I
nd
o
ne
s
ia
n
J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
p
u
t
er
Science
Vo
l.
21
,
No
.
2
,
Feb
r
u
ar
y
2
0
2
1
,
p
p
.
8
7
4
~
8
8
5
I
SS
N:
2
5
02
-
4
7
5
2
,
DOI
: 1
0
.
1
1
5
9
1
/i
j
ee
cs.v
2
1
.i
2
.
p
p
8
7
4
-
8
8
5
874
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs.ia
esco
r
e.
co
m
A secure
cloud se
rv
ice deploy
m
ent
fra
m
ew
o
rk
for D
ev
O
ps
P
Ra
v
ind
er
Ra
o
1
,
V.
Su
cha
rit
a
2
1
Re
se
a
rc
h
S
c
h
o
lar i
n
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
E
n
g
in
e
e
rin
g
,
Ko
n
e
ru
L
a
k
sh
m
a
iah
Ed
u
c
a
ti
o
n
F
o
u
n
d
a
ti
o
n
,
V
a
d
d
e
sw
a
r
a
m
,
A
P
,
I
n
d
ia
2
S
u
p
e
rv
iso
r
i
n
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
En
g
i
n
e
e
rin
g
,
Ko
n
e
ru
L
a
k
sh
m
a
iah
Ed
u
c
a
ti
o
n
F
o
u
n
d
a
ti
o
n
,
V
a
d
d
e
sw
a
r
a
m
,
Na
ra
y
a
n
a
En
g
in
e
e
rin
g
,
Co
ll
e
g
e
A
P
,
I
n
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
n
1
3
,
2
0
2
0
R
ev
i
s
ed
A
u
g
1
1
,
2
0
2
0
A
cc
ep
ted
A
u
g
2
1
,
2
0
2
0
T
h
e
a
d
v
a
n
c
e
m
e
n
ts
in
c
lo
u
d
c
o
m
p
u
ti
n
g
a
n
d
lev
e
ra
g
in
g
th
e
b
e
n
e
f
it
s
f
ro
m
c
lo
u
d
c
o
m
p
u
ti
n
g
to
th
e
se
rv
ice
p
ro
v
id
e
rs
h
a
v
e
in
c
re
a
se
d
th
e
d
e
p
l
o
y
m
e
n
t
o
f
trad
it
io
n
a
l
a
p
p
li
c
a
ti
o
n
s
to
t
h
e
c
lo
u
d
.
T
h
e
a
p
p
li
c
a
ti
o
n
s
o
n
c
e
d
e
p
l
o
y
e
d
o
n
th
e
c
lo
u
d
,
d
u
e
t
o
v
a
rio
u
s
re
a
so
n
s,
n
e
e
d
m
ig
ra
ti
o
n
f
ro
m
d
e
v
e
lo
p
m
e
n
t
in
f
ra
stru
c
tu
re
to
o
p
e
ra
ti
o
n
a
l
i
n
f
ra
stru
c
tu
re
,
o
n
e
o
p
e
ra
ti
o
n
a
l
i
n
sta
n
c
e
to
o
th
e
r
o
p
e
ra
ti
o
n
a
l
in
sta
n
c
e
s d
u
e
to
l
o
a
d
b
a
lan
c
in
g
a
n
d
t
h
e
c
y
c
le co
n
ti
n
u
e
s
d
u
e
to
t
h
e
u
se
o
f
De
v
Op
s
a
s
d
e
v
e
lo
p
m
e
n
t
s
trate
g
ies
f
o
r
c
lo
u
d
c
o
m
p
u
ti
n
g
a
p
p
li
c
a
ti
o
n
s.
A
d
v
o
c
a
te
s
o
f
h
y
b
rid
a
n
d
p
u
b
li
c
c
lo
u
d
s
o
b
se
rv
e
c
lo
u
d
c
o
m
p
u
ti
n
g
m
a
k
e
s
it
p
o
ss
ib
le
f
o
r
o
rg
a
n
iza
ti
o
n
s
to
a
v
e
rt
o
r
m
in
im
iz
e
u
p
f
ro
n
t
IT
in
f
r
a
stru
c
tu
re
e
x
p
e
n
se
s.
P
ro
p
o
n
e
n
ts
a
lso
a
ss
e
rt
th
a
t
c
lo
u
d
c
o
m
p
u
ti
n
g
sy
ste
m
s
p
e
r
m
it
b
u
sin
e
ss
e
s
to
re
c
e
iv
e
th
e
ir
so
f
t
wa
re
u
p
a
n
d
ru
n
n
in
g
f
a
ste
r,
u
sin
g
im
p
ro
v
e
d
m
a
n
a
g
e
a
b
il
it
y
a
n
d
les
s
m
a
in
ten
a
n
c
e
,
so
it
e
m
p
o
w
e
rs
I
T
tea
m
s
to
ra
p
id
ly
a
d
a
p
t
to
o
ls
to
m
e
e
t
th
e
v
a
r
y
in
g
a
n
d
u
n
p
re
d
icta
b
le
re
q
u
irem
e
n
ts.
D
e
v
Op
s
is
a
lo
t
o
f
p
ra
c
ti
c
e
s
th
a
t
m
e
c
h
a
n
ize
s
th
e
p
ro
c
e
d
u
re
s
b
e
tw
e
e
n
p
ro
g
ra
m
m
in
g
im
p
ro
v
e
m
e
n
t
a
n
d
IT
g
ro
u
p
s,
a
ll
to
g
e
th
e
r
th
a
t
t
h
e
y
c
a
n
f
a
b
rica
te
,
tes
t,
a
n
d
d
isc
h
a
rg
e
p
ro
g
ra
m
m
in
g
q
u
ick
e
r
a
n
d
e
v
e
n
m
o
re
d
e
p
e
n
d
a
b
ly
.
Th
e
id
e
a
o
f
De
v
Op
s
is
e
sta
b
li
sh
e
d
o
n
b
u
il
d
in
g
a
c
u
lt
u
re
o
f
a
jo
i
n
t
e
ff
o
rt
b
e
tw
e
e
n
g
ro
u
p
s
th
a
t
g
e
n
e
ra
ll
y
w
o
r
k
e
d
in
re
lativ
e
silo
e
s.
T
h
e
g
u
a
ra
n
tee
d
a
d
v
a
n
tag
e
s
in
c
o
rp
o
ra
te
e
x
p
a
n
d
e
d
tru
st
,
q
u
i
c
k
e
r
p
ro
g
ra
m
m
in
g
d
isc
h
a
rg
e
s,
c
a
p
a
c
it
y
to
e
x
p
lain
b
a
sic
issu
e
s
r
a
p
id
ly
a
n
d
b
e
tt
e
r
o
v
e
rse
e
i
m
p
ro
m
p
tu
w
o
rk
.
T
h
u
s,
th
is
w
o
rk
id
e
n
ti
f
ies
th
e
n
e
e
d
f
o
r
p
ro
v
id
in
g
m
u
lt
ip
le
se
c
u
rit
y
p
ro
to
c
o
ls
d
u
ri
n
g
th
e
c
o
m
p
lete
li
f
e
c
y
c
le
o
f
c
lo
u
d
a
p
p
l
ica
ti
o
n
d
e
v
e
lo
p
m
e
n
t
a
n
d
d
e
p
lo
y
m
e
n
t.
T
h
is
w
o
rk
p
ro
p
o
se
s
a
n
o
v
e
l
f
ra
m
e
w
o
rk
f
o
r
a
u
to
m
a
ti
c
se
l
e
c
ti
o
n
a
n
d
d
e
p
lo
y
m
e
n
t
o
f
th
e
se
c
u
rit
y
p
ro
to
c
o
ls
d
u
ri
n
g
c
lo
u
d
se
rv
ice
d
e
p
lo
y
m
e
n
ts.
T
h
e
fra
m
e
w
o
rk
id
e
n
ti
f
ies
th
e
n
e
e
d
f
o
r
se
c
u
rit
y
a
sp
e
c
ts
a
n
d
se
lec
ts
th
e
a
p
p
ro
p
riat
e
se
c
u
rit
y
a
lg
o
rit
h
m
s
f
o
r
v
irt
u
a
l
m
a
c
h
in
e
s.
T
h
e
p
ro
p
o
se
d
f
ra
m
e
w
o
rk
d
e
m
o
n
stra
tes
n
e
a
rly
8
0
%
i
m
p
ro
v
e
m
e
n
t
o
v
e
r
th
e
se
c
u
rit
y
p
o
li
c
y
d
e
p
lo
y
m
e
n
t
ti
m
e
.
K
ey
w
o
r
d
s
:
Dev
Op
s
Var
iab
le
len
g
th
e
n
cr
y
p
ti
o
n
ch
an
g
e
m
an
a
g
e
m
en
t
VM
d
ep
lo
y
m
en
t
VM
m
i
g
r
atio
n
s
ec
u
r
it
y
T
h
is
is
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
P
R
av
in
d
er
R
ao
Dep
ar
t
m
en
t o
f
C
o
m
p
u
ter
Scie
n
ce
an
d
E
n
g
i
n
ee
r
in
g
Ko
n
er
u
L
ak
s
h
m
aia
h
E
d
u
ca
tio
n
Fo
u
n
d
atio
n
Vad
d
es
w
ar
a
m
,
A
P
,
I
n
d
ia
E
m
ail:
r
av
is
r
i.s
u
n
n
y
@
g
m
ail.
c
o
m
1.
I
NT
RO
D
UCT
I
O
N
Mo
tiv
ated
b
y
t
h
e
b
en
e
f
it
s
,
s
u
ch
as
m
ea
s
u
r
ab
le
ad
v
a
n
tag
e
s
,
co
s
t
i
m
p
r
o
v
e
m
e
n
ts
,
a
n
d
th
e
s
ca
lab
ilit
y
b
en
ef
it
s
o
f
m
i
g
r
atin
g
t
h
e
ap
p
licatio
n
s
o
n
th
e
clo
u
d
,
a
g
o
o
d
n
u
m
b
er
o
f
ap
p
licatio
n
s
ar
e
m
i
g
r
ated
o
r
h
o
s
ted
d
ir
ec
tl
y
o
n
th
e
clo
u
d
.
L
e
v
er
a
g
in
g
th
e
ad
v
a
n
ta
g
es
f
r
o
m
t
h
e
clo
u
d
,
t
h
e
s
er
v
ice
p
r
o
v
id
er
s
o
r
th
e
ap
p
licatio
n
d
ev
elo
p
er
s
ca
n
tak
e
th
e
b
en
ef
its
o
f
th
e
p
latf
o
r
m
,
i
n
f
r
astr
u
ctu
r
e,
o
r
th
e
b
u
ild
-
i
n
s
er
v
ic
es
f
r
o
m
t
h
e
clo
u
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
A
s
ec
u
r
e
clo
u
d
s
ervice
d
ep
lo
y
men
t fra
mewo
r
k
fo
r
Dev
Op
s
(
P
R
a
vin
d
er R
a
o
)
875
p
r
o
v
id
er
s
as
P
aa
S,
I
aa
S,
o
r
t
h
e
SaaS.
Als
o
,
t
h
e
ap
p
licatio
n
d
ev
elo
p
er
s
ca
n
tak
e
th
e
f
r
ee
d
o
m
o
f
d
e
p
lo
y
m
e
n
t
ca
p
ab
ilit
ies
w
ith
ap
p
licatio
n
i
n
f
r
a
s
tr
u
ct
u
r
e
o
r
th
e
m
ai
n
tai
n
a
b
ilit
y
,
o
r
th
e
ac
ce
s
s
ib
ilit
ie
s
o
f
th
e
ap
p
licatio
n
b
y
h
o
s
ti
n
g
t
h
e
ap
p
licatio
n
s
o
n
p
u
b
lic,
p
r
iv
ate,
h
y
b
r
id
o
r
co
m
m
u
n
it
y
c
lo
u
d
h
o
s
ti
n
g
p
lan
s
.
