82 research outputs found

    Exploration of Erasure-Coded Storage Systems for High Performance, Reliability, and Inter-operability

    Get PDF
    With the unprecedented growth of data and the use of low commodity drives in local disk-based storage systems and remote cloud-based servers has increased the risk of data loss and an overall increase in the user perceived system latency. To guarantee high reliability, replication has been the most popular choice for decades, because of simplicity in data management. With the high volume of data being generated every day, the storage cost of replication is very high and is no longer a viable approach. Erasure coding is another approach of adding redundancy in storage systems, which provides high reliability at a fraction of the cost of replication. However, the choice of erasure codes being used affects the storage efficiency, reliability, and overall system performance. At the same time, the performance and interoperability are adversely affected by the slower device components and complex central management systems and operations. To address the problems encountered in various layers of the erasure coded storage system, in this dissertation, we explore the different aspects of storage and design several techniques to improve the reliability, performance, and interoperability. These techniques range from the comprehensive evaluation of erasure codes, application of erasure codes for highly reliable and high-performance SSD system, to the design of new erasure coding and caching schemes for Hadoop Distributed File System, which is one of the central management systems for distributed storage. Detailed evaluation and results are also provided in this dissertation

    FPGA based technical solutions for high throughput data processing and encryption for 5G communication: A review

    Get PDF
    The field programmable gate array (FPGA) devices are ideal solutions for high-speed processing applications, given their flexibility, parallel processing capability, and power efficiency. In this review paper, at first, an overview of the key applications of FPGA-based platforms in 5G networks/systems is presented, exploiting the improved performances offered by such devices. FPGA-based implementations of cloud radio access network (C-RAN) accelerators, network function virtualization (NFV)-based network slicers, cognitive radio systems, and multiple input multiple output (MIMO) channel characterizers are the main considered applications that can benefit from the high processing rate, power efficiency and flexibility of FPGAs. Furthermore, the implementations of encryption/decryption algorithms by employing the Xilinx Zynq Ultrascale+MPSoC ZCU102 FPGA platform are discussed, and then we introduce our high-speed and lightweight implementation of the well-known AES-128 algorithm, developed on the same FPGA platform, and comparing it with similar solutions already published in the literature. The comparison results indicate that our AES-128 implementation enables efficient hardware usage for a given data-rate (up to 28.16 Gbit/s), resulting in higher efficiency (8.64 Mbps/slice) than other considered solutions. Finally, the applications of the ZCU102 platform for high-speed processing are explored, such as image and signal processing, visual recognition, and hardware resource management

    Satellite Power Systems (SPS) concept definition study, exhibit C. Volume 5: Special emphasis studies

    Get PDF
    Specific areas were analyzed and identified as high priority for more in-depth analysis. These areas were: (1) rectenna constructability; (2) satellite constructability; (3) support systems constructability; (4) space environmental analysis, and (5) special end-to-end analyses. Baseline requirements specified coplanar solar blankets and an end mounted antenna, utilizing either GaAlAs solar cells and employing a CR of 2, or Si cells. Several configurations were analyzed. Utilizing the preferred configuration as a baseline, a satellite construction base was defined, precursor operations incident to establishment of orbital support facilities identified, and the satellite construction sequence and procedures developed. Since the baseline specifies sixty instead of one hundred and twenty satellites to be constructed in a thirty year period, mass flow to orbit requirements were revised and new traffic models established. Launch site requirements (exclusive of actual launch operations) in terms of manpower and building space were defined

    Satellite Power Systems (SPS) concept definition study, exhibit C. Volume 2, part 1: System engineering

    Get PDF
    Volume 2, Part 1, of a seven volume report is presented. Part 1 encompasses Satellite Power Systems (SPS) systems engineering aspects and is divided into three sections. The first section presents descriptions of the various candidate concepts considered and conclusions and recommendations for a preferred concept. The second section presents a summary of results of the various trade studies and analysis conducted during the course of the study. The third section describes the Photovoltaic Satellite Based Satellite Power System (SPS) Point Design as it was defined through studies performed during the period January 1977 through March 1979

    Solid state mass memories in the world of internet of things

    Get PDF
    The thesis is written as a consulting assignment to Helsinki Memory Technologies Oy. The motivation for this assignment was to learn more about mass memories as a part of Internet of Things ecosystem. Additionally, the thesis seeks if there could be the potentially new business opportunities at the target field. The thesis describes core technologies related to the solid state mass memories in the world of Internet of Things (IoT) at Chapter 2 to 4. Standards chapter covers the benefits of the standardization and the most important corresponding IoT forums. That chapter also summarizes IoT development activities of the key companies. At the end of the thesis there is an analysis of the new business opportunities found during the consulting period, which are grouped into two subsets: the extensions of existing solutions and the new IoT usage models with memory focus. Conclusion chapter states that the architecture of managed NAND holds a strong position, which is foreseen to remain. This enables the development of IoT support to the mass memories. An additional conclusion is that IoT has reached the critical mass, but its final implementation is not defined yet. The business potential of IoT is estimated to be significant. These conclusions lead to recommendation for continuing studying the role of the mass memories in the IoT ecosystem. The final conclusion is that organizations, which study the implementation of IoT to the mass memory in details, will be well prepared and have an adaptable technical offer

