Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number

Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number

Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number

Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number

TS-G-1.1 (ST-2) - RAMPAC

IAEA

SAFETY

STANDARDS

SERIES

Advisory Material for the

IAEA Regulations for the

Safe Transport of

Radioactive Material

SAFETY GUIDE

No. TS-G-1.1 (ST-2)

INTERNATIONAL

ATOMIC ENERGY AGENCY

VIENNA


IAEA SAFETY RELATED PUBLICATIONS

IAEA SAFETY STANDARDS

Under the terms of Article III of its Statute, the IAEA is authorized to establish standards

of safety for protection against ionizing radiation and to provide for the application of these

standards to peaceful nuclear activities.

The regulatory related publications by means of which the IAEA establishes safety

standards and measures are issued in the IAEA Safety Standards Series. This series covers

nuclear safety, radiation safety, transport safety and waste safety, and also general safety (that

is, of relevance in two or more of the four areas), and the categories within it are Safety

Fundamentals, Safety Requirements and Safety Guides.

Safety Fundamentals (blue lettering) present basic objectives, concepts and principles of

safety and protection in the development and application of nuclear energy for peaceful

purposes.

Safety Requirements (red lettering) establish the requirements that must be met to ensure

safety. These requirements, which are expressed as ‘shall’ statements, are governed by

the objectives and principles presented in the Safety Fundamentals.

Safety Guides (green lettering) recommend actions, conditions or procedures for meeting

safety requirements. Recommendations in Safety Guides are expressed as ‘should’ statements,

with the implication that it is necessary to take the measures recommended or

equivalent alternative measures to comply with the requirements.

The IAEA’s safety standards are not legally binding on Member States but may be

adopted by them, at their own discretion, for use in national regulations in respect of their own

activities. The standards are binding on the IAEA in relation to its own operations and on States

in relation to operations assisted by the IAEA.

Information on the IAEA’s safety standards programme (including editions in languages

other than English) is available at the IAEA Internet site

www.iaea.org/ns/coordinet

or on request to the Safety Co-ordination Section, IAEA, P.O. Box 100, A-1400 Vienna, Austria.

OTHER SAFETY RELATED PUBLICATIONS

Under the terms of Articles III and VIII.C of its Statute, the IAEA makes available and

fosters the exchange of information relating to peaceful nuclear activities and serves as an intermediary

among its Member States for this purpose.

Reports on safety and protection in nuclear activities are issued in other series, in

particular the IAEA Safety Reports Series, as informational publications. Safety Reports may

describe good practices and give practical examples and detailed methods that can be used to

meet safety requirements. They do not establish requirements or make recommendations.

Other IAEA series that include safety related sales publications are the Technical

Reports Series, the Radiological Assessment Reports Series and the INSAG Series. The

IAEA also issues reports on radiological accidents and other special sales publications.

Unpriced safety related publications are issued in the TECDOC Series, the Provisional Safety

Standards Series, the Training Course Series, the IAEA Services Series and the Computer

Manual Series, and as Practical Radiation Safety Manuals and Practical Radiation

Technical Manuals.


ADVISORY MATERIAL FOR THE

IAEA REGULATIONS FOR THE

SAFE TRANSPORT OF

RADIOACTIVE MATERIAL


The following States are Members of the International Atomic Energy Agency:

AFGHANISTAN

ALBANIA

ALGERIA

ANGOLA

ARGENTINA

ARMENIA

AUSTRALIA

AUSTRIA

AZERBAIJAN

BANGLADESH

BELARUS

BELGIUM

BENIN

BOLIVIA

BOSNIA AND HERZEGOVINA

BOTSWANA

BRAZIL

BULGARIA

BURKINA FASO

CAMBODIA

CAMEROON

CANADA

CENTRAL AFRICAN

REPUBLIC

CHILE

CHINA

COLOMBIA

COSTA RICA

CÔTE D’IVOIRE

CROATIA

CUBA

CYPRUS

CZECH REPUBLIC

DEMOCRATIC REPUBLIC

OF THE CONGO

DENMARK

DOMINICAN REPUBLIC

ECUADOR

EGYPT

EL SALVADOR

ESTONIA

ETHIOPIA

FINLAND

FRANCE

GABON

GEORGIA

GERMANY

GHANA

GREECE

GUATEMALA

HAITI

HOLY SEE

HUNGARY

ICELAND

INDIA

INDONESIA

IRAN, ISLAMIC REPUBLIC OF

IRAQ

IRELAND

ISRAEL

ITALY

JAMAICA

JAPAN

JORDAN

KAZAKHSTAN

KENYA

KOREA, REPUBLIC OF

KUWAIT

LATVIA

LEBANON

LIBERIA

LIBYAN ARAB JAMAHIRIYA

LIECHTENSTEIN

LITHUANIA

LUXEMBOURG

MADAGASCAR

MALAYSIA

MALI

MALTA

MARSHALL ISLANDS

MAURITIUS

MEXICO

MONACO

MONGOLIA

MOROCCO

MYANMAR

NAMIBIA

NETHERLANDS

NEW ZEALAND

NICARAGUA

NIGER

NIGERIA

NORWAY

PAKISTAN

PANAMA

PARAGUAY

PERU

PHILIPPINES

POLAND

PORTUGAL

QATAR

REPUBLIC OF MOLDOVA

ROMANIA

RUSSIAN FEDERATION

SAUDI ARABIA

SENEGAL

SIERRA LEONE

SINGAPORE

SLOVAKIA

SLOVENIA

SOUTH AFRICA

SPAIN

SRI LANKA

SUDAN

SWEDEN

SWITZERLAND

SYRIAN ARAB REPUBLIC

TAJIKISTAN

THAILAND

THE FORMER YUGOSLAV

REPUBLIC OF MACEDONIA

TUNISIA

TURKEY

UGANDA

UKRAINE

UNITED ARAB EMIRATES

UNITED KINGDOM OF

GREAT BRITAIN AND

NORTHERN IRELAND

UNITED REPUBLIC

OF TANZANIA

UNITED STATES OF AMERICA

URUGUAY

UZBEKISTAN

VENEZUELA

VIET NAM

YEMEN

YUGOSLAVIA,

FEDERAL REPUBLIC OF

ZAMBIA

ZIMBABWE

The Agency’s Statute was approved on 23 October 1956 by the Conference on the Statute of the

IAEA held at United Nations Headquarters, New York; it entered into force on 29 July 1957. The

Headquarters of the Agency are situated in Vienna. Its principal objective is “to accelerate and enlarge the

contribution of atomic energy to peace, health and prosperity throughout the world’’.

© IAEA, 2002

Permission to reproduce or translate the information contained in this publication may be

obtained by writing to the International Atomic Energy Agency, Wagramer Strasse 5, P.O. Box 100,

A-1400 Vienna, Austria.

Printed by the IAEA in Austria

June 2002

STI/PUB/1109


SAFETY STANDARDS SERIES No. TS-G-1.1 (ST-2)

ADVISORY MATERIAL FOR THE

IAEA REGULATIONS FOR THE

SAFE TRANSPORT OF

RADIOACTIVE MATERIAL

SAFETY GUIDE

INTERNATIONAL ATOMIC ENERGY AGENCY

VIENNA, 2002


VIC Library Cataloguing in Publication Data

Advisory material for the IAEA regulations for the safe transport of radioactive

material : safety guide. — Vienna : International Atomic Energy Agency,

2002.

p. ; 24 cm. — (Safety standards series, ISSN 1020–525X;

no. TS-G-1.1 (ST-2))

STI/PUB/1109

ISBN 92–0–111802–3

Includes bibliographical references.

1. Radioactive substances — Transportation — Safety regulations.

I. International Atomic Energy Agency. II. Series.

VICL 02–00271


FOREWORD

by Mohamed ElBaradei

Director General

One of the statutory functions of the IAEA is to establish or adopt standards of

safety for the protection of health, life and property in the development and application

of nuclear energy for peaceful purposes, and to provide for the application of these

standards to its own operations as well as to assisted operations and, at the request of

the parties, to operations under any bilateral or multilateral arrangement, or, at the

request of a State, to any of that State’s activities in the field of nuclear energy.

The following bodies oversee the development of safety standards: the

Commission for Safety Standards (CSS); the Nuclear Safety Standards Committee

(NUSSC); the Radiation Safety Standards Committee (RASSC); the Transport Safety

Standards Committee (TRANSSC); and the Waste Safety Standards Committee

(WASSC). Member States are widely represented on these committees.

In order to ensure the broadest international consensus, safety standards are

also submitted to all Member States for comment before approval by the IAEA Board

of Governors (for Safety Fundamentals and Safety Requirements) or, on behalf of the

Director General, by the Publications Committee (for Safety Guides).

The IAEA’s safety standards are not legally binding on Member States but may

be adopted by them, at their own discretion, for use in national regulations in respect

of their own activities. The standards are binding on the IAEA in relation to its own

operations and on States in relation to operations assisted by the IAEA. Any State

wishing to enter into an agreement with the IAEA for its assistance in connection

with the siting, design, construction, commissioning, operation or decommissioning

of a nuclear facility or any other activities will be required to follow those parts of the

safety standards that pertain to the activities to be covered by the agreement.

However, it should be recalled that the final decisions and legal responsibilities in any

licensing procedures rest with the States.

Although the safety standards establish an essential basis for safety, the

incorporation of more detailed requirements, in accordance with national practice,

may also be necessary. Moreover, there will generally be special aspects that need to

be assessed on a case by case basis.

The physical protection of fissile and radioactive materials and of nuclear

power plants as a whole is mentioned where appropriate but is not treated in detail;

obligations of States in this respect should be addressed on the basis of the relevant

instruments and publications developed under the auspices of the IAEA. Nonradiological

aspects of industrial safety and environmental protection are also not

explicitly considered; it is recognized that States should fulfil their international

undertakings and obligations in relation to these.


The requirements and recommendations set forth in the IAEA safety standards

might not be fully satisfied by some facilities built to earlier standards. Decisions on

the way in which the safety standards are applied to such facilities will be taken by

individual States.

The attention of States is drawn to the fact that the safety standards of the

IAEA, while not legally binding, are developed with the aim of ensuring that the

peaceful uses of nuclear energy and of radioactive materials are undertaken in a

manner that enables States to meet their obligations under generally accepted

principles of international law and rules such as those relating to environmental

protection. According to one such general principle, the territory of a State must not

be used in such a way as to cause damage in another State. States thus have an

obligation of diligence and standard of care.

Civil nuclear activities conducted within the jurisdiction of States are, as any

other activities, subject to obligations to which States may subscribe under

international conventions, in addition to generally accepted principles of international

law. States are expected to adopt within their national legal systems such legislation

(including regulations) and other standards and measures as may be necessary to fulfil

all of their international obligations effectively.

EDITORIAL NOTE

An appendix, when included, is considered to form an integral part of the standard and

to have the same status as the main text. Annexes, footnotes and bibliographies, if included, are

used to provide additional information or practical examples that might be helpful to the user.

The safety standards use the form ‘shall’ in making statements about requirements,

responsibilities and obligations. Use of the form ‘should’ denotes recommendations of a

desired option.

The English version of the text is the authoritative version.


PREFACE

This Advisory Material is not a stand-alone text. It only has significance when

used concurrently as a companion to the IAEA Safety Standards Series No. ST-1 1 ,

Regulations for the Safe Transport of Radioactive Material (1996 edition), denoted

henceforth as “the Regulations”. To facilitate cross-reference between it and the

Regulations, each paragraph of the Advisory Material is numbered in correspondence

with the paragraph of the Regulations to which it most directly relates. To distinguish

paragraphs of the Advisory Material from those of the Regulations for reference

purposes, Advisory Material paragraphs always have a numeral after the decimal

point, even when there is only one subparagraph of text. Thus, for example, advice

relating to para. 401 of the Regulations should be initially sought under para. 401.1

of the Advisory Material. Integral paragraph numbers which are cited in the text,

either alone or accompanied by lower case letters in brackets, should be taken as

identifying paragraphs of the Regulations.

Also, the publications listed under “References” are the versions which were

used in the development of the 1996 edition of the Regulations and this Advisory

Material. Some of the publications may have been superseded by later revisions.

These may be consulted for the most recent information recognizing that the earlier

editions are the basis for the discussions which follow.

Since the first edition in 1961, the Regulations for the Safe Transport of

Radioactive Material of the International Atomic Energy Agency (IAEA Regulations)

have served as the basis of safety for the transport of radioactive material worldwide.

The provisions of the IAEA Regulations have been adopted in national regulations by

most of the Member States of the Agency. The international regulatory bodies having

responsibility for the various modes of transport have also implemented the IAEA

Regulations. The safety record since the inception, and throughout several

comprehensive revisions, of the Regulations has demonstrated the efficacy both of the

regulatory provisions and of the arrangements for ensuring compliance with them.

In the discussions leading to the first edition of the IAEA Regulations, it was

realized that there was need for a publication to supplement the Regulations which

could give information on individual provisions as to their purpose, their scientific

background and how to apply them in practice. The scientific basis of the

classification of radioisotopes for transport purposes, then in use, and the factors that

1

The Regulations for the Safe Transport of Radioactive Material were issued in 1996

as Safety Standards Series No. ST-1. In 2000 the Regulations were issued in English, with

minor editorial corrections, as Safety Standards Series No. TS-R-1 (ST-1, Revised).


have to be taken into account by competent authorities in approving package designs,

were examples adduced in support of this concept at the time. In response, the Agency

published Safety Series No. 7, entitled, in its first edition in 1961, “Notes on Certain

Aspects of the Regulations”.

As experience in applying the Regulations grew, it became increasingly evident

that, while the provisions of the Regulations might be essentially clear and

unambiguous, nevertheless they would often also be highly technical in nature and

unavoidably complex. Moreover they intentionally state no more than ‘what’ must be

achieved in relation to package characteristics and operational conditions in order to

assure safety. They do not seek to prescribe ‘how’ the user should comply; indeed the

freedom to innovate and to develop new ways to ensure compliance is recognized as

intrinsically desirable in such a technically advanced field. An additional source of

information on the Regulations, providing advice on ‘how’ to comply with them

which could be augmented from time to time in the light of latest experience, was

therefore provided by the Agency, initially in relation to the 1973 edition of the

Regulations. This was entitled “Advisory Material for the IAEA Regulations for the

Safe Transport of Radioactive Material”. It was designated Safety Series No. 37.

