Determining an appropriate thread count for a multithread application running on a heterogeneous many-core system is crucial for improving computing performance and reducing energy consumption. This paper investigates...
详细信息
ISBN:
(纸本)9780769557854
Determining an appropriate thread count for a multithread application running on a heterogeneous many-core system is crucial for improving computing performance and reducing energy consumption. This paper investigates the interrelation between thread count and computing performance of applications, and designs a prediction model of the optimum thread count on the basis of Amdahl's law combined with regression analysis theory to improve computing performance and reduce energy consumption. The prediction model can estimate the optimum tread count relying on the program running behaviors and the architecture characteristics of heterogeneous many-core system. Using the estimated optimum thread count, the number of the active hardware threads and processing cores on the many-core processor is dynamically adjusted in the process of thread mapping to improve the energy efficiency of entire heterogeneous many-core system. The experimental results show that, using this paper proposed thread count prediction model, on an average, the computing performance is improved by 48.6%, energy consumption is reduced by 59%, and additional overhead introduced is 2.03% compared with that of the traditional thread mapping for the PARSEC benchmark programs run on an Intel MIC heterogeneous many-core system.
The ATLAS experiment at the LHC has successfully incorporated cloud computingtechnology and cloud resources into its primarily grid-based model of distributedcomputing. Cloud R&D activities continue to mature an...
详细信息
The ATLAS experiment at the LHC has successfully incorporated cloud computingtechnology and cloud resources into its primarily grid-based model of distributedcomputing. Cloud R&D activities continue to mature and transition into stable production systems, while ongoing evolutionary changes are still needed to adapt and refine the approaches used, in response to changes in prevailing cloud technology. In addition, completely new developments are needed to handle emerging requirements. This paper describes the overall evolution of cloud computing in ATLAS. The current status of the virtual machine (VM) management systems used for harnessing Infrastructure as a Service resources are discussed. Monitoring and accounting systems tailored for clouds are needed to complete the integration of cloud resources within ATLAS' distributedcomputing framework. We are developing and deploying new solutions to address the challenge of operation in a geographically distributed multi-cloud scenario, including a system for managing VM images across multiple clouds, a system for dynamic location-based discovery of caching proxy servers, and the usage of a data federation to unify the worldwide grid of storage elements into a single namespace and access point. The usage of the experiment's high level trigger farm for Monte Carlo production, in a specialized cloud environment, is presented. Finally, we evaluate and compare the performance of commercial clouds using several benchmarks.
Virtual Machine (VM) migration has recently received significant attention to address the issue of load balancing, system maintenance, intelligent energy management of the data center. However, the migration trust and...
详细信息
ISBN:
(纸本)9781509020300
Virtual Machine (VM) migration has recently received significant attention to address the issue of load balancing, system maintenance, intelligent energy management of the data center. However, the migration trust and security concerns still exist real in the placement of VM. In To resolve these challenging problems, we use the existing authentication schemes and also we propose an authentication framework as a basic and practical component of secure VM migration process. Especially, in the proposed framework, the physical machines (PM) which are distributed in diverse data centers can accomplish mutual authentication, launch the shared session key Diffie-Hellman exchange protocol, with the public session key between PMs and hash based authentications. In this work, a comprehensive security scrutiny shows that the anticipated framework can assure the desired security necessities of VM migration.
Digital communication & internet technology has brought big revolution in transferring of digital data in 21st century. Android operating system has enhanced all application of digital technology. Digital data c...
详细信息
ISBN:
(纸本)9781509020300
Digital communication & internet technology has brought big revolution in transferring of digital data in 21st century. Android operating system has enhanced all application of digital technology. Digital data can be transfer in various format like image, text, animation, graphics, message, video, audio, etc. For transferring the digital data like image, there is need of various multimedia models which can support digital image property. Such as image types, seeing colors containing different color model, human vision, interaction of light with matter, image resolution & bit depth. To maintain all these property of single digital still image of scanned cheque document, there is requirement of security, privacy & authentication. This can be done by using techniques like digital image watermarking and its combination with encryption & decryption techniques. In this research paper, a hybrid intelligent DWT-SVD digital image watermarking technique is used for authenticity & ownership whereas advanced encryption standard technique using 256 bit key is used for security of digital cheque image.
We report on the status of the data preservation project at DESY for the HERA experiments and present the latest design of the storage which is a central element for bit preservation. The HEP experiments based at the ...
