380,601 research outputs found
Staged cost optimization of urban storm drainage systems based on hydraulic performance in a changing environment
International audienceUrban flooding causes large economic losses, property damage and loss of lives. The impact of environmental changes mainly, the urbanization and the climatic change leads to increased runoff and increased peak flows which the drainage system must be able to cope with to overcome possible damage and inconveniences caused by the induced flooding. Allowing for detention storage to compliment the capacity of the drainage system network is one of the approaches to reduce urban floods. The traditional practice was to design systems against stationary environmental forcings ? including design rainfall, landuse, etc. Due to the rapid change in climate-environment, this approach is no longer economically viable and safe, and explicit consideration of changes that gradually take place during the life-time of the drainage system is warranted. In this paper, a staged cost optimization tool based on the hydraulic performance of the drainage system is presented. A one dimensional hydraulic model is used for hydraulic evaluation of the network together with a genetic algorithm based optimization tool to determine optimal intervention timings and amounts throughout the lifespan of the drainage network. The model was applied in a case study area in the city of Porto Alegre, Brazil. It was concluded that considerable financial savings and/or additional level of flood-safety can be achieved by approaching the design problem as a staged plan rather than one-off scheme
GPUs as Storage System Accelerators
Massively multicore processors, such as Graphics Processing Units (GPUs),
provide, at a comparable price, a one order of magnitude higher peak
performance than traditional CPUs. This drop in the cost of computation, as any
order-of-magnitude drop in the cost per unit of performance for a class of
system components, triggers the opportunity to redesign systems and to explore
new ways to engineer them to recalibrate the cost-to-performance relation. This
project explores the feasibility of harnessing GPUs' computational power to
improve the performance, reliability, or security of distributed storage
systems. In this context, we present the design of a storage system prototype
that uses GPU offloading to accelerate a number of computationally intensive
primitives based on hashing, and introduce techniques to efficiently leverage
the processing power of GPUs. We evaluate the performance of this prototype
under two configurations: as a content addressable storage system that
facilitates online similarity detection between successive versions of the same
file and as a traditional system that uses hashing to preserve data integrity.
Further, we evaluate the impact of offloading to the GPU on competing
applications' performance. Our results show that this technique can bring
tangible performance gains without negatively impacting the performance of
concurrently running applications.Comment: IEEE Transactions on Parallel and Distributed Systems, 201
Predicting Intermediate Storage Performance for Workflow Applications
Configuring a storage system to better serve an application is a challenging
task complicated by a multidimensional, discrete configuration space and the
high cost of space exploration (e.g., by running the application with different
storage configurations). To enable selecting the best configuration in a
reasonable time, we design an end-to-end performance prediction mechanism that
estimates the turn-around time of an application using storage system under a
given configuration. This approach focuses on a generic object-based storage
system design, supports exploring the impact of optimizations targeting
workflow applications (e.g., various data placement schemes) in addition to
other, more traditional, configuration knobs (e.g., stripe size or replication
level), and models the system operation at data-chunk and control message
level.
This paper presents our experience to date with designing and using this
prediction mechanism. We evaluate this mechanism using micro- as well as
synthetic benchmarks mimicking real workflow applications, and a real
application.. A preliminary evaluation shows that we are on a good track to
meet our objectives: it can scale to model a workflow application run on an
entire cluster while offering an over 200x speedup factor (normalized by
resource) compared to running the actual application, and can achieve, in the
limited number of scenarios we study, a prediction accuracy that enables
identifying the best storage system configuration
Simulation models and performance assessment of district heating substations
Development of new technologies and methodologies regarding district heating substation operational control strategies are increasingly found nowadays. At the same time a great number of modern buildings
are provided with energy monitoring and control systems which supervise and collect operating data from different energy components. Accordingly, an exemplary district heating systems is being implemented
in the city of Kortrijk in Belgium, as part of a demonstration zero-carbon neighborhood. This study deals with the energy performance assessment of one of the systems component -the consumer substationinstalled in this low-temperature district heating system. A comparative analysis of the energy performance with several existing district heating substations was carried out. Three different district heating substation models are set up (using TRNsys) for investigation of the gross energy use, energyefficiency and comfort issues. In order to evaluate the performance of the analyzed substations two scenarios concerning the space heating system (radiator or floor heating system) were considered. The study aims to investigate the impact of different operational circumstances on the performance of district heating substations. The study generate understandings for energy saving operational strategies to be developed. Results indicate that the design concept together with a suitable selection of the substation has an important impact on the energy performance of the entire system
Checkpointing as a Service in Heterogeneous Cloud Environments
A non-invasive, cloud-agnostic approach is demonstrated for extending
existing cloud platforms to include checkpoint-restart capability. Most cloud
platforms currently rely on each application to provide its own fault
tolerance. A uniform mechanism within the cloud itself serves two purposes: (a)
direct support for long-running jobs, which would otherwise require a custom
fault-tolerant mechanism for each application; and (b) the administrative
capability to manage an over-subscribed cloud by temporarily swapping out jobs
when higher priority jobs arrive. An advantage of this uniform approach is that
it also supports parallel and distributed computations, over both TCP and
InfiniBand, thus allowing traditional HPC applications to take advantage of an
existing cloud infrastructure. Additionally, an integrated health-monitoring
mechanism detects when long-running jobs either fail or incur exceptionally low
performance, perhaps due to resource starvation, and proactively suspends the
job. The cloud-agnostic feature is demonstrated by applying the implementation
to two very different cloud platforms: Snooze and OpenStack. The use of a
cloud-agnostic architecture also enables, for the first time, migration of
applications from one cloud platform to another.Comment: 20 pages, 11 figures, appears in CCGrid, 201
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
- âŠ