Up to the time of publication of the previous edition of the IAEA Regulations,

in 1985, Safety Series No. 37 had reached its third edition. Meanwhile, Safety Series

No. 7, which embodied information on the scientific basis and rationale of the

Regulations, had been retitled “Explanatory Material for the IAEA Regulations for

the Safe Transport of Radioactive Material” and, embodying mainly information on

the scientific basis and rationale of the Regulations, was in its second edition.

During the current regulatory revision, which culminated in 1996, the Agency’s

senior advisory body for transport, the Transport Safety Standards Advisory

Committee (TRANSSAC), in consultation with the Agency’s Publishing Section,

agreed that it would be a useful simplification to combine the two Safety Guides

previously known as Safety Series No. 7 and Safety Series No. 37 in a single

publication, to be known as “Advisory Material for the IAEA Regulations for the Safe

Transport of Radioactive Material”. This would have the advantage of consolidating

supporting information on the Regulations in one place, eliminating duplication. The

advisory nature of the present publication has been made paramount. The inclusion

of some explanatory material supports this function since a proper understanding of

the background to the regulatory provisions helps users to interpret them correctly

and to comply with them fully.

Thus the primary purpose of this publication (henceforth referred to as the

Advisory Material) is to provide guidance to users on proven and acceptable ways of

complying with and demonstrating compliance with the Regulations. It must be

emphasized that the text is not to be construed as being uniquely prescriptive. It offers

recommendations on ways of complying but it does not lay down ‘the only way’ to

comply with any specific provision.


Member States and international organizations are invited to take note of this

publication and to bring it to the attention of persons and organizations who make use

of, or are subject to, the IAEA Regulations. Moreover, readers are encouraged to

send, through their competent authority, any comments they may wish to make,

including proposals for modifications, additions or deletions, to the International

Atomic Energy Agency.


CONTENTS

SECTION I. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Reference to Section I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

SECTION II. DEFINITIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

References to Section II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

SECTION III. GENERAL PROVISIONS . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Radiation protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Emergency response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Quality assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Compliance assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Special arrangement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

References to Section III . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

SECTION IV.

ACTIVITY LIMITS AND MATERIAL

RESTRICTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Basic radionuclide values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Determination of basic radionuclide values . . . . . . . . . . . . . . . . . . . . . 43

Contents limits for packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

References to Section IV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

SECTION V.

REQUIREMENTS AND CONTROLS

FOR TRANSPORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Requirements before the first shipment . . . . . . . . . . . . . . . . . . . . . . . . . 51

Requirements before each shipment . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Transport of other goods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Other dangerous properties of contents . . . . . . . . . . . . . . . . . . . . . . . . . 56

Requirements and controls for contamination and

for leaking packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Requirements and controls for transport of excepted packages . . . . . . . 63


Requirements and controls for transport of LSA material and SCO

in industrial packages or unpackaged . . . . . . . . . . . . . . . . . . . . . . . 67

Determination of transport index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Determination of criticality safety index . . . . . . . . . . . . . . . . . . . . . . . . 70

Limits on transport index, criticality safety index and

radiation levels for packages and overpacks . . . . . . . . . . . . . . . . . . . 71

Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Marking, labelling and placarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Consignor’s responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Transport and storage in transit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Customs operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Undeliverable consignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

References to Section V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

SECTION VI.

REQUIREMENTS FOR RADIOACTIVE

MATERIALS AND FOR PACKAGINGS

AND PACKAGES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Requirements for radioactive materials . . . . . . . . . . . . . . . . . . . . . . . . . 97

General requirements for all packagings and packages . . . . . . . . . . . . . 101

Additional requirements for packages transported by air . . . . . . . . . . . . 104

Requirements for excepted packages . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Requirements for industrial packages . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Requirements for packages containing uranium hexafluoride . . . . . . . . 110

Requirements for Type A packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Requirements for Type B(U) packages . . . . . . . . . . . . . . . . . . . . . . . . . 119

Requirements for Type B(M) packages . . . . . . . . . . . . . . . . . . . . . . . . . 134

Requirements for Type C packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136

Requirements for packages containing fissile material . . . . . . . . . . . . . 137

References to Section VI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

SECTION VII. TEST PROCEDURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

Demonstration of compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

Tests for special form radioactive material . . . . . . . . . . . . . . . . . . . . . . 160

Tests for low dispersible radioactive material . . . . . . . . . . . . . . . . . . . . 162

Tests for packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

References to Section VII . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194


SECTION VIII. APPROVAL AND ADMINISTRATIVE

REQUIREMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

General aspects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

Approval of special form radioactive material and

low dispersible radioactive material . . . . . . . . . . . . . . . . . . . . . . . . . 200

Approval of package designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

Transitional arrangements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

Notification and registration of serial numbers . . . . . . . . . . . . . . . . . . . 206

Approval of shipments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

Approval of shipments under special arrangement . . . . . . . . . . . . . . . . 208

Competent authority approval certificates . . . . . . . . . . . . . . . . . . . . . . . 209

Contents of approval certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Validation of certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

Reference to Section VIII . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

APPENDIX I:

THE Q SYSTEM FOR THE CALCULATION AND

APPLICATION OF A 1

AND A 2

VALUES . . . . . . . . . . . . . . 215

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

Basis of the Q system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

Dosimetric models and assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

Special considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

Tabulation of Q values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

Decay chains used in the Q system . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

References to Appendix I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

APPENDIX II:

HALF-LIFE AND SPECIFIC ACTIVITY OF

RADIONUCLIDES, DOSE AND DOSE RATE

COEFFICIENTS OF RADIONUCLIDES AND

SPECIFIC ACTIVITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

Reference to Appendix II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

APPENDIX III: EXAMPLE CALCULATIONS FOR

ESTABLISHING MINIMUM SEGREGATION

DISTANCE REQUIREMENTS . . . . . . . . . . . . . . . . . . . . . . 287


Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287

Below main deck stowage of one group of packages

in passenger aircraft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

Below main deck stowage of multiple groups of packages

in passenger aircraft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

Main deck stowage on combi or cargo aircraft . . . . . . . . . . . . . . . . . . . 294

Segregation distances for undeveloped film . . . . . . . . . . . . . . . . . . . . . 295

References to Appendix III . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295

APPENDIX IV: QUALITY ASSURANCE IN THE SAFE TRANSPORT

OF RADIOACTIVE MATERIAL . . . . . . . . . . . . . . . . . . . . 297

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

Quality assurance programmes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302

Document control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

Design control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304

Procurement control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

Material control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

Process control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

Inspection and test control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

Non-conformity control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Corrective actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Staff and training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311

Servicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311

Audits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311

Definitions of terms used in Appendix IV . . . . . . . . . . . . . . . . . . . . . . . 312

References to Appendix IV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313

APPENDIX V:

PACKAGE STOWAGE AND RETENTION

DURING TRANSPORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

Types of retention system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

Package acceleration factor considerations . . . . . . . . . . . . . . . . . . . . . . 317

Demonstrating compliance through testing . . . . . . . . . . . . . . . . . . . . . . 319

Examples of retention system designs and assessments . . . . . . . . . . . . . 320

Definitions of terms used in Appendix V . . . . . . . . . . . . . . . . . . . . . . . 326

References to Appendix V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327


APPENDIX VI: GUIDELINES FOR SAFE DESIGN OF SHIPPING

PACKAGES AGAINST BRITTLE FRACTURE . . . . . . . . . 329

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

General consideration of evaluation methods . . . . . . . . . . . . . . . . . . . . 330

Considerations for fracture mechanics . . . . . . . . . . . . . . . . . . . . . . . . . 334

Safety factors for Method 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337

Evaluation procedure for Method 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339

References to Appendix VI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

APPENDIX VII: CRITICALITY SAFETY ASSESSMENTS . . . . . . . . . . . . . 347

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

Package description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

Criticality safety analysis models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348

Method of analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350

Validation of calculational method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352

Calculations and results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

Special issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365

Design and operational issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368

References to Appendix VII . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

CONTRIBUTORS TO DRAFTING AND REVIEW . . . . . . . . . . . . . . . . . . . . 375

BODIES FOR THE ENDORSEMENT OF SAFETY STANDARDS . . . . . . . . 380

INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382

LIST OF TABLES

Table I Correction factors for package and detector sizes . . . . . . . . . 22

Table II Sample segregation between classes of dangerous goods . . . 85

Table III Comparison of the four volumetric leak test

methods recommended by Aston et al. [3] . . . . . . . . . . . 98

Table IV List of VRI codes by country . . . . . . . . . . . . . . . . . . . . . . . . 211

Table I.1 Dose coefficients for submersion . . . . . . . . . . . . . . . . . . . . . 229

Table I.2 Type A package contents limits . . . . . . . . . . . . . . . . . . . . . . 238

Table I.3 Decay chains used in the Q system . . . . . . . . . . . . . . . . . . . . 253

Table II.1 Half-life and specific activity of radionuclides . . . . . . . . . . . 259

Table II.2 Dose and dose rate coefficients of radionuclides . . . . . . . . . . 272


Table II.3

Specific activity values for uranium at various

levels of enrichment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

Table III.1 Transmission factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Table III.2 Variation of segregation distance with transport index

for a single group of packages stowed below main deck

on a passenger aircraft . . . . . . . . . . . . . . . . . . . . . . . . . . 291

Table III.3 Variation of segregation distance with transport index

for main deck stowage on a combi or cargo aircraft . . . . 294

Table IV.1

Table V.1

Table V.2

Table V.3

Basic elements of quality assurance programmes that

should be considered and addressed in the safe transport

of radioactive material . . . . . . . . . . . . . . . . . . . . . . . . . . 300

Acceleration factors for package retention

system design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

Acceleration factors for package retention

system design for specific packages . . . . . . . . . . . . . . . . 319

Symbols used in calculation of a rectangular package

with baseplate flange bolted to the conveyance . . . . . . . . 325


Section I

INTRODUCTION

BACKGROUND

103.1. When making national or international shipments it is necessary to consult

the Regulations for the particular mode of transport to be used for the countries where

the shipment will be made. While most of the major requirements are in agreement

with the Regulations, there can be differences with respect to the assignment of

responsibilities for carrying out specific actions. For air shipments, the International

Civil Aviation Organization’s (ICAO) Technical Instructions for the Safe Transport of

Dangerous Goods by Air and the International Air Transport Association’s (IATA)

Dangerous Goods Regulations should be consulted, with particular regard to the State

and operator variations. For sea shipments, the International Maritime Organization’s

(IMO) International Maritime Dangerous Goods (IMDG) Code should be consulted.

Some countries have adopted the Regulations by reference while others have incorporated

them into their national regulations with possibly some minor variations.

OBJECTIVE

104.1. In general the Regulations aim to provide a uniform and adequate level of

safety that is commensurate with the inherent hazard presented by the radioactive

material being transported. To the extent feasible, safety features are required to be

built into the design of the package. By placing primary reliance on the package

design and preparation, the need for any special actions during carriage, i.e. by the

carrier, is minimized. Nevertheless, some operational controls are required for safety

purposes.

SCOPE

106.1. Transport includes carriage by a common carrier or by the owner or employee

where the carriage is incidental to the use of the radioactive materials, such as

vehicles carrying radiography devices being driven to and from the operations site by

the radiographer, vehicles carrying density measuring gauges being driven to and

from the construction site, and oil well logging vehicles carrying measuring devices

containing radioactive materials and radioactive materials used in oil well injections.

1


107.1. The Regulations are not intended to be applied to movements of radioactive

material that forms an integral part of a means of transport, such as depleted uranium

counterweights or tritium exit signs used in aircraft; or to radioactive material in persons

or animals for medical or veterinary purposes, such as cardiac pacemakers or

radioactive material introduced into humans or animals for diagnosis or treatment. The

treating physician or veterinarian should give appropriate advice on radiological safety.

107.2. Consumer products are items available to the general public as the end user

without further control or restriction. These may be devices such as smoke detectors,

luminous dials or ion generating tubes that contain small amounts of radioactive substances.

Consumer products are outside the scope of the Regulations only after sale

to the end user. Any transport, including the use of conveyances between manufacturers,

distributors and retailers, is within the scope of the Regulations to ensure that

large quantities of individually exempted consumer products are not transported in an

unregulated manner.

107.3. The principles of exemption and their application to the transport of radioactive

material are dealt with in para. 401.

107.4. The scope of the Regulations includes consideration of those natural materials

or ores which form part of the nuclear fuel cycle or which will be processed in

order to use their radioactive properties. The Regulations do not apply to other ores

which may contain naturally occurring radionuclides, but whose usefulness does not

lie in the fissile, fertile or radioactive properties of those nuclides, provided that the

activity concentration does not exceed 10 times the exempt activity concentration values.

In addition, the Regulations do not apply to natural materials and ores containing

naturally occurring radionuclides which have been processed (up to 10 times the

exempt activity concentration values) where the physical and/or chemical processing

was not for the purpose of extracting radionuclides, e.g. washed sands and tailings

from alumina refining. Were this not the case, the Regulations would have to be

applied to enormous quantities of material that present a very low hazard. However,

there are ores in nature where the activity concentration is much higher than the

exemption values. The regular transport of these ores may require consideration of

radiation protection measures. Hence, a factor of 10 times the exemption values for

activity concentration was chosen as providing an appropriate balance between the

radiological protection concerns and the practical inconvenience of regulating large

quantities of material with low activity concentrations of naturally occurring radionuclides.

