1,164 research outputs found
Report from GI-Dagstuhl Seminar 16394: Software Performance Engineering in the DevOps World
This report documents the program and the outcomes of GI-Dagstuhl Seminar
16394 "Software Performance Engineering in the DevOps World".
The seminar addressed the problem of performance-aware DevOps. Both, DevOps
and performance engineering have been growing trends over the past one to two
years, in no small part due to the rise in importance of identifying
performance anomalies in the operations (Ops) of cloud and big data systems and
feeding these back to the development (Dev). However, so far, the research
community has treated software engineering, performance engineering, and cloud
computing mostly as individual research areas. We aimed to identify
cross-community collaboration, and to set the path for long-lasting
collaborations towards performance-aware DevOps.
The main goal of the seminar was to bring together young researchers (PhD
students in a later stage of their PhD, as well as PostDocs or Junior
Professors) in the areas of (i) software engineering, (ii) performance
engineering, and (iii) cloud computing and big data to present their current
research projects, to exchange experience and expertise, to discuss research
challenges, and to develop ideas for future collaborations
Models to evaluate service Provisioning over Cloud Computing Environments - A Blockchain-As-A-Service case study
ThestrictnessoftheServiceLevelAgreements(SLAs)ismainlyduetoasetofconstraintsrelated to performance and dependability attributes, such as availability. This paper shows that systemâs availability values may be improved by deploying services over a private environment, which may obtain better availability values with improved management, security, and control. However, how much a company needs to afford to keep this improved availability? As an additional activity, this paper compares the obtained availability values with the infrastructure deployment expenses and establishes a cost Ă benefit relationship. As for the systemâs evaluation technique, we choose modeling; while for the service used to demonstrate the modelsâ feasibility, the blockchain-as-a-service was the selected one. This paper proposes and evaluate four different infrastructures hosting blockchains: (i) baseline; (ii) double redundant; (iii) triple redundant, and (iv) hyper-converged. The obtained results pointed out that the hyper-converged architecture had an advantage over a full triple redundant environment regarding availability and deployment cost
The Circular Economy Challenge: Towards a Sustainable Development
Many recent events, including the COVID-19 pandemic and climate change, have proven the necessity of a transformation of the current economic system based on a linear schema of: âtakeâ, âmakeâ, âuseâ, and âdisposeâ. This radical change should involve all of the actors involved in the economic system: institutions, industries, consumers, and scientific research. Only cooperation among these stakeholders can ensure an effective shift toward a circular model. However, which kinds of actions can be performed to implement an effective circular economy? The present Special Issue collects nine papers that prove the possibility of implementing the circular economy from different points of view. The authors analyze all of the spheres of sustainability (environmental, economic, and social) in a variety of contexts, evaluating the effect of the circular choices. The nine papers include several key product value chains, in agreement with the most recent European Circular Economy Action Plan (e.g., electronics and ICT, batteries, plastics, construction and buildings, and food). The present paper collection proves that the circular economy is not only a simple business model, but rather, it involves the integration of many strategies for the protection of the natural ecosystem and the maintenance of worldwide economic stability. The holistic approach is essential for a successful business model, and innovation has an indispensable role in the transition. In this context, the present Special Issue aims to be a multidisciplinary collection of innovations useful for all of the stakeholders involved in the circular economy
The Circular Economy Challenge: Towards a Sustainable Development
As it is now known, we have only one earth available for our life and it is our duty to preserve it [...
Recommended from our members
ENABLING IOT AUTHENTICATION, PRIVACY AND SECURITY VIA BLOCKCHAIN
Although low-power and Internet-connected gadgets and sensors are increasingly integrated into our lives, the optimal design of these systems remains an issue. In particular, authentication, privacy, security, and performance are critical success factors. Furthermore, with emerging research areas such as autonomous cars, advanced manufacturing, smart cities, and building, usage of the Internet of Things (IoT) devices is expected to skyrocket. A single compromised node can be turned into a malicious one that brings down whole systems or causes disasters in safety-critical applications. This dissertation addresses the critical problems of (i) device management, (ii) data management, and (iii) service management in IoT systems. In particular, we propose an integrated platform solution for IoT device authentication, data privacy, and service security via blockchain-based smart contracts. We ensure IoT device authentication by blockchain-based IC traceability system, from its fabrication to its end-of-life, allowing both the supplier and a potential customer to verify an ICâs provenance. Results show that our proposed consortium blockchain framework implementation in Hyperledger Fabric for IC traceability achieves a throughput of 35 transactions per second (tps). To corroborate the blockchain information, we authenticate the IC securely and uniquely with an embedded Physically Unclonable Function (PUF). For reliable Weak PUF-based authentication, our proposed accelerated aging technique reduces the cumulative burn-in cost by ⌠56%. We also propose a blockchain-based solution to integrate the privacy of data generated from the IoT devices by giving users control of their privacy. The smart contract controlled trust-base ensures that the users have private access to their IoT devices and data. We then propose a remote configuration of IC features via smart contracts, where an IC can be programmed repeatedly and securely. This programmability will enable users to upgrade IC features or rent upgraded IC features for a fixed period after users have purchased the IC. We tailor the hardware to meet the blockchain performance. Our on-die hardware module design enforces the hardware configurationâs secure execution and uses only 2,844 slices in the Xilinx Zedboard Zynq Evaluation board. The blockchain framework facilitates decentralized IoT, where interacting devices are empowered to execute digital contracts autonomously
On the Road to 6G: Visions, Requirements, Key Technologies and Testbeds
Fifth generation (5G) mobile communication systems have entered the stage of commercial development, providing users with new services and improved user experiences as well as offering a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation (6G) wireless communication systems. A series of white papers and survey papers have been published, which aim to define 6G in terms of requirements, application scenarios, key technologies, etc. Although ITU-R has been working on the 6G vision and it is expected to reach a consensus on what 6G will be by mid-2023, the related global discussions are still wide open and the existing literature has identified numerous open issues. This paper first provides a comprehensive portrayal of the 6G vision, technical requirements, and application scenarios, covering the current common understanding of 6G. Then, a critical appraisal of the 6G network architecture and key technologies is presented. Furthermore, existing testbeds and advanced 6G verification platforms are detailed for the first time. In addition, future research directions and open challenges are identified for stimulating the on-going global debate. Finally, lessons learned to date concerning 6G networks are discussed
Optimal and Secure Electricity Market Framework for Market Operation of Multi-Microgrid Systems
Traditional power systems were typically based on bulk energy services by large utility companies. However, microgrids and distributed generations have changed the structure of modern power systems as well as electricity markets. Therefore, restructured electricity markets are needed to address energy transactions in modern power systems.
