In this systematic literature review, automatic text-based and easy type assessment grading system using Machine Learning and Natural Language Processing (NLP) techniques was investigated. the major focus is on text-b...
详细信息
Choosing the best configuration to deploy a distributed application in a multi-cloud environment is a complex task since many cloud providers offer several services with different capabilities. In this paper, we prese...
详细信息
ISBN:
(纸本)9789897584244
Choosing the best configuration to deploy a distributed application in a multi-cloud environment is a complex task since many cloud providers offer several services with different capabilities. In this paper, we present a multi-cloud selection process to deploy a distributed microservice-based application, which has low communication cost among microservices. the proposed selection process is part of PacificClouds, an approach that intends to manage the deployment and execution of distributed applications across multiple providers from the software architect perspective. the proposed approach selects various providers, where each provider must host an entire microservice with multiple tasks consuming several cloud services. the UM(2)Q approach selects the provider that better meets the software architect requirements, for each microservice of a multi-cloud application. Hence, the proposed process of selecting multiple providers uses multi-criteria decision-making methods to rank the cloud services and selects cloud providers and services by individually observing each microservice requirement, such as cloud availability, response time, and cost. Further, we propose a formal description of UM(2)Q and a brief one of the strategy implementation. We also introduce a set of experiments to evaluate UM(2)Q performance, and the outcomes showed its feasibility for a variable number of requirements, microservices and providers, even for extreme values.
the proceedings contain 202 papers. the topics discussed include: multi-relational graph convolutional networks for skeleton-based action recognition;identifying the right person in social networks with double metapho...
ISBN:
(纸本)9781665414852
the proceedings contain 202 papers. the topics discussed include: multi-relational graph convolutional networks for skeleton-based action recognition;identifying the right person in social networks with double metaphone codes;a novel strong cache consistency mechanism in ICN based on role division and lease model;demystifying the largest live game streaming platform via black-box measurement;framework-agnostic optimization of repeated skewed joins at massive scale;remote procedure call optimization of big data systemsbased on data awareness;MCSEC: secure coded matrix multiplication scheme for edge computing with minimum communication cost;low-rate DoS attack detection based on WPD-EE algorithm;user identity linkage across location-based social networks with spatio-temporal check-in patterns;optimizing 3-D placement of multiple UAVs based on Taguchi’s method;and feature envy detection based on Bi-LSTM with self-attention mechanism.
the adoption of microservice-based applications in Edge Computing is increasing, as a result of the improved maintainability and scalability delivered by these highly-distributed and decoupled applications. On the oth...
详细信息
ISBN:
(纸本)9789897584244
the adoption of microservice-based applications in Edge Computing is increasing, as a result of the improved maintainability and scalability delivered by these highly-distributed and decoupled applications. On the other hand, Edge Computing operators must be aware of availability and resource contention issues when placing microservices on the edge infrastructure to avoid applications' performance degradation. In this paper, we present IRENE, a genetic algorithm designed to improve the performance of microservice-based applications in Edge Computing by preventing performance degradation caused by resource contention and increasing the application's availability as a means for avoiding SLA violations. Experiments were carried, and the results showed IRENE effectiveness over different existing strategies in different scenarios. In future investigations, we intend to extend IRENE's interference awareness to the network level.
the proceedings contain 31 papers. the topics discussed include: toolchain development for automated scene reconstruction using artificial neural network object detection and photogrammetry for the application in driv...
ISBN:
(纸本)9789897584442
the proceedings contain 31 papers. the topics discussed include: toolchain development for automated scene reconstruction using artificial neural network object detection and photogrammetry for the application in driving simulators;a malaria control model using mobility data: an early explanation of Kedougou case in Senegal;architectures for combining discrete-event simulation and machine learning;UniSim-design simulation and analysis of a sulfuric acid manufacturing plant with double absorption process;investigation of the dynamic loads on tower cranes during slewing operations;blending simulation and machine learning models to advance energy management in large ships;adopting technological devices in hospital at home: a modeling and simulation perspective;characteristics-based Simulink implementation of first-order quasilinear partial differential equations;and numerical study of the axial and radial forces, the stresses and the strains in a high pressure multistage centrifugal pump.
the aim of the paper is to outline the prerequisites for the introduction of a model for integrating an intended interface platform for storing information regarding results and background information from scientific ...
详细信息
In our more and more connected world where people are used to managing their lives via digital services, it has become mandatory for a successful company to build applications that can scale withthe popularity of the...