108.1. Although these Regulations provide for the requisite safety in transport

without the need for specified routing, the regulatory authorities in some Member

2

Источник: [https://torrent-igruha.org/3551-portal.html]
, Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number

Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019, Volume 1 [1st ed. 2020] 978-981-32-9948-1, 978-981-32-9949-8

Table of contents :
Front Matter ....Pages i-xiv
Front Matter ....Pages 1-1
Empirical Study of Soft Clustering Technique for Determining Click Through Rate in Online Advertising (Akshi Kumar, Anand Nayyar, Shubhangi Upasani, Arushi Arora)....Pages 3-13
ASK Approach: A Pre-migration Approach for Legacy Application Migration to Cloud (Sanjeev Kumar Yadav, Akhil Khare, Choudhary Kavita)....Pages 15-27
A Fuzzy Logic Based Cardiovascular Disease Risk Level Prediction System in Correlation to Diabetes and Smoking (Kanak Saxena, Umesh Banodha)....Pages 29-40
An Integrated Fault Classification Approach for Microgrid System (Ruchita Nale, Ruchi Chandrakar, Monalisa Biswal)....Pages 41-56
Role of Data Analytics in Human Resource Management for Prediction of Attrition Using Job Satisfaction (Neerja Aswale, Kavya Mukul)....Pages 57-67
A Study of Business Performance Management in Special Reference to Automobile Industry (Gurinder Singh, Smiti Kashyap, Kanika Singh Tomar, Vikas Garg)....Pages 69-92
Secure Online Voting System Using Biometric and Blockchain (Dipti Pawade, Avani Sakhapara, Aishwarya Badgujar, Divya Adepu, Melvita Andrade)....Pages 93-110
An Approach: Applicability of Existing Heterogeneous Multicore Real-Time Task Scheduling in Commercially Available Heterogeneous Multicore Systems (Kalyan Baital, Amlan Chakrabarti)....Pages 111-124
Analyzing the Detectability of Harmful Postures for Patient with Hip Prosthesis Based on a Single Accelerometer in Mobile Phone (Kitti Naonueng, Opas Chutatape, Rong Phoophuangpairoj)....Pages 125-138
Software Development Process Evolution in Malaysian Companies (Rehan Akbar, Asif Riaz Khan, Kiran Adnan)....Pages 139-150
Automated Scheduling of Hostel Room Allocation Using Genetic Algorithm (Rayner Alfred, Hin Fuk Yu)....Pages 151-160
Evaluation of ASTER TIR Data-Based Lithological Indices in Parts of Madhya Pradesh and Chhattisgarh State, India (Himanshu Govil, Subhanil Guha, Prabhat Diwan, Neetu Gill, Anindita Dey)....Pages 161-169
Analyzing Linear Relationships of LST with NDVI and MNDISI Using Various Resolution Levels of Landsat 8 OLI and TIRS Data (Himanshu Govil, Subhanil Guha, Prabhat Diwan, Neetu Gill, Anindita Dey)....Pages 171-184
Automatic Robot Processing Using Speech Recognition System (S. Elavarasi, G. Suseendran)....Pages 185-195
Banking and FinTech (Financial Technology) Embraced with IoT Device (G. Suseendran, E. Chandrasekaran, D. Akila, A. Sasi Kumar)....Pages 197-211
Front Matter ....Pages 213-213
GRNN++: A Parallel and Distributed Version of GRNN Under Apache Spark for Big Data Regression (Sk. Kamaruddin, Vadlamani Ravi)....Pages 215-227
An Entropy-Based Technique for Conferences Ranking (Fiaz Majeed, Rana Azhar Ul Haq)....Pages 229-239
MapReduce mRMR: Random Forests-Based Email Spam Classification in Distributed Environment (V. Sri Vinitha, D. Karthika Renuka)....Pages 241-253
The Impact of Sustainable Development Report Disclosure on Tax Planning in Thailand (Sathaya Thanjunpong, Thatphong Awirothananon)....Pages 255-268
Clustering and Labeling Auction Fraud Data (Ahmad Alzahrani, Samira Sadaoui)....Pages 269-283
Big Data Security Challenges and Preventive Solutions (Nirmal Kumar Gupta, Mukesh Kumar Rohil)....Pages 285-299
Role and Challenges of Unstructured Big Data in Healthcare (Kiran Adnan, Rehan Akbar, Siak Wang Khor, Adnan Bin Amanat Ali)....Pages 301-323
Zip Zap Data—A Framework for ‘Personal Data Preservation’ (K. Arunkumar, A. Devendran)....Pages 325-337
A Systematic Mapping Study of Cloud Large-Scale Foundation—Big Data, IoT, and Real-Time Analytics (Isaac Odun-Ayo, Rowland Goddy-Worlu, Temidayo Abayomi-Zannu, Emanuel Grant)....Pages 339-363
Studies on Radar Imageries of Thundercloud by Image Processing Technique (Sonia Bhattacharya, Himadri Bhattacharyya Chakrabarty)....Pages 365-380
Front Matter ....Pages 381-381
PURAN: Word Prediction System for Punjabi Language News (Gurjot Singh Mahi, Amandeep Verma)....Pages 383-400
Implementation of hDE-HTS Optimized T2FPID Controller in Solar-Thermal System (Binod Shaw, Jyoti Ranjan Nayak, Rajkumar Sahu)....Pages 401-412
Design of Sigma-Delta Converter Using 65 nm CMOS Technology for Nerves Organization in Brain Machine Interface (Anil Kumar Sahu, G. R. Sinha, Sapna Soni)....Pages 413-423
Performance Comparison of Machine Learning Techniques for Epilepsy Classification and Detection in EEG Signal (Rekh Ram Janghel, Archana Verma, Yogesh Kumar Rathore)....Pages 425-438
Novel Approach for Plant Disease Detection Based on Textural Feature Analysis (Varinderjit Kaur, Ashish Oberoi)....Pages 439-449
Novel Approach for Brain Tumor Detection Based on Naïve Bayes Classification (Gurkarandesh Kaur, Ashish Oberoi)....Pages 451-462
Automatic Classification of Carnatic Music Instruments Using MFCC and LPC (Surendra Shetty, Sarika Hegde)....Pages 463-474
Semiautomated Ontology Learning to Provide Domain-Specific Knowledge Search in Marathi Language (Neelam Chandolikar, Pushkar Joglekar, Shivjeet Bhosale, Dipali Peddawad, Rajesh Jalnekar, Swati Shilaskar)....Pages 475-488
Identifying Influential Users on Social Network: An Insight (Ragini Krishna, C. M. Prashanth)....Pages 489-502
Factex: A Practical Approach to Crime Detection (Rachna Jain, Anand Nayyar, Shivam Bachhety)....Pages 503-516
Analysis of Classification Algorithms for Breast Cancer Prediction (S. P. Rajamohana, K. Umamaheswari, K. Karunya, R. Deepika)....Pages 517-528
Real-Time Footfall Prediction Using Weather Data: A Case on Retail Analytics (Garima Makkar)....Pages 529-542
Normal Pressure Hydrocephalus Detection Using Active Contour Coupled Ensemble Based Classifier (Pallavi Saha, Sankhadeep Chatterjee, Santanu Roy, Soumya Sen)....Pages 543-553
Question–Answer System on Episodic Data Using Recurrent Neural Networks (RNN) (Vineet Yadav, Vishnu Bharadwaj, Alok Bhatt, Ayush Rawal)....Pages 555-568
Convoluted Cosmos: Classifying Galaxy Images Using Deep Learning (Diganta Misra, Sachi Nandan Mohanty, Mohit Agarwal, Suneet K. Gupta)....Pages 569-579
Front Matter ....Pages 581-581
Energy-Based Improved MPR Selection in OLSR Routing Protocol (Rachna Jain, Indu Kashyap)....Pages 583-599
A Novel Approach for Better QoS in Cognitive Radio Ad Hoc Networks Using Cat Optimization (Lolita Singh, Nitul Dutta)....Pages 601-612
(T-ToCODE): A Framework for Trendy Topic Detection and Community Detection for Information Diffusion in Social Network (Reena Pagare, Akhil Khare, Shankar Chaudhary)....Pages 613-632
ns-3 Implementation of Network Mobility Basic Support (NEMO-BS) Protocol for Intelligent Transportation Systems (Prasanta Mandal, Manoj Kumar Rana, Punyasha Chatterjee, Arpita Debnath)....Pages 633-642
Modified DFA Minimization with Artificial Bee Colony Optimization in Vehicular Routing Problem with Time Windows (G. Niranjani, K. Umamaheswari)....Pages 643-662
Coverage-Aware Recharge Scheduling Scheme for Wireless Charging Vehicles in the Wireless Rechargeable Sensor Networks (Govind P. Gupta, Vrajesh Kumar Chawra)....Pages 663-671
A Transition Model from Web of Things to Speech of Intelligent Things in a Smart Education System (Ambrose A. Azeta, Victor I. Azeta, Sanjay Misra, M. Ananya)....Pages 673-683
Intrusion Detection and Prevention Systems: An Updated Review (Nureni Ayofe Azeez, Taiwo Mayowa Bada, Sanjay Misra, Adewole Adewumi, Charles Van der Vyver, Ravin Ahuja)....Pages 685-696
Simulation-Based Performance Analysis of Location-Based Opportunistic Routing Protocols in Underwater Sensor Networks Having Communication Voids (Sonali John, Varun G. Menon, Anand Nayyar)....Pages 697-711
A Hybrid Optimization Algorithm for Pathfinding in Grid Environment (B. Booba, A. Prema, R. Renugadevi)....Pages 713-721
Dynamic Hashtag Interactions and Recommendations: An Implementation Using Apache Spark Streaming and GraphX (Sonam Sharma)....Pages 723-738
Back Matter ....Pages 739-740

Citation preview

Advances in Intelligent Systems and Computing 1042

Neha Sharma Amlan Chakrabarti Valentina Emilia Balas   Editors

Data Management, Analytics and Innovation Proceedings of ICDMAI 2019, Volume 1

Advances in Intelligent Systems and Computing Volume 1042

Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong

The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156

Neha Sharma Amlan Chakrabarti Valentina Emilia Balas •



Editors

Data Management, Analytics and Innovation Proceedings of ICDMAI 2019, Volume 1

123

Editors Neha Sharma Society for Data Science Pune, Maharashtra, India Valentina Emilia Balas Department of Automatics and Applied Software Aurel Vlaicu University of Arad Arad, Romania

Amlan Chakrabarti A.K. Choudhury School of Information Technology University of Calcutta Kolkata, West Bengal, India

ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-981-32-9948-1 ISBN 978-981-32-9949-8 (eBook) https://doi.org/10.1007/978-981-32-9949-8 © Springer Nature Singapore Pte Ltd. 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Preface

These two volumes constitute the proceedings of the International Conference on Data Management, Analytics and Innovation (ICDMAI 2019) held from 18 to 20 January 2019. ICDMAI is a flagship conference of Society for Data Science, which is a non-profit professional association established to create a collaborative platform for bringing together technical experts across industry, academia, government laboratories and professional bodies to promote innovation around data science. ICDMAI 2019 envisions its role towards data science and its enhancement through collaboration, innovative methodologies and connections throughout the globe. The conference was hosted by Lincoln University College, Kuala Lumpur, Malaysia, and was supported by the industry leaders like IBM. Other partners for the conference were Wizer and DSMS College of Tourism & Management, West Bengal, India. The conference witnessed participants from 20 countries, 12 industries, 31 international universities and 94 premier Indian universities. Utmost care was taken in each and every facet of the conference, especially regarding the quality of the paper submissions. Out of 418 papers submitted to ICDMAI 2019, only 20% (87 papers) are selected for an oral presentation after a rigorous review process. Besides paper presentation, the conference also showcased workshops, tutorial talks, keynote sessions and plenary talks by the experts of the respective field. The volumes cover a broad spectrum of computer science, information technology, computational engineering, electronics and telecommunication, electrical, computer application and all the relevant disciplines. The conference papers included in these proceedings are published post-conference and are grouped into the four areas of research such as data management and smart informatics; big data management; artificial intelligence and data analytics; and advances in network technologies. All the four tracks of the conference were very relevant to the current technological advancements and had Best Paper Award in each track. Very stringent selection process was adopted for paper selection, and from plagiarism check to technical chairs’ review to double-blind review, every step was religiously followed. We compliment all the authors for submitting high-quality research papers to ICDMAI 2019. We would like to acknowledge all the authors for their contributions and also the efforts taken by reviewers and session chairs of the conference, v

vi

Preface

without whom it would have been difficult to select these papers. We appreciate the unconditional support from the members of the National and International Program Committee. It was really interesting to hear the participants of the conference highlight the new areas and the resulting challenges as well as opportunities. This conference has served as a vehicle for a spirited debate and discussion on many challenges that the world faces today. We especially thank our General Chair, Dr. P. K. Sinha; Vice Chancellor and Director, Dr. S. P. Mukherjee, International Institute of Information Technology, Naya Raipur (IIIT-NR), Chhattisgarh; other eminent personalities like Mr. Eddy Liew, Cloud and Solutions Country Technical Leader at IBM, Malaysia; Kranti Athalye, Sr. Manager in IBM India University Relations; Dr. Juergen Seitz, Head of Business Information Systems Department, Baden-Wuerttemberg Cooperative State University, Heidenheim, Germany; Mr. Aninda Bose, Senior Publishing Editor, Springer India Pvt. Ltd.; Dr. Vincenzo Piuri, IEEE Fellow, University of Milano, Italy; Hanaa Hachimi, National School of Applied Sciences ENSA in Kenitra, Morocco; Amol Dhondse, IBM Senior Solution Architect; Mohd Helmy Abd Wahab, Senior Lecturer and Former Head of Multimedia Engineering Lab at the Department of Computer Engineering, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM); Anand Nayyar, Duy Tan University, Vietnam; and many more who were associated with ICDMAI 2019. Besides, there was CSI-Startup and Entrepreneurship Award to felicitate budding job creators. Our special thanks go to Janus Kacprzyk (Editor in Chief, Springer, Advances in Intelligent Systems and Computing Series) for the opportunity to organize this guest-edited volume. We are grateful to Springer, especially to Mr. Aninda Bose (Senior Publishing Editor, Springer India Pvt. Ltd.), for the excellent collaboration, patience and help during the evolvement of this volume. We are confident that the volumes will provide the state-of-the-art information to professors, researchers, practitioners and graduate students in the area of data management, analytics and innovation, and all will find this collection of papers inspiring and useful. Pune, India Kolkata, India Arad, Romania

Neha Sharma Amlan Chakrabarti Valentina Emilia Balas

Contents

Data Management and Smart Informatics Empirical Study of Soft Clustering Technique for Determining Click Through Rate in Online Advertising . . . . . . . . . . . . . . . . . . . . . . . . . . . Akshi Kumar, Anand Nayyar, Shubhangi Upasani and Arushi Arora

3

ASK Approach: A Pre-migration Approach for Legacy Application Migration to Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sanjeev Kumar Yadav, Akhil Khare and Choudhary Kavita

15

A Fuzzy Logic Based Cardiovascular Disease Risk Level Prediction System in Correlation to Diabetes and Smoking . . . . . . . . . . . . . . . . . . Kanak Saxena and Umesh Banodha

