The document proposes a two-sided matching model called CODA to allocate heterogeneous cloud-fog resources for data stream processing applications. CODA models applications as graphs of microservices and resources as nodes with computing and networking capabilities. It uses matching theory to match microservices to resources based on rankings to minimize completion time and network traffic. The document provides an example of CODA's matching algorithm, describes evaluation setups using simulation and a real testbed, and presents results comparing CODA to other approaches.
Survey Paper on Clustering Data Streams Based on Shared Density between Micro...IRJET Journal
This document discusses a survey of clustering data streams based on shared density between micro-clusters. It describes how current reclustering approaches for data stream clustering ignore density information between micro-clusters, which can result in inaccurate cluster assignments. The paper proposes DBSTREAM, a new approach that captures shared density between micro-clusters using a density graph. This density information is then used in the reclustering process to generate final clusters based on actual density between adjacent micro-clusters rather than assumptions about data distribution.
Presentation of Understanding and Surpassing Dropbox Globecom 2015Fajar Purnama
This is not my paper, just an assignment of the computer algorithm class I am taking to present a paper.
Title: Understanding and Surpassing Dropbox: Efficient
Incremental Synchronization in Cloud Storage Services
Authors: Shenglong Li, Quanlu Zhang, Zhi Yang, Yafei Dai
Source: http://dx.doi.org/10.1109/GLOCOM.2015.7417235
Presenter: Fajar Purnama
Video https://bit.tube/play?hash=QmSKeTyFcuKuRrTGMqLVHy43RXHrQgQkPoXhnH4MAMkf6K&channel=156033
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
This document discusses techniques for fast data collection in wireless sensor networks using a tree-based topology. It specifically focuses on minimizing the schedule length for aggregated convergecast (where data is aggregated at each hop) and raw-data convergecast (where packets are individually relayed to the sink).
It first considers time scheduling on a single channel, and then combines scheduling with transmission power control and multiple frequencies to further reduce interference and schedule length. It provides lower bounds on schedule length when interference is eliminated, and proposes algorithms that achieve these bounds.
Evaluation of different channel assignment methods, routing tree topologies, interference models, and their impact on schedule length is also presented. The key findings are that combining scheduling, power control,
Survey Paper on Clustering Data Streams Based on Shared Density between Micro...IRJET Journal
This document discusses a survey of clustering data streams based on shared density between micro-clusters. It describes how current reclustering approaches for data stream clustering ignore density information between micro-clusters, which can result in inaccurate cluster assignments. The paper proposes DBSTREAM, a new approach that captures shared density between micro-clusters using a density graph. This density information is then used in the reclustering process to generate final clusters based on actual density between adjacent micro-clusters rather than assumptions about data distribution.
Presentation of Understanding and Surpassing Dropbox Globecom 2015Fajar Purnama
This is not my paper, just an assignment of the computer algorithm class I am taking to present a paper.
Title: Understanding and Surpassing Dropbox: Efficient
Incremental Synchronization in Cloud Storage Services
Authors: Shenglong Li, Quanlu Zhang, Zhi Yang, Yafei Dai
Source: http://dx.doi.org/10.1109/GLOCOM.2015.7417235
Presenter: Fajar Purnama
Video https://bit.tube/play?hash=QmSKeTyFcuKuRrTGMqLVHy43RXHrQgQkPoXhnH4MAMkf6K&channel=156033
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
This document discusses techniques for fast data collection in wireless sensor networks using a tree-based topology. It specifically focuses on minimizing the schedule length for aggregated convergecast (where data is aggregated at each hop) and raw-data convergecast (where packets are individually relayed to the sink).
It first considers time scheduling on a single channel, and then combines scheduling with transmission power control and multiple frequencies to further reduce interference and schedule length. It provides lower bounds on schedule length when interference is eliminated, and proposes algorithms that achieve these bounds.
Evaluation of different channel assignment methods, routing tree topologies, interference models, and their impact on schedule length is also presented. The key findings are that combining scheduling, power control,
Presentation of the paper Construction of Text Digitization System for Nôm Historical Texts by Truyen Van Phan and Masaki Nakagawa in DATeCH 2014. #digidays
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
1) The document proposes a mathematical model and optimization service to predict the optimal number of parallel TCP streams needed to maximize data throughput in a distributed computing environment.
2) It develops a novel model that can predict the optimal number using only three data points, and implements this service in the Stork Data Scheduler.
3) Experimental results show the optimized transfer time using this prediction and optimization service is much less than without optimization in most cases.
This document proposes a new Ranking Chaos Optimization (RCO) algorithm to solve the dual scheduling problem of cloud services and computing resources (DS-CSCR) in private clouds. It introduces the DS-CSCR concept and models the characteristics of cloud services and computing resources. The RCO algorithm uses ranking selection, individual chaos, and dynamic heuristic operators. Experimental results show RCO has better searching ability, time complexity, and stability compared to other algorithms for solving DS-CSCR. Future work is needed to study additional quality of service properties and improve RCO for other optimization problems.
