Stochastic Resource Provisioning for Container ized Multi-Tier Web Ser vices in Clouds Abstract-Under today?s bursty web traffic, the fine-grained per-container control promises more efficient resource provisioning for web services and better resource utilization in cloud datacenters. In this paper, we present Two-stage Stochastic Programming Resource Allocator (2SPRA). It optimizes resource provisioning for containerized n-tier web…
1 Stochastic Resource Provisioning for Container ized Multi-Tier Web Ser vices in Clouds Abstract-Under today?s bursty web traffic, the fine-grained per-container control promises more efficient resource provisioning for web services and better resource utilization in cloud datacenters. It optimizes resource provisioning for containerized n-tier web services in accordance with fluctuations of incoming workload to accommodate…
10T SRAM Using Half-VDD Precharge and Row-Wise Dynamically Powered Read Port for Low Switching Power and Ultralow RBL Leakage Abstract– We present, in this paper, a new 10T static random access memory cell having single ended decoupled read-bitline (RBL) with a 4T read port for low power operation and leakage reduction. The RBL is precharged…
28-nm Latch-Type Sense Amplifier Modification for Coupling Suppression Abstract-With the development of modern semiconductor fabrication technology, the channel length of the CMOS device and the device pitch continually shrink accompanied by more and more severe process variation and signal coupling effect, respectively. In this paper, we explain how the coupling effect interferes with the action…
A 32 kb 0.35?1.2 V, 50 MHz?2.5 GHz Bit-Interleaved SRAM With 8 T SRAM Cell and Data Dependent Write Assist in 28-nm UTBB-FDSOI CMOS Abstract-An optimized co-design of SRAM cell, assist schemes, and layout is proposed to achieve wide voltage range operation of SRAM from 0.35?1.2 V at all process corners. A differential read asymmetric…
A cascaded Couple Inductor- Reverse high step up converter integrating three-winding coupled inductor and diode-capacitor technique Abstract-At the first place, introduces a cascaded high step up converter realized with a tightly coupled three-winding coupled inductor. Compared with existing high step up converters, the proposed converter features that the smaller the turns ratio is, the larger…
A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks Abstract-How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology control algorithm based on the energy forecast (CTEF) is proposed for…
Automobile Spare Shop(Android App) Abstract-A low-power ultrawideband (UWB) pulse generator based on pulsed oscillator architecture for 3?5 GHz applications is proposed. The pulsed oscillator is improved, so it realizes binary phase shift keying (BPSK) modulation. Unlike ON?OFF keying or pulse-position modulation (PPM), BPSK can scramble the spectrum, so it can be used in high pulse…
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks Abstract– In the first place, spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary…
A Collaborative DDoS Defence Framework using Network Function Virtualization Abstract-High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them the SYN Flood attack is the most common type. Conventional DDoS defense solutions may not bepreferable since…
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data Abstract-High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them the SYN Flood attack is the most common type. Conventional DDoS defense solutions may…
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing Abstract– Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback in urgent need of solution is…