759 research outputs found
Virtual numbers for virtual machines?
Knowing the number of virtual machines (VMs) that a cloud physical hardware can (further) support is critical as it has implications on provisioning and hardware procurement. However, current methods for estimating the maximum number of VMs possible on a given hardware is usually the ratio of the specifications of a VM to the underlying cloud hardware’s specifications. Such naive and linear estimation methods mostly yield impractical limits as to how many VMs the hardware can actually support. It was found that if we base on the naive division method, user experience on VMs at those limits would be severely degraded. In this paper, we demonstrate through experimental results, the significant gap between the limits derived using the estimation method mentioned above and the actual situation. We believe for a more practicable estimation of the limits of the underlying infrastructure
Time for Cloud? Design and implementation of a time-based cloud resource management system
The current pay-per-use model adopted by public cloud service providers has influenced the perception on how a cloud should provide its resources to end-users, i.e. on-demand and access to an unlimited amount of resources. However, not all clouds are equal. While such provisioning models work for well-endowed public clouds, they may not always work well in private clouds with limited budget and resources such as research and education clouds. Private clouds also stand to be impacted greatly by issues such as user resource hogging and the misuse of resources for nefarious activities. These problems are usually caused by challenges such as (1) limited physical servers/ budget, (2) growing number of users and (3) the inability to gracefully and automatically relinquish resources from inactive users. Currently, cloud resource management frameworks used for private cloud setups, such as OpenStack and CloudStack, only uses the pay-per-use model as the basis when provisioning resources to users. In this paper, we propose OpenStack Café, a novel methodology adopting the concepts of 'time' and booking systems' to manage resources of private clouds. By allowing users to book resources over specific time-slots, our proposed solution can efficiently and automatically help administrators manage users' access to resource, addressing the issue of resource hogging and gracefully relinquish resources back to the pool in resource-constrained private cloud setups. Work is currently in progress to adopt Café into OpenStack as a feature, and results of our prototype show promises. We also present some insights to lessons learnt during the design and implementation of our proposed methodology in this paper
Inferring User Actions from Provenance Logs
Progger, a kernel-spaced cloud data provenance logger which provides fine-grained data activity records, was recently developed to empower cloud stakeholders to trace data life cycles within and across clouds. Progger logs have the potential to allow analysts to infer user actions and create a data-centric behaviour history in a cloud computing environment. However, the Progger logs are complex and noisy and therefore, currently this potential can not be met. This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs. Inferring logs which capture activities at kernel-level granularity is not a straightforward endeavour. This paper overcomes this challenge through an approach which shows a high level of accuracy. The key aspects of this approach are identifying the data preprocessing steps and attribute selection. We then use four standard classification models and identify the model which provides the most accurate inference on user actions. To our best knowledge, this is the first work of its kind. We also discuss a number of possible extensions to this work. Possible future applications include the ability to predict an anomalous security activity before it occurs
Added Value of Computed Tomography Virtual Intravascular Endoscopy in the Evaluation of Coronary Arteries with Stents or Plaques