Cache performance analysis of virtualized router on virtual content centric n...ijngnjournal
Content-centric networking (CCN) is one of the major proposals for realizing information-centric networking. CCN routers cache forwarded data in a buffer memory called the ContentStore (CS). Virtual content-centric networking (VCCN), which enables the construction of multiple virtual networks (called VCCN slices) on a content-centric network, has been recently proposed. When multiple VCCN slices are constructed, the performance of each VCCN slice and that of the entire network are strongly affected by the CCN routers' CS allocation to VCCN router instances in VCCN slices. In this paper, we analyze the effects of CS allocation methods and content request patterns in VCCN slices on the performance of each VCCN slice and that of the entire network. Through several numerical examples, we show that when content request patterns are heterogeneous, a hybrid resource allocation method is effective in terms of both network fairness for VCCN slices and overall network performance.
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
This paper proposes a neuro-fuzzy system called Multi Attribute QoS scoring (MAQS) for dynamic resource allocation in collaborative cloud computing. MAQS uses a 3-layer neural network trained on 5 quality of service attributes - distance, reputation, task completion time, completion ratio, and load - to provide a QoS score for each resource. Resources are then allocated based on this score. The algorithm collects data periodically from nodes and calculates QoS scores for incoming tasks to select the highest scoring node for task allocation. The paper argues this approach considers multiple attributes and heterogeneity of resources better than previous single-attribute methods.
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
Cloud collaboration is an emerging technology which enables sharing of computer files using cloud
computing. Here the cloud resources are assembled and cloud services are provided using these resources.
Cloud collaboration technologies are allowing users to share documents. Resource allocation in the cloud
is challenging because resources offer different Quality of Service (QoS) and services running on these
resources are risky for user demands. We propose a solution for resource allocation based on multi
attribute QoS Scoring considering parameters such as distance to the resource from user site, reputation of
the resource, task completion time, task completion ratio, and load at the resource. The proposed algorithm
referred to as Multi Attribute QoS scoring (MAQS) uses Neuro Fuzzy system. We have also included a
speculative manager to handle fault tolerance. In this paper it is shown that the proposed algorithm
perform better than others including power trust reputation based algorithms and harmony method which
use single attribute to compute the reputation score of each resource allocated.
- Cloud computing allows users to access software and hardware resources that are managed by third parties and made available over the internet. Mobile cloud computing combines mobile devices and cloud computing, allowing computing tasks and data storage to occur remotely. Cloud radio access networks (C-RAN) centralize base stations and use cloud computing to improve coordination and reduce costs. The document proposes a mobile cloud computing system using C-RAN that employs a split-TCP proxy and centralized wireless network cloud to improve throughput and latency for mobile users. Simulation results demonstrate performance improvements over existing systems.
ENERGY-EFFICIENT ADAPTIVE RESOURCE MANAGEMENT FOR REAL-TIME VEHICULAR CLOUD S...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.
In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications — are delivered to an organization's computers and devices through the Internet.
A Multiscale Simulation Approach for Diesel Particulate Filter Design Based o...Ries Bouwman
This document discusses a multiscale simulation approach for diesel particulate filter design using OpenFOAM and DexaSIM. It describes reconstructing filter material microstructures from CT scans and simulating soot deposition, porosity, and permeability at the microscopic scale. These microscopic properties are then used in macroscopic simulations of the entire exhaust system to determine overall filter performance. The approach aims to provide a detailed link between microscopic material changes and resulting macroscopic filter behavior to improve design through simulations rather than experiments.
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
This document summarizes a lecture on trends and paradigm shifts in computational fluid dynamics (CFD). The summary is:
Market forces are driving hardware away from scientific computing toward lower-precision, highly parallel architectures. This will impact how CFD is performed in the future. As computing power increases, databases of detailed simulations may allow machine learning to provide efficient reduced-order models to replace human modeling for some problems. Examples discussed include reactive flows and non-equilibrium turbulence modeling using coherent structure dynamics equations. The talk also addressed how hardware trends may affect CFD and discussed using machine learning and genetic algorithms to optimize reduced-order models.
1) The document discusses quality of service (QoS)-aware data replication for data-intensive applications in cloud computing systems. It aims to minimize data replication cost and number of QoS violated replicas.
2) It presents a mathematical model and algorithm to optimally place QoS-satisfied and QoS-violated data replicas. The algorithm uses minimum-cost maximum flow to obtain the optimal placement.
3) The algorithm takes as input a set of requested nodes and outputs the optimal placement for QoS-satisfied and QoS-violated replicas by modeling the problem as a network flow graph and applying existing polynomial-time algorithms.
Efficient architecture for arithmetic designs using perpendicular NanoMagneti...VIT-AP University
As the process of scaling down continues at a rapid pace, there is a growing need for an alternative semiconductor device to replace CMOS. One of the alternatives that attracted a lot of attention is called nanomagnetic logic (NML). This is because NML delivers a high device density in addition to a non-volatility of stored information, beyond-CMOS technologies, and device work at room temperature. It is necessary to lower the circuit density and increase the speed of circuits like adders. Using emerging NML logic, we created a full-adder, and ripple carry adder (RCA) with a minimum area. As a result, the invented multilayer-based decimal design makes use of RCA, and full-adder, for innovative 3D topology. We used an NML framework built with perpendicular nanomagnetic (pNML) layers to simulate the characteristics of these devices. With the adder designs that have been offered the latency values are relatively low while performing exhaustive testing. Using pNML technology, a decimal adder has been constructed for the first time in the literature. In addition, simulations are carried out with the help of the Modelsim simulator. During the process of nanomagnetic designing consideration is given to both of these aspects as latency and area. To create an NML circuit, the tool MagCAD is employed. Results are better using the pNML environment-based full adder, RCA and decimal adder.