In this dissertation, we developed a hierarchical and decentralized electricity market framework for multi-microgrid systems, which clears energy transactions through three market levels; Day-Ahead-Market (DAM), Hour-Ahead-Market (HAM) and Real-Time-Market (RTM). In this market, energy trades are possible between all participants within the microgrids as well as inter-microgrids transactions. In this approach, we developed a game-theoretic-based double auction mechanism for energy transactions in the DAM, while HAM and RTM are cleared by an optimization algorithm and reverse action mechanism, respectively. For data exchange among market players, we developed a secure data-centric communication approach using the Data Distribution Service. Results demonstrated that this electricity market could significantly reduce the energy price and dependency of the multi-microgrid area on the external grid.
Furthermore, we developed and verified a hierarchical blockchain-based energy transaction framework for a multi-microgrid system. This framework has a unique structure, which makes it possible to check the feasibility of energy transactions from the power system point of view by evaluating transmission system constraints. The blockchain ledger summarization, microgrid equivalent model development, and market playersâ security and privacy enhancement are new approaches to this framework.
The research in this dissertation also addresses some ancillary services in power markets such as an optimal power routing in unbalanced microgrids, where we developed a multi-objective optimization model and verified its ability to minimize the power imbalance factor, active power losses and voltage deviation in an unbalanced microgrid.
Moreover, we developed an adaptive real-time congestion management algorithm to mitigate congestions in transmission systems using dynamic thermal ratings of transmission lines. Results indicated that the developed algorithm is cost-effective, fast, and reliable for real-time congestion management cases.
Finally, we completed research about the communication framework and security algorithm for IEC 61850 Routable GOOSE messages and developed an advanced protection scheme as its application in modern power systems
Fault Management in DC Microgrids:A Review of Challenges, Countermeasures, and Future Research Trends
The significant benefits of DC microgrids have instigated extensive efforts to be an alternative network as compared to conventional AC power networks. Although their deployment is ever-growing, multiple challenges still occurred for the protection of DC microgrids to efficiently design, control, and operate the system for the islanded mode and grid-tied mode. Therefore, there are extensive research activities underway to tackle these issues. The challenge arises from the sudden exponential increase in DC fault current, which must be extinguished in the absence of the naturally occurring zero crossings, potentially leading to sustained arcs. This paper presents cut-age and state-of-the-art issues concerning the fault management of DC microgrids. It provides an account of research in areas related to fault management of DC microgrids, including fault detection, location, identification, isolation, and reconfiguration. In each area, a comprehensive review has been carried out to identify the fault management of DC microgrids. Finally, future trends and challenges regarding fault management in DC-microgrids are also discussed
Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case
The security of Industrial Internet of Things (IIoT) systems is a challenge that needs to be
addressed immediately, as the increasing use of new communication paradigms and the abundant
use of sensors opens up new opportunities to compromise these types of systems. In this sense,
technologies such as Trusted Execution Environments (TEEs) and Hardware Security Modules
(HSMs) become crucial for adding new layers of security to IIoT systems, especially to edge nodes
that incorporate sensors and perform continuous measurements. These technologies, coupled with
new communication paradigms such as Blockchain, offer a high reliability, robustness and good
interoperability between them. This paper proposes the design of a secure sensor incorporating
the above mentioned technologiesâHSMs and a TEEâin a hardware device based on a dual-core
architecture. Through this combination of technologies, one of the cores collects the data extracted by
the sensors and implements the security mechanisms to guarantee the integrity of these data, while
the remaining core is responsible for sending these data through the appropriate communication
protocol. This proposed approach fits into the Blockchain networks, which act as an Oracle. Finally,
to illustrate the application of this concept, a use case applied to wine logistics is described, where
this secure sensor is integrated into a Blockchain that collects data from the storage and transport of
barrels, and a performance evaluation of the implemented prototype is providedEuropean Unionâs Horizon Europe research and innovation program through the funding project
âCognitive edge-cloud with serverless computingâ (EDGELESS) under grant agreement number
101092950FEDER/Junta de Andalucia-Consejeria de Transformacion
Economica, Industria, Conocimiento y Universidades under Project B-TIC-588-UGR2
Internet of Things From Hype to Reality
The Internet of Things (IoT) has gained significant mindshare, let alone attention, in academia and the industry especially over the past few years. The reasons behind this interest are the potential capabilities that IoT promises to offer. On the personal level, it paints a picture of a future world where all the things in our ambient environment are connected to the Internet and seamlessly communicate with each other to operate intelligently. The ultimate goal is to enable objects around us to efficiently sense our surroundings, inexpensively communicate, and ultimately create a better environment for us: one where everyday objects act based on what we need and like without explicit instructions
- âŠ