758 research outputs found

    Virtual numbers for virtual machines?

    Get PDF
    Knowing the number of virtual machines (VMs) that a cloud physical hardware can (further) support is critical as it has implications on provisioning and hardware procurement. However, current methods for estimating the maximum number of VMs possible on a given hardware is usually the ratio of the specifications of a VM to the underlying cloud hardware’s specifications. Such naive and linear estimation methods mostly yield impractical limits as to how many VMs the hardware can actually support. It was found that if we base on the naive division method, user experience on VMs at those limits would be severely degraded. In this paper, we demonstrate through experimental results, the significant gap between the limits derived using the estimation method mentioned above and the actual situation. We believe for a more practicable estimation of the limits of the underlying infrastructure

    Time for Cloud? Design and implementation of a time-based cloud resource management system

    Get PDF
    The current pay-per-use model adopted by public cloud service providers has influenced the perception on how a cloud should provide its resources to end-users, i.e. on-demand and access to an unlimited amount of resources. However, not all clouds are equal. While such provisioning models work for well-endowed public clouds, they may not always work well in private clouds with limited budget and resources such as research and education clouds. Private clouds also stand to be impacted greatly by issues such as user resource hogging and the misuse of resources for nefarious activities. These problems are usually caused by challenges such as (1) limited physical servers/ budget, (2) growing number of users and (3) the inability to gracefully and automatically relinquish resources from inactive users. Currently, cloud resource management frameworks used for private cloud setups, such as OpenStack and CloudStack, only uses the pay-per-use model as the basis when provisioning resources to users. In this paper, we propose OpenStack Café, a novel methodology adopting the concepts of 'time' and booking systems' to manage resources of private clouds. By allowing users to book resources over specific time-slots, our proposed solution can efficiently and automatically help administrators manage users' access to resource, addressing the issue of resource hogging and gracefully relinquish resources back to the pool in resource-constrained private cloud setups. Work is currently in progress to adopt Café into OpenStack as a feature, and results of our prototype show promises. We also present some insights to lessons learnt during the design and implementation of our proposed methodology in this paper

    Inferring User Actions from Provenance Logs

    Get PDF
    Progger, a kernel-spaced cloud data provenance logger which provides fine-grained data activity records, was recently developed to empower cloud stakeholders to trace data life cycles within and across clouds. Progger logs have the potential to allow analysts to infer user actions and create a data-centric behaviour history in a cloud computing environment. However, the Progger logs are complex and noisy and therefore, currently this potential can not be met. This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs. Inferring logs which capture activities at kernel-level granularity is not a straightforward endeavour. This paper overcomes this challenge through an approach which shows a high level of accuracy. The key aspects of this approach are identifying the data preprocessing steps and attribute selection. We then use four standard classification models and identify the model which provides the most accurate inference on user actions. To our best knowledge, this is the first work of its kind. We also discuss a number of possible extensions to this work. Possible future applications include the ability to predict an anomalous security activity before it occurs

    Added Value of Computed Tomography Virtual Intravascular Endoscopy in the Evaluation of Coronary Arteries with Stents or Plaques

    Get PDF
    Coronary computed tomography angiography (CCTA) is a widely used imaging modality for diagnosing coronary artery disease (CAD) but is limited by a high false positive rate when evaluating coronary arteries with stents and heavy calcifications. Virtual intravascular endoscopy (VIE) images generated from CCTA can be used to qualitatively assess the vascular lumen and might be helpful for overcoming this challenge. In this study, one hundred subjects with coronary stents underwent both CCTA and invasive coronary angiography (ICA). A total of 902 vessel segments were analyzed using CCTA and VIE. The vessel segments were first analyzed on CCTA alone. Then, using VIE, the segments were classified qualitatively as either negative or positive for in-stent restenosis (ISR) or CAD. These results were compared, using ICA as the reference, to determine the added diagnostic value of VIE. Of the 902 analyzed vessel segments, CCTA/VIE had sensitivity, specificity, accuracy, positive predictive value, and negative predictive value (shown in %) of 93.9/90.2, 96.2/98.2, 96.0/97.7, 70.0/83.1, and 99.4/99.0, respectively, in diagnosing ISR or CAD, with significantly improved specificity (p = 0.025), accuracy (p = 0.046), and positive predictive value (p = 0.047). VIE can be a helpful addition to CCTA when evaluating coronary arterie

    Thermodynamics and evaporation of the noncommutative black hole

    Full text link
    We investigate the thermodynamics of the noncommutative black hole whose static picture is similar to that of the nonsingular black hole known as the de Sitter-Schwarzschild black hole. It turns out that the final remnant of extremal black hole is a thermodynamically stable object. We describe the evaporation process of this black hole by using the noncommutativity-corrected Vaidya metric. It is found that there exists a close relationship between thermodynamic approach and evaporation process.Comment: 16 pages, 6 figures, added references, to appear in JHE

    Registration of 'Jeokwangtangkong' Peanut

    Get PDF
    'Jeokwangtangkong' peanut (Arachis hypogaea L. subsp.fastigiata var. vulgaris) (Reg. no. CV-63, PI607913 is a spanish-type developed at the International Crops Research Insitute for the Semi-Arid Tropics (ICRISAT), Patancheru, Andhra Pradesh, India It was introduced into the Republic Of Korea in 1989 as ICGV 86326. After five years of evaluaton, it was released in 1996 as Jeokwangtangkong for cultivation in Korea