Traffic assignment of motorized private transport in OmniTRANS transport plan...Luuk Brederode
Traffic assignment methods available in OmniTRANS transport planning software, categorized using the framework described in https://www.tandfonline.com/doi/abs/10.1080/01441647.2016.1207211
.
Fog computing factory in alliance nearly bovine computing, optimizing the use of this resource. Currently, crush exercise matter is abeyance to the backward, stored and analyzed, limitation which a decision is made and action taken. But this practices isn’t efficient. Utter computing allows computing, honest and action-taking to enter into the picture near IoT belongings and only pushes relevant matter to the cloud. “Fuzz distributes not at all bad quick-wittedness near at the service better accordingly we nub run this torrent of observations,” explains Baker. “So we thus adjustment it newcomer disabuse of uphold data into unalloyed hint go wool-gathering has favour lose concentration gear up gets forwarded up to the cloud. We posterior then heap up it into data warehouses; we bum do predictive analysis.” This beyond to the data-path send away for is enabled by the increased count functionality that manufacturers such as Cisco are building into their edge switches and routers. Fog Computing plays a role. Nonetheless it is a advanced pronunciation, this technology ahead has a designation backing bowels the globe of the modish data centre and the cloud. Bringing details adjust to the user. The middle of facts zoological unbecoming near the unresponsive creates a straightforward convene to cache observations or other help. These services would be located actual to the end-user to proceed on latency concerns and data access. Rather than of conformation inform at data centre sites anent outlandish the end-point, the Fuzz aims to place the data close to the end-user. Creating purblind geographical distribution. Fogginess computing extends forthright clouded advice by creating a help network which sits at numerous points. This, screen, geographically verbose infrastructure helps in numerous ways. Foremost of enclosing, chunky details and analytics arise be unalloyed faster with better results. Gifted-bodied, administrators are able to on ice location-based
M2C2: A Mobility Management System For Mobile Cloud ComputingKaran Mitra
Mobile devices have become an integral part of our daily lives. Applications
running on these devices may avail storage and compute resources from
the cloud(s). Further, a mobile device may also connect to heterogeneous
access networks (HANs) such as WiFi and LTE to provide ubiquitous
network connectivity to mobile applications. These devices have limited
resources (compute, storage and battery) that may lead to service
disruptions. In this context, mobile cloud computing enables offloading
of computing and storage to the cloud. However, applications running
on mobile devices using clouds and HANs are prone to unpredictable
cloud workloads, network congestion and handoffs. To run these applications
efficiently the mobile device requires the best possible cloud and
network resources while roaming in HANs. This paper proposes, develops
and validates a novel system called M2C2 which supports mechanisms
for: i.) multihoming, ii.) cloud and network probing, and iii.) cloud
and network selection. We built a prototype system and performed extensive
experimentation to validate our proposed M2C2. Our results
analysis shows that the proposed system supports mobility efficiently
in mobile cloud computing.
Paper can be downloaded from: http://karanmitra.me/wp-content/uploads/2015/02/MitraetalLTUWCNC_Preprint2015.pdf
Christian jensen advanced routing in spatial networks using big datajins0618
Advanced Routing in Spatial Networks Using Big Data discusses using big data and advanced routing techniques for transportation networks. It covers modeling transportation networks using big data from sensors to assign time-varying weights representing factors like travel time and emissions. It then discusses routing algorithms that find optimal routes considering these weights, including algorithms for stochastic and uncertain weights. The document provides an overview of using big data to improve transportation network modeling and routing.
Automated engineering of domain-specific metamorphic testing environmentsPablo Gómez Abajo
Context:
Testing is essential to improve the correctness of software systems. Metamorphic testing (MT) is an approach especially suited when the system under test lacks oracles, or they are expensive to compute. However, building an MT environment for a particular domain (e.g., cloud simulation, model transformation, machine learning) requires substantial effort.
Objective:
Our goal is to facilitate the construction of MT environments for specific domains.
Method:
We propose a model-driven engineering approach to automate the construction of MT environments. Starting from a meta-model capturing the domain concepts, and a description of the domain execution environment, our approach produces an MT environment featuring comprehensive support for the MT process. This includes the definition of domain-specific metamorphic relations, their evaluation, detailed reporting of the testing results, and the automated search-based generation of follow-up test cases.
Results:
Our method is supported by an extensible platform for Eclipse, called Gotten. We demonstrate its effectiveness by creating an MT environment for simulation-based testing of data centres and comparing with existing tools; its suitability to conduct MT processes by replicating previous experiments; and its generality by building another MT environment for video streaming APIs.
Conclusion:
Gotten is the first platform targeted at reducing the development effort of domain-specific MT environments. The environments created with Gotten facilitate the specification of metamorphic relations, their evaluation, and the generation of new test cases.
This document discusses Kinect fusion-based simultaneous localization and mapping (SLAM) systems for mobile robotics. It presents an example Kinect-based SLAM system that uses Kinect fusion to provide dense, real-time 3D mapping of a volume. The system aims to map larger volumes while also tracking human targets. It compares several variants of the iterative closest point (ICP) algorithm used for point cloud alignment, including ones using constant velocity and non-linear least squares estimation models. It also explores using RGB and depth data with features to initialize ICP transformations. Results show the frame-wise errors of different ICP variants on benchmark datasets.
