1,145 research outputs found
Measurement of the Communication Possibility of Service Requests for Multiservers in Parallel Connection in Cloud Computing Systems
Newly, growing amount of dataādemanding applications arrangement with continuous fluctuating data substances, have been investigated by many researchers recently. In these applications, the underlying data management system must support new types of the spaceātime changing that indicates to the paths of the cloud computing system (CCS). The timeāspace changing causes change in the dimension of data and, consequently, in the CCS. One of the solutions regarding this case is suggesting an integrated cloud computing system (ICCS). In this effort, we introduce a new ICCS, based on fractional formal operators, taking into account the symmetrical delay in it. This model is useful for higher dimensional data, moving data, and chaos data. Moreover, we employ a fractional differential method to discover the paths (outcomes) of the system by minimizing the cost function. The proposed system delivers a sequence of paths that converge to the optimal path. The theoretical technique is supported by the applications
A New Method for the Economic Laws of Extinction Using the Fox-Wright-type Function
In this note, we deal with the possibility of optimal economic extinction. We employ the Fox-Wright-type function to characterize the probability of transference from optimal selection to the economic laws of extinction. For the extinction, we shall utilize the fractional Poisson process
Multi-Objective Optimization Using Local Fractional Differential Operator
In this effort, we aim to generalize the concept of Univex functions by utilizing a local fractional differential-difference operator, based on different types of local fractional calculus (fractal calculus). This study leads to a new class of these functions in some optimal problems by illustrating conditions on the generalized functions. We call it the class of local fractional Univex functions. Strong, weak, converse, and strict converse duality theorems are given. Multi-objective optimal problem involves the new process is solved (local optimal problem). The main tool employed in the analysis is based on the local fractional derivative operators
Monitoring and analysis system for performance troubleshooting in data centers
It was not long ago. On Christmas Eve 2012, a war of troubleshooting began in Amazon data centers. It started at 12:24 PM, with an mistaken deletion of the state data of Amazon Elastic Load Balancing Service (ELB for short), which was
not realized at that time. The mistake first led to a local issue that a small number of ELB service APIs were affected. In about six minutes, it evolved into a critical one that EC2 customers were significantly affected. One example was that Netflix, which was using hundreds of Amazon ELB services, was experiencing an extensive streaming service outage when many customers could not watch TV shows or movies on Christmas Eve. It took Amazon engineers 5 hours 42 minutes to find the root cause, the mistaken deletion, and another 15 hours and 32 minutes to fully recover the ELB service. The war ended at 8:15 AM the next day and brought the performance
troubleshooting in data centers to worldās attention. As shown in this Amazon ELB case.Troubleshooting runtime performance issues is crucial in time-sensitive multi-tier cloud services because of their stringent end-to-end timing requirements, but it is also notoriously difficult and time consuming.
To address the troubleshooting challenge, this dissertation proposes VScope, a flexible monitoring and analysis system for online troubleshooting in data centers.
VScope provides primitive operations which data center operators can use to troubleshoot various performance issues. Each operation is essentially a series of monitoring and analysis functions executed on an overlay network. We design a novel
software architecture for VScope so that the overlay networks can be generated, executed and terminated automatically, on-demand. From the troubleshooting side, we design novel anomaly detection algorithms and implement them in VScope. By
running anomaly detection algorithms in VScope, data center operators are notified when performance anomalies happen. We also design a graph-based guidance approach, called VFocus, which tracks the interactions among hardware and software components in data centers. VFocus provides primitive operations by which operators can analyze the interactions to find out which components are relevant to the
performance issue.
