Distributed applications are composed of multiple objects and each object is replicated in order to increase reliability, availability, and performance. On the other hand, the larger amount of electric energy is consu...
详细信息
ISBN:
(纸本)9783319615660;9783319615653
Distributed applications are composed of multiple objects and each object is replicated in order to increase reliability, availability, and performance. On the other hand, the larger amount of electric energy is consumed in a system since multiple replicas of each object are manipulated on multiple servers. In this paper, the energy efficient quorum selection (EEQS) algorithm is proposed to construct a quorum for each method issued by a transaction in the quorum based locking protocol so that the total electric energy consumption of servers to perform methods can be reduced. We show the total energy consumption of servers, the average execution time of each transaction, and the number of aborted transactions can be reduced in the EEQS algorithm compared withthe random algorithm in the evaluation.
Traditionally, High-Performance computing (HPC) has been associated with large power requirements. the reason was that chip makers of the processors typically employed in HPC deployments have always focused on getting...
详细信息
ISBN:
(纸本)9781450365239
Traditionally, High-Performance computing (HPC) has been associated with large power requirements. the reason was that chip makers of the processors typically employed in HPC deployments have always focused on getting the highest performance from their designs, regardless of the energy their processors may consume. Actually, for many years only heat dissipation was the real barrier for achieving higher performance, at the cost of higher energy consumption. However, a new trend has recently appeared consisting on the use of low-power processors for HPC purposes. the MontBlanc and Isambard projects are good examples of this trend. these proposals, however, do not consider the use of GPUs. In this paper we propose to use GPUs in this kind of low-power processor based HPC deployments by making use of the remote GPU virtualization mechanism. To that end, we leverage the rCUDA middleware in a hybrid cluster composed of low-power Atom-based nodes and regular Xeon-based nodes equipped with GPUs. Our experiments show that, by making use of rCUDA, the execution time of applications belonging to the physics domain is noticeably reduced, achieving a speedup of almost 30x with just two remote NVIDIA P100 GPUs with respect to the execution of the same applications using 8 Atom-based nodes.
Blockchain technology has a real disruptive potential for a wide range of industries. But not every industry is likely to be remodeled by the blockchain. this article is part of a group of articles to justify the appl...
ISBN:
(数字)9781728116242
ISBN:
(纸本)9781728116259
Blockchain technology has a real disruptive potential for a wide range of industries. But not every industry is likely to be remodeled by the blockchain. this article is part of a group of articles to justify the application of these technologies. this article presents and analyzes the situation in the studied area and proposes the use of appropriate solutions to the situation. In the case of irrigation systems, the current technological opportunities as well as the challenges with which the final customer is confronted and how a new decentralized architecture could create are valuable to him. Such a system faces a high energy consumption in the drought-prone months. In this paper we propose a study on the possibility of using photovoltaic energy to feed a long-abandoned land improvement system that is in an unusable state at this time. However, this system can be very effective for small producers in the area who are unable to use an irrigation system in the summer dry months. the proposed method would attract a large number of small producers by creating associations that by appropriate management can bring a surplus value and the investment could be depreciated in a relatively short time.
Electrical grid's modernization and the need for sustainable sources of energy lead to changes in physical infrastructure and subsequent operations of the grid, such as penetration of renewables and local power ge...
详细信息
Electrical grid's modernization and the need for sustainable sources of energy lead to changes in physical infrastructure and subsequent operations of the grid, such as penetration of renewables and local power generation from them. there is a shift in paradigm from remotely concentrated generation toward distributed generations that are local to the loads. To meet the objective of sustainability, the local generations must include renewable energy conversions. this requires power-flow management of power variability arising from the spatial and temporal characteristics of the renewables like solar energy. Such management must require least human intervention, and it is achievable through fast and reliable automations. this paper presents geographic information system integrated automation of a noniterative power-flow method known as holomorphic embedded power flow (HEPF), thereby providing local grids the ability to manage themselves. Since HEPF reliably guarantees the solution and reaches it very fast through constructing the solution, it is an ideal candidate for near real-time updates of the electrical states of a power system. the role of the HEPF as a key enabler for the services of a power-flow manager, that performs optimizations for a cluster of buildings, is then illustrated.
A Pushdown system (PDS) is a finite transition system equipped with stacks that are allowed to accurately model procedure calls and mimic the program's stack. therefore, a PDS is extensively used for the analysis ...
