380,601 research outputs found

    Staged cost optimization of urban storm drainage systems based on hydraulic performance in a changing environment

    Get PDF
    International audienceUrban flooding causes large economic losses, property damage and loss of lives. The impact of environmental changes mainly, the urbanization and the climatic change leads to increased runoff and increased peak flows which the drainage system must be able to cope with to overcome possible damage and inconveniences caused by the induced flooding. Allowing for detention storage to compliment the capacity of the drainage system network is one of the approaches to reduce urban floods. The traditional practice was to design systems against stationary environmental forcings ? including design rainfall, landuse, etc. Due to the rapid change in climate-environment, this approach is no longer economically viable and safe, and explicit consideration of changes that gradually take place during the life-time of the drainage system is warranted. In this paper, a staged cost optimization tool based on the hydraulic performance of the drainage system is presented. A one dimensional hydraulic model is used for hydraulic evaluation of the network together with a genetic algorithm based optimization tool to determine optimal intervention timings and amounts throughout the lifespan of the drainage network. The model was applied in a case study area in the city of Porto Alegre, Brazil. It was concluded that considerable financial savings and/or additional level of flood-safety can be achieved by approaching the design problem as a staged plan rather than one-off scheme

    GPUs as Storage System Accelerators

    Full text link
    Massively multicore processors, such as Graphics Processing Units (GPUs), provide, at a comparable price, a one order of magnitude higher peak performance than traditional CPUs. This drop in the cost of computation, as any order-of-magnitude drop in the cost per unit of performance for a class of system components, triggers the opportunity to redesign systems and to explore new ways to engineer them to recalibrate the cost-to-performance relation. This project explores the feasibility of harnessing GPUs' computational power to improve the performance, reliability, or security of distributed storage systems. In this context, we present the design of a storage system prototype that uses GPU offloading to accelerate a number of computationally intensive primitives based on hashing, and introduce techniques to efficiently leverage the processing power of GPUs. We evaluate the performance of this prototype under two configurations: as a content addressable storage system that facilitates online similarity detection between successive versions of the same file and as a traditional system that uses hashing to preserve data integrity. Further, we evaluate the impact of offloading to the GPU on competing applications' performance. Our results show that this technique can bring tangible performance gains without negatively impacting the performance of concurrently running applications.Comment: IEEE Transactions on Parallel and Distributed Systems, 201

    Predicting Intermediate Storage Performance for Workflow Applications

    Full text link
    Configuring a storage system to better serve an application is a challenging task complicated by a multidimensional, discrete configuration space and the high cost of space exploration (e.g., by running the application with different storage configurations). To enable selecting the best configuration in a reasonable time, we design an end-to-end performance prediction mechanism that estimates the turn-around time of an application using storage system under a given configuration. This approach focuses on a generic object-based storage system design, supports exploring the impact of optimizations targeting workflow applications (e.g., various data placement schemes) in addition to other, more traditional, configuration knobs (e.g., stripe size or replication level), and models the system operation at data-chunk and control message level. This paper presents our experience to date with designing and using this prediction mechanism. We evaluate this mechanism using micro- as well as synthetic benchmarks mimicking real workflow applications, and a real application.. A preliminary evaluation shows that we are on a good track to meet our objectives: it can scale to model a workflow application run on an entire cluster while offering an over 200x speedup factor (normalized by resource) compared to running the actual application, and can achieve, in the limited number of scenarios we study, a prediction accuracy that enables identifying the best storage system configuration

    Simulation models and performance assessment of district heating substations

    Get PDF
    Development of new technologies and methodologies regarding district heating substation operational control strategies are increasingly found nowadays. At the same time a great number of modern buildings are provided with energy monitoring and control systems which supervise and collect operating data from different energy components. Accordingly, an exemplary district heating systems is being implemented in the city of Kortrijk in Belgium, as part of a demonstration zero-carbon neighborhood. This study deals with the energy performance assessment of one of the systems component -the consumer substationinstalled in this low-temperature district heating system. A comparative analysis of the energy performance with several existing district heating substations was carried out. Three different district heating substation models are set up (using TRNsys) for investigation of the gross energy use, energyefficiency and comfort issues. In order to evaluate the performance of the analyzed substations two scenarios concerning the space heating system (radiator or floor heating system) were considered. The study aims to investigate the impact of different operational circumstances on the performance of district heating substations. The study generate understandings for energy saving operational strategies to be developed. Results indicate that the design concept together with a suitable selection of the substation has an important impact on the energy performance of the entire system

    Checkpointing as a Service in Heterogeneous Cloud Environments

    Get PDF
    A non-invasive, cloud-agnostic approach is demonstrated for extending existing cloud platforms to include checkpoint-restart capability. Most cloud platforms currently rely on each application to provide its own fault tolerance. A uniform mechanism within the cloud itself serves two purposes: (a) direct support for long-running jobs, which would otherwise require a custom fault-tolerant mechanism for each application; and (b) the administrative capability to manage an over-subscribed cloud by temporarily swapping out jobs when higher priority jobs arrive. An advantage of this uniform approach is that it also supports parallel and distributed computations, over both TCP and InfiniBand, thus allowing traditional HPC applications to take advantage of an existing cloud infrastructure. Additionally, an integrated health-monitoring mechanism detects when long-running jobs either fail or incur exceptionally low performance, perhaps due to resource starvation, and proactively suspends the job. The cloud-agnostic feature is demonstrated by applying the implementation to two very different cloud platforms: Snooze and OpenStack. The use of a cloud-agnostic architecture also enables, for the first time, migration of applications from one cloud platform to another.Comment: 20 pages, 11 figures, appears in CCGrid, 201

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc
    • 

    corecore