Modeling Simulation and Visualization Methods 1st Edition Hamid R. Arabnia download
Modeling Simulation and Visualization Methods 1st Edition Hamid R. Arabnia download
https://ebookname.com/product/modeling-simulation-and-
visualization-methods-1st-edition-hamid-r-arabnia/
https://ebookname.com/product/information-and-knowledge-
engineering-1st-edition-hamid-r-arabnia-2/
https://ebookname.com/product/information-and-knowledge-
engineering-1st-edition-hamid-r-arabnia/
https://ebookname.com/product/software-engineering-research-and-
practice-1st-edition-hamid-r-arabnia/
https://ebookname.com/product/private-2-invitation-only-kate-
brian/
Bar Style Hotels and Members Clubs 1st Edition Howard
Watson
https://ebookname.com/product/bar-style-hotels-and-members-
clubs-1st-edition-howard-watson/
https://ebookname.com/product/common-pools-of-genetic-resources-
equity-and-innovation-in-international-biodiversity-law-1st-
edition-evanson-chege-kamau/
https://ebookname.com/product/the-conch-bearer-1st-aladdin-
paperback-ed-edition-chitra-banerjee-divakaruni/
https://ebookname.com/product/the-working-class-majority-america-
s-best-kept-secret-2nd-edition-michael-zweig/
https://ebookname.com/product/private-lives-public-deaths-
antigone-and-the-invention-of-individuality-1st-edition-jonathan-
strauss/
Fundamentals Of Polymer Engineering 2nd ed, rev. and
expanded Edition Anil Kumar
https://ebookname.com/product/fundamentals-of-polymer-
engineering-2nd-ed-rev-and-expanded-edition-anil-kumar/
PROCEEDINGS OF
THE 2017 INTERNATIONAL CONFERENCE ON
MODELING, SIMULATION & VISUALIZATION METHODS
Editors
Hamid R. Arabnia
Leonidas Deligiannidis, Fernando G. Tinetti
Associate Editors
Ashu M. G. Solo, Jane You
CSCE’17
July 17-20, 2017
Las Vegas Nevada, USA
americancse.org
©
CSREA Press
This volume contains papers presented at The 2017 International Conference on Modeling,
Simulation & Visualization Methods (MSV'17). Their inclusion in this publication does not
necessarily constitute endorsements by editors or by the publisher.
Copying without a fee is permitted provided that the copies are not made or distributed for direct
commercial advantage, and credit to source is given. Abstracting is permitted with credit to the
source. Please contact the publisher for other copying, reprint, or republication permission.
©
Copyright 2017 CSREA Press
ISBN: 1-60132-465-0
Printed in the United States of America
Foreword
It gives us great pleasure to introduce this collection of papers to be presented at the 2017 International
Conference on Modeling, Simulation and Visualization Methods (MSV’17), July 17-20, 2017, at Monte
Carlo Resort, Las Vegas, USA.
An important mission of the World Congress in Computer Science, Computer Engineering, and Applied
Computing, CSCE (a federated congress to which this conference is affiliated with) includes "Providing a
unique platform for a diverse community of constituents composed of scholars, researchers, developers,
educators, and practitioners. The Congress makes concerted effort to reach out to participants affiliated
with diverse entities (such as: universities, institutions, corporations, government agencies, and research
centers/labs) from all over the world. The congress also attempts to connect participants from institutions
that have teaching as their main mission with those who are affiliated with institutions that have research
as their main mission. The congress uses a quota system to achieve its institution and geography diversity
objectives." By any definition of diversity, this congress is among the most diverse scientific meeting in
USA. We are proud to report that this federated congress has authors and participants from 64 different
nations representing variety of personal and scientific experiences that arise from differences in culture and
values. As can be seen (see below), the program committee of this conference as well as the program
committee of all other tracks of the federated congress are as diverse as its authors and participants.
The program committee would like to thank all those who submitted papers for consideration. About 65%
of the submissions were from outside the United States. Each submitted paper was peer-reviewed by two
experts in the field for originality, significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee was charged to make the final decision;
often, this involved seeking help from additional referees. In addition, papers whose authors included a
member of the conference program committee were evaluated using the double-blinded review process.
One exception to the above evaluation process was for papers that were submitted directly to
chairs/organizers of pre-approved sessions/workshops; in these cases, the chairs/organizers were
responsible for the evaluation of such submissions. The overall paper acceptance rate for regular papers
was 25%; 19% of the remaining papers were accepted as poster papers (at the time of this writing, we had
not yet received the acceptance rate for a couple of individual tracks.)
We are very grateful to the many colleagues who offered their services in organizing the conference. In
particular, we would like to thank the members of Program Committee of MSV’17, members of the
congress Steering Committee, and members of the committees of federated congress tracks that have topics
within the scope of MSV. Many individuals listed below, will be requested after the conference to provide
their expertise and services for selecting papers for publication (extended versions) in journal special
issues as well as for publication in a set of research books (to be prepared for publishers including:
Springer, Elsevier, BMC journals, and others).
• Prof. Nizar Al-Holou (Congress Steering Committee); Professor and Chair, Electrical and Computer
Engineering Department; Vice Chair, IEEE/SEM-Computer Chapter; University of Detroit Mercy, Detroit,
Michigan, USA
• Prof. Hamid R. Arabnia (Congress Steering Committee); Graduate Program Director (PhD, MS, MAMS);
The University of Georgia, USA; Editor-in-Chief, Journal of Supercomputing (Springer);Fellow, Center of
Excellence in Terrorism, Resilience, Intelligence & Organized Crime Research (CENTRIC).