Nev
er
t
h
eles
s
,
t
h
e
m
i
g
r
atin
g
th
e
clo
u
d
ap
p
licati
o
n
s
o
n
th
e
clo
u
d
also
b
r
in
g
s
in
m
u
ltip
le
ch
al
len
g
es.
E
s
p
ec
iall
y
d
u
r
in
g
th
e
d
ep
lo
y
m
en
t
o
f
t
h
e
clo
u
d
s
er
v
i
ce
s
,
th
e
i
n
f
r
astru
c
tu
r
e
o
r
th
e
b
u
ild
-
in
s
er
v
ice
s
m
a
y
d
i
f
f
er
f
r
o
m
t
h
e
d
ev
elo
p
m
e
n
t
en
v
ir
o
n
m
e
n
t
to
th
e
o
p
er
atio
n
o
r
d
ep
lo
y
m
e
n
t
en
v
ir
o
n
m
e
n
t.
T
h
ese
d
ep
en
d
en
c
ies
ca
n
lead
to
d
ef
ec
ts
o
r
s
o
m
eti
m
es d
ata
a
n
d
ap
p
licatio
n
s
ec
u
r
it
y
v
u
ln
er
ab
ilit
ie
s
.
Ho
w
e
v
er
,
th
e
s
ec
u
r
it
y
p
r
o
to
co
ls
d
ep
lo
y
ed
o
n
t
h
e
clo
u
d
s
e
r
v
er
s
ca
n
p
r
o
tect
th
e
d
ata
at
t
h
e
co
s
t
o
f
ad
d
itio
n
al
ti
m
e
co
m
p
lex
it
y
,
wh
ich
in
cr
ea
s
es
t
h
e
r
esp
o
n
s
e
ti
m
e
o
f
th
e
ap
p
li
ca
tio
n
s
a
n
d
m
a
y
lead
to
a
d
ec
r
ea
s
e
in
c
u
s
to
m
er
s
ati
s
f
ac
tio
n
.
T
h
u
s
,
s
e
v
er
al
r
esear
ch
at
te
m
p
t
s
w
er
e
m
ad
e
to
r
ed
u
ce
t
h
e
ti
m
e
co
m
p
lex
it
y
o
f
t
h
e
s
ec
u
r
it
y
p
r
o
to
co
ls
o
r
th
e
al
g
o
r
ith
m
s
w
it
h
o
u
t
r
ed
u
c
in
g
t
h
e
ef
f
ec
tiv
e
n
e
s
s
to
f
i
g
h
t
a
g
ai
n
s
t
th
e
attac
k
s
o
n
t
h
e
clo
u
d
.
T
h
u
s
,
th
is
r
esear
c
h
also
atte
m
p
ts
to
r
ed
u
ce
th
e
ti
m
e
c
o
m
p
le
x
it
y
o
f
t
h
e
s
ec
u
r
it
y
p
r
o
to
co
ls
b
y
d
ep
lo
y
in
g
a
n
o
v
el
ch
a
n
g
e
d
etec
tio
n
a
n
d
v
ar
iab
le
-
le
n
g
th
e
n
cr
y
p
tio
n
alg
o
r
ith
m
f
o
r
th
e
v
ir
tu
al
m
ac
h
in
e
d
ata.
T
h
e
ex
is
ti
n
g
s
y
s
te
m
p
r
i
m
ar
il
y
f
o
c
u
s
es
o
n
t
h
e
i
n
f
r
a
s
tr
u
ct
u
r
e
-
b
ased
s
ec
u
r
it
y
f
o
r
th
e
clo
u
d
-
s
er
v
ice
s
.
T
h
at
m
ea
n
s
it
ca
n
o
n
l
y
d
ea
l
with
t
h
e
s
ec
u
r
it
y
is
s
u
e
s
a
f
ter
d
ep
lo
y
m
e
n
t.
Ho
w
ev
er
,
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
[
P
ap
er
–
2
]
ca
n
p
r
o
v
id
e
s
ec
u
r
it
y
f
o
r
t
h
e
clo
u
d
s
er
v
ices
f
r
o
m
d
ev
elo
p
m
e
n
t
to
tes
tin
g
to
d
ep
lo
y
m
e
n
t,
in
all
p
h
ases
.
T
h
e
m
aj
o
r
d
r
aw
b
ac
k
s
o
f
t
h
ese
r
e
s
ea
r
ch
es
to
i
g
n
o
r
e
th
e
m
o
d
er
n
s
o
f
t
w
ar
e
ap
p
licatio
n
d
e
v
elo
p
m
e
n
t
s
tr
ateg
ie
s
,
ch
an
g
e
m
an
a
g
e
m
e
n
t
in
t
h
e
s
o
u
r
ce
co
d
e
an
d
f
in
a
ll
y
t
h
e
g
r
o
w
i
n
g
o
r
s
h
r
i
n
k
i
n
g
v
o
l
u
m
e
o
f
t
h
e
v
ir
t
u
al
m
ac
h
in
e
s
,
r
esp
o
n
s
ib
le
f
o
r
ap
p
licatio
n
h
o
s
ti
n
g
a
n
d
u
s
ed
f
o
r
m
i
g
r
a
tio
n
.
T
h
is
p
r
o
p
o
s
ed
f
r
am
e
wo
r
k
id
en
ti
f
ies
t
h
e
ad
v
an
ta
g
es
o
f
d
etec
ti
n
g
ch
a
n
g
e
m
an
a
g
e
m
e
n
t,
p
r
o
d
u
ce
d
b
y
th
e
De
v
Op
s
p
r
o
ce
s
s
,
as
a
s
c
o
p
e
f
o
r
r
ed
u
cin
g
t
h
e
ti
m
e
co
m
p
le
x
it
y
.
A
ls
o
,
th
e
v
i
r
tu
al
m
ac
h
i
n
e
f
u
n
d
a
m
e
n
tal
ca
p
ab
ilit
ies
as
v
ar
iab
le
len
g
t
h
v
ir
tu
al
m
ac
h
i
n
es
ca
n
also
h
elp
in
r
ed
u
ci
n
g
th
e
ti
m
e
co
m
p
le
x
it
y
f
u
r
t
h
er
.
L
iter
at
u
r
e
r
ev
ie
w
:
t
h
e
r
esear
ch
o
u
tco
m
e
s
f
r
o
m
t
h
e
p
ar
allel
r
esear
ch
es
ar
e
an
al
y
ze
d
.
Mo
tiv
ated
b
y
th
e
n
ee
d
s
o
f
v
ar
io
u
s
ap
p
licati
o
n
d
ev
elo
p
er
s
to
p
r
o
v
id
e
t
h
e
b
est
s
ec
u
r
it
y
to
t
h
eir
ap
p
licati
o
n
s
,
b
u
s
in
e
s
s
lo
g
ic,
an
d
th
e
d
ata,
a
g
o
o
d
n
u
m
b
er
o
f
p
ar
allel
r
esear
ch
e
s
ar
e
ca
r
r
ied
o
u
t.
Mo
s
t
o
f
t
h
e
p
ar
all
el
r
esear
ch
es
h
a
v
e
id
en
ti
f
ied
th
e
n
ee
d
f
o
r
r
o
b
u
s
t
alg
o
r
ith
m
s
to
s
ec
u
r
e
th
e
ap
p
licatio
n
s
an
d
p
r
o
tect
th
e
p
r
i
v
ac
y
o
f
t
h
e
b
u
s
i
n
es
s
u
s
er
s
a
n
d
atte
m
p
ted
to
ac
c
o
m
m
o
d
ate
t
h
e
n
ee
d
i
n
es
s
.
T
h
e
w
o
r
k
o
f
P
.
J
.
B
r
u
en
in
g
et
al.
[
1
]
elab
o
r
ates
o
n
th
e
p
r
iv
ac
y
is
s
u
e
s
o
f
t
h
e
clo
u
d
-
b
ased
ap
p
licatio
n
s
to
a
g
r
ea
ter
ex
te
n
d
.
A
l
s
o
,
t
h
e
n
o
tab
le
s
u
r
v
e
y
a
n
d
a
n
al
y
s
i
s
b
y
M.
Ou
ed
r
ao
g
o
et
al.
[
2
]
d
e
f
i
n
e
t
h
e
i
m
p
o
r
tan
ce
o
f
clo
u
d
s
er
v
ice
p
r
o
v
id
er
s
elec
ti
o
n
s
co
n
s
id
er
in
g
t
h
e
g
r
o
w
t
h
i
n
c
y
b
er
cr
i
m
e
r
ep
o
r
ts
.
No
n
et
h
ele
s
s
,
t
h
e
m
ig
r
atio
n
o
f
th
e
clo
u
d
ap
p
licatio
n
s
m
u
s
t
b
e
tak
en
w
it
h
th
e
h
i
g
h
e
s
t
p
r
io
r
it
y
to
m
ai
n
tai
n
th
e
m
ar
k
et
ca
p
italizatio
n
an
d
b
u
ild
in
g
h
i
g
h
l
y
c
u
s
to
m
er
s
s
atis
f
iab
le
ap
p
licatio
n
.
T
h
is
m
i
g
r
atio
n
d
e
m
a
n
d
s
h
ig
h
l
y
a
u
to
m
ated
to
o
ls
a
n
d
s
tr
ateg
ie
s
.
T
h
e
w
o
r
k
b
y
A
.
K
h
aj
eh
-
Ho
s
s
ei
n
i
e
t
al.
[
3
]
elab
o
r
ates
o
n
th
e
ad
v
an
tag
e
s
o
f
v
ar
i
o
u
s
to
o
ls
to
s
u
p
p
o
r
t
th
e
m
i
g
r
atio
n
p
r
o
ce
s
s
a
n
d
cr
it
ical
d
ec
is
io
n
s
u
p
p
o
r
t
s
it
u
atio
n
s
.
T
h
ese
s
a
m
e
ad
v
a
n
tag
e
s
ar
e
also
w
ell
d
i
s
cu
s
s
ed
b
y
P
.
J
am
s
h
id
i e
t a
l.
[
4
]
.
Fo
r
a
lo
n
g
,
th
e
ap
p
licatio
n
d
ev
elo
p
er
s
h
av
e
h
esit
ated
to
d
ep
lo
y
o
r
m
ig
r
ate
t
h
eir
ap
p
licatio
n
s
o
r
s
er
v
ices
o
n
to
th
e
clo
u
d
as
th
e
b
u
s
i
n
ess
ap
p
licatio
n
s
a
n
d
th
e
d
ata
g
en
er
ated
b
y
t
h
ese
ap
p
licatio
n
s
ar
e
h
o
s
ted
o
n
th
ir
d
-
p
ar
t
y
i
n
f
r
astr
u
ctu
r
e
as
o
n
e
o
f
th
e
p
r
i
m
ar
y
co
n
ce
r
n
s
.
T
h
e
ea
r
l
y
d
a
y
s
'
co
n
ce
r
n
s
an
d
th
e
tr
ad
itio
n
al
s
ec
u
r
it
y
m
ea
s
u
r
e
s
ar
e
w
ell
d
o
cu
m
e
n
ted
i
n
th
e
w
o
r
k
ca
r
r
ied
o
u
t
b
y
C
.
Kallo
n
ia
tis
et
al.
[
5
]
.
A
ls
o
,
y
et
a
n
o
th
er
co
n
ce
r
n
o
f
t
h
e
u
s
er
p
r
iv
ac
y
,
t
h
e
co
n
s
u
m
er
s
u
s
i
n
g
th
e
s
e
d
e
p
lo
y
ed
ap
p
licatio
n
s
,
w
a
s
t
h
e
tr
ig
g
er
i
n
g
f
ac
to
r
as
w
ell.