Big data classification based on improved parallel k-nearest neighborTELKOMNIKA JOURNAL
In response to the rapid growth of many sorts of information, highway data has continued to evolve in the direction of big data in terms of scale, type, and structure, exhibiting characteristics of multi-source heterogeneous data. The k-nearest neighbor (KNN) join has received a lot of interest in recent years due to its wide range of applications. Processing KNN joins is time-consuming and inefficient due to the quadratic structure of the join method. As the number of applications dealing with vast amounts of data develops, KNN joins get more sophisticated. The authors seek to save money on computer resources by leveraging a large number of threads and multiprocessors. Six popular datasets are used to apply the method and evaluate the sequential and parallel performance of the KNN technique. These datasets are used to compare the sequential and parallel performance of the KNN method. When compared to a matching multi-core solution, the final implementation saves computing resources. It has been optimized to utilize as little RAM as possible, allowing it to manage high-resolution photo data without sacrificing efficiency. The authors will use the technique they presented using Spark Radoop. Our performance research validates the supplied method’s efficacy and scalability.
Presentation of the paper Construction of Text Digitization System for Nôm Historical Texts by Truyen Van Phan and Masaki Nakagawa in DATeCH 2014. #digidays
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
1) The document proposes a mathematical model and optimization service to predict the optimal number of parallel TCP streams needed to maximize data throughput in a distributed computing environment.
2) It develops a novel model that can predict the optimal number using only three data points, and implements this service in the Stork Data Scheduler.
3) Experimental results show the optimized transfer time using this prediction and optimization service is much less than without optimization in most cases.
This document proposes a new Ranking Chaos Optimization (RCO) algorithm to solve the dual scheduling problem of cloud services and computing resources (DS-CSCR) in private clouds. It introduces the DS-CSCR concept and models the characteristics of cloud services and computing resources. The RCO algorithm uses ranking selection, individual chaos, and dynamic heuristic operators. Experimental results show RCO has better searching ability, time complexity, and stability compared to other algorithms for solving DS-CSCR. Future work is needed to study additional quality of service properties and improve RCO for other optimization problems.
Cache performance analysis of virtualized router on virtual content centric n...ijngnjournal
Content-centric networking (CCN) is one of the major proposals for realizing information-centric networking. CCN routers cache forwarded data in a buffer memory called the ContentStore (CS). Virtual content-centric networking (VCCN), which enables the construction of multiple virtual networks (called VCCN slices) on a content-centric network, has been recently proposed. When multiple VCCN slices are constructed, the performance of each VCCN slice and that of the entire network are strongly affected by the CCN routers' CS allocation to VCCN router instances in VCCN slices. In this paper, we analyze the effects of CS allocation methods and content request patterns in VCCN slices on the performance of each VCCN slice and that of the entire network. Through several numerical examples, we show that when content request patterns are heterogeneous, a hybrid resource allocation method is effective in terms of both network fairness for VCCN slices and overall network performance.
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
This paper proposes a neuro-fuzzy system called Multi Attribute QoS scoring (MAQS) for dynamic resource allocation in collaborative cloud computing. MAQS uses a 3-layer neural network trained on 5 quality of service attributes - distance, reputation, task completion time, completion ratio, and load - to provide a QoS score for each resource. Resources are then allocated based on this score. The algorithm collects data periodically from nodes and calculates QoS scores for incoming tasks to select the highest scoring node for task allocation. The paper argues this approach considers multiple attributes and heterogeneity of resources better than previous single-attribute methods.
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
Cloud collaboration is an emerging technology which enables sharing of computer files using cloud
computing. Here the cloud resources are assembled and cloud services are provided using these resources.
Cloud collaboration technologies are allowing users to share documents. Resource allocation in the cloud
is challenging because resources offer different Quality of Service (QoS) and services running on these
resources are risky for user demands. We propose a solution for resource allocation based on multi
attribute QoS Scoring considering parameters such as distance to the resource from user site, reputation of
the resource, task completion time, task completion ratio, and load at the resource. The proposed algorithm
referred to as Multi Attribute QoS scoring (MAQS) uses Neuro Fuzzy system. We have also included a
speculative manager to handle fault tolerance. In this paper it is shown that the proposed algorithm
perform better than others including power trust reputation based algorithms and harmony method which
use single attribute to compute the reputation score of each resource allocated.
- Cloud computing allows users to access software and hardware resources that are managed by third parties and made available over the internet. Mobile cloud computing combines mobile devices and cloud computing, allowing computing tasks and data storage to occur remotely. Cloud radio access networks (C-RAN) centralize base stations and use cloud computing to improve coordination and reduce costs. The document proposes a mobile cloud computing system using C-RAN that employs a split-TCP proxy and centralized wireless network cloud to improve throughput and latency for mobile users. Simulation results demonstrate performance improvements over existing systems.
ENERGY-EFFICIENT ADAPTIVE RESOURCE MANAGEMENT FOR REAL-TIME VEHICULAR CLOUD S...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.
In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications — are delivered to an organization's computers and devices through the Internet.
A Multiscale Simulation Approach for Diesel Particulate Filter Design Based o...Ries Bouwman
This document discusses a multiscale simulation approach for diesel particulate filter design using OpenFOAM and DexaSIM. It describes reconstructing filter material microstructures from CT scans and simulating soot deposition, porosity, and permeability at the microscopic scale. These microscopic properties are then used in macroscopic simulations of the entire exhaust system to determine overall filter performance. The approach aims to provide a detailed link between microscopic material changes and resulting macroscopic filter behavior to improve design through simulations rather than experiments.