VScopeās capabilities and performance are evaluated on a testbed with over 1000 virtual machines (VMs). Experimental results show that the VScope runtime negligibly perturbs system and application performance, and requires mere seconds to deploy monitoring and analytics functions on over 1000 nodes. This demonstrates VScopeās ability to support fast operation and online queries against a comprehensive set of application to system/platform level metrics, and a variety of representative analytics functions. When supporting algorithms with high computation complexity, VScope serves as a āthin layerā that occupies no more than 5% of their total latency. Further, by using VFocus, VScope can locate problematic VMs that cannot be found
via solely application-level monitoring, and in one of the use cases explored in the dissertation, it operates with levels of perturbation of over 400% less than what is seen for brute-force and most sampling-based approaches. We also validate VFocus
with real-world data center traces. The experimental results show that VFocus has troubleshooting accuracy of 83% on average.Ph.D
Cloud-based Quadratic Optimization with Partially Homomorphic Encryption
The development of large-scale distributed control systems has led to the
outsourcing of costly computations to cloud-computing platforms, as well as to
concerns about privacy of the collected sensitive data. This paper develops a
cloud-based protocol for a quadratic optimization problem involving multiple
parties, each holding information it seeks to maintain private. The protocol is
based on the projected gradient ascent on the Lagrange dual problem and
exploits partially homomorphic encryption and secure multi-party computation
techniques. Using formal cryptographic definitions of indistinguishability, the
protocol is shown to achieve computational privacy, i.e., there is no
computationally efficient algorithm that any involved party can employ to
obtain private information beyond what can be inferred from the party's inputs
and outputs only. In order to reduce the communication complexity of the
proposed protocol, we introduced a variant that achieves this objective at the
expense of weaker privacy guarantees. We discuss in detail the computational
and communication complexity properties of both algorithms theoretically and
also through implementations. We conclude the paper with a discussion on
computational privacy and other notions of privacy such as the non-unique
retrieval of the private information from the protocol outputs
Towards a solution of the closure problem for convective atmospheric boundary-layer turbulence
We consider the closure problem for turbulence in the dry convective atmospheric boundary
layer (CBL). Transport in the CBL is carried by small scale eddies near the surface and large
plumes in the well mixed middle part up to the inversion that separates the CBL from the
stably stratified air above. An analytically tractable model based on a multivariate Delta-PDF
approach is developed. It is an extension of the model of Gryanik and Hartmann [1] (GH02)
that additionally includes a term for background turbulence. Thus an exact solution is derived
and all higher order moments (HOMs) are explained by second order moments, correlation
coefficients and the skewness. The solution provides a proof of the extended universality
hypothesis of GH02 which is the refinement of the Millionshchikov hypothesis (quasi-
normality of FOM). This refined hypothesis states that CBL turbulence can be considered as
result of a linear interpolation between the Gaussian and the very skewed turbulence regimes.
Although the extended universality hypothesis was confirmed by results of field
measurements, LES and DNS simulations (see e.g. [2-4]), several questions remained
unexplained. These are now answered by the new model including the reasons of the
universality of the functional form of the HOMs, the significant scatter of the values of the
coefficients and the source of the magic of the linear interpolation. Finally, the closures
61
predicted by the model are tested against measurements and LES data. Some of the other
issues of CBL turbulence, e.g. familiar kurtosis-skewness relationships and relation of area
coverage parameters of plumes (so called filling factors) with HOM will be discussed also
Optimization Methods for Image Thresholding: A review
Setting a border with the proper gray level in processing images to separate objects from their backgrounds is crucial. One of the simplest and most popular methods of segmenting pictures is histogram-based thresholding. Thresholding is a common technique for image segmentation because of its simplicity. Thresholding is used to separate the Background of the image from the Foreground. There are many methods of thresholding. This paper aims to review many previous studies and mention the types of thresholding. It includes two types: the global and local thresholding methods and each type include a group of methods. The global thresholding method includes (the Otsu method, Kapur's entropy method, Tsallis entropy method, Hysteresis method, and Fuzzy entropy method), and the local thresholding method includes ( Ni-Black method and Bernsen method). The optimization algorithms(Genetic Algorithm, Particle Swarm Optimization, Bat Algorithm, Modified Grasshopper Optimization, Firefly Algorithm, Cuckoo Search, Tabu Search Algorithm, Simulated Annealing, and Jaya Algorithm) used along with thresholding methods are also illustrated
Entropy in Dynamic Systems
In order to measure and quantify the complex behavior of real-world systems, either novel mathematical approaches or modifications of classical ones are required to precisely predict, monitor, and control complicated chaotic and stochastic processes. Though the term of entropy comes from Greek and emphasizes its analogy to energy, today, it has wandered to different branches of pure and applied sciences and is understood in a rather rough way, with emphasis placed on the transition from regular to chaotic states, stochastic and deterministic disorder, and uniform and non-uniform distribution or decay of diversity. This collection of papers addresses the notion of entropy in a very broad sense. The presented manuscripts follow from different branches of mathematical/physical sciences, natural/social sciences, and engineering-oriented sciences with emphasis placed on the complexity of dynamical systems. Topics like timing chaos and spatiotemporal chaos, bifurcation, synchronization and anti-synchronization, stability, lumped mass and continuous mechanical systems modeling, novel nonlinear phenomena, and resonances are discussed
- ā¦