T
h
e
ap
p
licatio
n
d
ev
elo
p
er
s
w
er
e
an
x
io
u
s
to
f
in
d
o
u
t
th
e
d
ep
th
o
f
th
e
s
ec
u
r
it
y
p
r
o
v
id
ed
b
y
t
h
e
clo
u
d
p
r
o
v
id
er
s
.
No
n
eth
e
less
,
t
h
e
la
ck
o
f
a
v
ailab
ilit
y
o
f
th
e
s
ec
u
r
it
y
m
ec
h
a
n
is
m
s
tr
e
n
g
t
h
an
al
y
s
is
m
ea
s
u
r
e
s
w
a
s
a
r
ea
l
b
o
ttlen
ec
k
.
T
h
e
w
o
r
k
o
f
S
.
P
ea
r
s
o
n
et
al.
[
6
]
h
ig
h
li
g
h
ted
th
e
g
ap
s
an
d
t
h
e
Fed
R
A
MP
[
7
]
as
an
au
to
m
ated
an
d
in
d
ep
en
d
en
t
o
r
g
a
n
izatio
n
h
as
f
o
r
m
u
lated
th
e
g
u
id
el
in
es.
T
h
ese
g
u
id
elin
e
s
en
s
u
r
ed
th
e
co
m
p
u
ls
o
r
y
s
ec
u
r
it
y
m
ea
s
u
r
es
to
b
e
tak
en
b
y
all
clo
u
d
p
r
o
v
id
er
s
f
o
r
all
ap
p
licatio
n
s
.
T
h
ese
m
ad
e
th
e
ap
p
licatio
n
d
ev
elo
p
er
s
in
cr
ea
s
e
th
eir
tr
u
s
t
in
h
o
s
ti
n
g
t
h
e
ap
p
licatio
n
s
o
n
th
e
clo
u
d
.
T
h
e
o
v
er
all
s
ce
n
ar
i
o
is
w
ell
f
u
r
n
i
s
h
e
d
in
t
h
e
w
o
r
k
o
f
P
.
J
.
B
r
u
en
in
g
e
t a
l.
[
1
]
.
A
s
p
er
th
e
r
ep
o
r
t b
y
P
.
J
.
B
r
u
en
in
g
et
al.
[
1
]
,
th
e
m
aj
o
r
ity
o
f
t
h
e
clo
u
d
-
b
ased
ap
p
licatio
n
s
ar
e
v
u
ln
er
ab
le
to
o
p
en
A
P
I
s
,
leak
a
g
e
o
f
b
u
s
i
n
es
s
d
ata,
i
m
p
r
o
p
er
d
ata
m
a
n
ag
e
m
e
n
t,
a
n
d
m
alicio
u
s
ac
ce
s
s
,
m
a
k
i
n
g
t
h
e
ap
p
licatio
n
s
h
i
g
h
l
y
in
s
ec
u
r
e.
T
h
u
s
,
t
h
e
r
esear
c
h
er
s
h
a
v
e
att
e
m
p
ted
to
p
r
o
v
id
e
p
r
o
ac
t
iv
e
s
ec
u
r
it
y
m
ea
s
u
r
es
t
o
av
o
id
o
r
p
r
ev
en
t
th
e
s
e
s
ec
u
r
it
y
b
r
ea
ch
e
s
.
An
al
y
z
in
g
t
h
e
r
is
k
s
o
f
o
p
en
ac
ce
s
s
A
P
I
s
,
th
e
r
e
s
ea
r
ch
b
y
M.
T
h
eo
h
ar
id
o
u
et
al.
[
8
]
o
p
en
s
n
e
w
e
r
d
im
e
n
s
io
n
s
o
f
t
h
e
w
o
r
k
s
.
A
l
s
o
,
th
e
co
n
tr
ib
u
tio
n
b
y
H.
T
ak
ab
i
et
al.
[
9
]
lis
ts
th
e
s
ig
n
i
f
ica
n
t
b
en
c
h
m
ar
k
s
f
o
r
m
ak
in
g
t
h
e
s
ec
u
r
it
y
al
g
o
r
ith
m
s
b
etter
.
No
t
li
m
iti
n
g
to
o
p
en
A
P
I
d
ef
ec
ts
,
th
e
w
o
r
k
o
f
M.
Gr
eg
g
et
al.
[
1
0
]
ela
b
o
r
ates
o
n
s
ec
u
r
in
g
t
h
e
ap
p
licatio
n
d
ata
f
r
o
m
a
tr
o
j
an
o
r
th
e
m
a
n
-
in
-
t
h
e
-
m
id
d
l
e
attac
k
s
.
T
h
e
s
ec
u
r
it
y
co
n
ce
r
n
s
d
if
f
er
f
r
o
m
th
e
s
ce
n
a
r
io
s
to
s
ce
n
ar
i
o
s
o
f
clo
u
d
s
er
v
ice
p
r
o
v
id
er
s
an
d
th
e
ap
p
licatio
n
t
y
p
es.
R
e
g
ar
d
less
to
m
e
n
tio
n
,
m
a
n
y
o
f
th
e
ap
p
licatio
n
s
m
u
s
t
p
r
o
v
id
e
o
p
en
ac
ce
s
s
to
th
e
b
u
s
in
e
s
s
d
ata
d
u
e
to
t
h
e
p
r
o
ce
s
s
f
lo
w
o
f
t
h
e
ap
p
licatio
n
s
a
n
d
al
s
o
,
m
an
y
o
f
th
e
ap
p
licatio
n
s
,
i
n
t
h
e
o
t
h
er
h
a
n
d
,
m
u
s
t
p
r
o
v
id
e
m
u
ltip
le
le
v
els
o
f
s
ec
u
r
it
y
la
y
er
s
f
o
r
th
e
a
u
t
h
en
t
icat
ed
u
s
er
s
to
ac
ce
s
s
th
e
b
u
s
in
e
s
s
d
ata,
en
co
u
r
ag
i
n
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
21
,
No
.
2
,
Feb
r
u
ar
y
2
0
2
1
:
8
7
4
-
8
8
5
876
th
e
h
i
g
h
er
ti
m
e
r
esp
o
n
s
e
ti
m
e
s
.
T
h
e
d
if
f
er
en
t
ial
s
ec
u
r
it
y
m
ea
s
u
r
es
ar
e
w
ell
d
e
m
o
n
s
tr
ated
b
y
t
h
e
w
o
r
k
o
f
S.
P
ea
r
s
o
n
et
al.
[
6
]
.
Th
e
b
u
s
in
es
s
d
ata,
g
en
er
ated
b
y
t
h
e
ap
p
licatio
n
h
o
s
ted
o
n
t
h
e
clo
u
d
,
is
o
f
te
n
r
ep
licated
t
o
p
r
o
v
id
e
th
e
p
ar
allelis
m
o
f
t
h
e
ap
p
licatio
n
s
.
D
u
e
to
v
ar
io
u
s
b
u
s
i
n
ess
r
eq
u
ir
e
m
e
n
t
s
,
th
e
r
ep
licat
ed
d
ata
in
v
ar
io
u
s
lo
ca
tio
n
s
ar
e
s
ec
u
r
ed
w
it
h
d
i
f
f
er
en
t
s
ec
u
r
it
y
p
o
lici
es.
T
h
e
s
ec
u
r
it
y
p
o
licies
i
n
d
if
f
er
en
t
lo
ca
tio
n
s
ca
n
b
e
id
en
ti
f
ied
as
w
ea
k
o
r
v
er
y
s
tr
o
n
g
d
ep
en
d
in
g
o
n
t
h
e
r
eq
u
ir
e
m
e
n
ts
.
T
h
e
attac
k
er
s
ca
n
id
en
ti
f
y
th
e
s
e
v
u
l
n
er
ab
ilit
ie
s
a
n
d
m
a
k
e
t
h
e
d
ata
ta
m
p
er
i
n
g
.
T
h
e
s
o
l
u
tio
n
to
th
i
s
p
r
o
b
le
m
w
as
p
r
o
v
id
ed
b
y
M.
Mu
lazz
an
i
et
al.
[
1
1
]
.
Ma
n
y
o
f
th
e
in
s
ta
n
ce
s
,
t
h
e
a
p
p
licatio
n
d
ev
elo
p
er
s
a
n
d
cl
o
u
d
s
er
v
ice
p
r
o
v
id
er
s
ar
e
cr
i
ticized
f
o
r
m
ak
in
g
t
h
e
s
ec
u
r
it
y
e
x
tr
e
m
el
y
h
i
g
h
an
d
co
m
p
r
o
m
is
e
o
n
t
h
e
ti
m
e
co
m
p
le
x
it
y
.
A
g
e
n
er
ic
f
r
a
m
e
w
o
r
k
w
as
p
r
o
p
o
s
ed
b
y
S.
De
C
ap
itan
i
d
i
Vi
m
er
ca
ti
et
al.
[
1
2
]
to
i
d
en
tify
t
h
e
d
esire
d
co
m
p
le
x
it
y
le
v
el
o
f
s
ec
u
r
it
y
.
T
h
i
s
f
r
a
m
e
w
o
r
k
is
w
ell
ac
ce
p
ted
in
r
esear
ch
er
s
an
d
p
r
ac
titi
o
n
er
’
s
co
m
m
u
n
itie
s
.
T
h
e
v
ir
tu
al
m
ac
h
in
e
s
a
n
d
th
e
ap
p
licatio
n
s
r
u
n
n
in
g
o
n
t
h
ese
v
ir
t
u
al
m
ac
h
in
e
s
ca
n
a
ls
o
b
ec
o
m
e
v
u
l
n
er
ab
le
to
t
h
e
attac
k
s
as
th
e
v
ir
t
u
al
m
ac
h
in
e
s
m
i
g
r
ate
as
p
lain
te
x
t o
v
er
th
e
in
ter
n
et.
T
h
e
in
it
ial
s
tr
ateg
y
f
o
r
s
ec
u
r
i
n
g
th
e
v
ir
t
u
al
m
ac
h
in
e
d
ata
w
a
s
p
r
o
p
o
s
ed
b
y
D.
G.
R
o
s
ad
o
et
al.
[
1
3
]
an
d
th
e
w
o
r
k
i
s
f
u
r
th
er
e
n
h
an
ce
d
b
y
M.
Kle
m
s
e
t a
l.
[
1
4
]
f
o
r
e
-
b
u
s
i
n
ess
s
y
s
te
m
s
.
T
h
e
v
ir
tu
al
m
ac
h
i
n
es
ar
e
v
u
ln
er
ab
le
d
u
r
in
g
th
e
m
i
g
r
atio
n
p
r
o
ce
s
s
f
o
r
m
a
n
y
p
o
s
s
ib
le
m
ig
r
atio
n
s
an
d
o
th
er
task
s
[
1
5
-
1
9
]
.
A
s
a
r
esu
lt,
th
e
Ser
v
ice
p
r
o
v
id
er
w
ill
b
ec
o
m
e
o
u
t
o
f
s
er
v
ice
w
h
en
e
v
er
m
a
n
y
p
ac
k
ets
ar
e
f
lo
o
d
ed
b
y
attac
k
er
s
.
Var
io
u
s
tech
n
o
lo
g
ies ar
e
b
ein
g
u
s
ed
f
o
r
h
an
d
li
n
g
s
u
c
h
attac
k
s
[
2
0
-
2
5
]
.
T
h
e
tech
n
o
lo
g
y
w
h
ic
h
h
as
a
b
o
o
m
i
n
th
e
f
ield
o
f
co
m
p
u
ter
s
cien
ce
n
o
w
ad
a
y
s
is
co
n
s
id
er
ed
as
C
lo
u
d
C
o
m
p
u
tin
g
.
Var
io
u
s
r
esear
c
h
p
r
o
j
ec
ts
ar
e
b
ein
g
u
n
d
er
tak
e
n
b
y
m
a
n
y
r
esear
c
h
er
s
i
n
t
h
is
f
ie
ld
.