• Prof. Dr. Juan-Vicente Capella-Hernandez; Universitat Politecnica de Valencia (UPV), Department of
Computer Engineering (DISCA), Valencia, Spain
• Prof. Juan Jose Martinez Castillo; Director, The Acantelys Alan Turing Nikola Tesla Research Group and
GIPEB, Universidad Nacional Abierta, Venezuela
• Prof. Kevin Daimi (Congress Steering Committee); Director, Computer Science and Software Engineering
Programs, Department of Mathematics, Computer Science and Software Engineering, University of Detroit
Mercy, Detroit, Michigan, USA
• Prof. Zhangisina Gulnur Davletzhanovna (IPCV); Vice-rector of the Science, Central-Asian University,
Kazakhstan, Almaty, Republic of Kazakhstan; Vice President of International Academy of Informatization,
Kazskhstan, Almaty, Republic of Kazakhstan
• Prof. Leonidas Deligiannidis (Congress Steering Committee); Department of Computer Information Systems,
Wentworth Institute of Technology, Boston, Massachusetts, USA; Visiting Professor, MIT, USA
• Prof. Mary Mehrnoosh Eshaghian-Wilner (Congress Steering Committee); Professor of Engineering
Practice, University of Southern California, California, USA; Adjunct Professor, Electrical Engineering,
University of California Los Angeles, Los Angeles (UCLA), California, USA
• Prof. Byung-Gyu Kim (Congress Steering Committee); Multimedia Processing Communications
Lab.(MPCL), Department of Computer Science and Engineering, College of Engineering, SunMoon
University, South Korea
• Prof. Dr. Guoming Lai; Computer Science and Technology, Sun Yat-Sen University, Guangzhou, P. R. China
• Prof. Hyo Jong Lee (IPCV); Director, Center for Advanced Image and Information Technology, Division of
Computer Science and Engineering, Chonbuk National University, South Korea
• Dr. Muhammad Naufal Bin Mansor; Faculty of Engineering Technology, Department of Electrical,
Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia
• Dr. Andrew Marsh (Congress Steering Committee); CEO, HoIP Telecom Ltd (Healthcare over Internet
Protocol), UK; Secretary General of World Academy of BioMedical Sciences and Technologies (WABT) a
UNESCO NGO, The United Nations
• Prof. Aree Ali Mohammed; Head, Computer Science Department, University of Sulaimani, Kurdistan Region,
Iraq
• Dr. Ali Mostafaeipour; Industrial Engineering Department, Yazd University, Yazd, Iran
• Prof. Dr., Eng. Robert Ehimen Okonigene (Congress Steering Committee); Department of Electrical &
Electronics Engineering, Faculty of Engineering and Technology, Ambrose Alli University, Edo State,
Nigeria
• Prof. James J. (Jong Hyuk) Park (Congress Steering Committee); Department of Computer Science and
Engineering (DCSE), SeoulTech, Korea; President, FTRA, EiC, HCIS Springer, JoC, IJITCC; Head of
DCSE, SeoulTech, Korea
• Prof. Dr. R. Ponalagusamy; Department of Mathematics, National Institute of Technology, India
• Dr. Xuewei Qi; Research Faculty & PI, Center for Environmental Research and Technology, University of
California, Riverside, California, USA
• Dr. Akash Singh (Congress Steering Committee); IBM Corporation, Sacramento, California, USA;
Chartered Scientist, Science Council, UK; Fellow, British Computer Society; Member, Senior IEEE, AACR,
AAAS, and AAAI; IBM Corporation, USA
• Ashu M. G. Solo (Publicity), Fellow of British Computer Society, Principal/R&D Engineer, Maverick
Technologies America Inc.
• Prof. Dr. Ir. Sim Kok Swee; Fellow, IEM; Senior Member, IEEE; Faculty of Engineering and Technology,
Multimedia University, Melaka, Malaysia
• Prof. Fernando G. Tinetti (Congress Steering Committee); School of CS, Universidad Nacional de La Plata,
La Plata, Argentina; Co-editor, Journal of Computer Science and Technology (JCS&T).
• Dr. Haoxiang Harry Wang (CSCE); Cornell University, Ithaca, New York, USA; Founder and Director,
GoPerception Laboratory, New York, USA
• Prof. Shiuh-Jeng Wang (Congress Steering Committee); Director of Information Cryptology and
Construction Laboratory (ICCL) and Director of Chinese Cryptology and Information Security Association
(CCISA); Department of Information Management, Central Police University, Taoyuan, Taiwan; Guest Ed.,
IEEE Journal on Selected Areas in Communications.
• Prof. Layne T. Watson (Congress Steering Committee); Fellow of IEEE; Fellow of The National Institute of
Aerospace; Professor of Computer Science, Mathematics, and Aerospace and Ocean Engineering, Virginia
Polytechnic Institute & State University, Blacksburg, Virginia, USA
• Prof. Jane You (Congress Steering Committee); Associate Head, Department of Computing, The Hong Kong
Polytechnic University, Kowloon, Hong Kong
We would like to extend our appreciation to the referees, the members of the program committees of
individual sessions, tracks, and workshops; their names do not appear in this document; they are listed on
the web sites of individual tracks.
We express our gratitude to keynote, invited, and individual conference/tracks and tutorial speakers - the
list of speakers appears on the conference web site. We would also like to thank the followings: UCMSS
(Universal Conference Management Systems & Support, California, USA) for managing all aspects of the
conference; Dr. Tim Field of APC for coordinating and managing the printing of the proceedings; and the
staff of Monte Carlo Resort (Convention department) at Las Vegas for the professional service they
provided. Last but not least, we would like to thank the Co-Editors of MSV’17: Prof. Hamid R. Arabnia,
Prof. Leonidas Deligiannidis, and Prof. Fernando G. Tinetti.
Simulating Virtual Memory Allocations using SPEC Tools in Microsoft Hyper-V Clouds 7
John M. Medellin, Lokesh Budhi
Traffic Re-Direction Simulation During a Road Disaster/Collapse on Toll Road 408 in Florida 19
Craig Tidwell
Increased Realism in Modeling and Simulation for Virtual Reality, Augmented Reality, and 42
Immersive Environments
Jeffrey Wallace, Sara Kambouris
Measuring Benefits, Drawbacks and Risks of Smart Community Wireless Platforms 107
Sakir Yucel
Magnetic Resonance Image Applied to 3-Dimensional Printing Utilizing Various Oils 114
Tyler Hartwig, Zeyu Huang, Sara Martinson, Ritchie Cai, Jeffrey Olafsen, Keith Schubert
SESSION
SIMULATION, TOOLS AND APPLICATIONS
Chair(s)
TBA
Abstract – The algorithm presented here is capable of generating only if a spanning tree exists. Algorithm 1 adds Vertex 0 to the
strongly connected graphs in a single pass that requires O(n) time. spanning tree, and then adds the remaining vertices by selecting a
The method is to create a spanning tree that is a directed acyclic random vertex from the partial spanning tree as the parent of the new
graph, and adding a minimal number of edges to make the vertex.
spanning tree strongly connected. This is done in a way that is
completely general. Once the strongly connected spanning tree is 1. Add Vertex 0 to the tree.
created, additional edges can be added to the tree to create an 2. For each vertex, i, 1 through k 1
arbitrary strongly connected graph. a. select a vertex j at random from the existing tree
1 Introduction vertices
One important problem in many types of simulation is creating b. Add an edge between i and j.
random data for input to the simulation. Over the years, our need for c. Add vertex i to the tree.
such data in the simulation of gate-level circuits has led us to create a Algorithm 1. Creating the Spanning Tree.
package for creating many different types of random data [1,2].
