the mathematical model of a two-dimensional nonlinear case of contaminant migration to the filter traps in catalytic porous media in isothermal conditions is presented. the mathematical model takes into account the mi...
详细信息
ISBN:
(纸本)9781728167602
the mathematical model of a two-dimensional nonlinear case of contaminant migration to the filter traps in catalytic porous media in isothermal conditions is presented. the mathematical model takes into account the micro and the meso/macro scale factors of the mass transfer process. the numerical solution of the respective boundary value problem was obtained by the method of finite differences. parallelcomputing optimization was conducted for numerical sweep method as well as for Orleans Grain management. the appropriate algorithmic complexity of the parallel block sweep method was shown. the general architecture of a new application was described. the resulted software was implemented in Microsoft Azure cloud computing platform. After a series of numerical experiments, the optimization performance results (speedup ratio and parallel efficiency) of a created solution were collected and discussed.
Most of the actual approaches to address the problem of serial code executing on parallel multi-core processors try to exploit the parallelism of the code during compile time. Such a solution is very efficient but pla...
详细信息
ISBN:
(纸本)9780769534435
Most of the actual approaches to address the problem of serial code executing on parallel multi-core processors try to exploit the parallelism of the code during compile time. Such a solution is very efficient but places the burden on the programmer to know the code will be running on a parallel architecture. In addition, the programmer needs to know the details of the architecture in order to generate efficient parallel code. In this work we present an alternative approach, the layer disruption model, that improves the performance of serial code executing on parallel architectures. We present a small test case that shows the benefits of the model.
In this paper, we present usages of XML-RPC and the effectiveness in a mobile agent framework named Maglog which is implemented in a Java environment. XML-RPC is used for the following two purposes in Maglog. First, i...
详细信息
ISBN:
(纸本)9780889866386
In this paper, we present usages of XML-RPC and the effectiveness in a mobile agent framework named Maglog which is implemented in a Java environment. XML-RPC is used for the following two purposes in Maglog. First, it is a transport mechanism that an agent migrates from one computer to another one. Second, it is an interface which is accessible from applications, written in any other language, which support for XML-RPC. In order to realize an agent migration mechanism, custom serialization mechanism is implemented to customize Java's built-in serialization mechanism. In custom serialization mechanism, objects which represent for an agent are encoded as an XML document. Encoded objects are transferred using XMLRPC. For deserialization, a dynamic class loader is implemented. If no custom serialization is used, an object cannot be deserialized on a remote host, because the class description of the object may not be in the host. As an example of an interface which is accessible from applications, we show a user interface program of a distributed e-Leaming system which we have developed.
In latest years modern world's needs of safety caused a speed spreading of video surveillance systems, more and more frequently collocated in the most crowded places. thus, a lot of theoretical approaches working ...
详细信息
ISBN:
(纸本)9781467394734
In latest years modern world's needs of safety caused a speed spreading of video surveillance systems, more and more frequently collocated in the most crowded places. thus, a lot of theoretical approaches working with data coming from heterogeneous sources and defining some very complex event detection algorithms have been proposed in the literature. In this paper, we present a distributed framework for event detection in video surveillance context. the overall process is described, starting from the video frames captured by different kinds of sensors and cameras till at the end some high-level event detection algorithms performed in a distributed environment for finding potentially dangerous activities are applied. the conducted experiments confirm the efficiency achieved by our distributed framework.
Smart grids are in their developing stages, but they are going to impact the world soon. the more they influence us, the more they have a threat of being misused. Industrial Internet of things(IIoT) is being extensive...
详细信息
ISBN:
(纸本)9781538659069
Smart grids are in their developing stages, but they are going to impact the world soon. the more they influence us, the more they have a threat of being misused. Industrial Internet of things(IIoT) is being extensively used in various smart grid based applications. IIoT has been an area for cyber-attacks to drastically affect various industries and businesses. Existing technologies are just not enough to deal with cyber-physical systems. Blockchain can help in creating more efficient, secure and reliable IIoT systems. Such systems, which involve rapid, distributed and complex energy transactions and data exchanges often face integrity and trust related issues. Blockchain can provide a solution to such problems. third-party interactions have been removed using blockchain based smart contracts, thereby facilitating the adoption of decentralization and establishing a global truth across all the nodes in the network. Efficiency can further be increased by logging only the most important events like faults in the system or injection of malicious data. this paper proposes an innovative collective decision algorithm using blockchain to build a resilient network of Phasor Measurement Units(PMUs) for Wide Area Measurement System(WAMS). the algorithm not only identifies "malicious" nodes in the system but also takes the correct decision, even in their presence, to perform further action. the proposed solution is validated on a hardware-in-loop platform withthe hardware PMUs connected on an IEEE 9 bus system.
the demand for distributedapplications has significantly increased over the past decade, with improvements in machine learning techniques fueling this growth. these applications predominantly utilize Cloud data cente...