R
esear
ch
er
s
ar
e
d
ev
elo
p
i
n
g
d
if
f
er
en
t
C
u
s
to
m
-
Dr
iv
en
ap
p
licatio
n
s
u
n
d
er
clo
u
d
en
v
ir
o
n
m
e
n
ts
.
Ma
n
y
I
T
C
o
r
p
o
r
ate
C
o
m
p
an
ie
s
lik
e
Go
o
g
le,
I
B
M,
Or
ac
le,
Mi
cr
o
s
o
f
t
h
a
v
e
s
tar
ted
to
e
n
h
a
n
c
e
th
e
i
n
te
g
r
atio
n
o
f
th
eir
r
esp
e
ctiv
e
p
r
o
d
u
cts
w
i
th
th
e
e
m
er
g
i
n
g
C
lo
u
d
C
o
m
p
u
ti
n
g
T
ec
h
n
o
lo
g
y
.
B
u
t,
I
t
h
as
b
ec
o
m
e
a
ted
io
u
s
task
to
in
te
g
r
ate
th
eir
s
p
ec
i
f
ic
p
r
o
d
u
cts
in
C
lo
u
d
C
o
m
p
u
ti
n
g
en
v
ir
o
n
m
en
t
s
.
I
n
ter
o
p
er
ab
ilit
y
is
t
h
e
k
e
y
to
b
ec
o
m
e
t
h
e
s
u
cc
ess
o
f
C
lo
u
d
C
o
m
p
u
tin
g
i
n
f
u
tu
r
e
e
n
d
ea
v
o
r
s
.
On
e
o
f
t
h
e
id
ea
s
o
f
t
h
i
s
r
ese
ar
ch
is
to
i
n
tr
o
d
u
ce
C
lo
u
d
I
n
t
er
o
p
er
a
b
ilit
y
i
n
t
h
e
f
ield
o
f
C
lo
u
d
C
o
m
p
u
ti
n
g
[
2
1
-
2
4
]
.
T
h
e
lo
ad
in
C
lo
u
d
Data
C
e
n
t
er
w
i
ll
b
e
i
m
b
ala
n
ce
w
h
en
e
v
e
r
a
h
u
g
e
v
o
l
u
m
e
o
f
s
eq
u
en
t
ial
in
co
m
in
g
f
u
n
ctio
n
r
eq
u
est
s
to
p
h
y
s
ical
h
o
s
ts
.
E
x
ec
u
tio
n
i
n
e
f
f
ic
ien
c
y
f
o
r
task
s
is
ca
r
r
ied
o
u
t
i
n
t
h
e
l
o
n
g
r
u
n
e
v
en
s
o
m
e
ex
is
t
in
g
w
o
r
k
s
b
alan
ce
t
h
e
l
o
ad
w
it
h
o
p
ti
m
izat
io
n
al
g
o
r
it
h
m
s
i
n
s
elec
tin
g
t
h
e
o
p
ti
m
al
h
o
s
t
f
o
r
ac
h
ie
v
i
n
g
in
s
ta
n
ta
n
eo
u
s
lo
ad
b
alan
cin
g
[
2
2
-
2
3
]
.
No
n
eth
ele
s
s
,
t
h
e
p
r
esen
t
ti
m
e
co
m
p
le
x
it
y
o
f
t
h
e
s
ec
u
r
i
t
y
p
o
licies
is
h
ig
h
er
an
d
s
i
g
n
if
ies
a
p
o
s
s
ib
ilit
y
f
o
r
r
ed
u
ctio
n
.
T
h
e
r
ed
u
ctio
n
i
n
ti
m
e
co
m
p
le
x
it
y
m
u
s
t
ad
d
r
ess
t
h
e
co
n
ti
n
u
o
u
s
ch
a
n
g
es
in
th
e
s
o
u
r
ce
co
d
e
o
f
th
e
ap
p
licatio
n
s
an
d
t
h
e
v
a
r
iab
le
len
g
th
o
f
t
h
e
v
ir
tu
al
m
ac
h
in
e
s
d
ep
lo
y
ed
o
v
er
t
h
e
clo
u
d
i
n
s
tan
ce
s
.
Hen
ce
f
o
r
th
,
w
it
h
a
d
etailed
u
n
d
er
s
tan
d
i
n
g
o
f
th
e
r
esear
c
h
o
u
tco
m
es
f
r
o
m
t
h
e
p
ar
allel
r
esear
ch
es,
t
h
is
w
o
r
k
p
r
o
v
id
es a
n
o
v
el
f
r
a
m
e
w
o
r
k
to
ad
d
r
ess
v
ar
io
u
s
n
ee
d
s
f
o
r
clo
u
d
-
b
ased
ap
p
licatio
n
d
ep
lo
y
m
en
t sec
u
r
ities
.
2.
F
UNCTI
O
N
AL
O
U
T
CO
M
E
S F
RO
M
DE
VO
P
S
T
h
e
f
u
n
ctio
n
a
l
r
es
u
ts
f
r
o
m
th
e
Dev
Op
s
p
r
o
ce
s
s
ar
e
id
en
ti
f
i
ed
.
T
h
ese
r
esu
lts
w
i
ll
h
elp
to
r
ea
lize
th
e
s
ec
u
r
it
y
n
ee
d
s
f
o
r
th
e
clo
u
d
ap
p
licatio
n
s
er
v
ice.
Dev
Op
s
i
s
th
e
b
len
d
o
f
s
o
cial
th
eo
r
ies,
p
r
ac
tices,
an
d
d
ev
ices
th
at
e
x
p
an
d
an
a
s
s
o
ciatio
n
'
s
c
ap
ac
it
y
to
co
n
v
e
y
ap
p
licatio
n
s
an
d
ad
m
in
i
s
tr
atio
n
s
at
h
ig
h
s
p
ee
d
:
T
h
is
s
p
ee
d
e
m
p
o
w
er
s
ass
o
ciatio
n
s
to
m
o
r
e
r
ea
d
ily
s
er
v
e
t
h
eir
clien
t
s
an
d
co
n
ten
t e
v
e
n
m
o
r
e
s
u
cc
es
s
f
u
ll
y
i
n
th
e
m
ar
k
e
t.
Un
d
er
th
e
Dev
Op
s
m
o
d
el,
i
m
p
r
o
v
e
m
e
n
t
a
n
d
ac
ti
v
itie
s
g
r
o
u
p
s
ar
e
n
o
m
o
r
e
d
r
a
w
n
-
o
u
t
"
s
ilo
ed
.
"
So
m
eti
m
es,
t
h
ese
t
w
o
g
r
o
u
p
s
ar
e
c
o
n
v
er
ted
in
to
a
s
o
litar
y
g
r
o
u
p
w
h
er
e
th
e
ar
ch
itect
s
w
o
r
k
o
v
er
th
e
w
h
o
l
e
ap
p
licatio
n
lif
ec
y
cle,
f
r
o
m
ad
v
an
ce
m
e
n
t
an
d
test
to
s
en
d
t
o
t
h
e
task
an
d
b
u
ild
u
p
a
s
co
p
e
o
f
ab
ilit
ies
n
o
t
co
n
s
tr
ain
ed
to
a
u
n
ac
co
m
p
an
i
ed
ca
p
ac
it
y
as
s
h
o
w
n
in
Fi
g
u
r
e
1
.
I
n
s
o
m
e
De
v
Op
s
m
o
d
els,
q
u
alit
y
a
f
f
ir
m
atio
n
an
d
s
ec
u
r
it
y
g
r
o
u
p
s
m
a
y
t
u
r
n
o
u
t
to
b
e
m
o
r
e
f
ir
m
l
y
co
o
r
d
in
ated
w
it
h
i
m
p
r
o
v
e
m
e
n
t
a
n
d
ac
tiv
i
ties
a
n
d
al
l
t
h
r
o
u
g
h
t
h
e
ap
p
licatio
n
l
if
ec
y
cle.
A
t
t
h
is
p
o
in
t,
w
h
e
n
s
ec
u
r
it
y
is
t
h
e
m
ain
e
m
p
h
a
s
is
o
f
ev
er
y
b
o
d
y
's
o
n
a
Dev
Op
s
g
r
o
u
p
,
th
is
i
s
to
b
e
allu
d
ed
to
as De
v
SecOp
s
.
T
h
ese
g
r
o
u
p
s
u
s
e
p
r
ac
tices
to
co
n
v
e
y
f
o
r
m
s
t
h
at
v
er
i
f
iab
l
y
h
a
v
e
b
ee
n
m
an
u
al
an
d
m
o
d
er
ate.
T
h
ey
u
ti
lize
an
i
n
n
o
v
atio
n
s
tack
a
n
d
to
o
lin
g
,
w
h
ic
h
en
ab
le
th
e
m
to
w
o
r
k
an
d
d
ev
elo
p
ap
p
li
ca
tio
n
s
r
ap
id
l
y
an
d
d
ep
en
d
ab
ly
.
T
h
ese
ap
p
ar
atu
s
es
lik
e
w
i
s
e
h
elp
to
b
u
ild
au
to
n
o
m
o
u
s
l
y
ac
h
ie
v
e
ass
i
g
n
m
en
ts
(
f
o
r
in
s
ta
n
ce
,
s
en
d
i
n
g
co
d
e
o
r
p
r
o
v
is
io
n
in
g
f
r
a
m
e
w
o
r
k
)
th
at
t
y
p
icall
y
w
o
u
l
d
h
av
e
r
eq
u
ir
ed
ass
i
s
ta
n
ce
f
r
o
m
d
if
f
er
en
t g
r
o
u
p
s
,
an
d
th
i
s
f
u
r
th
er
e
x
p
an
d
s
a
g
r
o
u
p
's s
p
ee
d
as s
h
o
w
n
i
n
Fi
g
u
r
e
2.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
A
s
ec
u
r
e
clo
u
d
s
ervice
d
ep
lo
y
men
t fra
mewo
r
k
fo
r
Dev
Op
s
(
P
R
a
vin
d
er R
a
o
)
877
Fig
u
r
e
1
.
Dev
Op
s
ca
p
ab
ilit
ies
Fig
u
r
e
2
.
P
r
o
ce
s
s
o
r
ien
ted
De
v
Op
s
2
.
1
.
Cre
a
t
e
pro
ce
s
s
-
peo
ple
-
t
o
o
ls
ec
o
s
y
s
t
em
Dev
Op
s
in
co
r
p
o
r
ates
in
d
i
v
id
u
als,
p
r
o
ce
d
u
r
es,
an
d
d
ev
ices
t
o
g
eth
er
to
c
h
a
n
g
e
an
ass
o
ciat
io
n
i
n
to
a
s
o
litar
y
s
u
b
s
ta
n
ce
.
2
.
2
.
I
nte
g
ra
t
io
n f
o
r
dev
el
o
pm
e
nt
W
h
en
t
h
e
en
tire
ass
o
ciat
io
n
is
r
ea
d
y
,
t
h
e
d
ev
elo
p
er
s
ce
n
ter
s
h
o
u
ld
s
w
i
n
g
to
t
h
e
Dev
Op
s
g
r
o
u
p
its
el
f
.
Her
e,
th
e
f
u
n
d
a
m
en
tal
i
s
s
u
e
i
s
to
g
iv
e
d
ev
elo
p
er
s
p
r
ec
is
e,
a
la
m
o
d
e
d
ata
ab
o
u
t
th
e
g
e
n
er
atio
n
co
n
d
itio
n
s
o
th
e
y
ca
n
d
esi
g
n
t
h
e
o
r
g
a
n
izati
o
n
p
r
o
p
er
ly
.
2
.
3
.
T
esting
T
h
e
s
n
ap
p
ier
t
h
e
co
m
p
a
n
y
g
e
ts
i
n
p
u
t
o
n
ch
a
n
g
es,
t
h
e
b
ette
r
d
ev
elo
p
er
’
s
p
r
o
g
r
a
m
m
in
g
q
u
alit
y
w
i
ll
b
e.