29

An Integrated Fault Classification Approach for Microgrid System . . . . Ruchita Nale, Ruchi Chandrakar and Monalisa Biswal

41

Role of Data Analytics in Human Resource Management for Prediction of Attrition Using Job Satisfaction . . . . . . . . . . . . . . . . . . Neerja Aswale and Kavya Mukul

57

A Study of Business Performance Management in Special Reference to Automobile Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Gurinder Singh, Smiti Kashyap, Kanika Singh Tomar and Vikas Garg

69

Secure Online Voting System Using Biometric and Blockchain . . . . . . . Dipti Pawade, Avani Sakhapara, Aishwarya Badgujar, Divya Adepu and Melvita Andrade

93

An Approach: Applicability of Existing Heterogeneous Multicore Real-Time Task Scheduling in Commercially Available Heterogeneous Multicore Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Kalyan Baital and Amlan Chakrabarti

vii

viii

Contents

Analyzing the Detectability of Harmful Postures for Patient with Hip Prosthesis Based on a Single Accelerometer in Mobile Phone . . . . . . . . 125 Kitti Naonueng, Opas Chutatape and Rong Phoophuangpairoj Software Development Process Evolution in Malaysian Companies . . . . 139 Rehan Akbar, Asif Riaz Khan and Kiran Adnan Automated Scheduling of Hostel Room Allocation Using Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Rayner Alfred and Hin Fuk Yu Evaluation of ASTER TIR Data-Based Lithological Indices in Parts of Madhya Pradesh and Chhattisgarh State, India . . . . . . . . . . . . . . . . 161 Himanshu Govil, Subhanil Guha, Prabhat Diwan, Neetu Gill and Anindita Dey Analyzing Linear Relationships of LST with NDVI and MNDISI Using Various Resolution Levels of Landsat 8 OLI and TIRS Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Himanshu Govil, Subhanil Guha, Prabhat Diwan, Neetu Gill and Anindita Dey Automatic Robot Processing Using Speech Recognition System . . . . . . . 185 S. Elavarasi and G. Suseendran Banking and FinTech (Financial Technology) Embraced with IoT Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 G. Suseendran, E. Chandrasekaran, D. Akila and A. Sasi Kumar Big Data Management GRNN++: A Parallel and Distributed Version of GRNN Under Apache Spark for Big Data Regression . . . . . . . . . . . . . . . . . . . . 215 Sk. Kamaruddin and Vadlamani Ravi An Entropy-Based Technique for Conferences Ranking . . . . . . . . . . . . 229 Fiaz Majeed and Rana Azhar Ul Haq MapReduce mRMR: Random Forests-Based Email Spam Classification in Distributed Environment . . . . . . . . . . . . . . . . . . . . . . . 241 V. Sri Vinitha and D. Karthika Renuka The Impact of Sustainable Development Report Disclosure on Tax Planning in Thailand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Sathaya Thanjunpong and Thatphong Awirothananon Clustering and Labeling Auction Fraud Data . . . . . . . . . . . . . . . . . . . . 269 Ahmad Alzahrani and Samira Sadaoui

Contents

ix

Big Data Security Challenges and Preventive Solutions . . . . . . . . . . . . . 285 Nirmal Kumar Gupta and Mukesh Kumar Rohil Role and Challenges of Unstructured Big Data in Healthcare . . . . . . . . 301 Kiran Adnan, Rehan Akbar, Siak Wang Khor and Adnan Bin Amanat Ali Zip Zap Data—A Framework for ‘Personal Data Preservation’ . . . . . . 325 K. Arunkumar and A. Devendran A Systematic Mapping Study of Cloud Large-Scale Foundation—Big Data, IoT, and Real-Time Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Isaac Odun-Ayo, Rowland Goddy-Worlu, Temidayo Abayomi-Zannu and Emanuel Grant Studies on Radar Imageries of Thundercloud by Image Processing Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Sonia Bhattacharya and Himadri Bhattacharyya Chakrabarty Artificial Intelligence and Data Analysis PURAN: Word Prediction System for Punjabi Language News . . . . . . . 383 Gurjot Singh Mahi and Amandeep Verma Implementation of hDE-HTS Optimized T2FPID Controller in Solar-Thermal System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Binod Shaw, Jyoti Ranjan Nayak and Rajkumar Sahu Design of Sigma-Delta Converter Using 65 nm CMOS Technology for Nerves Organization in Brain Machine Interface . . . . . . . . . . . . . . . 413 Anil Kumar Sahu, G. R. Sinha and Sapna Soni Performance Comparison of Machine Learning Techniques for Epilepsy Classification and Detection in EEG Signal . . . . . . . . . . . . 425 Rekh Ram Janghel, Archana Verma and Yogesh Kumar Rathore Novel Approach for Plant Disease Detection Based on Textural Feature Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Varinderjit Kaur and Ashish Oberoi Novel Approach for Brain Tumor Detection Based on Naïve Bayes Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451 Gurkarandesh Kaur and Ashish Oberoi Automatic Classification of Carnatic Music Instruments Using MFCC and LPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463 Surendra Shetty and Sarika Hegde

x

Contents

Semiautomated Ontology Learning to Provide Domain-Specific Knowledge Search in Marathi Language . . . . . . . . . . . . . . . . . . . . . . . . 475 Neelam Chandolikar, Pushkar Joglekar, Shivjeet Bhosale, Dipali Peddawad, Rajesh Jalnekar and Swati Shilaskar Identifying Influential Users on Social Network: An Insight . . . . . . . . . 489 Ragini Krishna and C. M. Prashanth Factex: A Practical Approach to Crime Detection . . . . . . . . . . . . . . . . . 503 Rachna Jain, Anand Nayyar and Shivam Bachhety Analysis of Classification Algorithms for Breast Cancer Prediction . . . . 517 S. P. Rajamohana, K. Umamaheswari, K. Karunya and R. Deepika Real-Time Footfall Prediction Using Weather Data: A Case on Retail Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529 Garima Makkar Normal Pressure Hydrocephalus Detection Using Active Contour Coupled Ensemble Based Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 Pallavi Saha, Sankhadeep Chatterjee, Santanu Roy and Soumya Sen Question–Answer System on Episodic Data Using Recurrent Neural Networks (RNN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555 Vineet Yadav, Vishnu Bharadwaj, Alok Bhatt and Ayush Rawal Convoluted Cosmos: Classifying Galaxy Images Using Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569 Diganta Misra, Sachi Nandan Mohanty, Mohit Agarwal and Suneet K. Gupta Advances in Network Technologies Energy-Based Improved MPR Selection in OLSR Routing Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 Rachna Jain and Indu Kashyap A Novel Approach for Better QoS in Cognitive Radio Ad Hoc Networks Using Cat Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601 Lolita Singh and Nitul Dutta (T-ToCODE): A Framework for Trendy Topic Detection and Community Detection for Information Diffusion in Social Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613 Reena Pagare, Akhil Khare and Shankar Chaudhary ns-3 Implementation of Network Mobility Basic Support (NEMO-BS) Protocol for Intelligent Transportation Systems . . . . . . . . . . . . . . . . . . . 633 Prasanta Mandal, Manoj Kumar Rana, Punyasha Chatterjee and Arpita Debnath

Contents

xi

Modified DFA Minimization with Artificial Bee Colony Optimization in Vehicular Routing Problem with Time Windows . . . . . . . . . . . . . . . . 643 G. Niranjani and K. Umamaheswari Coverage-Aware Recharge Scheduling Scheme for Wireless Charging Vehicles in the Wireless Rechargeable Sensor Networks . . . . . . . . . . . . 663 Govind P. Gupta and Vrajesh Kumar Chawra A Transition Model from Web of Things to Speech of Intelligent Things in a Smart Education System . . . . . . . . . . . . . . . . . . . . . . . . . . . 673 Ambrose A. Azeta, Victor I. Azeta, Sanjay Misra and M. Ananya Intrusion Detection and Prevention Systems: An Updated Review . . . . . 685 Nureni Ayofe Azeez, Taiwo Mayowa Bada, Sanjay Misra, Adewole Adewumi, Charles Van der Vyver and Ravin Ahuja Simulation-Based Performance Analysis of Location-Based Opportunistic Routing Protocols in Underwater Sensor Networks Having Communication Voids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697 Sonali John, Varun G. Menon and Anand Nayyar A Hybrid Optimization Algorithm for Pathfinding in Grid Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713 B. Booba, A. Prema and R. Renugadevi Dynamic Hashtag Interactions and Recommendations: An Implementation Using Apache Spark Streaming and GraphX . . . . . 723 Sonam Sharma Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739

About the Editors

Neha Sharma is the Founder Secretary of the Society for Data Science, India. She was the Director of the Zeal Institute of Business Administration, Computer Application & Research, Pune, Maharashtra, India, and and Deputy Director, of the Padmashree Dr. D.Y.Patil Institute of Master of Computer Applications, Akurdi, Pune. She completed her PhD at the prestigious Indian Institute of Technology (IIT-ISM), Dhanbad, and she is a Senior IEEE member as well as Execom member of IEEE Pune Section. She has published numerous research papers in respected international journals. She received the “Best PhD Thesis Award” and “Best Paper Presenter at International Conference Award” from the Computer Society of India. Her areas of interest include data mining, database design, analysis and design, artificial intelligence, big data, cloud computing, blockchain and data science. Amlan Chakrabarti currently the Dean of the Faculty of Engineering and Technology, Professor and Director of the A.K.Choudhury School of Information Technology, University of Calcutta, India. He was a postdoctoral fellow at the School of Engineering, Princeton University, USA from 2011 to 2012. He has published around 130 research papers in refereed journals and conferences, and has been involved in research projects supported by various national funding agencies and international collaborations. He is a senior member of the IEEE and ACM, ACM Distinguished Speaker, Vice President of the Society for Data Science, and Secretary of the xiii

xiv

About the Editors

IEEE CEDA India Chapter. He is also the Guest Editor of the Springer Nature Journal on Applied Sciences. His research interests include quantum computing, VLSI design, embedded system design, computer vision and analytics. Valentina Emilia Balas is currently a Full Professor at the Department of Automatics and Applied Software at the Faculty of Engineering, “Aurel Vlaicu” University of Arad, Romania. She holds a Ph.D. in Applied Electronics and Telecommunications from the Polytechnic University of Timisoara. Dr. Balas is the author of more than 300 research papers in refereed journals and international conferences. Her research interests include intelligent systems, fuzzy control, soft computing, smart sensors, information fusion, modeling and simulation. She is the editor‐in-chief of the International Journal of Advanced Intelligence Paradigms (IJAIP) and the International Journal of Computational Systems Engineering (IJCSysE), and is an editorial board member of several national and international journals.

Data Management and Smart Informatics

Empirical Study of Soft Clustering Technique for Determining Click Through Rate in Online Advertising Akshi Kumar, Anand Nayyar, Shubhangi Upasani and Arushi Arora

Abstract Online advertising is an industry with the potential for maximum revenue extraction. Displaying the ad which is more likely to be clicked plays a crucial role in generating maximum revenue. A high click through rate (CTR) is an indication that the user finds the ad useful and relevant. For suitable placement of ads online and rich user experience, determining CTR has become imperative. Accurate estimation of CTR helps in placement of advertisements in relevant locations which would result in more profits and return of investment for the advertisers and publishers. This paper presents the application of a soft clustering method namely fuzzy c-means (FCM) clustering for determining if a particular ad would be clicked by the user or not. This is done by classifying the ads in the dataset into broad clusters depending on whether they were actually clicked or not. This way the kind of advertisements that the user is interested in can be found out and subsequently more advertisements of the same kind can be recommended to him, thereby increasing the CTR of the displayed ads. Experimental results show that FCM outperforms k-means clustering (KMC) in determining CTR. Keywords Advertising

 Click Through Rate  Clustering

A. Kumar Department of Computer Science and Engineering, Delhi Technological University, Delhi, India e-mail: [email protected] A. Nayyar Graduate School, Duy Tan University, Da Nang, Viet Nam e-mail: [email protected] S. Upasani Department of Electronics and Communication Engineering, Delhi Technological University, Delhi, India e-mail: [email protected] A. Arora (&) Department of Electrical Engineering, Delhi Technological University, Delhi, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 N. Sharma et al. (eds.), Data Management, Analytics and Innovation, Advances in Intelligent Systems and Computing 1042, https://doi.org/10.1007/978-981-32-9949-8_1

3

4

A. Kumar et al.

1 Introduction Online advertising has become an important source of revenue for a wide range of businesses. With the tremendous growth in online advertising each year, it has also taken over a major area of research. Most of the revenues generated by widely used search engines as well as prevalent websites come from advertisements. It is therefore important to display relevant advertisements (ads) to the users and avoid the advertisements that are often disliked by them. Online advertising is more economical than traditional ways of advertising like mass markets and niche media. Internet ads have a wider audience and can be viewed for days and nights altogether, in contrast to ads on television and radios that last for shorter durations and are displayed with limited frequency. Market segmentation is much more effective over the Internet than in any other medium. Thorough study of markets, customer preferences and habits and segmenting consumers into cohesive groups can be done efficiently through online advertising. Online advertising also offers small businesses numerous benefits like robust targeting, consumer insights and more effective return on investment. Advertisements fall into two broad categories—sponsored search advertisements and contextual advertisements. Sponsored search ads are displayed on the same web pages that show results of search queries entered by users. The core purpose behind sponsored advertising is to enhance the advertiser’s brand image as the ads displayed have the same form and qualities as the advertiser’s original content. Contextual advertising, on the other hand, uses automated systems that display ads relevant to the user’s identity and website’s content. Google AdSense is one of the many well-known examples of contextual advertising. Google robots display only those ads that the users find relevant and useful. When a user visits a website, features like ad size, ad placement, etc. are extracted from the search query and sent to a server. Relevant ads are selected based on user’s past history, CTR and other data. Increasing the number of ads is not a good idea as it will shoot up the earnings only for a short time before the user switches to other search engines due to poor user experience. To maximize revenue, precise placements of ads are therefore required. CTR refers to the number of times the advertiser’s ad has been clicked (clicks) divided by number of times the ad appears on the screen (impression). Relevant placement of ad is a precondition for increasing the CTR for it. Ad performance can also be measured using CTR. CTR determination has several issues associated with it. The advertisers need to pay every time whenever an ad is clicked. It is on the basis of CTR that the search engine decides what ads are to be displayed and in what order of appearance. This is ensured by combining together the likelihood of an ad being clicked and the cost of the ad per click to create a display format that will yield maximum return. Many algorithms based on the supervised methodology have been designed to predict the CTR of advertisements like support vector machines, decision trees, Naïve Bayes, etc. Motivated by this, the goal is to analyse and assess the application of unsupervised approach namely FCM for determining the CTR of an advertisement. This

Empirical Study of Soft Clustering Technique for Determining …

5

clustering algorithm divides the total ads in the dataset into broad clusters based on whether they have been clicked or not by the user. This classification of ads helps in assessing the kind of advertisements that the user is really interested in and hence predict more of these kinds of ads. This would, in turn, result in a rise in the CTR of the displayed ads because of a greater number of clicks. The results obtained from FCM have been contrasted with KMC which has been used as a baseline model. The two techniques are assessed based on metrics like precision, recall and accuracy. The following content is compiled as follows: Sect. 2 reviews work done by various researchers along with the brief idea of the algorithm used by them and their results. Section 3 elaborates the dataset taken, methods employed for preparing the data before implementing the algorithm and the algorithms used. The scrutiny of the experimental outcomes is done in the Sect. 4. Section 5 culminates the results along with the suggestions for future research prospects.