Despite its utility, this package has become dated. It was originally When the graph is directed, simply creating a spanning tree is
intended to generate random data files for input to a simulation insufficient because the resultant graph must be strongly connected.
program. Recently, we have begun a project to upgrade this package The spanning tree is still necessary, because there must be a path from
with new features to make it more useful for modern types of programs Vertex 0 to every other vertex. When creating a spanning tree for a
that do not depend heavily on file-based input, and to generate types directed graph, the first step is to modify step 2 of Algorithm 1 so that
of data that are more suitable to modern programs than character the new edge proceeds from the tree vertex to the new vertex. This
strings and simple binary values. insures that there is a path from Vertex 0 to every other vertex. The
One major focus of this activity (there are many) is the generation resultant tree is a directed acyclic graph with the root of the tree as the
of random graphs. Graphs can be used to model many real-world only source. The sinks are the leaves of the tree.
phenomena. There are too many applications to mention individually, There are several straightforward methods for making the
but see [3] for an example. One new feature of our package is the spanning tree strongly connected. When adding a tree vertex, we could
creation of graph-generation subroutines that can be incorporated into add two edges, one from the tree vertex to the new vertex, and another
existing software. The graphs are generated internally as adjacency in the opposite direction. This would make the tree strongly connected,
lists and passed, as pointers, to the simulation software. but there would be no way to generate certain types of graphs such as
Graph specifications are simple, typically one line, but permit the the simple cycle of Figure 1. Another method is to add an edge from
specification of many different types of random graphs. The most each leaf vertex to the root vertex. This is perhaps more general, but
common models are the edged-oriented models, the Gilbert model [4] graphs such as that pictured in Figure 2 would be impossible to
and the Erdős–Rényi model [5]. The vertex-oriented models, power- generate.
law [6] and degree-sequence [7] models are also fairly common. This
paper will focus on the edge-oriented models. The Gilbert model
assigns a probability of p to the existence of any edge, and the Erdős–
Rényi model assigns equal probability to all graphs with M edges.
For the Gilbert model we generate k vertices and add each edge from
the complete graph with probability p . For the Erdős–Rényi model,
we sort all edges into random order and choose the first M edges from
the sorted list. (The parameters k, i, and M are specified by the user.)
Figure 1. A Simple Cycle.
The power-law and degree-sequence models are also available in our
package, but these are beyond the scope of this paper.
Parameters can be used to specify that the graph is directed, or
that the graph must be connected, or both. Creating a connected non-
directed graph is relatively simple. We generate a spanning tree using
Algorithm 1, and then apply either the Gilbert or the Erdős–Rényi
model to the remaining edges. The purpose of Algorithm 1 is to create
a spanning tree for the graph. A non-directed graph is connected if and
single core was used to run the experiments. The Linux time command We have not yet addressed the vertex-oriented models, power-
was used to obtain the timings. Algorithm 4 was implemented law and degree-sequence. Because each vertex has both an in-degree
iteratively rather than recursively for increased performance. The and an out-degree, it is not clear how to apply these models to directed
results of the experiments are given in Figure 4. The first experiment graphs. It is necessary that the total of the in-degrees equal the total of
generated one million five-vertex graphs to show the performance of the out-degrees. One model is to insist that the two degrees be identical
the algorithm with small graphs. Because the time to generate a small for each vertex. Another model is to use the same set of degrees, but
graph is tiny, it was necessary to generate a large number of graphs so randomly distribute them over the vertices. It is also not clear whether
that the execution time would be measurable. the degree distributions should include the strongly connected tree
The other three experiments were designed to show performance edges, or whether these edges should be considered separately. For
with large graphs. A single graph was generated because the time to some degree distributions, it is not clear that a strongly connected
generate such a graph is measurable. The Gilbert model was used for graph even exists. We are currently working on these problems.
all four experiments (each edge having the same probability.) For the
6 References
first experiment, we set the edge probability to .5, but it was necessary
1. Maurer, P., “Generating Test Data with Enhanced Context-Free
to set the edge probability to zero for the other three experiments due
Grammars,” IEEE Software, Vol. 7, No. 4, July 1990, pp. 50-55.
to memory requirements. If the edge probability were set to .5 for the
2. Maurer, P., “The Design and Implementation of a Grammar-
one million vertex graph, half a terabyte of RAM (at least) would be
Based Data Generator,” Software Practice and Experience, Vol.
required to store the graph.
22, No. 3, March 1992, pp. 223-244.
3. Calvert, K., Doar, M., Zegura, E., “Modeling Internet topology,”
Experiment User time
IEEE Communications Magazine, Vol. 35, No. 6, June 1997, pp.
1,000,000 5-vertex graphs Gilbert p .5 3.8 seconds
160-163.
One 1,000,000-vertex graph, Gilbert p 0 .577 seconds 4. Gilbert, E., (1959). “Random Graphs” Annals of Mathematical
One 10,000,000-vertex graph Gilbert p 0 7.3 seconds Statistics. Vol. 30, No. 4 1959, pp. 1141–1144.
One 100,000,000-vertex graph Gilbert p 0 59.3 seconds 5. Erdős, P.; Rényi, A., “On Random Graphs. I,” Publicationes
Figure 4. Experimental Results. Mathematicae, Vol. 6, 1959, pp. 290–297.
6. Aiello, W., Chung, F., Lu, L., “A Random Graph Model for
We speculate that it would take about 10 minutes to generate a Power Law Graphs,” Experimental Mathematics Vol. 10, No. 1,
one billion vertex graph, but 8GB of memory is insufficient to generate 2001, pp. 53-66.
a graph of this size. 7. Chatterjee, S., Diaconis, P., Sly, A., “Random Graphs with a
Given Degree Sequence,” The Annals of Applied Probability,
5 Conclusion Vol. 21, No. 4, 2011, pp. 1400–1435.
The algorithm presented here is simple, easy to implement, and 8. Devroye, L, Non-Uniform Random Variate Generation,
very fast. It can generate any strongly connected graph when used in Springer-Verlag, New York, 1986.
conjunction with the Gilbert or Erdős–Rényi models, and possible 9. Tarjan, R., “Depth-first search and linear graph algorithms,”
node-relabeling. The algorithm should prove to be a useful tool for the SIAM Journal on Computing, Vol. 1, No. 2, 1972, pp. 146–160,
generation of strongly connected graphs in most contexts.