I
n
th
e
cu
s
to
m
ar
y
ca
s
ca
d
e
p
r
o
ce
s
s
,
th
e
to
tal
co
d
e
m
o
v
e
s
f
r
o
m
i
m
p
r
o
v
e
m
e
n
t
to
th
e
te
s
tin
g
r
eg
io
n
an
d
is
th
en
p
u
s
h
ed
to
g
en
er
atio
n
o
n
th
e
o
f
f
c
h
an
ce
t
h
at
it
ef
f
ec
ti
v
el
y
f
i
n
is
h
es
t
h
e
test
.
I
f
n
o
t,
th
e
c
o
d
e
is
s
en
t
b
ac
k
to
ad
v
an
ce
m
en
t f
o
r
alter
in
g
.
I
t ta
k
es a
d
d
itio
n
al
ti
m
e
a
n
d
is
les
s
d
ep
en
d
ab
le.
2
.
4
.
Deplo
y
m
ent
f
o
r
het
er
o
g
eneo
us
s
y
s
t
e
m
s
C
o
n
s
tan
t
s
e
n
d
in
g
b
r
o
ad
en
s
n
o
n
s
to
p
co
n
v
e
y
a
n
ce
.
E
ac
h
f
o
r
m
th
at
e
f
f
ec
ti
v
el
y
f
i
n
i
s
h
e
s
a
f
u
ll
test
c
y
cle
is
n
at
u
r
all
y
s
e
n
t.
I
t
k
i
lls
t
h
e
r
e
q
u
ir
e
m
e
n
t
f
o
r
h
u
m
a
n
i
n
ter
ce
s
s
io
n
to
ch
o
o
s
e
w
h
at
to
co
n
v
e
y
an
d
w
h
e
n
to
s
e
n
d
.
W
ith
n
o
n
s
to
p
s
e
n
d
in
g
,
as
s
o
ciatio
n
s
ca
n
r
ap
id
l
y
co
n
v
e
y
n
e
w
h
ig
h
li
g
h
ts
a
n
d
u
p
d
ates
w
h
ile
p
r
o
ac
tiv
el
y
m
ak
in
g
ch
an
g
es
to
th
e
ite
m
.
T
o
d
ec
r
ea
s
e
d
o
w
n
t
i
m
e
a
n
d
m
o
d
er
ate
d
a
n
g
er
s
,
ass
o
ciatio
n
s
ca
n
th
i
n
k
ab
o
u
t
w
h
at
'
s
k
n
o
wn
as
a
b
lu
e/
g
r
ee
n
o
r
g
an
iza
tio
n
.
I
n
t
h
is
tec
h
n
iq
u
e,
w
h
e
n
a
ch
an
g
e
i
s
m
ad
e
an
d
a
n
o
th
er
s
en
d
i
n
g
(
b
lu
e)
is
ac
tiv
ated
,
it is
co
n
v
e
y
ed
in
p
ar
allel
to
th
e
f
o
r
m
er
o
n
e
(
g
r
ee
n
)
.
2
.
5
.
P
er
f
o
rm
a
nce
m
o
nito
rin
g
I
n
a
r
o
b
o
tized
s
it
u
atio
n
,
ex
ec
u
tio
n
ch
ec
k
i
n
g
i
s
cr
itical,
an
d
th
er
e
ar
e
a
f
e
w
i
n
s
tr
u
m
en
t
s
to
h
elp
.
B
ef
o
r
e
th
e
co
m
p
a
n
y
p
ick
s
th
e
d
e
v
elo
p
er
'
s
in
s
tr
u
m
e
n
t
s
,
th
e
co
m
p
an
y
n
ee
d
s
to
r
ec
o
g
n
ize
t
h
e
k
e
y
m
ea
s
u
r
e
m
e
n
t
s
t
h
e
co
m
p
a
n
y
n
ee
d
s
to
s
cr
ee
n
.
A
g
i
le
a
n
d
Dev
Op
s
s
er
v
e
d
is
ti
n
ct
f
u
n
ctio
n
s
:
s
ev
er
al
co
n
v
e
n
tio
n
al
Dev
Op
s
cli
n
ic
s
li
k
e
au
to
m
ate
d
b
u
ild
an
d
ev
al
u
atio
n
,
co
n
ti
n
u
o
u
s
i
n
te
g
r
atio
n
,
a
n
d
also
c
o
n
tin
u
o
u
s
s
h
ip
p
in
g
s
tar
ted
f
r
o
m
th
e
p
la
n
et,
th
at
m
o
v
e
s
(
in
f
o
r
m
all
y
)
in
to
t
h
e
1
9
9
0
s
,
an
d
also
o
f
f
iciall
y
to
2
0
0
1
.
A
g
ile
co
u
ld
b
e
lo
o
k
ed
at
ad
d
r
ess
i
n
g
co
m
m
u
n
icatio
n
g
ap
s
b
et
w
ee
n
cl
ien
t
s
a
n
d
p
r
o
g
r
a
m
m
er
s
,
w
h
er
ea
s
Dev
Op
s
ad
d
r
ess
e
s
d
if
f
er
e
n
ce
s
b
et
w
ee
n
p
r
o
g
r
a
m
m
er
s
an
d
I
T
o
p
e
r
atio
n
s
/in
f
r
as
t
r
u
ctu
r
e.
A
d
d
itio
n
all
y
,
Dev
Op
s
h
as
g
i
v
e
n
atte
n
tio
n
to
th
e
in
s
tallatio
n
o
f
d
ev
elo
p
e
d
ap
p
licatio
n
s
,
w
h
ile
it
's d
ev
el
o
p
ed
v
ia
A
g
i
le
o
r
alter
n
ativ
e
s
y
s
te
m
s
.
W
h
ile
co
n
t
in
u
o
u
s
m
o
n
i
to
r
in
g
is
ca
n
ter
ed
o
n
au
to
m
ati
n
g
t
h
e
p
r
o
ce
d
u
r
es
i
n
co
m
p
u
ter
s
o
f
t
w
ar
e
s
h
ip
p
in
g
,
Dev
Op
s
ad
d
itio
n
all
y
tar
g
ets
th
e
o
r
g
a
n
izat
io
n
al
s
h
if
t
to
e
n
co
u
r
ag
e
g
r
ea
t
co
o
p
er
atio
n
b
e
t
w
ee
n
th
e
v
ar
io
u
s
p
u
r
p
o
s
es r
eq
u
ir
ed
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
21
,
No
.
2
,
Feb
r
u
ar
y
2
0
2
1
:
8
7
4
-
8
8
5
87
8
3.
P
RO
P
O
SE
D
CH
AN
G
E
B
AS
E
D
VM
RE
G
I
O
N
SE
CU
RI
T
Y
AL
G
O
R
I
T
H
M
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
s
ar
e
elab
o
r
ated
.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
is
b
u
ilt
i
n
to
t
h
r
ee
p
ar
ts
as
c
h
a
n
g
e
d
etec
tio
n
in
th
e
s
o
u
r
ce
co
d
e
d
u
r
in
g
th
e
De
v
Op
s
p
r
o
ce
s
s
,
en
cr
y
p
tio
n
o
f
th
e
c
h
an
g
ed
p
ar
t
an
d
d
ec
r
y
p
tio
n
o
f
th
e
to
tal
VM
d
ata.
T
h
e
f
ir
s
t p
ar
t o
f
th
e
al
g
o
r
ith
m
i
s
f
u
r
n
is
h
ed
h
e
r
e:
A
l
g
o
r
ith
m
F
lo
w
-
1
:
So
u
r
ce
C
o
d
e
C
h
an
g
e
Dete
ctio
n
A
lg
o
r
it
h
m
(
S
C
C
D)
T
h
e
p
r
o
p
o
s
ed
SC
C
D
al
g
o
r
it
h
m
i
s
d
esi
g
n
ed
to
d
etec
t
t
h
e
ch
a
n
g
e
s
i
n
th
r
ee
m
aj
o
r
p
ar
ts
.
Firs
tl
y
,
in
cl
u
d
e
an
d
p
ac
k
ag
e
s
tate
m
e
n
ts
to
d
en
o
te
th
e
d
ep
en
d
en
c
y
c
h
an
g
es.
T
h
e
in
cl
u
d
e
an
d
p
ac
k
ag
e
s
tate
m
e
n
ts
ar
e
g
en
er
all
y
u
s
ed
to
s
u
p
p
o
r
t
th
e
ap
p
licatio
n
co
d
e
w
it
h
ex
ter
n
al
o
r
in
ter
n
al
r
eu
s
ab
le
co
d
es,
an
d
also
an
y
c
h
an
g
e
s
in
th
e
co
d
e
d
ep
en
d
en
cies.
Sec
o
n
d
l
y
,
th
e
id
en
tifie
r
s
in
t
h
e
co
d
e
b
lo
ck
s
ar
e
u
s
ed
to
d
o
f
u
n
c
t
io
n
al
w
o
r
k
s
i
n
th
e
co
d
e.
Of
ten
t
h
e
lo
o
p
s
o
r
t
h
e
c
o
n
tr
o
l
s
tate
m
en
ts
.
An
y
ch
a
n
g
e
in
t
h
e
id
e
n
ti
f
ier
s
ca
n
s
ig
n
i
f
ica
n
tl
y
d
e
m
o
n
s
tr
ate
a
ch
an
g
e
i
n
th
e
f
u
n
ctio
n
alitie
s
.
Fin
all
y
,
t
h
e
to
k
en
s
ar
e
u
s
ed
i
n
th
e
s
o
u
r
ce
co
d
e
f
o
r
m
ai
n
tai
n
in
g
t
h
e
d
ata.
An
y
ch
an
g
es
i
n
t
h
e
to
k
e
n
s
ca
n
s
i
g
n
i
f
y
t
h
e
ch
a
n
g
e
i
n
th
e
d
ata
f
lo
w
p
r
o
ce
s
s
i
n
th
e
s
o
u
r
ce
co
d
e
an
d
ca
n
id
e
n
t
if
y
t
h
e
w
a
y
d
ata
is
c
h
an
g
i
n
g
.
T
h
e
p
u
r
p
o
s
e
o
f
th
e
SC
C
D
alg
o
r
it
h
m
is
to
id
en
ti
f
y
t
h
e
ch
a
n
g
e
s
in
th
e
s
o
u
r
ce
co
d
e
d
u
r
in
g
th
e
De
v
Op
s
p
r
o
ce
s
s
an
d
o
n
l
y
ap
p
l
y
s
ec
u
r
it
y
al
g
o
r
ith
m
s
f
o
r
th
e
c
h
an
g
ed
p
ar
ts
to
r
ed
u
ce
th
e
ti
m
e
co
m
p
le
x
it
y
o
f
t
h
e
co
m
p
lete
p
r
o
ce
s
s
.
T
h
e
s
ec
o
n
d
p
ar
t o
f
th
e
alg
o
r
it
h
m
i
s
f
u
r
n
is
h
ed
h
er
e:
A
l
g
o
r
ith
m
F
lo
w
-
2
:
Var
iab
le
L
e
n
g
t
h
VM
E
n
cr
y
p
tio
n
Alg
o
r
i
th
m
(
V
L
VE
)
T
h
e
p
r
o
p
o
s
ed
VL
VE
a
lg
o
r
it
h
m
i
s
p
r
o
v
e
n
to
b
e
o
n
e
o
f
th
e
b
est
al
g
o
r
ith
m
s
to
e
n
cr
y
p
t
t
h
e
v
ir
tu
a
l
m
ac
h
in
e
d
ata
a
s
t
h
e
v
ir
t
u
al
m
ac
h
in
e
s
p
ac
e
ca
lc
u
latio
n
s
ar
e
d
o
n
e
b
ased
o
n
t
h
e
to
tal
b
lo
ck
s
allo
ca
ted
o
n
t
h
e
clo
u
d
s
er
v
er
.