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
This document summarizes a lecture on trends and paradigm shifts in computational fluid dynamics (CFD). The summary is:
Market forces are driving hardware away from scientific computing toward lower-precision, highly parallel architectures. This will impact how CFD is performed in the future. As computing power increases, databases of detailed simulations may allow machine learning to provide efficient reduced-order models to replace human modeling for some problems. Examples discussed include reactive flows and non-equilibrium turbulence modeling using coherent structure dynamics equations. The talk also addressed how hardware trends may affect CFD and discussed using machine learning and genetic algorithms to optimize reduced-order models.
1) The document discusses quality of service (QoS)-aware data replication for data-intensive applications in cloud computing systems. It aims to minimize data replication cost and number of QoS violated replicas.
2) It presents a mathematical model and algorithm to optimally place QoS-satisfied and QoS-violated data replicas. The algorithm uses minimum-cost maximum flow to obtain the optimal placement.
3) The algorithm takes as input a set of requested nodes and outputs the optimal placement for QoS-satisfied and QoS-violated replicas by modeling the problem as a network flow graph and applying existing polynomial-time algorithms.
Efficient architecture for arithmetic designs using perpendicular NanoMagneti...VIT-AP University
As the process of scaling down continues at a rapid pace, there is a growing need for an alternative semiconductor device to replace CMOS. One of the alternatives that attracted a lot of attention is called nanomagnetic logic (NML). This is because NML delivers a high device density in addition to a non-volatility of stored information, beyond-CMOS technologies, and device work at room temperature. It is necessary to lower the circuit density and increase the speed of circuits like adders. Using emerging NML logic, we created a full-adder, and ripple carry adder (RCA) with a minimum area. As a result, the invented multilayer-based decimal design makes use of RCA, and full-adder, for innovative 3D topology. We used an NML framework built with perpendicular nanomagnetic (pNML) layers to simulate the characteristics of these devices. With the adder designs that have been offered the latency values are relatively low while performing exhaustive testing. Using pNML technology, a decimal adder has been constructed for the first time in the literature. In addition, simulations are carried out with the help of the Modelsim simulator. During the process of nanomagnetic designing consideration is given to both of these aspects as latency and area. To create an NML circuit, the tool MagCAD is employed. Results are better using the pNML environment-based full adder, RCA and decimal adder.
Traffic assignment of motorized private transport in OmniTRANS transport plan...Luuk Brederode
Traffic assignment methods available in OmniTRANS transport planning software, categorized using the framework described in https://www.tandfonline.com/doi/abs/10.1080/01441647.2016.1207211
.
Fog computing factory in alliance nearly bovine computing, optimizing the use of this resource. Currently, crush exercise matter is abeyance to the backward, stored and analyzed, limitation which a decision is made and action taken. But this practices isn’t efficient. Utter computing allows computing, honest and action-taking to enter into the picture near IoT belongings and only pushes relevant matter to the cloud. “Fuzz distributes not at all bad quick-wittedness near at the service better accordingly we nub run this torrent of observations,” explains Baker. “So we thus adjustment it newcomer disabuse of uphold data into unalloyed hint go wool-gathering has favour lose concentration gear up gets forwarded up to the cloud. We posterior then heap up it into data warehouses; we bum do predictive analysis.” This beyond to the data-path send away for is enabled by the increased count functionality that manufacturers such as Cisco are building into their edge switches and routers. Fog Computing plays a role. Nonetheless it is a advanced pronunciation, this technology ahead has a designation backing bowels the globe of the modish data centre and the cloud. Bringing details adjust to the user. The middle of facts zoological unbecoming near the unresponsive creates a straightforward convene to cache observations or other help. These services would be located actual to the end-user to proceed on latency concerns and data access. Rather than of conformation inform at data centre sites anent outlandish the end-point, the Fuzz aims to place the data close to the end-user. Creating purblind geographical distribution. Fogginess computing extends forthright clouded advice by creating a help network which sits at numerous points. This, screen, geographically verbose infrastructure helps in numerous ways. Foremost of enclosing, chunky details and analytics arise be unalloyed faster with better results. Gifted-bodied, administrators are able to on ice location-based
M2C2: A Mobility Management System For Mobile Cloud ComputingKaran Mitra
Mobile devices have become an integral part of our daily lives. Applications
running on these devices may avail storage and compute resources from
the cloud(s). Further, a mobile device may also connect to heterogeneous
access networks (HANs) such as WiFi and LTE to provide ubiquitous
network connectivity to mobile applications. These devices have limited
resources (compute, storage and battery) that may lead to service
disruptions. In this context, mobile cloud computing enables offloading
of computing and storage to the cloud. However, applications running
on mobile devices using clouds and HANs are prone to unpredictable
cloud workloads, network congestion and handoffs. To run these applications
efficiently the mobile device requires the best possible cloud and
network resources while roaming in HANs. This paper proposes, develops
and validates a novel system called M2C2 which supports mechanisms
for: i.) multihoming, ii.) cloud and network probing, and iii.) cloud
and network selection. We built a prototype system and performed extensive
experimentation to validate our proposed M2C2. Our results
analysis shows that the proposed system supports mobility efficiently
in mobile cloud computing.