CPU/memory) that are executed in bare metal or on Virtual also referred to as the “hypervisor” [3]. All policies regarding
Machines (VMs). The functionality injects a series of allocation and usage of physical infrastructure resources are
standard transactions into a set of application processes that controlled by the hypervisor. Hypervisors are assisted by
drive simulation through java applications provided. These other tools and agents in order to deliver a fully functional
transactions are progressively injected into the applications Cloud Management Platform (CMP) [5].
until the system gets saturated and can no longer provide
A. Hypervisor Architecture Throughput
sufficient throughput to keep up with the load being input
(inputs exceed outputs). In their review of open source hypervisors; Freet, Agrawal,
The fundamental objectives of this research are to first Walker and Badr [5] detail out the general characteristics that
simulate the incremental overhead added by virtualization give advantages of some over others. For example, their study
from bare metal to the Hyper-V environment and second to includes adoption reviews on Eucalyptus, OpenStack,
add more memory to determine the effects on overcoming the CloudStack, OpenNebula, Nimbus and Proxmox and
virtualization penalty. We use the SPECjbb2015 to simulate presents a conclusion that OpenStack and CloudStack have
on bare metal using the Windows 10 operating system and over 30 times more messages in discussion forums that some
the Windows Server 2012 R2 allocating 8GB in each case. of their other competitors (meaning they are more top of mind
Next, we virtualize that environment in a VM on Hyper-V, in the development community). They proceed to review the
allocate the same amount of memory and execute the architecture fit within three commercial offerings (Xen,
simulation. In a second experiment, we increase the allocated KVM, Virtual Box and ESX/VMware) in relation to the
memory to 10GB and 12 GB and report the throughput requirements for data center virtualization and infrastructure
statistics. The business applicability of the approach is provision. In that study, various types of workloads are
discussed at the end of the document. simulated through each candidate hypervisor and the
In our analysis, we first present related work that has been throughput for each is reported. We have adopted a similar
done and how we have adapted some of those methods/results throughput reporting in our methodology.
in our research. Next, we create a series of experiments which Vardhan Reddy and Rajamani [15] further study the
simulate the impact of virtualization as follows: incremental overhead added by 4 different hypervisors. Their
work includes measurement of the residual CPU, memory,
• The SPECjbb2015 is executed on bare metal under the I/O (read/write) and network (send/receive) with focused
Windows 10 and the Windows Server 2012 R2 workloads for Citrix XenServer, VMWare ESXi, Linux
Operating Systems. Next, we virtualize the simulation (Ubuntu) KVM and Microsoft Hyper-V. They conclude that
under Windows Server 2012 R2 Network OS with the the Hyper-V overall performance is very close to the winning
Hyper-V 2016 Hypervisor and Windows 10 guest VMWare. Their results are useful as another data point for
operating system. All three of these have 8GB of our work (the work was done on a slightly older version than
Memory allocated. The results are reported in ours). In our opinion, the Microsoft architecture has
SPECjbb2015 throughput transaction totals. continued to evolve in areas such as swap-file performance
and such stack would perform at least as well as their findings
• The simulations above are repeated except under indicate in similar tests. Their calculations on a 32GB cloud
varied memory allocation at 10GB and 12GB. The indicate that there is a 30% overhead on RAM at that level.
corresponding increase throughput totals is reported. Our experiments begin at 8GB memory allocation and they
increment by 2 GB in successive trials until the system
This research aims to demonstrate the usage of standard performance can be linearly approximated based on the
simulation tools in order to determine potential alternatives increments.
in Cloud resources without having to build the specific In yet a further diagnostic approach, Ye et. al. [16] propose
environments. The approach used could be scaled to other a very innovative method and system for measuring usage of
Cloud architectures than the one presented. resources along the stack. They segment their findings into
impacts on hardware (indicating cache optimization should
II. RELATED WORK be attempted), hypervisor (the overhead from the hypervisor
itself) and finally from the virtual machines themselves (the
Virtualized environments date back a few decades. A key workload profile). The Virt-B system reports the results from
objective of virtualization was to keep the CPU busy while these layers as various workloads are being processed. This
memory variables were being fetched from slower work not only quantifies the impacts on performance but
components in the computer [12]. With the advent of fully further diagnoses the parts of the stack that might have
logically defined architectures in software (“software- significant bearing on the issue.
defined systems”) we are now able to abstract the physical
components into specifications resident in configuration B. Virtualization Overhead Optimization
files. The key software agent that manages and provisions the Virtualization of a platform’s resources can result in
resources in a modern cloud is the Virtual Machine Monitor significant incremental requirements compared to bare metal
architectures. There are however, a set of tools and parameters (one of the parameters for optimization of CPU
techniques that can help optimize those results in a virtualized performance).
environment. Oi and Nakajima [8] explored the effects of
C. Application Workload Research
performance loads on the Xen. They determined that the
performance of Xen could be enhanced in a virtualized Based on the research referenced, there is a significant
environment by adjusting cache sizes in some applications in impact on utilization of CPU from the overhead generated by
addition to incremental memory. Virtualized-Xen and bare- the hypervisor. Further the impact is based on the type of
metal Linux were compared for throughput performance in application that is operating in the virtualized environment.
different cache and memory optimization techniques. In most NasiriGerdeh, Hosseini, RahimiZadeh and AnaLoui [7]
circumstances, it is a combination of both that will drive measured throughput degradation on Web applications using
throughput gains in a virtual environment. In their work, they the Faban suite (a web-based workload generator). They
conclude that by varying configuration elements, a more simulated the behavior of heavy transactional Web
effective use of resources can be achieved. The applications that tend to be very network intensive. Their
benchmarking system used was SPECjbb2001 and the effects work also measured the effect on memory, disk i/o and CPU.
of Network Interface Cards (NIC) were isolated so the They concluded that a disproportionate difference exists in
workload could be measured in memory usage and CPU resources due to the translation of domain addresses.
throughput. Our team has adopted the SPEC performance This work further confirms that the principal resource
suite as a workload simulator to determine the effects on difference is the CPU utilization even when workloads may
memory allocations (another attribute) rather than in network be more i/o bound (the penalties associated where in finding
throughput. addresses; a CPU task, not access to the actual addresses in
Another relevant study is Jabry, Liu, Zhu and the Web environment; an i/o task). We incorporate this
Panneerselvam [1]; hypervisor overhead impact is studied on research by focusing on actual compute resource utilization
the following resources: disk i/o, CPU, memory and VMM rather than network or disk access. The SPECjbb2015 suite
(hypervisor memory usage). The study predicts the usage of is focused on exhausting the compute resources rather than
resources by the hypervisor in taking total resource usage and the disk (i/o) or network resources.