Nev
er
th
ele
s
s
,
t
h
e
v
ir
t
u
al
m
ac
h
i
n
es
ca
n
b
e
co
n
f
i
g
u
r
ed
to
g
r
o
w
b
ased
o
n
an
in
cr
ea
s
e
in
th
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
A
s
ec
u
r
e
clo
u
d
s
ervice
d
ep
lo
y
men
t fra
mewo
r
k
fo
r
Dev
Op
s
(
P
R
a
vin
d
er R
a
o
)
879
ap
p
licatio
n
o
r
s
h
r
i
n
k
b
ased
o
n
th
e
d
ec
r
ea
s
e
in
t
h
e
ap
p
licatio
n
s
ize,
w
h
ic
h
is
o
f
ten
o
b
s
er
v
ed
d
u
r
in
g
a
n
y
Dev
Op
s
p
r
o
ce
s
s
.
T
h
e
s
tan
d
ar
d
p
ar
allel
alg
o
r
it
h
m
s
ca
n
n
o
t
tak
e
ad
v
an
ta
g
e
o
f
th
i
s
p
h
en
o
m
en
o
n
,
t
h
u
s
ca
n
n
o
t
ca
ter
to
th
e
b
est
n
ee
d
s
f
o
r
VM
s
ec
u
r
it
y
.
W
h
er
ea
s
,
th
e
p
r
o
p
o
s
ed
v
ar
iab
le
-
len
g
t
h
alg
o
r
ith
m
d
i
v
id
es
t
h
e
v
ir
t
u
al
m
ac
h
in
e
s
in
to
m
u
lt
ip
le
b
lo
ck
s
an
d
f
u
r
t
h
er
ap
p
lies
th
e
n
o
v
e
l
s
ec
u
r
it
y
al
g
o
r
ith
m
.
T
h
is
i
m
p
r
o
v
e
m
en
t
o
v
er
t
h
e
o
th
er
alg
o
r
ith
m
s
i
m
p
r
o
v
e
s
th
e
s
p
ac
e
co
m
p
le
x
it
y
o
f
t
h
e
s
ec
u
r
i
t
y
alg
o
r
it
h
m
s
.
T
h
e
th
ir
d
p
ar
t o
f
th
e
alg
o
r
ith
m
is
f
u
r
n
i
s
h
ed
h
er
e:
A
l
g
o
r
ith
m
F
lo
w
-
3
:
Var
iab
le
L
e
n
g
t
h
VM
Dec
r
y
p
t
io
n
A
l
g
o
r
ith
m
(
VL
VD)
R
eg
ar
d
les
s
to
m
en
tio
n
,
th
e
p
u
r
p
o
s
e
o
f
th
e
VL
VD
al
g
o
r
ith
m
is
to
r
ev
er
s
e
th
e
VL
VE
alg
o
r
ith
m
.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
s
ar
e
co
m
b
in
ed
in
to
a
s
i
n
g
le
p
r
o
ce
s
s
f
lo
w
an
d
th
e
co
m
b
i
n
ed
p
r
o
ce
s
s
f
lo
w
is
d
is
cu
s
s
ed
in
th
e
n
e
x
t sec
tio
n
o
f
t
h
e
w
o
r
k
.
4.
P
RO
P
O
SE
D
S
E
CUR
I
T
Y
F
RAM
E
WO
RK
I
n
th
i
s
s
ec
tio
n
o
f
t
h
e
w
o
r
k
,
th
e
p
r
o
p
o
s
ed
f
r
am
e
w
o
r
k
is
elab
o
r
ated
w
it
h
all
t
h
e
f
u
n
c
tio
n
c
o
m
p
o
n
en
t
d
escr
ip
tio
n
s
as
s
h
o
w
n
i
n
Fi
g
u
r
e
3
.
T
h
e
w
o
r
k
i
n
g
f
lo
w
o
f
t
h
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
is
e
l
ab
o
r
ated
h
er
e.
T
h
e
C
o
d
e
R
ep
o
s
ito
r
y
i
s
co
n
f
ig
u
r
e
d
as
p
ar
t
o
f
th
e
Dev
Op
s
p
r
o
ce
s
s
.
A
s
o
u
r
ce
co
d
e
r
ep
o
s
ito
r
y
is
a
f
ile
an
d
w
eb
f
ac
ilit
at
in
g
lo
ca
tio
n
w
h
er
e
a
lo
t
o
f
s
o
u
r
ce
co
d
e,
f
o
r
p
r
o
g
r
a
m
m
in
g
o
r
w
eb
p
ag
es,
i
s
k
e
p
t,
eith
er
f
r
ee
l
y
o
r
s
ec
r
etl
y
.
T
h
e
y
ar
e
r
eg
u
lar
l
y
u
tili
ze
d
b
y
o
p
en
-
s
o
u
r
ce
p
r
o
g
r
a
m
m
i
n
g
v
e
n
tu
r
e
s
an
d
o
t
h
er
m
u
lti
-
e
n
g
in
ee
r
ac
tiv
itie
s
to
d
ea
l
w
it
h
d
i
f
f
er
e
n
t
ad
ap
tatio
n
s
.
T
h
e
y
e
n
ab
le
en
g
in
ee
r
s
to
s
u
b
m
it
p
atch
es
o
f
c
o
d
e
in
a
co
m
p
o
s
ed
m
an
n
er
.
Fre
q
u
e
n
tl
y
t
h
ese
s
ites
b
o
ls
ter
f
o
r
m
co
n
tr
o
l,
b
u
g
f
o
ll
o
w
i
n
g
,
d
is
c
h
ar
g
e
th
e
b
o
ar
d
,
m
ailin
g
r
ec
o
r
d
s
,
an
d
w
i
k
i
-
b
ased
d
o
cu
m
e
n
tatio
n
.
T
h
e
co
d
e
p
r
e
-
p
r
o
ce
s
s
o
r
as
p
a
r
t
o
f
th
e
r
ep
o
s
ito
r
y
m
a
n
ag
e
s
t
h
e
v
er
s
io
n
co
n
tr
o
l.
On
ce
t
h
e
p
r
e
-
p
r
o
ce
s
s
o
r
an
al
y
s
es
t
h
e
v
er
s
io
n
s
a
n
d
s
elec
t
s
t
h
e
m
o
s
t
r
ec
en
t
t
w
o
v
er
s
io
n
s
f
r
o
m
t
h
e
r
ep
o
s
ito
r
y
,
th
e
v
er
s
io
n
f
ile
s
ar
e
g
iv
e
n
as
in
p
u
t
s
to
th
e
SC
C
D
alg
o
r
i
th
m
m
o
d
u
le.
T
h
e
ch
an
g
e
r
ec
o
g
n
itio
n
s
y
s
te
m
s
en
d
ea
v
o
r
to
id
en
ti
f
y
a
n
d
f
i
n
d
r
eg
io
n
s
o
f
s
o
u
r
ce
co
d
e,
w
h
ic
h
h
av
e
c
h
a
n
g
ed
b
et
w
ee
n
at
least
t
w
o
p
er
ce
p
tio
n
s
o
f
a
s
i
m
i
lar
co
d
e
b
lo
ck
.
T
h
ese
p
r
o
g
r
ess
io
n
s
ca
n
b
e
o
f
v
ar
io
u
s
k
in
d
s
,
w
it
h
v
ar
io
u
s
ca
u
s
es,
a
n
d
o
f
v
ar
io
u
s
le
n
g
t
h
s
.
T
h
ese
p
er
m
it
to
r
ec
o
g
n
ize
v
ar
io
u
s
t
y
p
es
o
f
d
ep
en
d
en
cie
s
,
f
u
n
ctio
n
al,
an
d
d
ata
f
lo
w
c
h
a
n
g
e
s
.
T
h
e
s
ec
u
r
it
y
alg
o
r
ith
m
,
p
r
o
p
o
s
ed
in
th
is
wo
r
k
,
is
ap
p
lied
to
th
e
ch
an
g
e
d
co
d
e,
w
h
ich
r
ed
u
ce
s
t
h
e
ti
m
e
co
m
p
le
x
it
y
to
a
g
r
ea
ter
ex
te
n
d
.
Fu
r
t
h
er
,
o
n
ce
th
e
ch
a
n
g
e
i
s
d
etec
ted
,
th
e
ch
a
n
g
ed
p
ar
t
o
f
t
h
e
C
o
d
e,
w
h
ic
h
is
to
b
e
d
ep
lo
y
ed
o
n
th
e
v
ir
tu
a
l
m
ac
h
in
e
s
ar
e
o
n
l
y
en
cr
y
p
ted
u
s
in
g
th
e
p
r
o
p
o
s
ed
VL
VE
al
g
o
r
ith
m
b
lo
ck
.
An
y
en
cr
y
p
tio
n
is
th
e
p
r
o
ce
s
s
o
f
en
co
d
in
g
a
VM
d
a
ta
o
r
in
f
o
r
m
atio
n
in
s
u
c
h
a
wa
y
th
at
o
n
l
y
a
u
t
h
o
r
ized
p
ar
ties
ca
n
ac
ce
s
s
it
an
d
th
o
s
e
w
h
o
ar
e
n
o
t a
u
t
h
o
r
ized
ca
n
n
o
t.
E
n
cr
y
p
tio
n
d
o
es n
o
t it
s
elf
p
r
ev
e
n
t in
ter
f
er
en
ce
b
u
t d
en
ies t
h
e
i
n
telli
g
ib
le
co
n
ten
t
to
a
w
o
u
ld
-
b
e
in
ter
ce
p
to
r
.
T
h
e
v
ar
iab
le
-
len
g
t
h
V
L
VE
alg
o
r
it
h
m
ca
n
id
en
tify
th
e
b
lo
ck
s
ize
a
n
d
ca
n
ap
p
ly
e
n
cr
y
p
tio
n
to
t
h
e
s
elec
te
d
p
ar
t o
f
th
e
v
ir
tu
al
m
ac
h
in
e
d
ata,
w
h
ich
r
ed
u
ce
s
th
e
t
i
m
e
co
m
p
lex
i
t
y
f
u
r
th
er
.
Fu
r
t
h
er
m
o
r
e,
as
p
ar
t
o
f
th
e
De
v
Op
s
p
r
o
ce
s
s
,
th
e
d
ep
lo
y
m
en
t
d
escr
ip
to
r
s
ar
e
p
r
ep
ar
e
d
f
o
r
a
u
to
m
at
io
n
in
t
h
e
d
ep
lo
y
m
e
n
t
a
n
d
p
r
o
v
is
io
n
in
g
p
r
o
ce
s
s
.
A
d
ep
lo
y
m
e
n
t
d
escr
ip
to
r
allu
d
es
to
a
s
et
u
p
d
o
cu
m
en
t
f
o
r
an
an
cien
t
r
ar
it
y
t
h
at
is
s
en
t
to
s
o
m
e
co
m
p
ar
t
m
en
t/
m
o
to
r
.
I
n
t
h
e
J
av
a
P
latf
o
r
m
,
E
n
ter
p
r
is
e
E
d
itio
n
,
a
d
ep
lo
y
m
e
n
t
d
escr
ip
to
r
d
e
p
icts
h
o
w
a
p
ar
t,
m
o
d
u
le,
o
r
ap
p
licatio
n
o
u
g
h
t
t
o
b
e
s
en
t.
I
t
g
u
id
es
a
d
ep
lo
y
m
en
t
d
ev
ic
e
to
s
e
n
d
a
m
o
d
u
le
o
r
ap
p
licatio
n
w
it
h
ex
p
licit
co
m
p
ar
t
m
e
n
t
al
ter
n
ati
v
es,
s
ec
u
r
it
y
s
etti
n
g
s
,
a
n
d
d
ep
icts
e
x
p
licit
d
es
ig
n
n
ec
es
s
ities
.