详细信息
ISBN:
(纸本)9798400702341
the demand for distributedapplications has significantly increased over the past decade, with improvements in machine learning techniques fueling this growth. these applications predominantly utilize Cloud data centers for high-performance computing and Fog and Edge devices for low-latency communication for small-size machine learning model training and inference. the challenge of executing applications with different requirements on heterogeneous devices requires effective methods for solving NP-hard resource allocation and application scheduling problems. the state-of-the-art techniques primarily investigate conflicting objectives, such as the completion time, energy consumption, and economic cost of application execution on the Cloud, Fog, and Edge computing infrastructure. therefore, in this work, we review these research works considering their objectives, methods, and evaluation tools. Based on the review, we provide a discussion on the scheduling methods in the computing Continuum.
A connected dominating set of a graph G is a set of nodes of G such that every node in G is either in the set or is adjacent to some node in the set, and the graph induced by the elements of the set is connected Conne...
详细信息
ISBN:
(纸本)0769524052
A connected dominating set of a graph G is a set of nodes of G such that every node in G is either in the set or is adjacent to some node in the set, and the graph induced by the elements of the set is connected Connected dominating sets have major applications in routing in wireless ad-hoc networks. In this paper, we present a distributed self-estabilizing algorithm for finding a connected dominating set of a graph. Starting from an arbitrary initial state, the algorithm finds a connected dominating set in 002) time, where N is the number of nodes. We also show detailed simulation results to indicate that in practice, the algorithm finas small-sized connected dominating sets in a short time.
In this paper we describe a task allocation method, that utilizes genetic programming to find a suitable solution in an adequate time for this NP-complete combinatorial optimization problem. the underlying distributed...
详细信息
ISBN:
(纸本)9780769530499
In this paper we describe a task allocation method, that utilizes genetic programming to find a suitable solution in an adequate time for this NP-complete combinatorial optimization problem. the underlying distributed embedded system is heterogenous, consisting of different processors with different properties such as core type, clock frequency, available memory, and I/O interfaces, interconnected with different communication media. In our applications, which are described as data flow graphs, the number of tasks to be placed is much larger than the number of processors available. We highlight the difficulties when applying genetic programming to this problem and present our solutions and enhancements, accompanied with some simulation results.
Nowadays simulation modeling is applied for solving a wide range of problems. there are simulations which require significant performance and time resources. To decrease overall simulation time a model can be converte...
详细信息
ISBN:
(纸本)9783642032745
Nowadays simulation modeling is applied for solving a wide range of problems. there are simulations which require significant performance and time resources. To decrease overall simulation time a model can be converted to a distributed system and executed on a computer network. the goal of this project is to create a library enabling clear and rapid development parallel discrete event models in AnyLogic. the library is aimed for professionals in computer simulation and helps to reduce code amount. the project includes a research on different synchronization algorithms. In this paper we present techniques which can be used in creating distributed models. We present comparison of a single threaded model with a distributed model implementing optimistic algorithm. the comparison shows a significant improvement in wallclock time achieved by separating the model into independent submodels with minimal communications.
We present a variety of possible parallelization approaches for a real-world case study using several modern parallel and distributed computer architectures. Our case study is a production-quality, time-intensive algo...
详细信息
ISBN:
(纸本)9783642032745
We present a variety of possible parallelization approaches for a real-world case study using several modern parallel and distributed computer architectures. Our case study is a production-quality, time-intensive algorithm for medical image reconstruction used in computer tomography. We describe how this algorithm can be parallelized for the main kinds of contemporary parallel architectures: shared-memory multiprocessors, distributed-memory clusters, graphics processors, the Cell processor and, finally, how various architectures can be accessed in a distributed Grid environment. the main contribution of the paper;besides the parallelization approaches, is their systematic comparison regarding four important criteria: performance, programming comfort, accessibility, and cost-effectiveness. We report results of experiments on particular parallel machines of different architectures that confirm the findings of our systematic comparison.
暂无评论