subtracting individual component loads and until only a San Wariya, Nair and Shiwani [11] focused their research
residual is left (presumably the hypervisor load). Those tests on benchmarking three hypervisors; Windows Hyper-V,
were conducted with VMware, Virtual Box (Oracle VMWare/ESXi and Citrix Xen in three cloud games; 3D
Corporation) and Windows Virtual PC (Microsoft). Their Mark 11, Unigine Heaven and Halo. The objectives of their
work benchmarked a standard load in each hypervisor study are to identify which hypervisor was better from a
environment and used IOzone to quantify load on disk i/o, cloud gaming workload perspective. The three performed
RAMSpeed to quantify the impact on memory and differently in each category but were mostly lead by the
UnixBench, to indicate the effect on CPU. Their work VMWare product. For our purposes however, the HALO
concludes that the hypervisor is considerably higher on CPU benchmark (number of frames per second) is probably the
rather than the other components of the architecture. Each most predictive of workloads that are CPU bound. In this
suite of simulations focused on impacting a separate part of category, Hyper-V performed 7% ahead of VMWare and
the architecture and demonstrated how different workloads 57% ahead of Citrix Xen. This was another reason for
impact the choice of hypervisor. It points to the Microsoft selection of Hyper-V as the hypervisor for our test suite.
stack being more balanced due to its integration with the D. The SPEC Benchmarking Suite
other components included in that specific Cloud architecture
The SPECjbb2015 constitutes a workload benchmarking
(MS Windows). We selected the Microsoft stack in our
simulation so as to provide for greater integration between simulation for a Supermarket Chain. The model can be
the components and being able to evaluate the environment extended to include several supermarkets and several central
offices in a variety of virtual machine settings. The tool set
as a “whole offering” from a single vendor. Further, tightness
can be configured in a variety of business transaction settings
of coupling between the units would allow for study of the
so that different business patterns can be simulated (e.g., web
simulation as a whole without the need to study the effects of
sales versus physical store sales). The system is owned and
separate vendor “noise”.
licensed by spec.org Error! Reference source not found.
Chen, Patel, Shen and Zhou [2] studied virtualization
which is a consortium of major IT companies that have
overhead across multiple VMs running under Xen in cloud
agreed on a set of principles to guide the performance
environments. They also found that the larger resource usage
benchmarking process.
was attributable to the CPU. They also propose a series of
The system progressively injects transaction loads into the
equations that are remarkably accurate in predicting the
lateral scaling of workloads on all components based on the environment until saturation is reached. A sample output of
observed results of the application under study. We provide a these results is seen in Figure 3. In that graphic the system
begins to stress at around the 5,200 java Operations Per
graphical analysis of throughput under several memory
Second (jOPS) with a range of 5K (median tolerance) to 50K
(max tolerance). The system reaches saturation (min a) Bare metal with Windows 10
tolerance) at around 6,700 jOPS and 60K. We report our b) Bare metal with Windows Server 2012 R2
results using the total transactions up to saturation. Figure 4 c) Virtual Machine: Windows Server 2012 R2 NOS /
is a graphic representation of the architecture of the system.
Hyper-V/ Windows 10 Guest OS
Figure 3: Sample SPECjbb2015 Benchmark Output The simulation was run for a typical store sales only
www.spec.org company with 90% store sales and 10% online sales. This is
typical of smaller stores that have not adapted to the online
grocery demands of consumers and are experimenting with
their own private clouds.
B. Application Architecture Patterns
The application patterns were analyzed by deriving use
cases and preparing activity diagrams from the code for the
application workload being simulated.
i. Use Case Analysis
Use cases are a functional decomposition tool that
illustrate the process interactions between actors in
applications [13]. The processes that we have selected in the
SPECjbb2015 suite are fairly standard and follow similar
patterns. The use case diagram for the store sales architecture
is similar to this one (www.UML-diagrams.org), the
“adornments” in the graphic describe the usage of artifacts.
Figure 4: SPECjbb2015 Architecture
www.spec.org Figure 5: Store Use Case Diagram
Txi Sends SM an
InStorePurchaseRequest
Select a Random
• 1TB Hybrid SSD
Customer
• 4GB NVIDIA GTX 950M chip
Retrieve Customers
Previous Purchase History
Proceed to Check
Customer Basket Validation
incremental impact of each increase on the original base
measurements.
Throw an Exception
out
STOP
Generate Reciept
Figure 8: Throughput in the Experimental Systems
Customer has Customer doesn't
enough Credit have enough Credit 100%
Check Customer's Credit
90%
Transaction Fails 80%
70%
60%
50%
Move the Purchased Debit the cost of Each Send Suppliers a
40%
Items from Store Item from Customer's Request, If any item runs 30%
Inventory Account out from store
20%
10%
0%
10GB 12GB
Win 10 2% 2%
Send Receipt back
to HQ Win 2012 20% 7%
Win Hyp-V 95% 79%
Percent Throughput Improvement, 8GB Constant Base
Stop
150%
The third environment used MS Windows 10, Server 2012 100%
allocated to the Virtual Machine. A diagram for this Percent Throughput Improvement, 8GB Constant Base
logical. Our study has illustrated how using a process of [2] L. Chen; S. Patel; H. Shen; Z. Zhou: “Profiling and
simulation, a small company may avoid the costly and risky Understaning Virtualization Overhead in Cloud”. 2015
44th International Conference on Parallel Processing. p.
process of making the decision to virtualize in a private cloud 31-40.
without knowing how much incremental resource will be [3] T. Erl; Z. Mahmood; R. Puttini: “Cloud Computing
needed. Concepts, Technology & Architecture”. c. 2013 Arcitura
We used Windows 10 and Server 2012 R2 to test on bare Education, Inc./Pearson Education, Upper Saddle River,
NJ. USA.
metal. It is important to understand that these are two
[4] A. Finn; M. Luescher; P. Lownds; D. Flynn: “Windows
fundamentally different Operating Systems. Windows 10 is Server 2012 Hyper-V; Installation and Configuration
focused on managing the desktop and execution of localized Guide”. c. 2013 Wiley and Sons, Indianapolis, IN. USA.
workloads. It provides rich functionality in areas such as [5] D. Freet; R. Agrawal; J. Walker; Y. Badr: “Open source
graphics and gaming which are not simulated by the cloud management platforms and hypervisor
SPECjbb2015 suite but are nevertheless instantiated in it’s technologies: A review and comparison”. SoutheastCon
2016. p. 1-8.
services. The Server 2012 R2 is a Distributed OS whose focus
[6] M. Karlsson; K.E. Moore; E. Hagersten; D.A. Wood:
is to manage standard workloads associated with raw “Memory system Behavior of Java-Based Middleware”.
compute and storage power. Under these circumstances, the The Ninth International Symposium on High-
Server 2012 R2 performs with better results in traditional Performance Computer Architecture, 2003. HPCA-9
2003 p. 217-228.
business process simulations like SPECjbb2015.