2 Related Work After a thorough assessment of various studies in the past, it was found that a lot of algorithms have been proposed for the prediction of relevant ad to be displayed to the user. The author Avila Clemenshia et al. [1] in 2016, proposed a CTR prediction model using Poisson’s regression, linear regression and support vector regression algorithms and displayed the ads accordingly. The dataset was provided by a digital marketing agency. Their results stated that support vector regression performed best among the three. Evaluation of the results was done on the basis of root mean squared error (RMSE) and correlation coefficient. Authors Graepel et al. [2] in 2010 devised a new Bayesian CTR algorithm. The ad predictor presented showed better outcomes when compared to the baseline Naïve Bayes in terms of relative information gain (RIG) and areas under the curve (AUC). Hillard et al. [3] in 2010, implemented a model for estimating ad relevance. They refined it by including indirect feedback after consolidating the basic features of text overlap. In case of presence of adequate observations, click history was used. In case of no or few observations, a model was learned that could also be used for unpredicted ads. The precision, recall and f-score values were noted and improvement was observed with the new model. A logistic regression approach was suggested by author Kondakindi et al. [4] in 2014, to predict whether an ad will be clicked or not. The dataset used for this purpose was from Avazu provided as a part of Kaggle competition. They started off with simple Naive Bayes followed by Vowpal Wabbit and finally got the best scores with logistic regression together with proper data preprocessing. Shi et al. [5] in 2016, designed a framework for prediction of CTR and average cost per click (CPC) of a keyword using some machine learning algorithms. The performance data for the advertiser’s keywords was gathered from Google AdWords. The author had applied different machine learning algorithms such as regression, random forest

6

A. Kumar et al.

and gradient boosting to evaluate the prediction performance on both CTR and CPC. Results concluded that random forest transpires to be the best for both the metrics while gradient descent results are least reliable. Wang et al. [6] in 2011, implemented a model for learning of user’s click behaviours from advertisement search and click logs. Decision tree (DT), CRF, SVM and backpropagation neural networks (BPN) are the algorithms which were employed to carry out the imposition. The experimentation finally led to proving that CRF model outperformed the two baselines and SVM remarkably. Chakrabarti et al. [7] in 2008, developed a model for contextual advertising in which the revenue accrued by the site publisher and the advertising network depends upon the suitability of the ads displayed. This was followed by mapping the model to standard cosine similarity matching. Cheng et al. [8] in 2010, developed the model for customization of click models in sponsored search. The results demonstrated that the accuracy of CTR could significantly be improved by personalized models in sponsored advertising. Edizel* et al. [9] in 2017, proposed the use of that deep convolutional neural networks for CTR prediction of an advertisement. One approach involved query-ad depiction being learned at character while the second entail word-level model by pretrained word vectors. The conclusion signified better outcome than the standard machine learning algorithms trained with well-defined features. The analysis of the background work clearly connotes that most of the algorithm used in the past are supervised classification algorithms that involves two classes namely clicked and not clicked-demonstrating whether advertisement was clicked or not. The study of unsupervised clustering is still not much discovered in this domain to the extent of our understanding. This research paper is an endeavour to compare FCM and KMC algorithm using the dataset.

3 Data Characteristics The following Fig. 1 demonstrates the system architecture of the research. The following subsection explains the details.

3.1

Data Collection

The dataset is acquired from Avazu (Kaggle) for the purpose of writing this paper. It contains 11 days’ worth of data in order to build and test prediction models using various machine learning algorithms. As the given data is approximately 6 GB, the data taken was 10 h of data for training and 2 h of data for testing. The data is ordered chronologically and the clicks and non-clicks are sampled according to different strategies.

Empirical Study of Soft Clustering Technique for Determining …

Fig. 1 System architecture

The following features are included in the dataset: • id (unique id to identify advertisement) • click (0 for not clicked and 1 for clicked)

7

8

A. Kumar et al.

• hour (in format of YYMMDDHH; it refers to the date and time the data is recorded) • banner_pos (0 for top and 1 for bottom) • site_id (refers to the website id) • site_domain (website domain id) • site_category (category to which website belongs) • app_id (app id) • app_domain (app domain) • app_category (class to which app belongs) • device_id (id of device from which ad was clicked • device_ip (ip address of the device) • device_model (model number of device) • device_type (mobile/laptop/desktop) • device_conn_type(internet connection type-wifi/mobile data) • C1 and C14–C21 (anonymized categorical variables).

3.2

Preprocessing of Data

The class attribute is removed owing to the fact that unsupervised clustering is the technique applied which will learn from the data and classify it into two clusters. The dataset contains features in both integer and string format. In order to carry out the implementation, conversion of strings into integer is done. Pandas package in Python is used to load the csv file, i.e. the raw dataset into memory, identify the columns with string values and convert them into integer values using python standard hash function. Feature scaling is done with the help of scikit-learn library in python in the case of KMC. It is done in order to ensure fast convergence to the optimal solution and normalize the range of variables.

3.3

Implementation of Machine Learning Algorithms

The following section explains the clustering algorithm used. K-means Clustering: It is one of the most straightforward learning algorithms available for unsupervised learning [10]. The procedure basically follows two main steps to classify the dataset into k clusters. The number of clusters are fixed apriori. The algorithm starts by defining k cluster centers. Each value in the dataset is then associated to its nearest cluster. This is followed by a recalculation of the k cluster centers. A new binding is done between discrete units of information in the dataset and the new cluster centers and these steps are repeated till all units have been assigned to their respective clusters.

Empirical Study of Soft Clustering Technique for Determining …

9

The pseudocode is given as follows (Fig. 2): X = {x1, x2 …xn} be the collection of observations and u = {u1, u2 …uc} are the cluster centroids. We arbitrarily select ‘c’ cluster centers (1). Then, the distance

Fig. 2 Pseudocode for k-means clustering

10

A. Kumar et al.

between each observation in dataset and center is calculated. Following this, each observation is assigned to that cluster for which the distance between the observation and the center is least from all the available centers (2). This assignment step is followed by a recalculation of the cluster centers (3) by executing step 1 again. If all observations belong to the clusters calculated in the previous iteration, then the algorithm is terminated.

Fig. 3 Pseudocode for fuzzy c-means clustering

Empirical Study of Soft Clustering Technique for Determining …

11

Fuzzy C-Means Clustering: FCM is also referred to as soft clustering [11]. Each observation can be a part of more than one cluster at the same time. The distance between each cluster center and value in the dataset is evaluated and based on this distance, the degree of membership is assigned to each observation. A higher degree of membership towards a cluster means that the observation is closer to that cluster center than compared to the rest of the clusters. The summation of the degree of membership of each point in dataset equals to one. Data points belong to distinct clusters in hard or non-fuzzy clustering. The degree of membership assigned to each observation plays a pivotal role here. This denotes the extent to which an observation belongs to each cluster. As we move from center to the boundary of the cluster, the degree of belongingness of the observation decreases. The pseudocode for FCM is as follows (Fig. 3). Let X = {x1, x2, x3 …, xn} be the collection of discrete units in dataset and V = {c1, c2, c3 …, ck} be the centers. Select ‘k’ cluster centers and initialize the membership matrix in step (1). Compute the centers ‘cj’ in step (2). Calculate the membership ‘µij’ in the membership matrix using step (3). Repeat step (2) and (3) until the smallest value of J is obtained.

4 Results and Analysis The results were analysed using the accuracy, precision and recall [12] as an efficacy criterion. Accuracy is the measure of the closeness of the predicted observations to the actual value. It is the ratio of rightly predicted inspections to the total inspections made. Higher value of accuracy indicates more true positives and true negatives. Precision refers to the correctness of a model. It is simply the ratio of all the precisely predicted positives to the total number of positives predicted. More the number of true positives implies more precision. Recall is a measure of responsiveness or sensitivity of a machine model. It is the ratio of the correctly predicted positives to the count of values that belong to the class ‘yes’. Recall and precision are inversely related. The following Table 1 depicts the performance analysis of FCM and KMC. As Table 1 shows the accuracy, recall and precision values obtained for the two clusters, i.e. clicks/non-clicks predictions for the users is higher for FCM than for

Table 1 Comparison of results for k means and fuzzy c-means clustering

Accuracy Precision Recall

k-means Cluster 0

Cluster 1

Fuzzy c-means Cluster 0

Cluster 1

43.85438544 15.62280084 52.05182649

43.85438544 81.0428737 42.16809357

76.61767177 17.12049388 91.03165299

76.61767177 83.51293103 9.345230918

12

A. Kumar et al.

Fig. 4 Results

KMC. This means that the rightly predicted true positives and true negatives (accuracy), the degree of exactness (precision) and degree of completeness (recall) are relatively higher for FCM than for KMC. Both the algorithms divide the data into two clusters, Cluster 0 and Cluster 1, which in turn represent a division of the dataset into two categories (Fig. 4). These categories are based on click/non-click classification for the ads, i.e. one cluster has all the ads clicked by the user. The other cluster has all ads which were not clicked by him. This gives a clear idea of the type of ads the user is inquisitive about and willing to click on. After the classification of the ads in the dataset into categories—‘Click’ and ‘Non-Click’, we get a fair estimate of the kind of advertisements the user really wants to see. We can thereby predict more of such ads, hence increasing the CTR for the same. The number of ‘clicks’ divided by the total number of times the ad is displayed, i.e. ‘impressions’ gives the CTR.

5 Conclusion This paper compares the CTR as assessed by KMC and FCM algorithms. The outcome shows that FCM achieves better values of performance metrics than KMC. The results are better because it considers the fact that each data point can lie in more than one cluster and involves complex calculation of membership matrix. Conventional KMC, on the other hand, relies on hard clustering and definitively assigns each data point to the clusters. The accuracy of the model can further be improved by assessing the shape of the clusters, including other more refined attribute selection and extraction methods that could assist in better modelling of the present system. Attribute selection is

Empirical Study of Soft Clustering Technique for Determining …

13

concerned with selecting a subgroup of valid features for model selection whereas attribute extraction means deriving attributes from the already existing ones for subsequent learning. Superior results could be obtained by enhancing fuzziness coefficient. The degree of overlap between clusters is determined by the fuzziness coefficient. Higher value of m means larger overlapping between clusters. There exists a vast scope of application of other soft computing methodologies also, like swarm optimization, etc. that can be applied for determining CTR for other datasets as well.

References 1. Avila Clemenshia, P., Vijaya, M.S.: Click through rate prediction for display advertisement. Int. J. Comput. Appl. 975, 8887 (2016) 2. Graepel, T., Candela, J., Borchert, T., Herbrich, R.: Web-scale bayesian click-through rate prediction for sponsored search advertising in microsoft’s bing search engine. In: IJCA (2010) 3. Hillard, D., Schroedl, S., Manavoglu, E., Raghavan, H., Leggetter, C.: Im-proving ad relevance in sponsored search. In: ACM (2010) 4. Kondakindi, G., Rana, S., Rajkumar, A., Ponnekanti, S.K., Parakh, V.: A logistic regression approach to ad click prediction (2014) 5. Shi, L., Li, B.: Predict the click through rate and average cost per click for key-words using machine learning methodologies. In: IEOM (2016) 6. Wang., C.J., Chen, H.H.: Learning user behaviors for advertisements click predictions. In: ACM (2011) 7. Chakrabarti, D., Agarwal, D., Josifovski, V.: Contextual advertising by combining relevance with click feedback. In: WWW (2008) 8. Cheng, H., Cantú-Paz, E.: Personalized click prediction in sponsored search. In: ACM (2010) 9. Edizel, B., Mantrach, A., Bai, X.: Deep character-level click-through rate prediction for sponsored search. In: Stat.ml (2017) 10. Yadav, J., Sharma, M.: A review of K means algorithm. Int. J. Eng. Trends Technol. 4(7), 2972–2976 (2013) 11. Yanyun, C., Jianlin, Q., Xiang, G., Jianping, C., Dan, J., Li, C.: Advances in research of fuzzy c means algorithm. In: International Conference on Network Computing and Information Security (2011) 12. Bhatia, M.P.S., Kumar, A.: Information retrieval and machine learning: supporting technologies for web mining research and practice. Webology 5(2), 5 (2008)

ASK Approach: A Pre-migration Approach for Legacy Application Migration to Cloud Sanjeev Kumar Yadav, Akhil Khare and Choudhary Kavita

Abstract Legacy application migration is a mammoth task, if migration approach is not well thought at the very start, i.e. pre-migration, and supported by robust planning especially at pre-migration process area. This paper proposes a mathematical pre-migration approach, which will help the enterprise to analyse existing/ legacy application based on the application’s available information and parameters an enterprise would like to consider for analysis. Proposed pre-migration assessment will help in understanding the legacy application’s current state and will help in un-earthing the information with respect candidate application. Proposed pre-migration approach will help to take appropriate well-informed decision, whether to migrate or not to migrate the legacy application. As it is said that application migration is a journey, if kick-started once, needs to reach its destination else it can result into a disaster hence pre-migration is one of the important areas of migration journey.





