11,573 research outputs found

    On the detection of nearly optimal solutions in the context of single-objective space mission design problems

    Get PDF
    When making decisions, having multiple options available for a possible realization of the same project can be advantageous. One way to increase the number of interesting choices is to consider, in addition to the optimal solution x*, also nearly optimal or approximate solutions; these alternative solutions differ from x* and can be in different regions – in the design space – but fulfil certain proximity to its function value f(x*). The scope of this article is the efficient computation and discretization of the set E of e–approximate solutions for scalar optimization problems. To accomplish this task, two strategies to archive and update the data of the search procedure will be suggested and investigated. To make emphasis on data storage efficiency, a way to manage significant and insignificant parameters is also presented. Further on, differential evolution will be used together with the new archivers for the computation of E. Finally, the behaviour of the archiver, as well as the efficiency of the resulting search procedure, will be demonstrated on some academic functions as well as on three models related to space mission design

    A Security Monitoring Framework For Virtualization Based HEP Infrastructures

    Full text link
    High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware. This malware was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.Comment: Proceedings of the 22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 2016, 10-14 October 2016, San Francisco. Submitted to Journal of Physics: Conference Series (JPCS

    ABOUT THE EXACT SOLUTION IN TWO PHASE-STEFAN PROBLEM

    Get PDF
    Two cases of the two - phase Stefan problem in a semi - infinite slab are presented here: one has heat flux boundary condition proportional to t−½ and the other has constant temperature boundary condition. In these two cases the exact solution exists, the relationship between the two boundary conditions is presented here, and the equivalence between the two problems is shown

    Two-state behaviour of Kondo trimers

    Get PDF
    The electronic properties and spectroscopic features of a magnetic trimer with a Kondo-like coupling to a non-magnetic metallic substrate are analyzed at zero temperature. The substrate density of states is depressed in the trimer neighbourhood, being exactly zero at the substrate chemical potential. The size of the resonance strongly depends on the magnetic state of the trimer, and exhibits a two-state behavior. The geometrical dependence of these results agree qualitatively with recent experiments and could be reproduced in a triangular quantum dot arrangement.Comment: 5 pages, including 4 figure
    • …
    corecore