAN CONFERENCE ON QUEUEING THEORY 2016

    Get PDF
    International audienceThis booklet contains the proceedings of the second European Conference in Queueing Theory (ECQT) that was held from the 18th to the 20th of July 2016 at the engineering school ENSEEIHT, Toulouse, France. ECQT is a biannual event where scientists and technicians in queueing theory and related areas get together to promote research, encourage interaction and exchange ideas. The spirit of the conference is to be a queueing event organized from within Europe, but open to participants from all over the world. The technical program of the 2016 edition consisted of 112 presentations organized in 29 sessions covering all trends in queueing theory, including the development of the theory, methodology advances, computational aspects and applications. Another exciting feature of ECQT2016 was the institution of the Takács Award for outstanding PhD thesis on "Queueing Theory and its Applications"

    Customer Perceptions of Skills of Agents in Effectively Managing Their Needs within a Call Center

    Get PDF
    The world’s dynamics and demands of employment and production have evolved over the past decade. Human resources has today become the single largest unrestrained resource and many firms are striving to enhance competence and interaction between its customers and itself via the customer call center through enhanced skills, knowledge, ability and attitude by fostering better interpersonal skills and through the promotion of training and development of their call center agents. This study was undertaken in EThekwini (Durban), South Africa and was conducted within a Public Sector service environment comprising of four major call centers employing a total of 240 call center agents. Using simple random sampling, 220 customers were drawn from all consumers subscribing to e-billing in EThekwini (Durban). Data for the customer sample was collected using a precoded, self-developed questionnaire whose psychometric properties were statistically determined. Data was analyzed using descriptive and inferential statistics. The results specify that agents were unsuccessful in handling customers’ needs timeously and efficiently and that most customers felt burdened by being transferred to other agents due to the incompetence of original agents in handling their queries/complaints. Furthermore it was found that there was an overall lack of empathy from agents in following-up after a customer communication to ensure that the customer was satisfied with their experience within the call center. Based on the results of the study recommendations have been made to manage the interaction between the customers and call center agents more competently and efficiently

    Rethinking Routing and Peering in the era of Vertical Integration of Network Functions

    Get PDF
    Content providers typically control the digital content consumption services and are getting the most revenue by implementing an all-you-can-eat model via subscription or hyper-targeted advertisements. Revamping the existing Internet architecture and design, a vertical integration where a content provider and access ISP will act as unibody in a sugarcane form seems to be the recent trend. As this vertical integration trend is emerging in the ISP market, it is questionable if existing routing architecture will suffice in terms of sustainable economics, peering, and scalability. It is expected that the current routing will need careful modifications and smart innovations to ensure effective and reliable end-to-end packet delivery. This involves new feature developments for handling traffic with reduced latency to tackle routing scalability issues in a more secure way and to offer new services at cheaper costs. Considering the fact that prices of DRAM or TCAM in legacy routers are not necessarily decreasing at the desired pace, cloud computing can be a great solution to manage the increasing computation and memory complexity of routing functions in a centralized manner with optimized expenses. Focusing on the attributes associated with existing routing cost models and by exploring a hybrid approach to SDN, we also compare recent trends in cloud pricing (for both storage and service) to evaluate whether it would be economically beneficial to integrate cloud services with legacy routing for improved cost-efficiency. In terms of peering, using the US as a case study, we show the overlaps between access ISPs and content providers to explore the viability of a future in terms of peering between the new emerging content-dominated sugarcane ISPs and the healthiness of Internet economics. To this end, we introduce meta-peering, a term that encompasses automation efforts related to peering – from identifying a list of ISPs likely to peer, to injecting control-plane rules, to continuous monitoring and notifying any violation – one of the many outcroppings of vertical integration procedure which could be offered to the ISPs as a standalone service

    The Migration Measurement Model - How to Measure the Success of a Channel Migration in Customer Support

    Get PDF
    Purpose: The purpose of this thesis is to develop a theoretical framework that enables a company to measure the success of an initiative that migrates customers from one channel to another, in order to improve or upgrade the way of handling customer support between the company and its end customers. Methodology: The strategy for this thesis was to carry out an iterative case study - theory-led by explaining the causes of events and processes from the literature, and discovery-led by exploring the key issues in ACTIVE Network‟s migration. A theoretical framework was then developed and applied at the company, before the model could be analyzed and recommendations were formulated. Case study: The author performed the case study onsite at ACTIVE Network in San Diego, California, where interviews, observations, questionnaires and documents were collected and analyzed over the course of 4 months. iv Conclusion: The developed framework, the Migration Measurement Model, covers the most relevant factors that a support organization needs to consider when measuring the success of a migration to a new communication channel. The model starts with analyzing company characteristics and objectives, which in the case study was proven to be very important for choosing appropriate metrics. By evaluating metrics connected to financial, customer and operational performances, a company can with help from the Migration Measurement Model find the most valuable measurements that can be used to determine the success of a migration, internally and externally. The Migration Measurement Model was applied at ACTIVE Network, leading to recommendations for future improvements at the company

    Controller as business manager

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2707/thumbnail.jp

    Cybersecurity and the Digital Health: An Investigation on the State of the Art and the Position of the Actors

    Get PDF
    Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain
    • …
    corecore