Keywords Application migration ASK approach ASK confidence level (ACL) LAMP2C Legacy application Migration process Pre-migration









1 Introduction Technology paradigm is changing at fast pace, so is the customer requirement. In order to serve the fast-changing customer requirement is to keep abreast with ever-changing technology. Important is, if enterprise does not embrace or adopt S. K. Yadav (&)  C. Kavita Jayoti Vidyapeeth Women’s University, Jaipur, India e-mail: [email protected] C. Kavita e-mail: [email protected] A. Khare CSED MVSR Engineering College, Hyderabad, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2020 N. Sharma et al. (eds.), Data Management, Analytics and Innovation, Advances in Intelligent Systems and Computing 1042, https://doi.org/10.1007/978-981-32-9949-8_2

15

16

S. K. Yadav et al.

new or up-coming technology then enterprise may face challenges such as unavailability or shortage of skilled manpower as they would have moved to other latest technology, which will impact software and hardware maintenance cost (complex patching and modifications/enhancement) because scarcity of people in market with the required technology will increase the manpower cost and at the same time even the hardware will also become costly. All this may put application scalability, business continuity, customers’ experience and enterprise image [1] in jeopardize and may result in inability to meet current business needs. Each of the challenges identified may have direct or indirect impact on one or more factors. At times these identified factors seem to be interrelated, refer Fig. 2. There may be other factors, which may be enterprise or legacy application specific. Enterprises may be ardent and ready to adopt technology such as cloud computing, which delivers resource as virtualize service [2] and offers so many other benefits. However, the biggest challenge for an organization is that enterprise can’t discard the investment made in the past in terms of existing business critical and in-use applications including its infrastructure. These business-critical applications/ systems are referred as an asset. These assets are built or might have evolved over a span of 10–20 years; and have become core to business process, might have become complex and large enough to be understood by a person. Cloud computing offers multiple benefits which any enterprise will be interested in such as lower operating cost, no up-front investment and ease of maintenance. Fact is that cloud reduces capital expenditure by leveraging cloud business model of pay-as-you use, which turns capital expenditure to operation expenditure. As exiting applications cannot be discarded, so to embrace the new technology enterprise has below-mentioned three options for lasting benefits/goal, refer Fig. 1:

P r o g r e s s

Migrate Development Phase

Maintenance Phase

Initial Phase

Time Fig. 1 Software life cycle phases and modernisation options©

Replace & Re-develop

ASK Approach: A Pre-migration Approach for Legacy Application …

i. Application platform. ii. Application available in iii. Application again.

17

Migration—Migrate legacy application migration to new Replacement—Replace legacy application with off-the-shelf, market, application. Redevelopment—Redevelop the existing application all over

Two options, Option ii, i.e. Application replacement or option iii, i.e. Application redevelopment, does not seem to be feasible options because the existing business-critical application might have got developed with lot of effort, time and cost. Putting similar effort, cost and time all over again may not be feasible, so feasible option available with enterprise is option i, i.e. Application migration, which will help to migrate current application to new technology/ platform and embrace new technology, i.e. Cloud at the same time, will keep the business-critical application intact. Paper is organized in six sections. Section 2 provides the literature review, which provides background of related work. Section 3 defines the problem. Section 4 provides the detail about the proposed framework. Section 5 details the ASK approach. Finally, the paper concludes with Sect. 6, which presents the concluding comments and future scope.

2 Literature Review Cloud computing acceptance has increased over a period of time because of the benefits it brings in the area of operational and efficiency. Migration frameworks are proposed and are compared in the selected literature but none provides an end-to-end migration framework, especially in the pre-migration stage of the migration. The focus of literature review is to bring out any available pre-migration method/approach. Summary of literature studied and identified research gap in context of chosen topic of the paper are detailed below: Shoaib et al. [3] highlighted that due to technology advancement enterprises need to migrate from one platform to other, so existed framework was examined and reviewed. Based on this, the author is of view that multiple methods exists for migration and at the same time there are multiple risks involved during migration all these risks can be taken care if migration is performed properly. In this paper, the author describes different methods and frameworks which provides guideline for developers to enhance software migration process. As per the author, the focus area for migration is framework along with process and activities. The author concludes that there is research gap and need to be explored further. Musale et al. [4] provided basic knowledge about the migration concept and initial factors required to migrate to cloud. The paper also highlighted that could computing is an emerging technology and there is substantial scope of operational

18

S. K. Yadav et al.

and efficiency improvement. If IT application is migration to cloud or some of the processes are migration to cloud environment, off premises. The author puts forward the cloud migration concept and discusses the essential points for migration and further discusses the after migration essential. The author is of view that migration to cloud is an art than it is a science. Gholami et al. [5] highlighted that research around migrating legacy application to cloud has increased because of the adoption of cloud computing as an outsourcing strategy has grown in recent past. The author is of view that there is no integrated overarching cloud migration exists in current literature. In order to fulfil this gap, the author tries to propose cloud platform-independent conceptual view and reusable migration process, which has phases, activities and task. Validity of the proposed metamodel is demonstrated by analysing three existing cloud migration process models. Model can be extended by adding new constructs and can be customized for other migration paradigm. Sabiri et al. [6] , the authors said that enterprises adopting cloud is increasing because of the significant advantage cloud computing brings in; however, the migration (move) to cloud has challenges. The authors studied and compared the existing cloud migration methods to understand the strengths and weaknesses of each model based on Model-Driven Engineering (MDE) approach. The author proposed and explained a cloud migration method based on Architecture Driven Modernization (ADM), which focuses on architectural modes instead of code artefacts. Gouda et al. [7] highlighted that cloud migration can be of two types; either from on-site premises to the cloud or moving them from one cloud environment to another, where the information can be accessed over the Internet. The authors also highlighted that cloud migration is broadly classified into two categories, i.e. Big Bang Migration and Trickle Migration. The authors have suggested multiple cloud migration patterns or categories as their requirement. The authors also suggested migration to cloud-step wise approach or procedure which will help the user to successful and fruitful migration of its IT resources to cloud. Shawky [2] highlighted that in order to utilize cloud’s capability, the system should be migrated to cloud. The author also highlights that application migration to cloud leads multiple technical challenges and these challenges cannot be ignored. According to the author, the main challenge is mapping application to cloud services as multiple aspects need to be considered, which includes other system component dependencies. Rashmi and Sahoo [8], ‘A five-phased approach for cloud migration’; highlighted that cloud computing is the rapidly growing segment of IT. Organization is moving to cloud due to its long-term benefits but they are unsure about the migration process. The authors proposed a five-phased waterfall-based migration model to cloud having feedback path to earlier phase of the process but have not dwelled into the details of each phase of the proposed model. Pahl et al. [9] mentioned in this paper that though cloud computing has gained the attention, adoption of the technology is yet to gain acceptance as how to migrate to cloud is unanswered for many. Point in case is highlighted with the help of three provider-driven case studies and tries to extract common layer-specific migration

ASK Approach: A Pre-migration Approach for Legacy Application …

19

process. Highlights that no common procedures and tools are exiting, however, establish migration core elements such as activities and steps. Stavru et al. [10] acknowledged the fact that enterprises are unable to take full strategic and operational advantage as they are not able to migrate legacy application to cloud due to non-existence of mature process. The authors identified and extracted challenges with the help of systematic literature review. Using expert judgment, evaluates how different agile techniques, taken from Scrum and Extreme Programming (XP), could address or overcome the identified challenges in software modernization projects in specific context.

3 Problem Specification Challenge can be in terms of skilled resource’s scarcity, software maintenance cost, lack of software scalability, business continuousness, customers experience, reduced efficiencies, knowledge retention, enterprise image [1] and inability to meet current business needs. Each of the challenges identified may have direct or indirect impact on one or more factors, so identified impacted factors seem to be interrelated. Tried categorizing these challenges into the below category; refer Fig. 2. There may be other factors, which may at times be enterprise specific or legacy application specific. • Customer (a) Application inefficient in catering to business requirement will impact the enterprise interest. (b) Applications may become inefficient in catering to any area of customer requirement (customer can be internal and/or external) over time; in terms of functionality/feature(s) and better service. Inefficient application will provide an edge to competition. • Knowledge (a) Lack of in-depth knowledge in terms of understanding the existing system and its related process will or may have direct impact on the system maintenance, i.e. developing new functionality and enhancements. Customer

Fig. 2 System maintenance and enhancement challenges

Technlogy

Compliance

Knowledge

Resource

20

S. K. Yadav et al.

(b) Due to non-availability of knowledgeable resources will have difficulty in getting best practices shared with respect to these legacy applications, i.e. knowledge sharing. It will increase the risk of knowledge concentration amount small set of people. • Resources (a) Reducing resource pool (attrition) or resource pool desire to move onto market relevant technology will have direct impact on resource availability for the maintenance/enhancement of legacy application. (b) As legacy application knowledge gets concentrated into few resources, it will lead to increase in people retaining cost; related aspect will be increase cost of gaining resource in desired technology. (c) Contracted resource pool will have risk of high dependency, in terms of understanding the existing system and its related process on to a very small set of people in an organization. • Technology (a) Enterprise may have multiple technologies in use for existing business-critical applications, so maintaining them will have high cost because the legacy application might have become unsupported due to non-existence of support from the product vendor as they might have stopped supporting the in-use version or vendor might release new version, i.e. vendor moved ahead in technology. • Compliance (a) Legacy applications may become non-regulatory compliance over a period of time if no enhancement is made due to multiple reasons mentioned above. (b) Non-compliance to regulatory norms may have bigger impact than adopting new technology and moving legacy application to the technology. Challenges highlighted above are few of the challenge, many other challenges will come which will be application or enterprise-specific challenges. These challenges motivate to come up with a framework, which will help the enterprise to migrate legacy application to cloud in an efficient manner.

4 Proposed Framework Legacy application migration is a journey which requires a careful detailed planning irrespective of the size of the application identified for migration because no one-size-fit-approach will work in application migration. One of the biggest challenges an enterprise faces is the uncertainty of where to begin the migration process. If enterprises do not carefully plan, execute and monitor the transformation using

ASK Approach: A Pre-migration Approach for Legacy Application …

21

established processes [11] then migration can be fraught with pitfalls. Before we proceed further, it is essential to understand the reasons or trigger points for migration. At high level there are only two factors which trigger migration and these factors are either: Business Driven, Technology Driven or both. Whichever may the reason for migration, i.e. business and/or technology; one thing which will happen first is current portfolio analysis. Cloud computing concepts and approach itself is very different from the traditional software concepts and approach. In fact, moving to cloud is a serious step to take in a holistic manner [1], which required a careful elaborate planning for successful migration because cloud computing brings changes such as economic, legal, privacy/security, [1] etc. especially the pre-migration area of the migration process. Cloud covers all application layers, i.e. application (SaaS), platform (PaaS) and infrastructure (IaaS), which makes legacy application migration not a straightforward task as it looks like. Rashmi et al. [8], especially when migrating a legacy application, which is tightly coupled [12] as compared to cloud application. In order to address this issue, a framework is proposed called ‘Legacy Application Migration Process Framework to Cloud’; referred as LAMP2C, Fig. 3. LAMP2C migration framework acts as a guiding principle for migrating application to cloud and process to be followed while migrating legacy application. Scope of the proposed LAMP2C framework covers entire legacy application as shown in Fig. 3 and pre-migration is highlighted as ASK Approach is part and limited to the pre-migration area of the LAMP2C framework. Framework helps to plan the migration in an effective and efficient manner and it also helps in speeding up migration execution process with clear and hazel free migration path. LAMP2C, address pre-migration, migration and post-migration area of migration with an umbrella of governance area across three cloud layers. Framework is divided into area and area is further sub-divided into phases. The phases will have activities under it. LAMP2C—high-level framework is shown in Fig. 4.

Fig. 3 High-level framework

22 Fig. 4 LAMP2C constituents

S. K. Yadav et al.

Activities Phases Area

LAMP2C is a flexible framework, which can be tweaked as per the enterprise’s requirement as proposed framework does not force to follow the process end-to-end rather it suggests to go phased manner. One of the important parts of LAMP2C is the pre-migration area, which helps in evaluating existing portfolio or application which in turn helps an enterprise in understanding the complexity, challenges and efforts that will be required for application migration. It will also address the uncertainty of ‘where to begin’ and other than whether to migrate or not to migrate to the cloud. LAMP2C, Figs. 1 and 3 is copyright of the authors: Registration Number L-60550/2014.