Paper can be downloaded from: http://karanmitra.me/wp-content/uploads/2015/02/MitraetalLTUWCNC_Preprint2015.pdf
Christian jensen advanced routing in spatial networks using big datajins0618
Advanced Routing in Spatial Networks Using Big Data discusses using big data and advanced routing techniques for transportation networks. It covers modeling transportation networks using big data from sensors to assign time-varying weights representing factors like travel time and emissions. It then discusses routing algorithms that find optimal routes considering these weights, including algorithms for stochastic and uncertain weights. The document provides an overview of using big data to improve transportation network modeling and routing.
Automated engineering of domain-specific metamorphic testing environmentsPablo Gómez Abajo
Context:
Testing is essential to improve the correctness of software systems. Metamorphic testing (MT) is an approach especially suited when the system under test lacks oracles, or they are expensive to compute. However, building an MT environment for a particular domain (e.g., cloud simulation, model transformation, machine learning) requires substantial effort.
Objective:
Our goal is to facilitate the construction of MT environments for specific domains.
Method:
We propose a model-driven engineering approach to automate the construction of MT environments. Starting from a meta-model capturing the domain concepts, and a description of the domain execution environment, our approach produces an MT environment featuring comprehensive support for the MT process. This includes the definition of domain-specific metamorphic relations, their evaluation, detailed reporting of the testing results, and the automated search-based generation of follow-up test cases.
Results:
Our method is supported by an extensible platform for Eclipse, called Gotten. We demonstrate its effectiveness by creating an MT environment for simulation-based testing of data centres and comparing with existing tools; its suitability to conduct MT processes by replicating previous experiments; and its generality by building another MT environment for video streaming APIs.
Conclusion:
Gotten is the first platform targeted at reducing the development effort of domain-specific MT environments. The environments created with Gotten facilitate the specification of metamorphic relations, their evaluation, and the generation of new test cases.
This document discusses Kinect fusion-based simultaneous localization and mapping (SLAM) systems for mobile robotics. It presents an example Kinect-based SLAM system that uses Kinect fusion to provide dense, real-time 3D mapping of a volume. The system aims to map larger volumes while also tracking human targets. It compares several variants of the iterative closest point (ICP) algorithm used for point cloud alignment, including ones using constant velocity and non-linear least squares estimation models. It also explores using RGB and depth data with features to initialize ICP transformations. Results show the frame-wise errors of different ICP variants on benchmark datasets.
Big data classification based on improved parallel k-nearest neighborTELKOMNIKA JOURNAL
In response to the rapid growth of many sorts of information, highway data has continued to evolve in the direction of big data in terms of scale, type, and structure, exhibiting characteristics of multi-source heterogeneous data. The k-nearest neighbor (KNN) join has received a lot of interest in recent years due to its wide range of applications. Processing KNN joins is time-consuming and inefficient due to the quadratic structure of the join method. As the number of applications dealing with vast amounts of data develops, KNN joins get more sophisticated. The authors seek to save money on computer resources by leveraging a large number of threads and multiprocessors. Six popular datasets are used to apply the method and evaluate the sequential and parallel performance of the KNN technique. These datasets are used to compare the sequential and parallel performance of the KNN method. When compared to a matching multi-core solution, the final implementation saves computing resources. It has been optimized to utilize as little RAM as possible, allowing it to manage high-resolution photo data without sacrificing efficiency. The authors will use the technique they presented using Spark Radoop. Our performance research validates the supplied method’s efficacy and scalability.
An Approach to Reduce Energy Consumption in Cloud data centers using Harmony ...ijccsa
Fast development of knowledge and communication has established a new computational style which is
known as cloud computing. One of the main issues considered by the cloud infrastructure providers, is to
minimize the costs and maximize the profitability. Energy management in the cloud data centers is very
important to achieve such goal. Energy consumption can be reduced either by releasing idle nodes or by
reducing the virtual machines migrations. To do the latter, one of the challenges is to select the placement
approach of the migrated virtual machines on the appropriate node. In this paper, an approach to reduce
the energy consumption in cloud data centers is proposed. This approach adapts harmony search
algorithm to migrate the virtual machines. It performs the placement by sorting the nodes and virtual
machines based on their priority in descending order. The priority is calculated based on the workload.
The proposed approach is simulated. The evaluation results show the reduction in the virtual machine
migrations, the increase of efficiency and the reduction of energy consumption.
KEYWORDS
Energy Consumption, Virtual Machine Placement, Harmony Search Algorithm, Server Consolidati
An Approach to Reduce Energy Consumption in Cloud data centers using Harmony ...neirew J
Fast development of knowledge and communication has established a new computational style which is
known as cloud computing. One of the main issues considered by the cloud infrastructure providers, is to
minimize the costs and maximize the profitability. Energy management in the cloud data centers is very
important to achieve such goal. Energy consumption can be reduced either by releasing idle nodes or by
reducing the virtual machines migrations. To do the latter, one of the challenges is to select the placement
approach of the migrated virtual machines on the appropriate node. In this paper, an approach to reduce
the energy consumption in cloud data centers is proposed. This approach adapts harmony search
algorithm to migrate the virtual machines. It performs the placement by sorting the nodes and virtual
machines based on their priority in descending order. The priority is calculated based on the workload.
The proposed approach is simulated. The evaluation results show the reduction in the virtual machine
migrations, the increase of efficiency and the reduction of energy consumption.