详细信息
We report on the status of the data preservation project at DESY for the HERA experiments and present the latest design of the storage which is a central element for bit preservation. The HEP experiments based at the HERA accelerator at DESY collected large and unique datasets during the period from 1992 to 2007. As part of the ongoing DPHEP data preservation efforts at DESY, these datasets must be transferred into storage systems that keep the data available for ongoing studies and guarantee safe long term access. To achieve a high level of reliability, we use the dCache distributedstorage solution and make use of its replication capabilities and tape interfaces. We also investigate a recently introduced Small File Service that allows for the fully automatic creation of tape friendly container files.
In this paper, we propose a habit-based SWRL generation and reasoning approach in smart home. Definition and recognition of habits of daily living can provide humanized smart home for assisted living application, espe...
详细信息
ISBN:
(纸本)9780769557854
In this paper, we propose a habit-based SWRL generation and reasoning approach in smart home. Definition and recognition of habits of daily living can provide humanized smart home for assisted living application, especially for people with memory deficits. This paper presents Recognizing Habit of Daily Living(RHDL) by discovering and monitoring smart home context information. The habit and habit association of using electrical appliances are defined explicitly for the first time. The generation rules between habit/complex habit and SWRL are designed, and the reasoning is based on the Semantic Web Rule Language(SWRL). The ontology model for the RHDL is designed and the prototype system of RHDL is implemented using protege and Jess tools.
The zhuyin phonetic script not only provides greater learning benefits compared to romanization systems for Chinese Mandarin language students with existing English fluency, but also allows students to take advantage ...
详细信息
ISBN:
(纸本)1891706381
The zhuyin phonetic script not only provides greater learning benefits compared to romanization systems for Chinese Mandarin language students with existing English fluency, but also allows students to take advantage of its use in Taiwan where it exists in both official and popular usage. However, while penenabled computing educational applications can assist traditional pedagogical approaches for accelerating mastery of the script, existing approaches are either constrained in providing writing assessment, catered to native language users, or are less flexible in recognizing more natural writing. We present BopoNoto, an intelligent sketch education application for language students to learn zhuyin. Our application provides a sketching interface for practicing the symbols, and a sketch recognition system for assessing the visual and technical correctness of their input. From our evaluations, BopoNoto successfully demonstrates strong results in understanding and assessing students' written input.
A cloud-based Virtual Analysis Facility (VAF) for the ALICE experiment at the LHC has been deployed in Bari. Similar facilities are currently running in other Italian sites with the aim to create a federation of inter...
详细信息
A cloud-based Virtual Analysis Facility (VAF) for the ALICE experiment at the LHC has been deployed in Bari. Similar facilities are currently running in other Italian sites with the aim to create a federation of interoperating farms able to provide their computing resources for interactive distributed analysis. The use of cloud technology, along with elastic provisioning of computing resources as an alternative to the grid for running data intensive analyses, is the main challenge of these facilities. One of the crucial aspects of the user-driven analysis execution is the data access. A local storage facility has the disadvantage that the stored data can be accessed only locally, i.e. from within the single VAF. To overcome such a limitation a federated infrastructure, which provides full access to all the data belonging to the federation independently from the site where they are stored, has been set up. The federation architecture exploits both cloud computing and XRootD technologies, in order to provide a dynamic, easy-to-use and well performing solution for data handling. It should allow the users to store the files and efficiently retrieve the data, since it implements a dynamic distributed cache among many datacenters in Italy connected to one another through the high-bandwidth national network. Details on the preliminary architecture implementation and performance studies are discussed.
With the rapid advancements of mobile computing, mobile location recognition is becoming an important and useful service, which recognizes the logical locations of places/scenes that users are interested in, instead o...
详细信息
ISBN:
(纸本)9780769557854
With the rapid advancements of mobile computing, mobile location recognition is becoming an important and useful service, which recognizes the logical locations of places/scenes that users are interested in, instead of physical coordinates. Most of the existing mobile location recognition systems utilize the image as visual fingerprint of a place, and need to construct a large-scale visual fingerprint database in advance. However, collecting visual fingerprints is a labor-intensive and time-consuming procedure. In order to address this problem, we propose a novel crowdsourcing-based framework, and leverage a variety of sensors embedded in smartphones to collect richer location fingerprints for exploring their positive effects. To achieve higher recognition accuracy, we propose an object-centric fingerprint searching which can sufficiently take advantage of smartphone sensors and determine more accurate searching space than the traditional user-centric method. We build a crowdsourcing-based database with richer fingerprints and implement a location recognition system, called CrowdLR. Extensive experiments verify that our object-centric method can achieve promising results maintaining around 10% precision higher than the user-centric method.
暂无评论