    Search for Λc+pK+π\Lambda_c^+ \to p K^+ \pi^- and Ds+K+K+πD_s^+ \to K^+ K^+ \pi^- Using Genetic Programming Event Selection

    Full text link
    We apply a genetic programming technique to search for the double Cabibbo suppressed decays Λc+pK+π\Lambda_c^+ \to p K^+ \pi^- and Ds+K+K+πD_s^+ \to K^+ K^+ \pi^-. We normalize these decays to their Cabibbo favored partners and find BR(\text{BR}(\Lambda_c^+ \to p K^+ \pi^-)/BR()/\text{BR}(\Lambda_c^+ \to p K^- \pi^+)=(0.05±0.26±0.02)) = (0.05 \pm 0.26 \pm 0.02)% and BR(\text{BR}(D_s^+ \to K^+ K^+ \pi^-)/BR()/\text{BR}(D_s^+ \to K^+ K^- \pi^+)=(0.52±0.17±0.11)) = (0.52\pm 0.17\pm 0.11)% where the first errors are statistical and the second are systematic. Expressed as 90% confidence levels (CL), we find <0.46< 0.46 % and <0.78 < 0.78% respectively. This is the first successful use of genetic programming in a high energy physics data analysis.Comment: 10 page

    Measurement of the D+ and Ds+ decays into K+K-K+

    Full text link
    We present the first clear observation of the doubly Cabibbo suppressed decay D+ --> K-K+K+ and the first observation of the singly Cabibbo suppressed decay Ds+ --> K-K+K+. These signals have been obtained by analyzing the high statistics sample of photoproduced charm particles of the FOCUS(E831) experiment at Fermilab. We measure the following relative branching ratios: Gamma(D+ --> K-K+K+)/Gamma(D+ --> K-pi+pi+) = (9.49 +/- 2.17(statistical) +/- 0.22(systematic))x10^-4 and Gamma(Ds+ --> K-K+K+)/Gamma(Ds+ --> K-K+pi+) = (8.95 +/- 2.12(statistical) +2.24(syst.) -2.31(syst.))x10^-3.Comment: 10 pages, 8 figure

    A Non-parametric Approach to the D+ to K*0bar mu+ nu Form Factors

    Full text link
    Using a large sample of D+ -> K- pi+ mu+ nu decays collected by the FOCUS photoproduction experiment at Fermilab, we present the first measurements of the helicity basis form factors free from the assumption of spectroscopic pole dominance. We also present the first information on the form factor that controls the s-wave interference discussed in a previous paper by the FOCUS collaboration. We find reasonable agreement with the usual assumption of spectroscopic pole dominance and measured form factor ratios.Comment: 14 pages, 5 figures, and 2 tables. We updated the previous version by changing some words, removing one plot, and adding two tables. These changes are mostly stylisti

    Measurements of Ξc+\Xi_c^{+} Branching Ratios

    Get PDF
    Using data collected by the fixed target Fermilab experiment FOCUS, we measure the branching ratios of the Cabibbo favored decays Ξc+Σ+Kπ+\Xi_c^+ \to \Sigma^+K^-\pi^+, Ξc+Σ+Kˉ(892)0\Xi_c^+ \to \Sigma^+ \bar{K}^{*}(892)^0, and Ξc+Λ0Kπ+π+\Xi_c^+ \to \Lambda^0K^-\pi^+\pi^+ relative to Ξc+Ξπ+π+\Xi_c^+ \to \Xi^-\pi^+\pi^+ to be 0.91±0.11±0.040.91\pm0.11\pm0.04, 0.78±0.16±0.060.78\pm0.16\pm0.06, and 0.28±0.06±0.060.28\pm0.06\pm0.06, respectively. We report the first observation of the Cabibbo suppressed decay Ξc+Σ+K+K\Xi_c^+ \to \Sigma^+K^+K^- and we measure the branching ratio relative to Ξc+Σ+Kπ+\Xi_c^+ \to \Sigma^+K^-\pi^+ to be 0.16±0.06±0.010.16\pm0.06\pm0.01. We also set 90% confidence level upper limits for Ξc+Σ+ϕ\Xi_c^+ \to \Sigma^+ \phi and Ξc+Ξ(1690)0(Σ+K)K+\Xi_c^+ \to \Xi^*(1690)^0(\Sigma^+ K^-) K^+ relative to Ξc+Σ+Kπ+\Xi_c^+ \to \Sigma^+K^-\pi^+ to be 0.12 and 0.05, respectively. We find an indication of the decays Ξc+ΩK+π+\Xi_c^+ \to \Omega^-K^{+}\pi^+ and Ξc+Σ(1385)+Kˉ0\Xi_c^+ \to \Sigma^{*}(1385)^+ \bar{K}^0 and set 90% confidence level upper limits for the branching ratios with respect to Ξc+Ξπ+π+\Xi_c^+ \to \Xi^-\pi^+\pi^+ to be 0.12 and 1.72, respectively. Finally, we determine the 90% C.L. upper limit for the resonant contribution Ξc+Ξ(1530)0π+\Xi_c^+ \to \Xi^{*}(1530)^0 \pi^+ relative to Ξc+Ξπ+π+\Xi_c^+ \to \Xi^-\pi^+\pi^+ to be 0.10.Comment: 14 pages, 8 figure
    corecore