Coronary computed tomography angiography (CCTA) is a widely used imaging modality for diagnosing coronary artery disease (CAD) but is limited by a high false positive rate when evaluating coronary arteries with stents and heavy calcifications. Virtual intravascular endoscopy (VIE) images generated from CCTA can be used to qualitatively assess the vascular lumen and might be helpful for overcoming this challenge. In this study, one hundred subjects with coronary stents underwent both CCTA and invasive coronary angiography (ICA). A total of 902 vessel segments were analyzed using CCTA and VIE. The vessel segments were first analyzed on CCTA alone. Then, using VIE, the segments were classified qualitatively as either negative or positive for in-stent restenosis (ISR) or CAD. These results were compared, using ICA as the reference, to determine the added diagnostic value of VIE. Of the 902 analyzed vessel segments, CCTA/VIE had sensitivity, specificity, accuracy, positive predictive value, and negative predictive value (shown in %) of 93.9/90.2, 96.2/98.2, 96.0/97.7, 70.0/83.1, and 99.4/99.0, respectively, in diagnosing ISR or CAD, with significantly improved specificity (p = 0.025), accuracy (p = 0.046), and positive predictive value (p = 0.047). VIE can be a helpful addition to CCTA when evaluating coronary arterie
Thermodynamics and evaporation of the noncommutative black hole
We investigate the thermodynamics of the noncommutative black hole whose
static picture is similar to that of the nonsingular black hole known as the de
Sitter-Schwarzschild black hole. It turns out that the final remnant of
extremal black hole is a thermodynamically stable object. We describe the
evaporation process of this black hole by using the noncommutativity-corrected
Vaidya metric. It is found that there exists a close relationship between
thermodynamic approach and evaporation process.Comment: 16 pages, 6 figures, added references, to appear in JHE
Registration of 'Jeokwangtangkong' Peanut
'Jeokwangtangkong' peanut (Arachis hypogaea L. subsp.fastigiata var. vulgaris) (Reg. no. CV-63, PI607913 is a spanish-type
developed at the International Crops Research Insitute for the Semi-Arid Tropics (ICRISAT), Patancheru, Andhra Pradesh, India
It was introduced into the Republic Of Korea in 1989 as ICGV 86326. After five years of evaluaton, it was released in 1996
as Jeokwangtangkong for cultivation in Korea
Search for and Using Genetic Programming Event Selection
We apply a genetic programming technique to search for the double Cabibbo
suppressed decays and .
We normalize these decays to their Cabibbo favored partners and find
\Lambda_c^+ \to p K^+ \pi^-\Lambda_c^+ \to p K^-
\pi^+ and D_s^+ \to K^+ K^+
\pi^-D_s^+ \to K^+ K^- \pi^+ where
the first errors are statistical and the second are systematic. Expressed as
90% confidence levels (CL), we find and respectively.
This is the first successful use of genetic programming in a high energy
physics data analysis.Comment: 10 page
Measurement of the D+ and Ds+ decays into K+K-K+
We present the first clear observation of the doubly Cabibbo suppressed decay
D+ --> K-K+K+ and the first observation of the singly Cabibbo suppressed decay
Ds+ --> K-K+K+. These signals have been obtained by analyzing the high
statistics sample of photoproduced charm particles of the FOCUS(E831)
experiment at Fermilab. We measure the following relative branching ratios:
Gamma(D+ --> K-K+K+)/Gamma(D+ --> K-pi+pi+) = (9.49 +/- 2.17(statistical) +/-
0.22(systematic))x10^-4 and Gamma(Ds+ --> K-K+K+)/Gamma(Ds+ --> K-K+pi+) =
(8.95 +/- 2.12(statistical) +2.24(syst.) -2.31(syst.))x10^-3.Comment: 10 pages, 8 figure
A Non-parametric Approach to the D+ to K*0bar mu+ nu Form Factors
Using a large sample of D+ -> K- pi+ mu+ nu decays collected by the FOCUS
photoproduction experiment at Fermilab, we present the first measurements of
the helicity basis form factors free from the assumption of spectroscopic pole
dominance. We also present the first information on the form factor that
controls the s-wave interference discussed in a previous paper by the FOCUS
collaboration. We find reasonable agreement with the usual assumption of
spectroscopic pole dominance and measured form factor ratios.Comment: 14 pages, 5 figures, and 2 tables. We updated the previous version by
changing some words, removing one plot, and adding two tables. These changes
are mostly stylisti
Dalitz plot analysis of D_s+ and D+ decay to pi+pi-pi+ using the K-matrix formalism
FOCUS results from Dalitz plot analysis of D_s+ and D+ to pi+pi-pi+ are
presented. The K-matrix formalism is applied to charm decays for the first time
to fully exploit the already existing knowledge coming from the light-meson
spectroscopy experiments. In particular all the measured dynamics of the S-wave
pipi scattering, characterized by broad/overlapping resonances and large
non-resonant background, can be properly included. This paper studies the
extent to which the K-matrix approach is able to reproduce the observed Dalitz
plot and thus help us to understand the underlying dynamics. The results are
discussed, along with their possible implications on the controversial nature
of the sigma meson.Comment: To be submitted to Phys.Lett.B A misprint corrected in formula
- …