XM
L
i
s
u
ti
lized
f
o
r
th
e
p
u
n
ct
u
atio
n
o
f
t
h
ese
d
ep
lo
y
m
e
n
t d
escr
ip
to
r
r
ec
o
r
d
s
.
I
t
n
atu
r
al
to
r
ea
lize
th
at
t
h
e
v
ir
tu
al
m
ac
h
in
e
d
ep
lo
y
m
e
n
ts
ar
e
n
o
t
s
tatic,
r
at
h
er
v
ar
y
b
ased
o
n
t
h
e
lo
ad
b
alan
cin
g
s
tr
ate
g
ies
o
f
t
h
e
cl
o
u
d
s
er
v
ice
p
r
o
v
id
er
.
C
lo
u
d
lo
ad
b
alan
cin
g
is
a
s
o
r
t
o
f
lo
ad
b
alan
cin
g
t
h
at
is
p
er
f
o
r
m
ed
i
n
clo
u
d
r
eg
is
ter
i
n
g
.
C
lo
u
d
lo
ad
b
alan
cin
g
is
t
h
e
w
a
y
to
w
ar
d
d
is
p
er
s
in
g
w
o
r
k
l
o
ad
s
o
v
er
v
ar
io
u
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
21
,
No
.
2
,
Feb
r
u
ar
y
2
0
2
1
:
8
7
4
-
8
8
5
880
f
i
g
u
r
i
n
g
ass
e
ts
.
C
lo
u
d
lo
ad
b
alan
ci
n
g
d
i
m
i
n
is
h
es
co
s
ts
r
el
ated
to
ar
ch
iv
e
t
h
e
ex
ec
u
ti
v
e
s
'
f
r
a
m
e
w
o
r
k
s
an
d
a
m
p
li
f
ies
t
h
e
ac
ce
s
s
ib
il
it
y
o
f
ass
ets.
I
t
is
a
k
in
d
o
f
lo
ad
b
alan
cin
g
a
n
d
n
o
t
to
b
e
m
i
s
tak
e
n
f
o
r
Do
m
ai
n
Na
m
e
Ser
v
ice
(
DNS)
lo
ad
b
alan
c
in
g
.
W
h
ile
DNS
lo
ad
b
alan
cin
g
u
tili
ze
s
p
r
o
g
r
a
m
m
i
n
g
o
r
eq
u
ip
m
en
t
to
p
la
y
o
u
t
t
h
e
ca
p
ac
it
y
,
clo
u
d
lo
ad
b
alan
ci
n
g
u
t
ilizes
ad
m
i
n
is
tr
atio
n
s
o
f
f
er
ed
b
y
d
if
f
er
e
n
t
P
C
o
r
g
a
n
ize
o
r
g
a
n
izatio
n
s
.
B
ec
au
s
e
o
f
t
h
is
m
o
d
u
le
i
n
t
h
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
,
t
h
e
s
o
u
r
ce
an
d
d
esti
n
atio
n
n
o
d
es
ar
e
id
en
ti
f
ied
,
an
d
t
h
e
en
cr
y
p
ted
v
ir
tu
al
m
ac
h
i
n
es
ar
e
m
i
g
r
ated
f
r
o
m
t
h
e
s
o
u
r
ce
n
o
d
es
to
th
e
d
es
tin
a
tio
n
n
o
d
es
.
On
ce
t
h
e
v
ir
t
u
al
m
ac
h
in
e
s
ar
e
d
eliv
er
ed
to
th
e
d
esti
n
atio
n
n
o
d
e,
th
e
V
L
VD
a
lg
o
r
ith
m
m
o
d
u
le
r
ev
er
s
es
t
h
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
an
d
th
e
v
ir
tu
al
m
ac
h
in
e
s
ar
e
p
r
o
v
is
io
n
ed
w
it
h
all
d
ep
en
d
e
n
c
ies b
y
th
e
V
M
Star
ter
m
o
d
u
le.
Fig
u
r
e
3
.
P
r
o
p
o
s
ed
f
r
am
e
w
o
r
k
f
o
r
s
ec
u
r
e
s
er
v
ice
d
ep
lo
y
m
e
n
t
5.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
T
h
e
r
esu
lt
s
o
b
tain
ed
f
r
o
m
t
h
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
ar
e
h
i
g
h
l
y
s
atis
f
ac
to
r
y
.
I
n
t
h
i
s
s
ec
tio
n
t
h
e
r
es
u
lt
s
ar
e
f
u
r
n
is
h
ed
a
s
i
n
itial
VM
al
lo
ca
tio
n
r
es
u
lts
,
VM
d
ep
en
d
e
n
c
y
an
d
co
d
e
s
ize
ch
a
n
g
e
tr
ac
in
g
,
th
e
en
cr
y
p
tio
n
ti
m
e
a
n
d
f
i
n
all
y
th
e
d
ec
r
y
p
tio
n
ti
m
e.
5
.
1
.
I
nitia
l V
M
a
llo
c
a
t
io
n
T
h
e
v
ir
tu
al
m
ac
h
i
n
e
s
f
o
r
th
e
clo
u
d
s
er
v
ices
ar
e
allo
ca
ted
o
n
clo
u
d
s
er
v
ice
p
r
o
v
id
er
s
.
T
h
e
in
itia
l
allo
ca
tio
n
s
tat
u
s
is
f
u
r
n
i
s
h
ed
h
er
e
as
s
h
o
w
n
i
n
T
ab
le
1
.
T
h
e
r
esu
lt
s
ar
e
an
al
y
s
ed
g
r
ap
h
icall
y
h
er
e
a
s
s
h
o
w
n
in
Fig
u
r
e
4
.
T
ab
le
1
.
VM
I
n
itial
allo
ca
tio
n
T
e
st
R
u
n
N
u
m
b
e
r
P
r
o
v
i
si
o
n
i
n
g
V
M
N
a
me
A
p
p
l
i
c
a
t
i
o
n
S
i
z
e
(
G
B
)
D
a
t
a
S
i
z
e
(
G
B
)
1
T
e
st
D
a
t
a
1
.
v
m
36
35
2
T
e
st
D
a
t
a
2
.
v
m
36
35
3
T
e
st
D
a
t
a
3
.
v
m
36
35
4
T
e
st
D
a
t
a
4
.
v
m
36
35
5
T
e
st
D
a
t
a
1
.
v
m
36
35
6
T
e
st
D
a
t
a
2
.
v
m
36
35
7
T
e
st
D
a
t
a
3
.
v
m
36
35
8
T
e
st
D
a
t
a
4
.
v
m
36
35
9
T
e
st
D
a
t
a
1
.
v
m
36
35
10
T
e
st
D
a
t
a
2
.
v
m
36
35
11
T
e
st
D
a
t
a
3
.
v
m
36
35
12
T
e
st
D
a
t
a
4
.
v
m
36
35
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
A
s
ec
u
r
e
clo
u
d
s
ervice
d
ep
lo
y
men
t fra
mewo
r
k
fo
r
Dev
Op
s
(
P
R
a
vin
d
er R
a
o
)
881
Fig
u
r
e
4
.
I
n
itial VM
allo
ca
tio
n
T
h
e
v
ir
tu
al
m
ac
h
i
n
es
ar
e
allo
ca
ted
to
I
B
M
B
lu
e
m
i
x
clo
u
d
p
r
o
v
id
er
s
.
Vir
tu
al
s
er
v
er
s
ar
e
ad
ap
tab
le
an
d
ac
co
m
p
a
n
ied
d
ev
o
ted
ce
n
tr
e
an
d
m
e
m
o
r
y
d
esi
g
n
at
i
o
n
s
.
T
h
e
y
ar
e
an
ex
tr
ao
r
d
in
ar
y
alter
n
a
tiv
e
i
f
d
ev
elo
p
er
s
ar
e
s
ea
r
ch
in
g
f
o
r
f
i
g
u
r
e
as
s
ets,
th
a
t
ca
n
b
e
in
clu
d
ed
m
i
n
u
tes,
w
it
h
ac
ce
s
s
to
h
i
g
h
li
g
h
t
s
li
k
e
p
ictu
r
e
la
y
o
u
t
s
.
T
h
e
h
y
p
er
v
is
o
r
i
s
co
m
p
letel
y
o
v
er
s
ee
n
b
y
I
B
M
C
l
o
u
d
,
an
d
d
ev
elo
p
er
s
ca
n
p
er
f
o
r
m
d
es
ig
n
a
n
d
th
e
b
r
o
ad
u
n
d
er
tak
i
n
g
s
b
y
u
ti
lizi
n
g
b
o
th
th
e
I
B
M
C
lo
u
d
clien
t
en
tr
y
a
n
d
th
e
A
P
I
.
Vir
tu
al
s
er
v
er
s
ar
e
s
en
t
to
th
e
eq
u
iv
ale
n
t
V
L
A
N
s
as
p
h
y
s
ic
al
s
er
v
er
s
,
en
ab
li
n
g
d
ev
elo
p
e
r
s
to
s
p
r
ea
d
o
u
ts
tan
d
in
g
ta
s
k
s
at
h
a
n
d
cr
o
s
s
w
is
e
o
v
er
v
ir
t
u
al
s
er
v
er
s
a
n
d
u
n
c
o
v
er
ed
m
etal
s
er
v
er
s
w
h
ile
l
o
o
k
in
g
af
ter
in
ter
o
p
er
ab
ilit
y
.
Vir
tu
al
s
er
v
er
s
ar
e
co
m
p
lete
l
y
ad
j
u
s
tab
le
w
h
en
d
ev
elo
p
er
s
o
r
d
er
th
em
,
w
i
th
c
h
o
ices to
s
ca
le
u
p
as th
e
ir
r
eg
is
t
er
n
ee
d
s
d
ev
elo
p
.
5
.
2
.
Cha
ng
e
det
ec
t
i
o
n r
esu
lt
s
Seco
n
d
l
y
t
h
e
s
o
u
r
ce
co
d
e
d
e
p
en
d
en
c
y
a
n
d
th
e
f
u
n
ctio
n
al
ch
an
g
e
r
es
u
lts
ar
e
a
n
al
y
s
ed
.
T
h
e
ch
an
g
e
r
esu
lt
s
ar
e
r
ec
eiv
ed
f
r
o
m
t
h
e
S
C
C
D
al
g
o
r
ith
m
.
T
h
e
r
esu
l
ts
ar
e
f
u
r
n
is
h
ed
h
er
e
as
s
h
o
w
n
in
T
ab
le
2
.
T
h
e
r
esu
l
ts
ar
e
an
al
y
s
ed
g
r
ap
h
icall
y
h
er
e
as sh
o
w
n
i
n
Fi
g
u
r
e
5
.
T
ab
le
2.
C
h
an
g
e
d
etec
tio
n
T
e
st
R
u
n
N
u
m
b
e
r
P
r
o
v
i
si
o
n
i
n
g
V
M
N
a
me
C
h
a
n
g
e
d
D
e
p
e
n
d
e
n
c
y
S
i
z
e
(
G
B
)
C
h
a
n
g
e
d
C
o
d
e
S
i
z
e
(
M
B
)
1
T
e
st
D
a
t
a
1
.
v
m
1
5
4
7
52
2
T
e
st
D
a
t
a
2
.
v
m
9
7
5
14
3
T
e
st
D
a
t
a
3
.
v
m
2
5
0
4
36
4
T
e
st
D
a
t
a
4
.
v
m
4
0
8
7
67
5
T
e
st
D
a
t
a
1
.
v
m
1
5
4
7
27
6
T
e
st
D
a
t
a
2
.
v
m
9
7
5
18
7
T
e
st
D
a
t
a
3
.
v
m
2
5
0
4
1
2
4
8
T
e
st
D
a
t
a
4
.
v
m
4
0
8
7
52
9
T
e
st
D
a
t
a
1
.
v
m
1
5
4
7
56
10
T
e
st
D
a
t
a
2
.
v
m
9
7
5
24
11
T
e
st
D
a
t
a
3
.
v
m
2
5
0
4
51
12
T
e
st
D
a
t
a
4
.
v
m
4
0
8
7
2
0
0
Fig
u
r
e
5
.