5 Ask Approach It is assumed that at high level there are only two factors which can trigger migration and they are either technical or non-technical (business) parameter, so assessment and its parameters are also clubbed into these two categories only. Another assumption is that a) technical assessment should consider all the three cloud’s service model, i.e. IaaS, SaaS and PaaS; however, enterprise is free to choose one or more for assessment and their respective parameters. Parameters which cut across three models should be grouped into one as ‘Common Parameters’, as shown in Fig. 5. Common parameters are to avoid the consideration of same parameter(s) across three layers of service model, however it will depend upon individual, how they would like to perform the pre-migration analysis. b) Non-technical, i.e. business parameter are those parameters, which are not technical in nature should be considered as one group or as suitable. ASK Approach—a pre-migration assessment methodology is proposed to perform portfolio or application analysis under pre-migration are of LAMP2C framework. ASK Approach is an important constituent of the LAMP2C framework and its scope is limited to the pre-migration area of the LAMP2C framework as it

ASK Approach: A Pre-migration Approach for Legacy Application …

23

Fig. 5 Parameter identification area

Identify Parameters

ASK Point

ASK Confidence Level

ASK Belt

Plot Graph

Fig. 6 Pre-migration approach

provides inputs and helps in taking GO/No-Go decision with respect to legacy application migration to cloud. Proposed pre-migration assessment methodology is parameter based mathematical approach, which will be appropriate for any application identified for migration and will help enterprise to view and analyse the enterprises IT application portfolio in details based on parameters which are important for organization and application so assessment is carried out on any set of identified parameters under the mentioned category or both, i.e. technical and non-technical (business) aspect. Pre-migration approach can be divided into five steps, as shown in Fig. 6 and detailed in subsequent paras: As approach is parameter based, as a first step, all parameters and its sub-parameters needs to be identified. Each identified and considered parameter needs to be assigned the importance. Importance is rated between the range of 0.1, being the lowest to 5.0, being the highest, based on the parameter’s impact, as tabled below (Table 1):

Table 1 Impact rating range

Importance

Impact rating range

Very high High Neutral Low Very low

4.1–5.0 3.1–4.0 2.1–3.0 1.1–2.0 0.1–1.0

24

S. K. Yadav et al.

Assuming that there are n number of parameters namely C1, C2, C3 and so on till Cn. Based on parameters’ importance an impact rating between the range of 0.1–5.0 will be assigned for each parameter. Adding all these integrals and dividing them by the total number of parameters (in this case n) considered for analysis will give us the mean value of the data, which is being referred as ‘ASK Point’ (ASKP), i.e. lc . R ASKP ¼ lc ¼

C1 þ

R

C2 þ

R

C3 þ n

R

C4 . . . þ

R

Cn

ASKP ¼ lc ¼ Parameters'Mean n ¼ Number of parameters i ¼ Importance of parameter In reduced form the above formula can be written as follows: n R X Cn ASKP ¼ lc ¼ n 1

Considering the same data calculate the standard, which will be referred as ASK Confidence Level (ACL). ACL will be calculated by adding the squares of the values found from subtracting the ASKP from each parametric value. This summed value is divided by the total number of parameters. This will give us the standard deviation rc , i.e. ACL. R 2 R 2 R 2 R 2 C1  lc þ C2  lc þ C3  lc þ    Cn  lc ACL ¼ rc ¼ n

ACL ¼ rc ¼ Parameters' Standard Deviation ASKP ¼ lc ¼ Parameters'Mean n ¼ Number of parameters In reduced form the above formula can be rewritten as follows: ACL ¼ rc ¼

n X 1

R

C n  lc n

2

In order to generate boundary for the identified parameter, which is going to be referred as ASK Belt (ASKB). ASKP and ACL will help to build ASK Belt. ASKB will have two components a) ASKB Right, i.e. ASKBR and b) ASKB Left, i.e. ASKBL. ASKBR and ASKBL can be calculated as shown below: ASKBR ¼ ASKP þ ACL ASKBL ¼ ASKP  ACL

ASK Approach: A Pre-migration Approach for Legacy Application …

25

Once, ASKP, ACL and ASKB (ASKBR and ASKBL); bell curve can be calculated using the below formula (Gaussian equation) ðxlc Þ2 1 f ð xÞ ¼ pffiffiffiffiffiffiffiffiffiffi e 2rc 2pr2c

The following are the value for the above formula: p = 3.14 e = 2.71 and x = Parameter Impact lc = ASKP rc = ACL As fifth and the last step; calculate various other values required in the Gaussian function. The parameters have been arranged in the ascending order of the impact rating for facilitating the plotting process. Plotting the above f ð xÞ values versus x values, we get the following bell curve (as defined by the Gaussian function), refer Fig. 7. Points which falls between ASKBR and ASKBL can be safely considered for legacy application migration, however, points which fall outside the belt need to be re-looked and considered with caution. These inputs will provide enough data points to conclude as to Go ahead with the legacy application migration or still there are points/parameters, which need to be re-looked at. And will provide inputs to come up with migration plan.

Fig. 7 Bell curve

26

S. K. Yadav et al.

Источник: [https://torrent-igruha.org/3551-portal.html]
Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number

Debian Bug report logs - #777439
Jessie DI-rc1 amd64 after installation no network interfaces

Reported by: Heiko Ernst <heiko.ernst@aschershain.de>

Date: Sun, 8 Feb 2015 09:27:01 UTC

Severity: important

Tags: bullseye, buster, d-i, jessie, sid, stretch

Merged with 694068, 727740

Found in version netcfg/1.102

Blocking fix for 696755: installation-reports: no network connection after reboot if only tasksel's standard and ssh-server

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to :
; Package . (Sun, 08 Feb 2015 09:27:05 GMT) (full text, mbox, link).