详细信息
ISBN:
(纸本)9781728111414
A Pushdown system (PDS) is a finite transition system equipped with stacks that are allowed to accurately model procedure calls and mimic the program's stack. therefore, a PDS is extensively used for the analysis and verification of sequential programs. the computational tree logic (CTL) model checking for PDS is reduced to an emptiness problem, which consists of computingthe set of accepting configurations of an alternating Buchi PushDown System(ABPDS). When the PDSs are very large, the emptiness analysis can be time-consuming. In this study, we use the features of a Compute Unified Device Architecture (CUDA) to achieve the parallelism. First, we propose a parallel algorithm to conduct the emptiness analysis of the ABPDS in multi-threads. thus we propose a partitioned alternating multi automaton, which is a parallel extension of the alternating multi automaton (AMA) to represent the infinite set of configurations for the alternating Pushdown System and demonstrate how the emptiness analysis can be conducted in parallel based on a partitioned alternating multi automaton. Second, the process of the emptiness analysis is irregular, which means it is difficult to allocate resources dynamically. In order to effectively utilize the graphics processing unit (GPU), we design a new data structure and use thread scheduling to fit the computing model. the algorithm is implemented in a tool and is compared to the PDS model checker PuMoC as a benchmark. the results demonstrate a significant performance speedup (average 50X and up to 180X).
this article is devoted to the issues of streaming data processing in the Internet of things applications. Stream processing is a natural fit for the Internet of things applications. Most of the data models on the Int...
详细信息
ISBN:
(纸本)9783030011680;9783030011673
this article is devoted to the issues of streaming data processing in the Internet of things applications. Stream processing is a natural fit for the Internet of things applications. Most of the data models on the Internet things are exactly the data streams. Accordingly, most applications (business applications) are oriented to processing real-time data streams (e.g., search for anomalies, provide billing features, etc.). the paper considers the architecture of data processing systems, classifies stream processing patterns. Much attention is paid to time management in stream processing systems. the review is conducted from the standpoint of the contents of the master's course on stream data processing in the Internet of things and Industrial Internet of things applications. Also, the paper considers the specific application models and streaming data architecture for the Internet of things applications as well basic data analysis algorithms that are used in such systems.
In our modern society the reliance on fast and reliable delivery of large amounts of data is steadily growing as more and more companies and public bodies use data analytics to support their decision processes. At the...
详细信息
ISBN:
(纸本)9783319615660;9783319615653
In our modern society the reliance on fast and reliable delivery of large amounts of data is steadily growing as more and more companies and public bodies use data analytics to support their decision processes. At the same time, the rise of the Internet of things introduces into the public cyberspace a multitude of devices that are often ill-suited to implement strong security measures. For this reason, it is of paramount importance that the whole Internet traffic is fully sanitized from any malicious packet before it is delivered to the destination. Past work has proved that this compelling security requirement may be leveraged to implement an aggressive intrusion detection that may lead to energy savings in the network;however it may also negatively impact latency sensitive applications as the need to scrutinize all the packets may cause latency sensitive traffic to incur unwanted delays beyond the time needed to analyze it for security sake. In this paper, we describe a methodology that, while guaranteeing a full sanitization of the Internet traffic, allows reducing its impact on the delay introduced in latency sensitive traffic.
With parallel applications becoming more and more popular even in real-timesystems, the demand for safe and easy-to-use software libraries and frameworks for parallel and con-current computations is growing immensely...
详细信息
the diversity of applications and devices in enterprise networks combined with large traffic volumes make it inherently challenging to quickly identify malicious traffic. When incidents occur, emergency response teams...
详细信息
ISBN:
(纸本)9781728117249
the diversity of applications and devices in enterprise networks combined with large traffic volumes make it inherently challenging to quickly identify malicious traffic. When incidents occur, emergency response teams often lose precious time in reverse-engineering the network topology and configuration before they can focus on malicious activities and digital forensics. In this paper, we present a system that quickly and reliably identifies Command and Control (C&C) channels without prior network knowledge. the key idea is to train a classifier using network traffic from attacks that happened in the past and use it to identify C&C connections in the current traffic of other networks. Specifically, we leverage the fact that - while benign traffic differs - malicious traffic bears similarities across networks (e.g., devices participating in a botnet act in a similar manner irrespective of their location). To ensure performance and scalability, we use a random forest classifier based on a set of computationally-efficient features tailored to the detection of C&C traffic. In order to prevent attackers from outwitting our classifier, we tune the model parameters to maximize robustness. We measure high resilience against possible attacks - e.g., attempts to camouflaging C&C flows as benign traffic - and packet loss during the inference. We have implemented our approach and we show its practicality on a real use case: Locked Shields, the world's largest cyber defense exercise. In Locked Shields, defenders have limited resources to protect a large, heterogeneous network against unknown attacks. Using recorded datasets (from 2017 and 2018) from a participating team, we show that our classifier is able to identify C&C channels with 99% precision and over 90% recall in near realtime and withrealistic resource requirements. If the team had used our system in 2018, it would have discovered 10 out of 12 C&C servers in the first hours of the exercise.
暂无评论