C
h
a
n
g
e
d
etec
tio
n
r
es
u
lts
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
21
,
No
.
2
,
Feb
r
u
ar
y
2
0
2
1
:
8
7
4
-
8
8
5
882
5
.
3
.
E
ncry
ptio
n t
i
m
e
a
na
ly
s
i
s
Fu
r
t
h
er
,
th
e
en
cr
y
p
t
io
n
ti
m
e
f
o
r
th
e
ch
an
g
ed
p
ar
t
o
f
th
e
ap
p
licatio
n
w
it
h
d
ep
en
d
en
cie
s
ar
e
an
al
y
ze
d
h
er
e
as s
h
o
w
n
i
n
T
ab
le
3
.
T
h
e
r
esu
lt
s
ar
e
an
al
y
s
ed
g
r
ap
h
i
ca
l
l
y
h
er
e
as s
h
o
w
n
in
F
ig
u
r
e
6
.
T
ab
le
3
.
E
n
cr
y
p
tio
n
ti
m
e
a
n
al
y
s
i
s
T
e
st
R
u
n
N
u
m
b
e
r
P
r
o
v
i
si
o
n
i
n
g
V
M
N
a
me
En
c
r
y
p
t
i
o
n
T
i
me
(
S
e
c
)
1
T
e
st
D
a
t
a
1
.
v
m
52
2
T
e
st
D
a
t
a
2
.
v
m
14
3
T
e
st
D
a
t
a
3
.
v
m
36
4
T
e
st
D
a
t
a
4
.
v
m
67
5
T
e
st
D
a
t
a
1
.
v
m
27
6
T
e
st
D
a
t
a
2
.
v
m
18
7
T
e
st
D
a
t
a
3
.
v
m
1
2
4
8
T
e
st
D
a
t
a
4
.
v
m
52
9
T
e
st
D
a
t
a
1
.
v
m
56
10
T
e
st
D
a
t
a
2
.
v
m
24
11
T
e
st
D
a
t
a
3
.
v
m
51
12
T
e
st
D
a
t
a
4
.
v
m
2
0
0
Fig
u
r
e
6
.
E
n
cr
y
p
tio
n
ti
m
e
a
n
al
y
s
i
s
I
t
is
n
at
u
r
al
to
r
ea
lize
t
h
at,
t
h
e
d
ep
en
d
en
cie
s
ar
e
n
ested
i
n
p
ac
k
a
g
e
f
o
r
m
at.
Hen
ce
,
th
e
ti
m
e
f
o
r
en
cr
y
p
tio
n
i
s
n
o
t
o
n
l
y
d
ep
en
d
en
t
o
n
t
h
e
s
ize
o
f
th
e
co
d
e,
r
ath
er
also
d
ep
en
d
in
g
o
n
t
h
e
n
ested
lev
el
s
o
f
t
h
e
p
ac
k
ag
es.
5
.
4
.
Dec
ry
pti
o
n t
i
m
e
a
na
ly
s
i
s
F
u
r
t
h
e
r
,
th
e
d
e
c
r
y
p
t
i
o
n
t
im
e
o
f
t
h
e
a
p
p
li
c
a
ti
o
n
w
i
th
d
e
p
en
d
en
c
i
e
s
a
r
e
a
n
a
ly
s
e
d
h
e
r
e
as
s
h
o
w
n
in
T
a
b
l
e
4
.
T
h
e
r
e
s
u
l
ts
a
r
e
an
aly
s
e
d
g
r
ap
h
i
c
al
ly
h
e
r
e
as
s
h
o
w
n
i
n
F
ig
u
r
e
7
.
F
u
r
t
h
e
r
m
o
r
e
,
w
i
th
th
e
d
e
ta
i
l
e
d
an
a
ly
s
is
o
f
th
e
r
e
s
u
l
ts
f
r
o
m
th
e
p
r
o
p
o
s
e
d
f
r
am
ew
o
r
k
,
in
t
h
e
n
e
x
t
s
ec
t
i
o
n
,
th
e
c
o
m
p
a
r
a
tiv
e
an
a
ly
s
is
i
s
c
a
r
r
i
e
d
o
u
t
.
T
ab
le
4
.
Dec
r
y
p
tio
n
ti
m
e
an
al
y
s
i
s
T
e
st
R
u
n
N
u
m
b
e
r
P
r
o
v
i
si
o
n
i
n
g
V
M
N
a
me
D
e
c
r
y
p
t
i
o
n
T
i
me
(
S
e
c
)
1
T
e
st
D
a
t
a
1
.
v
m
7
8
6
2
T
e
st
D
a
t
a
2
.
v
m
8
5
7
3
T
e
st
D
a
t
a
3
.
v
m
8
4
T
e
st
D
a
t
a
4
.
v
m
7
5
T
e
st
D
a
t
a
1
.
v
m
15
6
T
e
st
D
a
t
a
2
.
v
m
14
7
T
e
st
D
a
t
a
3
.
v
m
7
8
T
e
st
D
a
t
a
4
.
v
m
7
9
T
e
st
D
a
t
a
1
.
v
m
16
10
T
e
st
D
a
t
a
2
.
v
m
15
11
T
e
st
D
a
t
a
3
.
v
m
15
12
T
e
st
D
a
t
a
4
.
v
m
15
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
A
s
ec
u
r
e
clo
u
d
s
ervice
d
ep
lo
y
men
t fra
mewo
r
k
fo
r
Dev
Op
s
(
P
R
a
vin
d
er R
a
o
)
883
Fig
u
r
e
7
.
Dec
r
y
p
tio
n
ti
m
e
an
a
l
y
s
i
s
6.
CO
M
P
ARATI
VE
ANA
L
YS
I
S
I
n
th
is
s
ec
tio
n
o
f
t
h
e
w
o
r
k
,
th
e
co
m
p
ar
ati
v
e
a
n
al
y
s
i
s
w
it
h
th
e
s
ta
n
d
ar
d
VM
en
cr
y
p
t
io
n
a
n
d
d
ec
r
y
p
tio
n
is
an
al
y
s
ed
a
s
s
h
o
w
n
i
n
T
ab
le
5
.
Du
r
in
g
th
e
co
m
p
ar
at
iv
e
a
n
al
y
s
is
,
t
h
e
s
tan
d
ar
d
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
alg
o
r
it
h
m
s
ar
e
ap
p
lied
to
th
e
v
ir
tu
al
m
ac
h
i
n
e
s
,
an
d
t
h
e
lea
s
t
ti
m
e
co
m
p
l
e
x
it
y
al
g
o
r
ith
m
i
s
s
elec
ted
.
T
h
e
ti
m
e
co
m
p
le
x
it
y
f
o
r
en
c
r
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
i
s
s
ta
b
le
f
o
r
th
e
tr
ad
itio
n
al
al
g
o
r
it
h
m
as
t
h
e
tr
ad
itio
n
al
al
g
o
r
ith
m
s
d
o
n
o
t
ca
ter
to
t
h
e
n
ee
d
f
o
r
ch
a
n
g
e
m
an
a
g
e
m
e
n
t
a
n
d
v
ar
iab
le
-
le
n
g
th
VM
en
cr
y
p
tio
n
p
o
licies
as
d
e
m
o
n
s
tr
ated
b
y
th
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
.
T
h
e
ad
v
an
ta
g
es,
w
h
ic
h
ar
e
r
ed
u
cin
g
t
h
e
ti
m
e
co
m
p
le
x
it
y
,
ar
e
alr
ea
d
y
elab
o
r
ated
in
th
e
p
r
ev
io
u
s
s
ec
t
io
n
s
o
f
th
is
w
o
r
k
.
Fro
m
t
h
e
o
b
s
er
v
ed
r
es
u
lt
s
,
it
i
s
n
at
u
r
al
to
r
ea
lize
th
a
t
f
o
r
th
e
en
cr
y
p
tio
n
a
n
ea
r
l
y
8
8
.
7
7
%
an
d
f
o
r
t
h
e
d
ec
r
y
p
t
io
n
a
n
ea
r
l
y
7
9
.
4
1
%
i
m
p
r
o
v
e
m
e
n
t
o
v
er
t
h
e
s
ta
n
d
ar
d
alg
o
r
ith
m
s
is
ac
h
iev
ed
.
Af
ter
r
ea
lizin
g
t
h
e
r
es
u
lts
an
d
ac
h
iev
i
n
g
s
atis
f
ac
to
r
y
i
m
p
r
o
v
e
m
e
n
ts
o
n
t
h
e
ti
m
e
co
m
p
le
x
it
y
.
T
h
e
r
es
u
lts
ar
e
a
n
al
y
s
ed
g
r
ap
h
icall
y
h
er
e
a
s
s
h
o
w
n
in
F
ig
u
r
e
8
.
T
ab
le
5
.
C
o
m
p
ar
ativ
e
e
n
cr
y
p
ti
o
n
&
d
ec
r
y
p
tio
n
ti
m
e
a
n
al
y
s
i
s
P
r
o
p
o
se
d
S
y
st
e
m
T
r
a
d
i
t
i
o
n
a
l
S
e
c
u
r
i
t
y
A
l
g
o
r
i
t
h
ms
I
mp
r
o
v
e
me
n
t
s
T
e
st
R
u
n
N
u
mb
e
r
P
r
o
v
i
si
o
n
i
n
g
V
M
N
a
me
En
c
r
y
p
t
i
o
n
T
i
me
(
S
e
c
)
D
e
c
r
y
p
t
i
o
n
T
i
me
(
S
e
c
)
En
c
r
y
p
t
i
o
n
T
i
me
(
S
e
c
)
D
e
c
r
y
p
t
i
o
n
T
i
me
(
S
e
c
)
En
c
r
y
p
t
i
o
n
T
i
me
(
%)
D
e
c
r
y
p
t
i
o
n
T
i
me
(
%)
1
T
e
st
D
a
t
a
1
.
v
m
52
7
8
6
5
3
5
7
1
3
9
0
.
2
8
-
1
0
.
2
4
2
T
e
st
D
a
t
a
2
.
v
m
14
8
5
7
5
3
5
7
1
3
9
7
.
3
8
-
2
0
.
2
0
3
T
e
st
D
a
t
a
3
.
v
m
36
8
5
3
5
7
1
3
9
3
.
2
7
9
8
.
8
8
4
T
e
st
D
a
t
a
4
.
v
m
67
7
5
3
5
7
1
3
8
7
.
4
8
9
9
.
0
2
5
T
e
st
D
a
t
a
1
.
v
m
27
15
5
3
5
7
1
3
9
4
.
9
5
9
7
.
9
0
6
T
e
st
D
a
t
a
2
.
v
m
18
14
5
3
5
7
1
3
9
6
.
6
4
9
8
.
0
4
7
T
e
st
D
a
t
a
3
.
v
m
1
2
4
7
5
3
5
7
1
3
7
6
.
8
2
9
9
.
0
2
8
T
e
st
D
a
t
a
4
.
v
m
52
7
5
3
5
7
1
3
9
0
.
2
8
9
9
.
0
2
9
T
e
st
D
a
t
a
1
.
v
m
56
16
5
3
5
7
1
3
8
9
.
5
3
9
7
.
7
6
10
T
e
st
D
a
t
a
2
.
v
m
24
15
5
3
5
7
1
3
9
5
.
5
1
9
7
.
9
0
11
T
e
st
D
a
t
a
3
.
v
m
51
15
5
3
5
7
1
3
9
0
.
4
7
9
7
.
9
0
12
T
e
st
D
a
t
a
4
.
v
m
2
0
0
15
5
3
5
7
1
3
6
2
.
6
2
9
7
.
9
0
Evaluation Warning : The document was created with Spire.PDF for Python.