1,145 research outputs found

    Measurement of the Communication Possibility of Service Requests for Multiservers in Parallel Connection in Cloud Computing Systems

    Get PDF
    Newly, growing amount of dataā€demanding applications arrangement with continuous fluctuating data substances, have been investigated by many researchers recently. In these applications, the underlying data management system must support new types of the spaceā€time changing that indicates to the paths of the cloud computing system (CCS). The timeā€space changing causes change in the dimension of data and, consequently, in the CCS. One of the solutions regarding this case is suggesting an integrated cloud computing system (ICCS). In this effort, we introduce a new ICCS, based on fractional formal operators, taking into account the symmetrical delay in it. This model is useful for higher dimensional data, moving data, and chaos data. Moreover, we employ a fractional differential method to discover the paths (outcomes) of the system by minimizing the cost function. The proposed system delivers a sequence of paths that converge to the optimal path. The theoretical technique is supported by the applications

    A New Method for the Economic Laws of Extinction Using the Fox-Wright-type Function

    Get PDF
    In this note, we deal with the possibility of optimal economic extinction. We employ the Fox-Wright-type function to characterize the probability of transference from optimal selection to the economic laws of extinction. For the extinction, we shall utilize the fractional Poisson process

    Multi-Objective Optimization Using Local Fractional Differential Operator

    Get PDF
    In this effort, we aim to generalize the concept of Univex functions by utilizing a local fractional differential-difference operator, based on different types of local fractional calculus (fractal calculus). This study leads to a new class of these functions in some optimal problems by illustrating conditions on the generalized functions. We call it the class of local fractional Univex functions. Strong, weak, converse, and strict converse duality theorems are given. Multi-objective optimal problem involves the new process is solved (local optimal problem). The main tool employed in the analysis is based on the local fractional derivative operators

    Monitoring and analysis system for performance troubleshooting in data centers

    Get PDF
    It was not long ago. On Christmas Eve 2012, a war of troubleshooting began in Amazon data centers. It started at 12:24 PM, with an mistaken deletion of the state data of Amazon Elastic Load Balancing Service (ELB for short), which was not realized at that time. The mistake first led to a local issue that a small number of ELB service APIs were affected. In about six minutes, it evolved into a critical one that EC2 customers were significantly affected. One example was that Netflix, which was using hundreds of Amazon ELB services, was experiencing an extensive streaming service outage when many customers could not watch TV shows or movies on Christmas Eve. It took Amazon engineers 5 hours 42 minutes to find the root cause, the mistaken deletion, and another 15 hours and 32 minutes to fully recover the ELB service. The war ended at 8:15 AM the next day and brought the performance troubleshooting in data centers to worldā€™s attention. As shown in this Amazon ELB case.Troubleshooting runtime performance issues is crucial in time-sensitive multi-tier cloud services because of their stringent end-to-end timing requirements, but it is also notoriously difficult and time consuming. To address the troubleshooting challenge, this dissertation proposes VScope, a flexible monitoring and analysis system for online troubleshooting in data centers. VScope provides primitive operations which data center operators can use to troubleshoot various performance issues. Each operation is essentially a series of monitoring and analysis functions executed on an overlay network. We design a novel software architecture for VScope so that the overlay networks can be generated, executed and terminated automatically, on-demand. From the troubleshooting side, we design novel anomaly detection algorithms and implement them in VScope. By running anomaly detection algorithms in VScope, data center operators are notified when performance anomalies happen. We also design a graph-based guidance approach, called VFocus, which tracks the interactions among hardware and software components in data centers. VFocus provides primitive operations by which operators can analyze the interactions to find out which components are relevant to the performance issue. VScopeā€™s capabilities and performance are evaluated on a testbed with over 1000 virtual machines (VMs). Experimental results show that the VScope runtime negligibly perturbs system and application performance, and requires mere seconds to deploy monitoring and analytics functions on over 1000 nodes. This demonstrates VScopeā€™s ability to support fast operation and online queries against a comprehensive set of application to system/platform level metrics, and a variety of representative analytics functions. When supporting algorithms with high computation complexity, VScope serves as a ā€˜thin layerā€™ that occupies no more than 5% of their total latency. Further, by using VFocus, VScope can locate problematic VMs that cannot be found via solely application-level monitoring, and in one of the use cases explored in the dissertation, it operates with levels of perturbation of over 400% less than what is seen for brute-force and most sampling-based approaches. We also validate VFocus with real-world data center traces. The experimental results show that VFocus has troubleshooting accuracy of 83% on average.Ph.D