[7] R. NasiriGerdeh; N. Hosseini; K. RahimiZadeh; M.
The Hyper-V extension of the Windows Server 2012 R2 AnaLoui: “Performance Analysis of Web Application in
is a tool for managing the life cycle of virtual machines. It is Xen-based Virtualized Environment”. 2015 5th
an extension of the Network OS that communicates decisions International Conference on Computer and Knowledge
to the virtualization layer for translation of operating Engineering (ICCKE). p.258-261.
parameters back and forth. This additional load constitutes [8] H. Oi; F. Nakajima: “Performance Analysis of Large
Receive Offload in a Xen Virtualized System”. 2009
overhead (more resources). Some of these resources are International Conference on Computer Engineering and
“fixed”; they are there by virtue of instantiation and some are Technology. p. 475-480
“variable”; by usage of the workspace through applications. [9] J. Rhoton; J. De Clercq; F. Novak: “OpenStack Cloud
As memory is increased, there exists more workspace for Computing Architecture Guide 2014 Edition”. c. 2014
applications and the overall impact of the hypervisor usage of Recursive Press, USA & UK.
memory is reduced. The first incremental memory allocation [10] A. Salam; Z. Gilani; S. Ul Haq: “Deploying and
Managing a Cloud Infrastructure”. c. 2014 Sybex, a
(from 8GB to 10GB) has a higher yield because a greater Wiley Brand, Indianapolis, IN. USA
percentage of that “boost” goes to the application. The [11] A. SanWariya; R. Nair; S. Shiwani: “Analyzing
successive increment (from 10GB to 12GB) is still significant Processing Overhead of Type-0 Hypervisor for Cloud
but not as high. According to hypervisor vendors and Reddy Gaming”. 2016 International Conference on Advances in
Computing, Communication, & Automation (ICACCA)
and Rajamani [15] this reduction will continue until the bare (Spring). p. 1-5.
metal and virtualized environment will start to resemble each [12] W. Stallings:th “Operating Systems: Internals and Design
other in throughput given volume/memory mix. Principles 7 ed”. c. 2012 Pearson/Prentice Hall, Upper
The simulation process allows a company to make plans Saddle River, NJ. USA
of how to deploy in the future. Using a standard simulation [13] C. Larman; “Applying UML and Patterns: An
may lead to answering some key questions as: Introduction to Object-Oriented Analysis and Design
and Iterative Development (3rd Edition)” c. Pearson
a) Should we virtualize or keep on bare metal? Education 2005, Upper River, NJ.
b) When should we revisit our decision? [14] www.spec.org
A company could continue the simulation by contracting [15] P.V. Vardhan Reddy; L. Rajamani: “Virtualization
additional capacity with one of the major Cloud vendors and Overhead Findings of Four Hypervisors in the
determine where the VM/bare metal results ultimately blur. CloudStack with SIGAR”. 2014 World Congress on
Information and Communication Technologies (WICT
B. Future Plans 2014) p. 140-145.
The team is busy executing additional work in running [16] K. Ye; Z. Wu; B. Zhou; X. Jiang; C. Wang; A. Zomaya:
“Virt-B: Toward Performance Benchmarking of Virtual
additional simulations that can implement optimization Machine Systems”. IEEE Internet Computing, V. 18,
techniques. The ultimate objective is to have a “cookbook” of Issue 3 (2014). p. 64-72
simulation/optimization techniques that can be used in private
or hybrid cloud evaluators.
REFERENCES
[1] H. Al Jabry; L. Liu, Y. Zhu, J. Panneerselvam: “A
Critical Evaluation thof the Performance of Virtualization
Technologies”. 9 International Conference on
Communications and Networking in China (2014). p.
606-611.
Abstract:-This paper illustrates the use of piezoelectric (viii) Less expensive compared to its counterpart.
material to generate electricity in the Electric Vehicle (EV)
These features make them most suited to be employed in
tire. According to the proposed mechanism, the vehicle tires EV tires. However, proof of concept needs to be done, that
are embedded with layers of the Piezo-electric material requires collaboration with tires manufacturer.
along the periphery. Thus, when the EV is in motion,
electricity can be generated due to mechanical stress in that The rest of the paper is divided into the following
part of Piezo-electric material that is in contact with the sections. Section-2 describes the composition and structure
road surface. The results show that, with peripheral of the tire, section-3 explians our proposal on embedding
arrangement of Piezo-material inside the automobile tire, piezo-electric material in tire and harvesting energy from it.
we can generate electricity that can be stored in a battery to Section-4 calculates cost efficiency of the proposed
mechanism, Section-5 suggest future work, Section-6
run the EV for some extra miles of the total miles the EV is
concludes the paper, Section-7 lists some of the key
capable of on a single charge. The use of Polyvinylidene
references, and finally Section-8 titled as Annex, presents
fluoride (PVDF); a polymer based piezoelectric material is the detailed mathematical analysis.
considered due to its robust and favorable properties.
Due to the rising demand for generating energy in the
Keywords— Piezoelectricity, Polyvinylidene fluoride most efficient way; smart, intelligent and adaptive materials
(PVDF), Electrical power, Mechanical stress-to-electricity are being used and one such smart substance is the
conversion, Automobile tire. piezoelectric material. Piezoelectric substances produce
electric charge when mechanical stress is applied on its
surface.
1 Introduction
Piezoelectric materials are composed of various
Due to the rising demand for generating energy in the materials namely crystals, ceramics, polymers etc. Polymer-
most efficient way; smart, intelligent and adaptive materials based piezoelectric materials have served as the most
are being used and one such smart substance is the efficient material compared to ceramics and crystals for
piezoelectric material. Piezoelectric substances produce applications where elasticity is preferred. The most
electric charge when mechanical stress is applied on its commonly used polymer based piezoelectric material is
surface. Polyvinylidene Fluoride (PVDF). PVDF is a transparent,
Piezoelectric materials are composed of various semi-crystalline, thermoplastic fluoroplastic. We have
materials namely crystals, ceramics, polymers etc. Polymer- employed PVDF as the piezo electric material in our work
based piezoelectric materials have served as the most based on the merits of PVDF as listed below [13]
efficient material compared to ceramics and crystals for
applications where elasticity is preferred. The most 2 Composition and Structure of the Tire
commonly used polymer based piezoelectric material is
Polyvinylidene Fluoride (PVDF). PVDF is a transparent, The most basic component in the tire is “rubber” which
semi-crystalline, thermoplastic fluoroplastic. We have may be ‘synthetic rubber’ or ‘natural rubber’. Other
employed PVDF as the piezo electric material in our work components that are present in the tire are fabric wire,
based on the merits of PVDF as listed below [13]: polymers, fillers, softeners, anti-degradents and curatives.