A Review - Synchronization Approaches to Digital systemsIJERA Editor
Synchronization is a prime requirement in the process of Digital systems. Wherein new devices are upcoming
towards providing higher service level, advanced distributed systems are been integrated onto a single platform
for higher service provision. However with the integration of large processing units, the distributed processing
needs a high level synchronization with minimum processing overhead. The issue of synchronization was
processed by various approaches. This paper outlines a brief review on the developments made in the field of
synchronization approach to digital system, under distributed mode operation.
This presentation by Yong Lim, Professor of Economic Law at Seoul National University School of Law, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Tim Capel, Director of the UK Information Commissioner’s Office Legal Service, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
The importance of sustainable and efficient computational practices in artificial intelligence (AI) and deep learning has become increasingly critical. This webinar focuses on the intersection of sustainability and AI, highlighting the significance of energy-efficient deep learning, innovative randomization techniques in neural networks, the potential of reservoir computing, and the cutting-edge realm of neuromorphic computing. This webinar aims to connect theoretical knowledge with practical applications and provide insights into how these innovative approaches can lead to more robust, efficient, and environmentally conscious AI systems.
Webinar Speaker: Prof. Claudio Gallicchio, Assistant Professor, University of Pisa
Claudio Gallicchio is an Assistant Professor at the Department of Computer Science of the University of Pisa, Italy. His research involves merging concepts from Deep Learning, Dynamical Systems, and Randomized Neural Systems, and he has co-authored over 100 scientific publications on the subject. He is the founder of the IEEE CIS Task Force on Reservoir Computing, and the co-founder and chair of the IEEE Task Force on Randomization-based Neural Networks and Learning Systems. He is an associate editor of IEEE Transactions on Neural Networks and Learning Systems (TNNLS).
This presentation by Thibault Schrepel, Associate Professor of Law at Vrije Universiteit Amsterdam University, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
1.) Introduction
Our Movement is not new; it is the same as it was for Freedom, Justice, and Equality since we were labeled as slaves. However, this movement at its core must entail economics.
2.) Historical Context
This is the same movement because none of the previous movements, such as boycotts, were ever completed. For some, maybe, but for the most part, it’s just a place to keep your stable until you’re ready to assimilate them into your system. The rest of the crabs are left in the world’s worst parts, begging for scraps.
3.) Economic Empowerment
Our Movement aims to show that it is indeed possible for the less fortunate to establish their economic system. Everyone else – Caucasian, Asian, Mexican, Israeli, Jews, etc. – has their systems, and they all set up and usurp money from the less fortunate. So, the less fortunate buy from every one of them, yet none of them buy from the less fortunate. Moreover, the less fortunate really don’t have anything to sell.
4.) Collaboration with Organizations
Our Movement will demonstrate how organizations such as the National Association for the Advancement of Colored People, National Urban League, Black Lives Matter, and others can assist in creating a much more indestructible Black Wall Street.
5.) Vision for the Future
Our Movement will not settle for less than those who came before us and stopped before the rights were equal. The economy, jobs, healthcare, education, housing, incarceration – everything is unfair, and what isn’t is rigged for the less fortunate to fail, as evidenced in society.
6.) Call to Action
Our movement has started and implemented everything needed for the advancement of the economic system. There are positions for only those who understand the importance of this movement, as failure to address it will continue the degradation of the people deemed less fortunate.
No, this isn’t Noah’s Ark, nor am I a Prophet. I’m just a man who wrote a couple of books, created a magnificent website: http://www.thearkproject.llc, and who truly hopes to try and initiate a truly sustainable economic system for deprived people. We may not all have the same beliefs, but if our methods are tried, tested, and proven, we can come together and help others. My website: http://www.thearkproject.llc is very informative and considerably controversial. Please check it out, and if you are afraid, leave immediately; it’s no place for cowards. The last Prophet said: “Whoever among you sees an evil action, then let him change it with his hand [by taking action]; if he cannot, then with his tongue [by speaking out]; and if he cannot, then, with his heart – and that is the weakest of faith.” [Sahih Muslim] If we all, or even some of us, did this, there would be significant change. We are able to witness it on small and grand scales, for example, from climate control to business partnerships. I encourage, invite, and challenge you all to support me by visiting my website.
This presentation by Katharine Kemp, Associate Professor at the Faculty of Law & Justice at UNSW Sydney, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfBen Linders
Psychological safety in teams is important; team members must feel safe and able to communicate and collaborate effectively to deliver value. It’s also necessary to build long-lasting teams since things will happen and relationships will be strained.
But, how safe is a team? How can we determine if there are any factors that make the team unsafe or have an impact on the team’s culture?
In this mini-workshop, we’ll play games for psychological safety and team culture utilizing a deck of coaching cards, The Psychological Safety Cards. We will learn how to use gamification to gain a better understanding of what’s going on in teams. Individuals share what they have learned from working in teams, what has impacted the team’s safety and culture, and what has led to positive change.
Different game formats will be played in groups in parallel. Examples are an ice-breaker to get people talking about psychological safety, a constellation where people take positions about aspects of psychological safety in their team or organization, and collaborative card games where people work together to create an environment that fosters psychological safety.
Gamify it until you make it Improving Agile Development and Operations with ...Ben Linders
So many challenges, so little time. While we’re busy developing software and keeping it operational, we also need to sharpen the saw, but how? Gamification can be a way to look at how you’re doing and find out where to improve. It’s a great way to have everyone involved and get the best out of people.