ISBN:
(纸本)9781450393089
In our more and more connected world where people are used to managing their lives via digital services, it has become mandatory for a successful company to build applications that can scale withthe popularity of the company's services. Scalability is not the only requirement but similarly important is that modern applications are highly available and fast because users are not willing to wait in our ever faster moving world. Due to this, we have seen a shift from the classic monolith towards micro service architectures which promise to be more easily scalable. the emergence of serverless functions further strengthened this trend more recently. By implementing a micro service architecture, application developers are all of a sudden exposed to the realm of distributed applications with its seemingly limitless scalability but also its pitfalls nobody tells you about upfront. So instead of solving business domain problems, developers find themselves fighting with race conditions, distributed failures, inconsistencies and in general a drastically increased complexity. In order to solve some of these problems, people introduce endless retries, timeouts, sagas and distributed transactions. these band aids can quickly result in a not so scalable system that is brittle and hard to maintain. the underlying problem is that developers are responsible for ensuring reliable communication and consistent state changes. Having a system that takes care of these aspects could drastically reduce the complexity of developing scalable distributed applications. By inverting the traditional control-flow from application-to-database to database-to-application, we can put the database in charge of ensuring reliable communication and consistent state changes and, thus, freeing the developer to think about it. In this keynote, I want to explore the idea of putting the database in charge of driving the application logic using the example of Stateful Functions, a library built on top of Apache
the proceedings contain 10 papers. the topics discussed include: replacing pivoting in distributed Gaussian elimination with randomized techniques;implementation and numerical techniques for one EFlop/s HPL-AI benchma...
ISBN:
(纸本)9781665422703
the proceedings contain 10 papers. the topics discussed include: replacing pivoting in distributed Gaussian elimination with randomized techniques;implementation and numerical techniques for one EFlop/s HPL-AI benchmark on Fugaku;performance analysis of a quantum Monte Carlo application on multiple hardware architectures using the HPX runtime;an integer arithmetic-based sparse linear solver using a GMRES method and iterative refinement;two-stage asynchronous iterative solvers for multi-GPU clusters;basic linear algebra operations on TensorCore GPU;a survey of singular value decomposition methods for distributed tall/skinny data;and a fast scalable iterative implicit solver with green’s function-based neural networks.
Integration of distributed energy resources (DERs) in grid planning and control requires estimating and aggregating the active and reactive power flexibility offered by an ensemble of DERs. the flexibility of DERs to ...
详细信息
ISBN:
(纸本)9781450366717
Integration of distributed energy resources (DERs) in grid planning and control requires estimating and aggregating the active and reactive power flexibility offered by an ensemble of DERs. the flexibility of DERs to provide grid services is, however, often uncertain due to insufficient end-use measurements (e.g. power consumption) and inaccurate forecast (e.g. solar irradiance). In this short note, we propose a numerical simulation based framework for modeling the flexibility in uncertain individual continuous DERs.
the proceedings contain 35 papers. the special focus in this conference is on Computational Intelligence in Security for Information systems. the topics include: Deep Wavelet Extreme Learning Machine for Data Classifi...
ISBN:
(纸本)9783030200046
the proceedings contain 35 papers. the special focus in this conference is on Computational Intelligence in Security for Information systems. the topics include: Deep Wavelet Extreme Learning Machine for Data Classification;palm Vein Age and Gender Estimation Using Center Symmetric-Local Binary Pattern;neuro-Evolutionary Feature Selection to Detect Android Malware;improving Blockchain Security Validation and Transaction Processing through Heterogeneous Computing;anomaly Detection on Patients Undergoing General Anesthesia;an Internet Voting Proposal Towards Improving Usability and Coercion Resistance;linearization of Cryptographic Sequences;On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework;a Novel Construction for Streaming Networks with Delays;comparison of System Call Representations for Intrusion Detection;hyot: Leveraging Hyperledger for Constructing an event-based Traceability System in IoT;data Mining for Statistical Evaluation of Summative and Competency-based Assessments in Mathematics;looking for the Antidote for Contaminated Water: Learning through an Escape Game;enhancing Collaborative Learning through Pedagogical Alignment;rules_Math: Establishing Assessment Standards;evaluate Mathematical Competencies in Engineering Using Video-Lessons;statistical Methods – What Is the Problem Here?;enhancing the Learning of Cryptography through Concept Maps;analysis of Student Achievement Scores: A Machine Learning Approach;analysis of Teacher Training in Mathematics in Paraguay’s Elementary Education System Using Machine Learning Techniques;Efficient Verification of Security Protocols Time Properties Using SMT Solvers;cooperative Evaluation Using Moodle;automatic Categorization of Introductory Programming Students;using Scratch to Improve Undergraduate Students’ Skills on Artificial Intelligence;project-based Methodology to Lecture on Web Frameworks Applied to the Management of Health-Related Data;mirkwood: An Online Parallel Craw
暂无评论