    INQUIRIES IN INTELLIGENT INFORMATION SYSTEMS: NEW TRAJECTORIES AND PARADIGMS

    Get PDF
    Rapid Digital transformation drives organizations to continually revitalize their business models so organizations can excel in such aggressive global competition. Intelligent Information Systems (IIS) have enabled organizations to achieve many strategic and market leverages. Despite the increasing intelligence competencies offered by IIS, they are still limited in many cognitive functions. Elevating the cognitive competencies offered by IIS would impact the organizational strategic positions. With the advent of Deep Learning (DL), IoT, and Edge Computing, IISs has witnessed a leap in their intelligence competencies. DL has been applied to many business areas and many industries such as real estate and manufacturing. Moreover, despite the complexity of DL models, many research dedicated efforts to apply DL to limited computational devices, such as IoTs. Applying deep learning for IoTs will turn everyday devices into intelligent interactive assistants. IISs suffer from many challenges that affect their service quality, process quality, and information quality. These challenges affected, in turn, user acceptance in terms of satisfaction, use, and trust. Moreover, Information Systems (IS) has conducted very little research on IIS development and the foreseeable contribution for the new paradigms to address IIS challenges. Therefore, this research aims to investigate how the employment of new AI paradigms would enhance the overall quality and consequently user acceptance of IIS. This research employs different AI paradigms to develop two different IIS. The first system uses deep learning, edge computing, and IoT to develop scene-aware ridesharing mentoring. The first developed system enhances the efficiency, privacy, and responsiveness of current ridesharing monitoring solutions. The second system aims to enhance the real estate searching process by formulating the search problem as a Multi-criteria decision. The system also allows users to filter properties based on their degree of damage, where a deep learning network allocates damages in 12 each real estate image. The system enhances real-estate website service quality by enhancing flexibility, relevancy, and efficiency. The research contributes to the Information Systems research by developing two Design Science artifacts. Both artifacts are adding to the IS knowledge base in terms of integrating different components, measurements, and techniques coherently and logically to effectively address important issues in IIS. The research also adds to the IS environment by addressing important business requirements that current methodologies and paradigms are not fulfilled. The research also highlights that most IIS overlook important design guidelines due to the lack of relevant evaluation metrics for different business problems

    Fog computing security: a review of current applications and security solutions

    Get PDF
    Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems

    The Proceedings of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, and I would like to take this opportunity to thank the conference committee for their tireless efforts in this regard. These efforts have included but not been limited to the reviewing and editing of the conference papers, and helping with the planning, organisation and execution of the conference. Particular thanks go to those international reviewers who took the time to review papers for the conference, irrespective of the fact that they are unable to attend this year. To our sponsors and supporters a vote of thanks for both the financial and moral support provided to the conference. Finally, to the student volunteers and staff of the ECU Security Research Institute, your efforts as always are appreciated and invaluable. Yours sincerely, Conference Chair Professor Craig Valli Director, Security Research Institut

    Pilvipalvelupohjaisten alustojen hyödyntäminen tuotantoautomaation prosessidatan keräyksessä ja visualisoinnissa

    Get PDF
    New developments at the field of factory information systems and resource allocation solutions are constantly taken into practice within the field of manufacturing and production. Customers are turning their vision for more customized products and requesting further monitoring possibilities for the product itself, for its manufacturing and for its delivery. Similar paradigm change is taking place within the companies’ departments and between the clusters of manufacturing stakeholders. Modern cloud based tools are providing the means for gaining these objectives. Technology evolved from parallel, grid and distributed computing; at present cited as Cloud computing is one key future paradigm in factory and production automation. Regardless of the terminology still settling, in multiple occasions cloud computing is used term when referring to cloud services or cloud resources. Cloud technology is further-more understood as resources located outside individual entities premises. These resources are pieces of functionalities for gaining overall performance of the designed system and so worth such an architectural style is referred as Resource-Oriented Architecture (ROA). Most prominent connection method for combining the resources is a communication via REST (Representational State Transfer) based interfaces. When comping cloud resources with internet connected devices technology, Internet-of-Things (IoT) and furthermore IoT Dashboards for creating user interfaces, substantial benefits can be gained. These benefits include shorter lead-time for user interface development, process data gathering and production monitoring at higher abstract level. This Master’s Thesis takes a study for modern cloud computing resources and IoT Dashboards technologies for gaining process monitoring capabilities able to be used in the field of university research. During the thesis work, an alternative user group is kept in mind. Deploying similar methods for private production companies manufacturing environments. Additionally, field of Additive Manufacturing (AM) and one of its sub-category Direct Energy Deposition Method (DED) is detailed for gaining comprehension over the process monitoring needs, laying in the questioned manufacturing method. Finally, an implementation is developed for monitoring Tampere University of Technology Direct Energy Deposition method manufacturing environment research cell process both in real-time and gathering the process data for later reviewing. These functionalities are gained by harnessing cloud based infrastructures and resources
    • …
    corecore