Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 5

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
In this paper, the Stackelberg game models are used for supporting the decisions on task scheduling and resource utilization in computational clouds. Stackelberg games are asymmetric games, where a specific group of players’ acts first as leaders, and the rest of the players follow the leaders’ decisions and make their decisions based on the leader’s actions. In the proposed model, the optimal schedules are generated under the security criteria along with the generation of the optimal virtual machines set for the scheduled batch of tasks. The security criteria are defined as security requirements for mapping tasks onto virtual machines with specified trust level. The effectiveness of the proposed method has been verified in the realistic use cases with in the cloud environment with OpenStack and Amazon Cloud standards.
EN
This paper presents an overview of techniques developed to improve energy efficiency of grid and cloud computing. Power consumption models and energy usage proles are presented together with energy efficiency measuring methods. Modeling of computing dynamics is discussed from the viewpoint of system identication theory, indicating basic experiment design problems and challenges. Novel approaches to cluster and network-wide energy usage optimization are surveyed, including multi-level power and software control systems, energy-aware task scheduling, resource allocation algorithms and frameworks for backbone networks management. Software-development techniques and tools are also presented as a new promising way to reduce power consumption at the computing node level. Finally, energy-aware control mechanisms are presented. In addition, this paper introduces the example of batch scheduler based on ETC matrix approach.
PL
Celem pracy było określenie dystrybucji pierwiastków ziem rzadkich (REE) w procesie sekwencyjnego chemicznego ługowania próbek węgla z pokładu 404 KWK Pniówek. Na potrzeby pracy wykorzystano pięciostopniową zmodyfikowaną procedurę ługowania opisaną w pracy D.A. Spears. Zawartość REE w uzyskanych roztworach oznaczono metodą ICP-MS). Analizowano oddzielnie udziały REE w próbkach bruzdowych węgla oraz w roztworach będących produktami sekwencyjnego ługowania substancji nieorganicznej i organicznej węgla. Stwierdzono zróżnicowany udział REE w analizowanych próbkach węgla. Normalizacja udziałów REE do chondrytów wykazała obecność małej anomalii ujemnej dla Eu i większej dodatniej dla Gd. Na wszystkich krzywych po znormalizowaniu widoczne jest wzbogacenie próbek węgla w LREE i odpowiednio niższy mało zróżnicowany udział HREE. Podobnym przebiegiem charakteryzują się krzywe po znormalizowaniu uzyskane dla produktów ługowania związanych z substancją organiczną węgla (etap IV-V) i krzemianami. Krzywe normalizacyjne uzyskane dla produktów ługowania związanych z substancją mineralną (etap I-III) dla poszczególnych próbek węgla są podobne. Wszystkie charakteryzują się dodatnimi anomaliami w zakresie Sm-Tb oraz wzbogaceniem udziałów MREE względem LREE.
EN
The aim of the study was to determine the distribution of REE in coal using during the sequential chemical leaching of four coal samples from 404 seam of Ruda beds of “Pniówek” coal mine. The five digestion steps were used to determine REE distribution. In this study adopted the leaching procedure described in work D.A. Spears.The content of REE in obtained solutions was determined by ICP-MS method.The contents of REE in the samples was analyzed in coal and separately in the solutions which were products of the sequential leaching of inorganic and organic substances of coal. It was found that the REE content in coal samples is varied. The contents of REE were normalized to chondrites. It showed a small negative anomaly for Eu and larger positive anomaly for Gd. The enrichment in LREE of coal samples and respectively lower and less diverse of HREE content are shown on all of the normalized curves. The normalized curves obtained for chondrites REE content in the leaching products connected with organic substance (stage IV-V) have a similar course.The normalized curves obtained for chondrites REE content of the leaching products connected with mineral substance (stage I-III) for the individual samples of coal were similar. All these curves are characterized by positive anomalies in the range of Sm-Tb and enrichment in MREE relative to LREE.
EN
Stackelberg games are non-symmetric games where one player or specified group of players have the privilege position and make decision before the other players. Such games are used in telecommunication and computational systems for supporting administrative decisions. Recently Stackleberg games became useful also in the systems where security issues are the crucial decision criteria. In this paper authors briefly survey the most popular Stackelberg security game models and provide the analysis of the model properties illustrated in the realistic use cases.
EN
In this paper a RSA based security system enabling the group of users to upload the single masked message to the cloud environment is proposed. Data stored are encrypted using RSA algorithm. The data receiver is able to encrypt the message retrieved from the cloud environment using private key. Two different separate RSA systems are used. The presented approach is divided into three parts. First, an RSA key is generated for each sender. Then masking the message by newly chosen mask proposed individually by every member, additionally encrypted by individual RSA private key of each member is proceed. Next, encrypting the gathered message inside the cloud environment, using the public key of the receiver is executed. In the third step, the message is decrypted by the receiver using his private RSA key. The scheme reduces the computational load on users side and transfers calculations and storage effort to the cloud environment. The proposed algorithm was developed for storing and sending the data that originally are produced by a group of users, but the receiver of the data is single. It was implemented using Java 8 and OpenStack software. Numerical test of different key length for RSA are presented.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.