406,093 research outputs found

    Multilayer Environment and Toolchain for Holistic NetwOrk Design and Analysis

    Full text link
    The recent developments and research in distributed ledger technologies and blockchain have contributed to the increasing adoption of distributed systems. To collect relevant insights into systems' behavior, we observe many evaluation frameworks focusing mainly on the system under test throughput. However, these frameworks often need more comprehensiveness and generality, particularly in adopting a distributed applications' cross-layer approach. This work analyses in detail the requirements for distributed systems assessment. We summarize these findings into a structured methodology and experimentation framework called METHODA. Our approach emphasizes setting up and assessing a broader spectrum of distributed systems and addresses a notable research gap. We showcase the effectiveness of the framework by evaluating four distinct systems and their interaction, leveraging a diverse set of eight carefully selected metrics and 12 essential parameters. Through experimentation and analysis we demonstrate the framework's capabilities to provide valuable insights across various use cases. For instance, we identify that a combination of Trusted Execution Environments with threshold signature scheme FROST introduces minimal overhead on the performance with average latency around \SI{40}{\ms}. We showcase an emulation of realistic systems behavior, e.g., Maximal Extractable Value is possible and could be used to further model such dynamics. The METHODA framework enables a deeper understanding of distributed systems and is a powerful tool for researchers and practitioners navigating the complex landscape of modern computing infrastructures

    Performance Analysis and Improvement for Scalable and Distributed Applications Based on Asynchronous Many-Task Systems

    Get PDF
    As the complexity of recent and future large-scale data and exascale systems architectures grows, so do productivity, portability, software scalability, and efficient utilization of system resources challenges presented to both industry and the research community. Software solutions and applications are expected to scale in performance on such complex systems. Asynchronous many-task (AMT) systems, taking advantage of multi-core architectures with light-weight threads, asynchronous executions, and smart scheduling, are showing promise in addressing these challenges. In this research, we implement several scalable and distributed applications based on HPX, an exemplar AMT runtime system. First, a distributed HPX implementation for a parameterized benchmark Task Bench is introduced. The performance bottleneck is analyzed where the repeated HPX threads creation costs and a global barrier for all threads limit the performance. The methodologies to retain the spawning threads alive and overlap communication and computation are presented. The evaluation results prove the effectiveness of the improved approach, where HPX is comparable with the prevalent programming models and takes advantages of multi-task scenarios. Second, an algorithms and data-structures SHAD library with HPX support is introduced. The methodologies to support local and remote operations in synchronous and asynchronous manners are developed. The HPX implementation in support of the SHAD library is further provided. Performance results demonstrate that the proposed system presents the similar performance as SHAD with Intel TBB (Threading Building Blocks) support for shared-memory parallelism and is better to explore the distributed-memory parallelism than SHAD with GMT (Global Memory and Threading) support. Third, an asynchronous array processing framework Phylanx is introduced. The methodologies that support a distributed alternating least square algorithm are developed. The implementation of this algorithm along with a number of distributed primitives are provided. The performance results show that Phylanx implementation presents a good scalability. Finally, a scalable second-order method for optimization is introduced. The implementation of a Krylov-Newton second-order method via PyTorch framework is provided. Evaluation results illustrate the effectiveness of scalability, convergence, and robust to hyper-parameters of the proposed method

    Distributed passive actuation schemes for seismic protection of multibuilding systems

    Get PDF
    In this paper, we investigate the design of distributed damping systems (DDSs) for the overall seismic protection of multiple adjacent buildings. The considered DDSs contain interstory dampers implemented inside the buildings and also interbuilding damping links. The design objectives include mitigating the buildings seismic response by reducing the interstory-drift and story-acceleration peak-values and producing small interbuilding approachings to decrease the risk of interbuilding collisions. Designing high-performance DDS configurations requires determining convenient damper positions and computing proper values for the damper parameters. That allocation-tuning optimization problem can pose serious computational difficulties for large-scale multibuilding systems. The design methodology proposed in this work—(i) is based on an effective matrix formulation of the damped multibuilding system; (ii) follows an H8 approach to define an objective function with fast-evaluation characteristics; (iii) exploits the computational advantages of the current state-of-the-art genetic algorithm solvers, including the usage of hybrid discrete-continuous optimization and parallel computing; and (iv) allows setting actuation schemes of particular interest such as full-linked configurations or nonactuated buildings. To illustrate the main features of the presented methodology, we consider a system of five adjacent multistory buildings and design three full-linked DDS configurations with a different number of actuated buildings. The obtained results confirm the flexibility and effectiveness of the proposed design approach and demonstrate the high-performance characteristics of the devised DDS configurations.Peer ReviewedPostprint (published version

