this paper presents a simplified interval type-2 fuzzy CMAC controller which it can be seen as the combination of two type-1 fuzzy controller. the proposed controller modified CMAC architecture and simplified the inte...
详细信息
Solid State Drives (SSD) is a promising storage technology for High Energy Physics parallel analysis farms. Its combination of low random access time and relatively high read speed is very well suited for situations w...
详细信息
Solid State Drives (SSD) is a promising storage technology for High Energy Physics parallel analysis farms. Its combination of low random access time and relatively high read speed is very well suited for situations where multiple jobs concurrently access data located on the same drive. It also has lower energy consumption and higher vibration tolerance than Hard Disk Drive (HDD) which makes it an attractive choice in many applications raging from personal laptops to large analysis farms. the Parallel ROOT Facility-PROOF is a distributed analysis system which allows to exploit inherent event level parallelism of high energy physics data. PROOF is especially efficient together withdistributed local storage systems like Xrootd, when data are distributed over computing nodes. In such an architecture the local disk subsystem I/O performance becomes a critical factor, especially when computing nodes use multi-core CPUs. We will discuss our experience with SSDs in PROOF environment. We will compare performance of HDD with SSD in I/O intensive analysis scenarios. In particular we will discuss PROOF system performance scaling with a number of simultaneously running analysis jobs.
Network computing infrastructure for sharing tools and data was implemented to support international collaboration. In designing the system, we focused on three issues: accessibility, security, and usability. In the i...
详细信息
ISBN:
(纸本)9780791843529
Network computing infrastructure for sharing tools and data was implemented to support international collaboration. In designing the system, we focused on three issues: accessibility, security, and usability. In the implementation, we integrated existing network and web technologies into the infrastructure by introducing the authentication gateway. For the first issue, SSL-VPN (Security Socket Layer Virtual Private Network) technology was adopted to access computing resources beyond firewalls. For the second issue, PKI (Public Key Infrastructure) -based authentication mechanism was used for access control. Shared key based file encryption was also used to protect against information leakage. the introduction of the authentication gateway enables to strengthen the security. To provide high usability, WebDAV (Web-based distributed Authoring and Versioning) was used to provide users with a function to manipulate distributed files through a windows-like GUI (Graphical User Interface). these functions were integrated into a Grid infrastructure called AEGIS (Atomic Energy Grid Infra Structure). Web applications were developed on the infrastructure for dynamic community creation and information sharing. In this paper, we discuss design issues of the system and report the implementation of a prototype applied to share information for the international project GNEP (Global Nuclear Energy Partnership).
the blockchain is an innovative technology which opened doors to new applications for solving numerous problems in distributed environments. In this work, we design a blockchain-based data storage and access framework...
详细信息
ISBN:
(纸本)9781538643877
the blockchain is an innovative technology which opened doors to new applications for solving numerous problems in distributed environments. In this work, we design a blockchain-based data storage and access framework for PingER (worldwide end-to-end Internet performance measurement project) to remove its total dependence on a centralized repository. We use the permissioned blockchain and distributed Hash Tables (DHT) for this purpose. In the proposed framework, metadata of the files are stored on the blockchain whereas the actual files are stored off-chain through DHT at multiple locations using a peer-to-peer network of PingER Monitoring Agents. this will provide decentralized storage, distributed processing, and efficient lookup capabilities to the PingER framework.
A core security (or trustworthiness) question for all designs of networked applications persists: If distributed nodes connect, are these nodes trustworthy? Is it possible to assess a node's software state before ...
详细信息
ISBN:
(纸本)9781450396707
A core security (or trustworthiness) question for all designs of networked applications persists: If distributed nodes connect, are these nodes trustworthy? Is it possible to assess a node's software state before sharing data, programs and/or interacting withthem? this paper revisits a scenario of assembling distributed, individual nodes for networked applications, such as data science compute nodes or bridge nodes connecting established applications to novel blockchain-related applications and their ecosystem. By taking advantage of special hardware support (Intel TXT), modern boot software that supports it (Trenchboot) and a custom attestation-before-joining protocol, we report on our prototype implementation how attestable nodes can be achieved today.
In this paper a new general recurrent statespace Neuro-Fuzzy model structure based on the combination of a modified Jordan network and an Adaptive Neuro-Fuzzy Inference System is proposed. the Neural-Fuzzy System'...
详细信息
Data mining has emerged as a significant technology for discovering knowledge in vast quantities of data. It is, however, accompanied by the danger that private information will be revealed in the processing of data m...
详细信息
ISBN:
(纸本)9781479959556
Data mining has emerged as a significant technology for discovering knowledge in vast quantities of data. It is, however, accompanied by the danger that private information will be revealed in the processing of data mining. Hence, privacy-preserving data mining has received a growing amount of attention in recent years. We have proposed a method to extract global fuzzy rules from distributed data withthe same attributes in a privacy-preserving manner. this method transfers only values necessary for the extraction process without collecting any data at one place and can obtain the global fuzzy rules at all places. In this paper, we propose a method to extract global fuzzy rules in a privacy-preserving manner from distributed data with different attributes based on the method for distributed data withthe same attributes. We illustrate a result for experiments using Iris data by R.A. Fisher.
In the last years the utilization of Multiagent Systems to implement distributed control systems in industrial environments was presented as suitable and as a cost-effective solution to deal withthe new requirements ...
详细信息
ISBN:
(纸本)9781728129273
In the last years the utilization of Multiagent Systems to implement distributed control systems in industrial environments was presented as suitable and as a cost-effective solution to deal withthe new requirements regarding flexibility and dynamism on the shop-floor. However, the proposed implementation of these distributed Cyber-Physical Production Systems faced some challenges regarding hardware and network requirements. Hence, the proposed work presents one utilization of a Multiagent-based distributed control system running on the fog level and running upon the edge level. this research presents a test and assessment of running intelligent agents outside the edge level but at the same time avoid the deployment of the industrial agents on the cloud level due to time and performance constraints. the proposed test presents a Multiagent architecture responsible for controlling the shopfloor, but the overall architecture was designed to accommodate the agents on the fog level, running upon the edge level composed by industrial controllers running Device Profile Web Services.
Federated learning (FL) is an appealing model training technique that utilizes heterogeneous datasets and user devices, ensuring user data privacy. Existing FL research proposed device selection schemes to balance the...
详细信息
ISBN:
(纸本)9798350368543;9798350368536
Federated learning (FL) is an appealing model training technique that utilizes heterogeneous datasets and user devices, ensuring user data privacy. Existing FL research proposed device selection schemes to balance the computing speeds of devices. However, we observe that these schemes compromise prediction accuracy by similar to 57.7%. To solve this problem, we present Harmonia that enhances prediction accuracy, while also balancing the diverse computing speeds of devices. Our evaluation shows that Harmonia improves prediction accuracy by similar to 1.7x over existing schemes.
Different from homogeneous clusters, when distributed training is performed in heterogeneous clusters, there will be great performance degradation due to the effect of stragglers. Instead of the synchronous stochastic...
详细信息
暂无评论