(i) Piezoelectricity obtained from PVDF is several times
greater than that obtained from quartz or ceramics. As polymers are the backbone of rubber compounds, it is
more appropriate to embed polymer piezoelectric material
(ii) PVDF materials are insoluble in water, resistant to within the structure of the tire as done in [1].
solvents, acids, bases, heat, and generate low smoke in case
of any fire accidents. Since the objective of using Piezoelectric material in [1]
(iii) Has low weight and low thermal conductivity. is sensing, it simply employs pallets of PVDF materials.
However, we embed PVDF material as a circular ring along
(iv) Highly resistant to chemical corrosion and heat the entire periphery of the tire to maximize electricity
variations, thus withstands exposure to harsh chemical and generation.
thermal conditions.
(v) Very good mechanical strength and toughness and has There are 3 main categories of tires such as Diagonal
high abrasion resistance. (bias) tire, belted bias tire and Radial tire. Radial tires are
most commonly used in the automobile industry; therefore,
(vi ) Low permeability to most gases and liquids.
this paper considers radial tire for mathematical analysis.
(vii) Unaffected by long-term exposure to ultraviolet However, it does not preclude other types.
radiation.
3 Proposal on Embedding Piezoelectric the PVDF will be coming in contact with the road, and thus
will ensure constant generation of electricity as shown in
Material in Tires to Harvest Energy figure 1.
Figure 1 shows the overall concept of piezoelectric In this section, pressure exerted by the road on the
generation phenomenon in context to the proposed tire automobile tire is modeled and the amount of energy
scenario. harvested in this process is calculated. Since the section
involves mathematical variables, therefore for the
convenience of the readers, the terminology, abbreviations
Tire With Piezoelectric and units are provided in the form of a table below:
Piezoelectric Phenomenon
Material
TABLE I. NOMENCLATURE, SYMBOLS AND UNITS
Pa
ra- Parameter definition Unit
meter
A Area meter2
c Circumference centimeter
C Charge Coulomb
Road Surface
d Piezoelectric strain
coefficient or
t Thickness of a ring µm
Having the PVDF material as a circular ring along the Pressure exerted by a car on the road can be given by,
entire periphery of the tire is more efficient compared to
having pallets of PVDF material embed within the tire.
When the tires will rotate at a high speed, most portions of
Fig. 5. [15]
Result Calculation
If the mass of the car is 1500Kg (Because electric
vehicles have more weight due to their battery) then the
calculated force is 14700Newtons (3675N for each tire).
When the average diameter of the PVDF ring is considered
to be D = 0.5588 m (22 inch), width of a ring is 0.1651 m
(6.5 inch) and thickness of the ring is 110 micrometer [7].
Therefore, the Area (A) for the PVDF ring is 0.289 m2 and
the surface area when 10% of the tire is in contact with the
road surface is 28.9 × 10-3 m2.
From this value of force (F) and area (A) the pressure
(T) exerted on the PVDF material is 127162.63 N/m2.
Fig 3. [15]
[9] Kris De Decker, May 3, 2010. “The status quo of If we consider the mass of the car to be 1500 kg, force
electric cars: better batteries, same range.” Low-tech can be calculated as follows:
magazine. Retrieved March 13, 2012 from Force = m × g
http://www.energybulletin.net/node/52736.
= 1500 × 9.8 = 14700 N
[10] http://www.tirerack.com/tires/tiretech/techpage.jsp?tec
hid=46 And
Force on one tire will be = 14700/4 =3675N
[11] http://www.tirerack.com/tires/tiretech/techpage.jsp?tec
hid=7. Therefore Pressure = 14700 / 28.9 × 10-3 = 127162.63
N / m2
[12] http://teacher.pas.rochester.edu/phy121/lecturenotes/Ch
apter06/Chapter6.html. To determine the charge surface density
The charge surface density is given by,
[13] http://www.openmusiclabs.com/wp/wp-
content/uploads/2011/11/piezo.pdf
Massinger died suddenly at his house near the Globe theatre, and
was buried in the churchyard of St Saviour’s, Southwark, on the 18th
of March 1640. In the entry in the parish register he is described as a
“stranger,” which, however, implies nothing more than that he
belonged to another parish.
See Livy xxiv. 49, xxviii. 11, 35, 42, xxix. 27, xxx. 3, 12, 28, 37,
xlii. 23, 29, xliii. 3; Polybius iii. 5, ix. 42, xiv. 1, xxxii. 2, xxxvii. 3;
Appian, Hisp. 37, Punica, 11, 27, 105; Justin xxxiii. 1; A. H. J.
Greenidge, Hist. of Rome (London, 1904).
MASSON, DAVID (1822-1907), Scottish man of letters, was
born at Aberdeen on the 2nd of December 1822, and educated at the
grammar school there and at Marischal College. Intending to enter the
Church, he proceeded to Edinburgh University, where he studied
theology under Dr Chalmers, whose friendship he enjoyed until the
divine’s death in 1847. However, abandoning his project of the
ministry, he returned to his native city to undertake the editorship of
the Banner, a weekly paper devoted to the advocacy of Free Kirk
principles. After two years he resigned this post and went back to the
capital, bent upon pursuing a purely literary career. There he wrote a
great deal, contributing to Fraser’s Magazine, Dublin University
Magazine (in which appeared his essays on Chatterton) and other
periodicals. In 1847 he went to London, where he found wider scope
for his energy and knowledge. He was secretary (1851-1852) of the
“Society of the Friends of Italy.” In a famous interview with Mrs
Browning at Florence he contested her admiration for Napoleon III. He
had known De Quincey, whose biography he contributed in 1878 to the
“English Men of Letters” series, and he was an enthusiastic friend and
admirer of Carlyle. In 1852 he was appointed professor of English
literature at University College, London, in succession to A. H. Clough,
and from 1858 to 1865 he edited the newly established Macmillan’s
Magazine. In 1865 he was selected for the chair of rhetoric and English
literature at Edinburgh, and during the early years of his professorship
actively promoted the movement for the university education of
women. In 1879 he became editor of the Register of the Scottish Privy
Council, and in 1893 was appointed Historiographer Royal for Scotland.