    FAULT LOCATION ALGORITHMS, OBSERVABILITY AND OPTIMALITY FOR POWER DISTRIBUTION SYSTEMS

    Get PDF
    Power outages usually lead to customer complaints and revenue losses. Consequently, fast and accurate fault location on electric lines is needed so that repair work can be carried out as fast as possible. Chapter 2 describes novel fault location algorithms for radial and non-radial ungrounded power distribution systems. For both types of systems, fault location approaches using line to neutral or line to line measurements are presented. It’s assumed that network structure and parameters are known, so that during-fault bus impedance matrix of the system can be derived. Functions of bus impedance matrix and available measurements at substation are formulated, from which the unknown fault location can be estimated. Evaluation studies on fault location accuracy and robustness of fault location methods to load variations and measurement errors has been performed. Most existing fault location methods rely on measurements obtained from meters installed in power systems. To get the most from a limited number of meters available, optimal meter placement methods are needed. Chapter 3 presents a novel optimal meter placement algorithm to keep the system observable in terms of fault location determination. The observability of a fault location in power systems is defined first. Then, fault location observability analysis of the whole system is performed to determine the least number of meters needed and their best locations to achieve fault location observability. Case studies on fault location observability with limited meters are presented. Optimal meter deployment results based on the studied system with equal and varying monitoring cost for meters are displayed. To enhance fault location accuracy, an optimal fault location estimator for power distribution systems with distributed generation (DG) is described in Chapter 4. Voltages and currents at locations with power generation are adopted to give the best estimation of variables including measurements, fault location and fault resistances. Chi-square test is employed to detect and identify bad measurement. Evaluation studies are carried out to validate the effectiveness of optimal fault location estimator. A set of measurements with one bad measurement is utilized to test if a bad data can be identified successfully by the presented method

    Passing Muster: Evaluating Teacher Evaluation Systems

    Get PDF
    Describes how state or federal governments could reward exceptional teachers based on a uniform standard across various district-level teacher evaluation systems by determining the systems' reliability in predicting future performance. Includes Q & A

    Query expansion with naive bayes for searching distributed collections

    Get PDF
    The proliferation of online information resources increases the importance of effective and efficient distributed searching. However, the problem of word mismatch seriously hurts the effectiveness of distributed information retrieval. Automatic query expansion has been suggested as a technique for dealing with the fundamental issue of word mismatch. In this paper, we propose a method - query expansion with Naive Bayes to address the problem, discuss its implementation in IISS system, and present experimental results demonstrating its effectiveness. Such technique not only enhances the discriminatory power of typical queries for choosing the right collections but also hence significantly improves retrieval results

    Efficient intrusion detection scheme based on SVM

    Get PDF
    The network intrusion detection problem is the focus of current academic research. In this paper, we propose to use Support Vector Machine (SVM) model to identify and detect the network intrusion problem, and simultaneously introduce a new optimization search method, referred to as Improved Harmony Search (IHS) algorithm, to determine the parameters of the SVM model for better classification accuracy. Taking the general mechanism network system of a growing city in China between 2006 and 2012 as the sample, this study divides the mechanism into normal network system and crisis network system according to the harm extent of network intrusion. We consider a crisis network system coupled with two to three normal network systems as paired samples. Experimental results show that SVMs based on IHS have a high prediction accuracy which can perform prediction and classification of network intrusion detection and assist in guarding against network intrusion
    • …
    corecore