Acknowledgement sent to :
New Bug report received and forwarded. Copy sent to . (Sun, 08 Feb 2015 09:27:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Heiko Ernst <heiko.ernst@aschershain.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: Jessie DI-rc1 amd64 after installation no network interfaces
Date: Sun, 08 Feb 2015 10:24:16 +0100
Package: installation-reports Severity: critical Tags: newcomer Hello. After installation Debian Jessie with the debian jessie di-rc1 network installer I have no notwork interfaces after boot the installed system. My Laptop is a ASUS PRO7BSV. I have use my wlan to install and download the packages from the internet, but after the installation, no network cards with ifconfig found. After installation my /etc/network/interfaces # This file describes the network interfaces available on your system # and how to activate them. For more information, see interfaces(5). # The loopback network interface auto lo iface lo inet loopback -- Package-specific info: Boot method: Image version: Date: <Date and time of the install> Machine: Partitions: <df -Tl will do; the raw partition table is preferred> Base System Installation Checklist: [O] = OK, [E] = Error (please elaborate below), [ ] = didn't try it Initial boot: [ ] Detect network card: [ ] Configure network: [ ] Detect CD: [ ] Load installer modules: [ ] Clock/timezone setup: [ ] User/password setup: [ ] Detect hard drives: [ ] Partition hard drives: [ ] Install base system: [ ] Install tasks: [ ] Install boot loader: [ ] Overall install: [ ] Comments/Problems: <Description of the install, in prose, and any thoughts, comments and ideas you had during the initial install.> -- Please make sure that the hardware-summary log file, and any other installation logs that you think would be useful are attached to this report. Please compress large files using gzip. Once you have filled out this report, mail it to submit@bugs.debian.org. ============================================== Installer lsb-release: ============================================== DISTRIB_ID=Debian DISTRIB_DESCRIPTION="Debian GNU/Linux installer" DISTRIB_RELEASE="8 (jessie) - installer build 20131124-00:05" X_INSTALLATION_MEDIUM=cdrom ============================================== Installer hardware-summary: ============================================== uname -a: Linux debian 3.11-2-amd64 #1 SMP Debian 3.11.8-1 (2013-11-13) x86_64 GNU/Linux lspci -knn: 00:00.0 Host bridge [0600]: Intel Corporation 5520/5500/X58 I/O Hub to ESI Port [8086:3405] (rev 13) lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:836b] lspci -knn: 00:01.0 PCI bridge [0604]: Intel Corporation 5520/5500/X58 I/O Hub PCI Express Root Port 1 [8086:3408] (rev 13) lspci -knn: Kernel driver in use: pcieport lspci -knn: 00:03.0 PCI bridge [0604]: Intel Corporation 5520/5500/X58 I/O Hub PCI Express Root Port 3 [8086:340a] (rev 13) lspci -knn: Kernel driver in use: pcieport lspci -knn: 00:07.0 PCI bridge [0604]: Intel Corporation 5520/5500/X58 I/O Hub PCI Express Root Port 7 [8086:340e] (rev 13) lspci -knn: Kernel driver in use: pcieport lspci -knn: 00:14.0 PIC [0800]: Intel Corporation 7500/5520/5500/X58 I/O Hub System Management Registers [8086:342e] (rev 13) lspci -knn: 00:14.1 PIC [0800]: Intel Corporation 7500/5520/5500/X58 I/O Hub GPIO and Scratch Pad Registers [8086:3422] (rev 13) lspci -knn: 00:14.2 PIC [0800]: Intel Corporation 7500/5520/5500/X58 I/O Hub Control Status and RAS Registers [8086:3423] (rev 13) lspci -knn: 00:14.3 PIC [0800]: Intel Corporation 7500/5520/5500/X58 I/O Hub Throttle Registers [8086:3438] (rev 13) lspci -knn: 00:1a.0 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB UHCI Controller #4 [8086:3a37] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: uhci_hcd lspci -knn: 00:1a.1 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB UHCI Controller #5 [8086:3a38] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: uhci_hcd lspci -knn: 00:1a.2 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB UHCI Controller #6 [8086:3a39] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: uhci_hcd lspci -knn: 00:1a.7 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB2 EHCI Controller #2 [8086:3a3c] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: ehci-pci lspci -knn: 00:1b.0 Audio device [0403]: Intel Corporation 82801JI (ICH10 Family) HD Audio Controller [8086:3a3e] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82ea] lspci -knn: 00:1c.0 PCI bridge [0604]: Intel Corporation 82801JI (ICH10 Family) PCI Express Root Port 1 [8086:3a40] lspci -knn: Kernel driver in use: pcieport lspci -knn: 00:1c.2 PCI bridge [0604]: Intel Corporation 82801JI (ICH10 Family) PCI Express Root Port 3 [8086:3a44] lspci -knn: Kernel driver in use: pcieport lspci -knn: 00:1c.4 PCI bridge [0604]: Intel Corporation 82801JI (ICH10 Family) PCI Express Root Port 5 [8086:3a48] lspci -knn: Kernel driver in use: pcieport lspci -knn: 00:1d.0 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB UHCI Controller #1 [8086:3a34] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: uhci_hcd lspci -knn: 00:1d.1 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB UHCI Controller #2 [8086:3a35] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: uhci_hcd lspci -knn: 00:1d.2 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB UHCI Controller #3 [8086:3a36] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: uhci_hcd lspci -knn: 00:1d.7 USB controller [0c03]: Intel Corporation 82801JI (ICH10 Family) USB2 EHCI Controller #1 [8086:3a3a] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: ehci-pci lspci -knn: 00:1e.0 PCI bridge [0604]: Intel Corporation 82801 PCI Bridge [8086:244e] (rev 90) lspci -knn: 00:1f.0 ISA bridge [0601]: Intel Corporation 82801JIR (ICH10R) LPC Interface Controller [8086:3a16] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: 00:1f.2 SATA controller [0106]: Intel Corporation 82801JI (ICH10 Family) SATA AHCI Controller [8086:3a22] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: Kernel driver in use: ahci lspci -knn: 00:1f.3 SMBus [0c05]: Intel Corporation 82801JI (ICH10 Family) SMBus Controller [8086:3a30] lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:82d4] lspci -knn: 02:00.0 VGA compatible controller [0300]: NVIDIA Corporation GF114 [GeForce GTX 560] [10de:1201] (rev a1) lspci -knn: Subsystem: ZOTAC International (MCO) Ltd. Device [19da:3227] lspci -knn: 02:00.1 Audio device [0403]: NVIDIA Corporation GF114 HDMI Audio Controller [10de:0e0c] (rev a1) lspci -knn: Subsystem: ZOTAC International (MCO) Ltd. Device [19da:3227] lspci -knn: 04:00.0 SATA controller [0106]: JMicron Technology Corp. JMB363 SATA/IDE Controller [197b:2363] (rev 03) lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:824f] lspci -knn: Kernel driver in use: ahci lspci -knn: 04:00.1 IDE interface [0101]: JMicron Technology Corp. JMB363 SATA/IDE Controller [197b:2363] (rev 03) lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:824f] lspci -knn: Kernel driver in use: pata_jmicron lspci -knn: 05:00.0 Ethernet controller [0200]: Marvell Technology Group Ltd. 88E8056 PCI-E Gigabit Ethernet Controller [11ab:4364] (rev 12) lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:81f8] lspci -knn: Kernel driver in use: sky2 lspci -knn: 07:00.0 Network controller [0280]: Techsan Electronics Co Ltd B2C2 FlexCopII DVB chip / Technisat SkyStar2 DVB card [13d0:2103] (rev 02) lspci -knn: Subsystem: Techsan Electronics Co Ltd B2C2 FlexCopII DVB chip / Technisat SkyStar2 DVB card [13d0:2103] lspci -knn: 07:02.0 FireWire (IEEE 1394) [0c00]: VIA Technologies, Inc. VT6306/7/8 [Fire II(M)] IEEE 1394 OHCI Controller [1106:3044] (rev c0) lspci -knn: Subsystem: ASUSTeK Computer Inc. Device [1043:81fe] lspci -knn: Kernel driver in use: firewire_ohci lspci -knn: ff:00.0 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 QuickPath Architecture Generic Non-Core Registers [8086:2c41] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:00.1 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 QuickPath Architecture System Address Decoder [8086:2c01] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:02.0 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 QPI Link 0 [8086:2c10] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:02.1 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 QPI Physical 0 [8086:2c11] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:03.0 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller [8086:2c18] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:03.1 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Target Address Decoder [8086:2c19] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:03.4 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Test Registers [8086:2c1c] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:04.0 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 0 Control Registers [8086:2c20] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:04.1 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 0 Address Registers [8086:2c21] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:04.2 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 0 Rank Registers [8086:2c22] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:04.3 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 0 Thermal Control Registers [8086:2c23] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:05.0 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 1 Control Registers [8086:2c28] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:05.1 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 1 Address Registers [8086:2c29] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:05.2 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 1 Rank Registers [8086:2c2a] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:05.3 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 1 Thermal Control Registers [8086:2c2b] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:06.0 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 2 Control Registers [8086:2c30] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:06.1 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 2 Address Registers [8086:2c31] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:06.2 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 2 Rank Registers [8086:2c32] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] lspci -knn: ff:06.3 Host bridge [0600]: Intel Corporation Xeon 5500/Core i7 Integrated Memory Controller Channel 2 Thermal Control Registers [8086:2c33] (rev 05) lspci -knn: Subsystem: Intel Corporation Device [8086:8086] usb-list: usb-list: Bus 01 Device 01: UHCI Host Controller [1d6b:0001] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.11-2-amd64 uhci_hcd usb-list: Interface 00: Class 09(hub ) Subclass 00 Protocol 00 Driver hub usb-list: usb-list: Bus 01 Device 26: USB Optical Mouse [046d:c05a] usb-list: Level 01 Parent 01 Port 01 Class 00(>ifc ) Subclass 00 Protocol 00 usb-list: Manufacturer: Logitech usb-list: Interface 00: Class 03(HID ) Subclass 01 Protocol 02 Driver usbhid usb-list: usb-list: Bus 02 Device 01: UHCI Host Controller [1d6b:0001] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.11-2-amd64 uhci_hcd usb-list: Interface 00: Class 09(hub ) Subclass 00 Protocol 00 Driver hub usb-list: usb-list: Bus 03 Device 01: UHCI Host Controller [1d6b:0001] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.11-2-amd64 uhci_hcd usb-list: Interface 00: Class 09(hub ) Subclass 00 Protocol 00 Driver hub usb-list: usb-list: Bus 04 Device 01: UHCI Host Controller [1d6b:0001] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.11-2-amd64 uhci_hcd usb-list: Interface 00: Class 09(hub ) Subclass 00 Protocol 00 Driver hub usb-list: usb-list: Bus 05 Device 01: UHCI Host Controller [1d6b:0001] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.11-2-amd64 uhci_hcd usb-list: Interface 00: Class 09(hub ) Subclass 00 Protocol 00 Driver hub usb-list: usb-list: Bus 06 Device 01: UHCI Host Controller [1d6b:0001] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.11-2-amd64 uhci_hcd usb-list: Interface 00: Class 09(hub ) Subclass 00 Protocol 00 Driver hub usb-list: usb-list: Bus 07 Device 01: EHCI Host Controller [1d6b:0002] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.11-2-amd64 ehci_hcd usb-list: Interface 00: Class 09(hub ) Subclass 00 Protocol 00 Driver hub usb-list: usb-list: Bus 08 Device 01: EHCI Host Controller [1d6b:0002] usb-list: Level 00 Parent 00 Port 00 Class 09(hub ) Subclass 00 Protocol 00 usb-list: Manufacturer: Linux 3.static/dev df: devtmpfs 3056096 0 3056096 0% /target/dev free: total used free shared buffers free: Mem: 6120296 1189592 4930704 0 99244 free: -/+ buffers: 1090348 5029948 free: Swap: 12564476 0 12564476 /proc/cmdline: vga=788 initrd=/install.amd/initrd.gz -- quiet BOOT_IMAGE=/install.amd/vmlinuz /proc/cpuinfo: processor : 0 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 0 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 0 /proc/cpuinfo: initial apicid : 0 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/cpuinfo: processor : 1 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 1 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 2 /proc/cpuinfo: initial apicid : 2 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/cpuinfo: processor : 2 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 2 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 4 /proc/cpuinfo: initial apicid : 4 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/cpuinfo: processor : 3 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 3 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 6 /proc/cpuinfo: initial apicid : 6 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/cpuinfo: processor : 4 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 0 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 1 /proc/cpuinfo: initial apicid : 1 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/cpuinfo: processor : 5 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 1 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 3 /proc/cpuinfo: initial apicid : 3 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/cpuinfo: processor : 6 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 2 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 5 /proc/cpuinfo: initial apicid : 5 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/cpuinfo: processor : 7 /proc/cpuinfo: vendor_id : GenuineIntel /proc/cpuinfo: cpu family : 6 /proc/cpuinfo: model : 26 /proc/cpuinfo: model name : Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz /proc/cpuinfo: stepping : 5 /proc/cpuinfo: microcode : 0xf /proc/cpuinfo: cpu MHz : 2669.964 /proc/cpuinfo: cache size : 8192 KB /proc/cpuinfo: physical id : 0 /proc/cpuinfo: siblings : 8 /proc/cpuinfo: core id : 3 /proc/cpuinfo: cpu cores : 4 /proc/cpuinfo: apicid : 7 /proc/cpuinfo: initial apicid : 7 /proc/cpuinfo: fpu : yes /proc/cpuinfo: fpu_exception : yes /proc/cpuinfo: cpuid level : 11 /proc/cpuinfo: wp : yes /proc/cpuinfo: flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm sse4_1 sse4_2 popcnt lahf_lm ida dtherm tpr_shadow vnmi flexpriority ept vpid /proc/cpuinfo: bogomips : 5339.92 /proc/cpuinfo: clflush size : 64 /proc/cpuinfo: cache_alignment : 64 /proc/cpuinfo: address sizes : 36 bits physical, 48 bits virtual /proc/cpuinfo: power management: /proc/cpuinfo: /proc/ioports: 0000-0cf7 : PCI Bus 0000:00 /proc/ioports: 0000-001f : dma1 /proc/ioports: 0020-0021 : pic1 /proc/ioports: 0040-0043 : timer0 /proc/ioports: 0050-0053 : timer1 /proc/ioports: 0060-0060 : keyboard /proc/ioports: 0064-0064 : keyboard /proc/ioports: 0070-0071 : rtc0 /proc/ioports: 0080-008f : dma page reg /proc/ioports: 00a0-00a1 : pic2 /proc/ioports: 00c0-00df : dma2 /proc/ioports: 00f0-00ff : fpu /proc/ioports: 0290-029f : pnp 00:06 /proc/ioports: 03c0-03df : vesafb /proc/ioports: 0400-041f : 0000:00:1f.3 /proc/ioports: 04d0-04d1 : pnp 00:07 /proc/ioports: 0500-053f : 0000:00:1f.0 /proc/ioports: 0800-0803 : ACPI PM1a_EVT_BLK /proc/ioports: 0804-0805 : ACPI PM1a_CNT_BLK /proc/ioports: 0808-080b : ACPI PM_TMR /proc/ioports: 0810-0815 : ACPI CPU throttle /proc/ioports: 0820-082f : ACPI GPE0_BLK /proc/ioports: 0850-0850 : ACPI PM2_CNT_BLK /proc/ioports: 0cf8-0cff : PCI conf1 /proc/ioports: 0d00-ffff : PCI Bus 0000:00 /proc/ioports: 1000-1fff : PCI Bus 0000:06 /proc/ioports: 9400-941f : 0000:00:1f.2 /proc/ioports: 9400-941f : ahci /proc/ioports: 9480-9483 : 0000:00:1f.2 /proc/ioports: 9480-9483 : ahci /proc/ioports: 9800-9807 : 0000:00:1f.2 /proc/ioports: 9800-9807 : ahci /proc/ioports: 9880-9883 : 0000:00:1f.2 /proc/ioports: 9880-9883 : ahci /proc/ioports: 9c00-9c07 : 0000:00:1f.2 /proc/ioports: 9c00-9c07 : ahci /proc/ioports: a080-a09f : 0000:00:1d.0 /proc/ioports: a080-a09f : uhci_hcd /proc/ioports: a400-a41f : 0000:00:1d.1 /proc/ioports: a400-a41f : uhci_hcd /proc/ioports: a480-a49f : 0000:00:1d.2 /proc/ioports: a480-a49f : uhci_hcd /proc/ioports: a800-a81f : 0000:00:1a.0 /proc/ioports: a800-a81f : uhci_hcd /proc/ioports: a880-a89f : 0000:00:1a.1 /proc/ioports: a880-a89f : uhci_hcd /proc/ioports: ac00-ac1f : 0000:00:1a.2 /proc/ioports: ac00-ac1f : uhci_hcd /proc/ioports: b000-bfff : PCI Bus 0000:02 /proc/ioports: bc00-bc7f : 0000:02:00.0 /proc/ioports: c000-cfff : PCI Bus 0000:04 /proc/ioports: c400-c40f : 0000:04:00.1 /proc/ioports: c400-c40f : pata_jmicron /proc/ioports: c480-c483 : 0000:04:00.1 /proc/ioports: c480-c483 : pata_jmicron /proc/ioports: c800-c807 : 0000:04:00.1 /proc/ioports: c800-c807 : pata_jmicron /proc/ioports: c880-c883 : 0000:04:00.1 /proc/ioports: c880-c883 : pata_jmicron /proc/ioports: cc00-cc07 : 0000:04:00.1 /proc/ioports: cc00-cc07 : pata_jmicron /proc/ioports: d000-dfff : PCI Bus 0000:05 /proc/ioports: d800-d8ff : 0000:05:00.0 /proc/ioports: d800-d8ff : sky2 /proc/ioports: e000-efff : PCI Bus 0000:07 /proc/ioports: e880-e8ff : 0000:07:02.0 /proc/ioports: ec00-ec1f : 0000:07:00.0 /proc/iomem: 00000000-00000fff : reserved /proc/iomem: 00001000-0009ebff : System RAM /proc/iomem: 0009ec00-0009ffff : reserved /proc/iomem: 000a0000-000bffff : PCI Bus 0000:00 /proc/iomem: 000c0000-000c7fff : Video ROM /proc/iomem: 000d0000-000dffff : PCI Bus 0000:00 /proc/iomem: 000e4000-000fffff : reserved /proc/iomem: 000f0000-000fffff : System ROM /proc/iomem: 00100000-bf77ffff : System RAM /proc/iomem: 01000000-01486077 : Kernel code /proc/iomem: 01486078-018a4bff : Kernel data /proc/iomem: 0199e000-01a85fff : Kernel bss /proc/iomem: bf780000-bf797fff : ACPI Tables /proc/iomem: bf798000-bf7dbfff : ACPI Non-volatile Storage /proc/iomem: bf7dc000-bfffffff : reserved /proc/iomem: c0000000-dfffffff : PCI Bus 0000:00 /proc/iomem: c0000000-c03fffff : PCI Bus 0000:06 /proc/iomem: c0400000-c05fffff : PCI Bus 0000:05 /proc/iomem: c0600000-c07fffff : PCI Bus 0000:04 /proc/iomem: d4000000-dfffffff : PCI Bus 0000:02 /proc/iomem: d4000000-d7ffffff : 0000:02:00.0 /proc/iomem: d5000000-d5dfffff : vesafb /proc/iomem: d8000000-dfffffff : 0000:02:00.0 /proc/iomem: e0000000-efffffff : PCI MMCONFIG 0000 [bus 00-ff] /proc/iomem: e0000000-efffffff : pnp 00:0e /proc/iomem: f0000000-fed8ffff : PCI Bus 0000:00 /proc/iomem: f6f00000-f6ffffff : PCI Bus 0000:06 /proc/iomem: f7ff8000-f7ffbfff : 0000:00:1b.0 /proc/iomem: f7ffc000-f7ffc7ff : 0000:00:1f.2 /proc/iomem: f7ffc000-f7ffc7ff : ahci /proc/iomem: f7ffd000-f7ffd0ff : 0000:00:1f.3 /proc/iomem: f7ffe000-f7ffe3ff : 0000:00:1d.7 /proc/iomem: f7ffe000-f7ffe3ff : ehci_hcd /proc/iomem: f7fff000-f7fff3ff : 0000:00:1a.7 /proc/iomem: f7fff000-f7fff3ff : ehci_hcd /proc/iomem: f8000000-fbbfffff : PCI Bus 0000:02 /proc/iomem: f8000000-f9ffffff : 0000:02:00.0 /proc/iomem: fbb00000-fbb7ffff : 0000:02:00.0 /proc/iomem: fbbfc000-fbbfffff : 0000:02:00.1 /proc/iomem: fbc00000-fbcfffff : PCI Bus 0000:04 /proc/iomem: fbcfa000-fbcfbfff : 0000:04:00.0 /proc/iomem: fbcfa000-fbcfbfff : ahci /proc/iomem: fbd00000-fbdfffff : PCI Bus 0000:05 /proc/iomem: fbdc0000-fbddffff : 0000:05:00.0 /proc/iomem: fbdfc000-fbdfffff : 0000:05:00.0 /proc/iomem: fbdfc000-fbdfffff : sky2 /proc/iomem: fbe00000-fbefffff : PCI Bus 0000:07 /proc/iomem: fbeef000-fbeef7ff : 0000:07:02.0 /proc/iomem: fbeef000-fbeef7ff : firewire_ohci /proc/iomem: fbef0000-fbefffff : 0000:07:00.0-2/input0 /proc/bus/input/devices: S: Sysfs=/devices/pci0000:00/0000:00:1a.0/usb1/1-2/1-2:1.0/input/input25 /proc/bus/input/devices: U: Uniq= /proc/bus/input/devices: H: Handlers=mouse0 /proc/bus/input/devices: B: PROP=0 /proc/bus/input/devices: B: EV=17 /proc/bus/input/devices: B: KEY=70000 0 0 0 0 /proc/bus/input/devices: B: REL=103 /proc/bus/input/devices: B: MSC=10 /proc/bus/input/devices: -- System Information: Debian Release: 8.0 APT prefers testing-updates APT policy: (500, 'testing-updates'), (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)

Information forwarded to :
; Package . (Sun, 08 Feb 2015 09:42:04 GMT) (full text, mbox, link).


Acknowledgement sent to :
Extra info received and forwarded to list. Copy sent to . (Sun, 08 Feb 2015 09:42:04 GMT) (full text, mbox, link).


Message #10 received at 777439@bugs.debian.org (full text, mbox, reply):

From: Karsten Merker <merker@debian.org>
To: 777439@bugs.debian.org, 777439-submitter@bugs.debian.org
Subject: Re: Bug#777439: Jessie DI-rc1 amd64 after installation no network interfaces
Date: Sun, 8 Feb 2015 10:39:28 +0100
On Sun, Feb 08, 2015 at 10:24:16AM +0100, Heiko Ernst wrote: > Package: installation-reports > Severity: critical > Tags: newcomer > > Hello. > > After installation Debian Jessie with the debian jessie di-rc1 network > installer I have no notwork interfaces after boot the installed system. My > Laptop is a ASUS PRO7BSV. I have use my wlan to install and download the > packages from the internet, but after the installation, no network cards with > ifconfig found. > > After installation my /etc/network/interfaces > > # This file describes the network interfaces available on your system > # and how to activate them. For more information, see interfaces(5). > > # The loopback network interface > auto lo > iface lo inet loopback Hello, could you provide the output of the "dmesg" command on the installed system? Regards, Karsten -- Gem. Par. 28 Abs. 4 Bundesdatenschutzgesetz widerspreche ich der Nutzung sowie der Weitergabe meiner personenbezogenen Daten für Zwecke der Werbung sowie der Markt- oder Meinungsforschung.

Message sent on to :
Bug#777439. (Sun, 08 Feb 2015 09:42:08 GMT) (full text, mbox, link).


Information forwarded to :
; Package . (Sun, 08 Feb 2015 11:27:15 GMT) (full text, mbox, link).


Acknowledgement sent to :
Extra info received and forwarded to list. Copy sent to . (Sun, 08 Feb 2015 11:27:15 GMT) (full text, mbox, link).


Message #18 received at 777439@bugs.debian.org (full text, mbox, reply):

From: Heiko Ernst <heiko.ernst@aschershain.de>
To: Karsten Merker <merker@debian.org>, 777439@bugs.debian.org
Subject: Re: Bug#777439: Jessie DI-rc1 amd64 after installation no network interfaces
Date: Sun, 08 Feb 2015 12:23:28 +0100
Источник: [https://torrent-igruha.org/3551-portal.html]
.

What’s New in the Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number?

Screen Shot

System Requirements for Sorenson Squeeze Compression Suite v4.2.301 6 serial key or number

Add a Comment

Your email address will not be published. Required fields are marked *