Two years later he resigned his professorship. His magnum opus in his
Life of Milton in Connexion with the History of His Own Time in six
volumes, the first of which appeared in 1858 and the last in 1880. He
also edited the library edition of Milton’s Poetical Works (3 vols., 1874),
and De Quincey’s Collected Works (14 vols., 1889-1890). Among his
other publications are Essays, Biographical and Critical (1856, reprinted
with additions, 3 vols., 1874), British Novelists and their Styles (1859),
Drummond of Hawthornden (1873), Chatterton (1873) and Edinburgh
Sketches (1892). He died on the 6th of October 1907. A bust of
Masson was presented to the senate of the university of Edinburgh in
1897. Professor Masson had married Rosaline Orme. His son Orme
Masson became professor of chemistry in the university of Melbourne,
and his daughter Rosaline is known as a writer and novelist.
The mast was for long made out of a single spar. Thence the
Mediterranean name of “palo” (spar) and the Spanish “arbol”
(tree). The typical Mediterranean mast of “lateen” (Latin) vessels
is short and bends forward. In other classes it is upright, or bends
slightly backwards with what is called a “rake.” The mast is
grounded, or in technical language “stepped,” on the kelson (or
keelson), the solid timber or metal beam lying parallel with, and
above the keel. As the 15th century advanced the growth of the
ship made it difficult, or even impossible, to find spars large
enough to make a mast. The practice of dividing it into lower, and
upper or topmast, was introduced. At first the two were fastened
firmly, and the topmast could not be lowered. In the 16th century
the topmast became movable. No date can be given for the
change, which was gradual, and was not simultaneously adopted.
When the masting of sailing ships was fully developed, the division
was into lower or standing mast, topmast, topgallant mast, and
topgallant royal. The topgallant royal is a small spar which is often
a continuation of the topgallant mast, and is fixed. Increase of size
also made it impossible to construct each of these subdivisions out
of single timbers. A distinction was made between “whole” or
single-spar masts and “armed” and “made masts.” The first were
used for the lighter spars, for small vessels and the Mediterranean
craft called “polacras.” Armed masts were composed of two single
timbers. Made masts were built of many pieces, bolted and
“coaked,” i.e. dovetailed and fitted together, fastened round by
iron hoops, and between them by twelve or thirteen close turns of
rope, firmly secured. “Made masts” are stronger than those made
of a single tree and less liable to be sprung. The general principle
of construction is that it is built round a central shaft, called in
English the “spindle” or “upper tree,” and in French the mèche or
wick. The other pieces—“side trees,” “keel pieces,” “side fishes,”
“cant pieces” and “fillings” are “coaked,” i.e. dovetailed and bolted
on to and around the “spindle,” which itself is made of two pieces,
coaked and bolted. The whole is bound by iron bands, and
between the bands, by rope firmly “woulded” or turned round, and
nailed tight. The art of constructing made masts, like that of
building wooden ships, is in process of dying out. In sailing men-
of-war the mizen-mast often did not reach to the kelson, but was
stepped on the orlop deck. Hollow metal cylinders are now used
as masts. In the case of a masted screw steamer the masts abaft
the engines could not be stepped on the kelson because they
would interfere with the shaft of the screw. It is therefore
necessary to step them on the lower deck, where they are
supported by stanchions, or on a horseshoe covering the screw
shaft. The size of masts naturally varies very much. In a 110-gun
ship of 2164 tons the proportions of the mainmast were: for the
lower mast, length 117 ft., diameter 3 ft. 3 in.; topmast, 70 ft.,
and 20¾ in.; topgallant mast, 35 ft., and 115⁄8 in., 222 ft. in all. At
the other end of the scale, a cutter of 200 tons had a lower mast
of 88 ft., of 22 in. diameter, and a topgallant mast (there was no
topmast between them) of 44 ft., of 9¾ in. in diameter, 132 ft. in
all; topgallant mast of 44 ft., and 9¾ in. in diameter. The masts of
a warship were more lofty than those of a merchant ship of the
same tonnage. At present masts are only used by warships for
signalling and military purposes. In sailing merchant ships, the
masts are more lofty than they were about a century ago. A
merchant ship of 1300 tons, in 1830, had a mainmast 179 ft. in
height; a vessel of the same size would have a mast of 198 ft. to-
day.
The terms of the contract of service are for the most part such as
the parties choose to make them, but in the absence of express
stipulations terms will be implied by the law. Thus, “where no time is
limited either expressly or by implication for the duration of a contract
of hiring and service, the hiring is considered as a general hiring, and
in point of law a hiring for a year.” But “in the case of domestic and
menial servants there is a well-known rule, founded solely on custom,
that their contract of service may be determined at any time by giving
a month’s warning or paying a month’s wages, but a domestic or other
yearly servant, wrongfully quitting his master’s service, forfeits all claim
to wages for that part of the current year during which he has served,
and cannot claim the sum to which his wages would have amounted
had he kept his contract, merely deducting therefrom one month’s
wages. Domestic servants have a right by custom to leave their
situations at any time on payment of a calendar month’s wages in
advance, just as a master may discharge them in a similar manner”
(Manley Smith’s Law of Master and Servant, chs. ii. and iii.). The
following are sufficient grounds for discharging a servant: (1) wilful
disobedience of any lawful order; (2) gross moral misconduct; (3)
habitual negligence; (4) incompetence or permanent disability caused
by illness. A master has a right of action against any person who
deprives him of the services of his servant, by enticing him away,
harbouring or detaining him after notice, confining or disabling him, or
by seducing his female servant. Indeed, the ordinary and only available
action for seduction in English law is in form of a claim by a parent for
the loss of his daughter’s services. The death of either master or
servant in general puts an end to the contract. A servant wrongfully
discharged may either treat the contract as rescinded and sue for
services actually rendered, or he may bring a special action for
damages for the breach. The common law liabilities of a master
towards his servants have been further regulated by the Workmen’s
Compensation Acts (see Employer’s Liability). A master is bound to
provide food for a servant living under his roof, and wilful breach of
duty in that respect is a misdemeanour under the Offences against the
Person Act 1861.
1 Sir John Romilly, M.P. for Devonport, 1847 to 1852, was the last master
of the rolls to sit in Parliament. He was appointed master of the rolls in
1851.
Mastodons are found in almost all parts of the world. In Asia they
gave rise to the elephants, while they themselves originated in Africa
from ungulates of more normal type. (See Proboscidea.)
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com