    Cloud-based Quadratic Optimization with Partially Homomorphic Encryption

    Get PDF
    The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data. This paper develops a cloud-based protocol for a quadratic optimization problem involving multiple parties, each holding information it seeks to maintain private. The protocol is based on the projected gradient ascent on the Lagrange dual problem and exploits partially homomorphic encryption and secure multi-party computation techniques. Using formal cryptographic definitions of indistinguishability, the protocol is shown to achieve computational privacy, i.e., there is no computationally efficient algorithm that any involved party can employ to obtain private information beyond what can be inferred from the party's inputs and outputs only. In order to reduce the communication complexity of the proposed protocol, we introduced a variant that achieves this objective at the expense of weaker privacy guarantees. We discuss in detail the computational and communication complexity properties of both algorithms theoretically and also through implementations. We conclude the paper with a discussion on computational privacy and other notions of privacy such as the non-unique retrieval of the private information from the protocol outputs

    Towards a solution of the closure problem for convective atmospheric boundary-layer turbulence

    Get PDF
    We consider the closure problem for turbulence in the dry convective atmospheric boundary layer (CBL). Transport in the CBL is carried by small scale eddies near the surface and large plumes in the well mixed middle part up to the inversion that separates the CBL from the stably stratified air above. An analytically tractable model based on a multivariate Delta-PDF approach is developed. It is an extension of the model of Gryanik and Hartmann [1] (GH02) that additionally includes a term for background turbulence. Thus an exact solution is derived and all higher order moments (HOMs) are explained by second order moments, correlation coefficients and the skewness. The solution provides a proof of the extended universality hypothesis of GH02 which is the refinement of the Millionshchikov hypothesis (quasi- normality of FOM). This refined hypothesis states that CBL turbulence can be considered as result of a linear interpolation between the Gaussian and the very skewed turbulence regimes. Although the extended universality hypothesis was confirmed by results of field measurements, LES and DNS simulations (see e.g. [2-4]), several questions remained unexplained. These are now answered by the new model including the reasons of the universality of the functional form of the HOMs, the significant scatter of the values of the coefficients and the source of the magic of the linear interpolation. Finally, the closures 61 predicted by the model are tested against measurements and LES data. Some of the other issues of CBL turbulence, e.g. familiar kurtosis-skewness relationships and relation of area coverage parameters of plumes (so called filling factors) with HOM will be discussed also

    Optimization Methods for Image Thresholding: A review

    Get PDF
    Setting a border with the proper gray level in processing images to separate objects from their backgrounds is crucial. One of the simplest and most popular methods of segmenting pictures is histogram-based thresholding. Thresholding is a common technique for image segmentation because of its simplicity. Thresholding is used to separate the Background of the image from the Foreground. There are many methods of thresholding. This paper aims to review many previous studies and mention the types of thresholding. It includes two types: the global and local thresholding methods and each type include a group of methods. The global thresholding method includes (the Otsu method, Kapur's entropy method, Tsallis entropy method, Hysteresis method, and Fuzzy entropy method), and the local thresholding method includes ( Ni-Black method and Bernsen method). The optimization algorithms(Genetic Algorithm, Particle Swarm Optimization, Bat Algorithm, Modified Grasshopper Optimization, Firefly Algorithm, Cuckoo Search, Tabu Search Algorithm, Simulated Annealing, and Jaya Algorithm) used along with thresholding methods are also illustrated

    Entropy in Dynamic Systems

    Get PDF
    In order to measure and quantify the complex behavior of real-world systems, either novel mathematical approaches or modifications of classical ones are required to precisely predict, monitor, and control complicated chaotic and stochastic processes. Though the term of entropy comes from Greek and emphasizes its analogy to energy, today, it has wandered to different branches of pure and applied sciences and is understood in a rather rough way, with emphasis placed on the transition from regular to chaotic states, stochastic and deterministic disorder, and uniform and non-uniform distribution or decay of diversity. This collection of papers addresses the notion of entropy in a very broad sense. The presented manuscripts follow from different branches of mathematical/physical sciences, natural/social sciences, and engineering-oriented sciences with emphasis placed on the complexity of dynamical systems. Topics like timing chaos and spatiotemporal chaos, bifurcation, synchronization and anti-synchronization, stability, lumped mass and continuous mechanical systems modeling, novel nonlinear phenomena, and resonances are discussed
    • ā€¦
    corecore