The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the demand of power information construction and the application of D5000 platform, the standardization and management of all kinds of data becomes a necessary condition for data sharing and application integration between systems. In order to realize the safe, convenient and efficient information resource sharing of power enterprises and improve the information management level, the fusion method...
Monitoring is a common requirement in everyday modern life, from anti-virus scanners on personal computers to securing large multinational systems' health and status. Such monitoring is a fundamental process which must be undertaken where resources are offered as a service as in the cloud, to make sure that the service has been delivered to meet all contractual obligations. However, with a dynamic...
In this paper, we present an approach for automated profiling of cloud-based distributed applications. The failure dependencies within or between application nodes can be methodically elucidated by dynamically applying a series of unitary perturbations on the underlying computing resources. Each such perturbation in a node acts as a stimulus which propagates to performance meters of dependent nodes...
Tremendous interest prevails in developing a convenient and effective wearable medical device for evaluating sleep at home. The current study presents the clinical validation of VitalPatch®, a wireless adhesive patch sensor for screening of sleep architecture compared to the gold standard polysomnograph (PSG). A group of 45 volunteers were attached to a standard 22-channel PSG and a VitalPatch sensor...
Information security management is a complicated task in cloud environment. Cloud service layers and multi-tenant architecture have created a complicated environment for developing and managing a monitoring and incident response environment in organizations. The main goal of this paper is to receive and analyze events from OpenStack environment. Events and system logs are received from OpenStack environment...
As the requirement of the user increases, complexity in the development of software is also increases. It is a great challenge in software engineering to understand, measure, manage, control, and even to low the software complexity and also increases quality. To improve performance of software, web sites and services is a holy grail of software industry. A new approach for implementation of Poka-Yoke...
Monitoring application performance over IT infrastructure is common practise for cloud providers, and is the foundation for ensuring the health of systems and quality of service for users. However, with the architecture of cloud computing allowing the allocation and provision of resources to be set at several layers, the scope for potential performance issues is increased and as a result increases...
Elastic Optical Networks will drive a high degree of flexibility enabling dynamic configurable lightpaths provisioning and re- optimization due to next generation bandwidth variable transponders and switches. In order to guarantee quality of transmission (QoT), novel Operation Administration and Maintenance (OAM) solutions are necessary with respect to existing standard management protocols. For optical...
Due to a growing number of Host's intrusions and since the Internet have become so ubiquitous, implementing various systems that monitor system security breaches is inevitable. In this way, Host Intrusion Detection Systems (abbreviated as HIDS) have recently gained a noticeable amount of interest. These defensive systems detect malicious activities on host-based applications. This paper reviews types...
This paper presents a cross-layer self-healing approach for Cloud computing environments, based on the Complex Event Processing method. It analyzes monitored events to detect performance-related problems and performs action to fix them without human intervention. Our proposal makes use of novel analysis rules, derived from a comprehensive study of the relationships between monitored metrics across...
Large size cluster management is a complex and difficult task. In this paper, we firstly discuss distributed hierarchical autonomic management mechanisms including the framework of distributed hierarchical autonomic management system and functions of each its component. And then we design and realize a high-performance cluster management system DHAView. It has autonomic management features such as...
A Cloud is a very dynamic environment where resources offered by a Cloud Service Provider (CSP), out of one or more Cloud Data Centers (DCs) are acquired or released (by an enterprise (tenant) on-demand and at any scale. Typically a tenant will use Cloud service interfaces to acquire or release resources directly. This process can be automated by a CSP by providing auto-scaling capability where a...
With the widespread use of information, variety of security logs have increased greatly, which due need for security log management. Organizations requirements have imposed to collect, store, and analyze tremendous volumes of log data across entire infrastructure for extended durations and at increasingly granular levels. It is the process of generating, transmitting, storing, analyzing, and disposing...
LTE (Long Term Evolution) represents an emerging technology that will change how mobility service providers connect user devices to their infrastructure over IP networks. To support growing mobile broadband data loads, an all-IP Ethernet cell site backhaul (CSBH) network infrastructure will make possible real-time high bandwidth applications using mobiles. This paper discusses the changes that LTE...
Wearable sensor platforms have proved effective in a large variety of new application domains including wellness and healthcare, and are perfect examples of cyber physical systems. A major obstacle in realization of these systems is the amount of energy required for sensing, processing and communication, which can jeopardize small battery size and wear ability of the entire system. In this paper,...
Recent years have shown an alarmous increase in rain fall induced landslides. This has facilitated the need for having a monitoring system to predict the landslides which could eventually reduce the loss of human life. We have developed and deployed a Wireless Sensor Network to monitor rainfall induced landslide, in Munnar, South India. A successful landslide warning was issued in June 2009 using...
Autonomic features can be built into systems by including Self-* properties. There is a dire need to find new techniques of building in Self-* features in networks for delivering important goals like maintaining uptime and QoS, since system adminstrators are crying for help as complexity of networks and their management systems continues to grow unabatedly and managing them effectively and efficiently...
Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is limited in size since event sets can be succinctly represented. While this minimizes the bandwidth consumed and helps scale the detection to a large number of nodes, it limits the infrastructure's ability to identify the source of anomalies. We...
Electrocardiography (ECG) is an interpretation of the electrical activity of the heart over time captured and externally recorded by electrodes. An effective approach to speed up this and other biomedical operations is to integrate a very high number of processing elements in a single chip so that the massive scale of fine-grain parallelism inherent in several biomedical applications can be exploited...
Distributed systems have been developing rapidly in the past few years and their automatic control is a real challenge being a very active research field. In order to assure the load balancing and to optimize the resource utilization, a distributed system is using different software components, such as management tools, schedulers or monitoring tools. Considering the prediction of future behavior...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.