In this presentation, Ben Linders will show how playing games with the DevOps coaching cards can help to explore your current development and deployment (DevOps) practices and decide as a team what to improve or experiment with.
The games that we play are based on an engagement model. Instead of imposing change, the games enable people to pull in ideas for change and apply those in a way that best suits their collective needs.
By playing games, you can learn from each other. Teams can use games, exercises, and coaching cards to discuss values, principles, and practices, and share their experiences and learnings.
Different game formats can be used to share experiences on DevOps principles and practices and explore how they can be applied effectively. This presentation provides an overview of playing formats and will inspire you to come up with your own formats.
This presentation by OECD, OECD Secretariat, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
• For a full set of 530+ questions. Go to
https://skillcertpro.com/product/servicenow-cis-itsm-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
This presentation by Professor Giuseppe Colangelo, Jean Monnet Professor of European Innovation Policy, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
CODA-ccgrid21
1. A Two-Sided Matching Model for Data
Stream Processing in the Cloud-Fog
Continuum
Narges Mehran, Dragi Kimovski, Radu Prodan
University of Klagenfurt, Klagenfurt, Austria
3. Introduction
• Latency-sensitive and bandwidth-intensive data stream processing services,
➢amongst the dominating traffic generators in today's world
• Processing such data streams in nearly real-time
• Requiring vast amounts of compute, storage and network resources in proximity of
data sources
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021. 3
4. …
CDC 1 CDC 2 CDC n
…
…
Big Data analysis
and memory
optimized
Compute optimized
GPU instances …
Cloud-Fog continuum
Micro DC 1 Micro DC n
• Micro or femto data centre
directly connected to base
station,
• Cisco router1,
• Cluster of:
✓ VMs running on workstations,
✓ Raspberry Pi,
✓ Nvidia Jetson Nano,
✓ Nano Pi.
https://lead-conduct.de/
4
1 https://developer.cisco.com/site/iox/
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
6. Cloud-fOg Data stream
application mAtching
• Cloud-fOg to Data stream application mAtching (CODA):
• addresses the problem of deploying data stream processing applications on
heterogeneous resources,
• CODA approaches this problem using matching theory principles,
➢ application microservices:
✓ require lower completion time,
➢ computing resources:
✓ require lower traffic.
6
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
7. Application model
set of interconnected
microservices
Source and sink
microservices
Application edges
for data element
flowing among
microservices
Data source and sink
mi
mu
Dataui
Upstream
microservice of mi
7
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
11. Ranking methods
• We propose two ranking methods:
➢ microservice-side ranking that considers the microservice time;
➢ resource-side ranking that considers the residual bandwidth.
11
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
12. • Element processing time:
𝑡 𝑚𝑖, 𝑑𝑎𝑡𝑎𝑢𝑖 𝑥 , 𝑟
𝑗 =
𝐶𝑃𝑈(𝑚𝑖, 𝑑𝑎𝑡𝑎𝑢𝑖[𝑥])
𝐶𝑃𝑈𝑗
+
𝑑𝑎𝑡𝑎𝑢𝑖[𝑥]
𝐵𝑊𝑞𝑗
+ 𝐿𝐴𝑇𝑞𝑗
• Microservice time:
𝑇 𝑚𝑖, 𝑑𝑎𝑡𝑎𝑢𝑖 , 𝑟
𝑗 =
𝑥=1
𝑠𝑖𝑧𝑒𝑢𝑖
𝑡 𝑚𝑖, 𝑑𝑎𝑡𝑎𝑢𝑖 𝑥 , 𝑟
𝑗
Microservice-side ranking
computation time transmission time and channel latency
Number of data elements
12
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
13. • Residual bandwidth:
𝑅𝑒𝑠𝑑𝐵𝑊
𝑗 𝑚𝑖, 𝑑𝑎𝑡𝑎𝑢𝑖 , 𝑟
𝑗 = 𝐵𝑊𝑞𝑗 −
𝑥=1
𝑠𝑖𝑧𝑒𝑢𝑖
𝜆𝑢𝑖 . 𝑑𝑎𝑡𝑎𝑢𝑖[𝑥]
Resource-side ranking
ingress data rate & data stream
Bandwidth between resources rq and rj
13
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
14. Problem definition
• Resource allocation problem → as a matching game
14
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
15. Problem definition
• Resource allocation problem → as a matching game
15
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
16. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
An example on CODA Algorithm
16
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
17. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
17
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
18. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
18
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
19. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
19
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
20. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
20
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
21. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
21
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
22. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
22
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
23. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r4 r1 r3
m5
r1 r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1 m5 m4
m2 m5 m4
23
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
24. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r3
m5
r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1
m2 m5
24
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
25. m1
m3
m2
m4
r4 r2 r3
r1 r3 r2
r1 r2
r3
m5
r4 r2 r3
r1
r3
r2
r4
m2 m3 m1 m5
m2 m3 m5 m4
m3 m1
m2 m5
25
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
An example on CODA Algorithm
26. Traffic sign classification in
video stream applications
Traffic sign classification in video stream applications
1) Encoding: encodes the raw video stream with
ffmpeg software suite with the H.264 codec.
2) Framing: divides the videos into frames by utilizing
OpenCV library.
3) Analysis: is an ML model to train a neural network
from 50,000 video frames of 43 traffic signs.
26
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
27. 1. iFogSim simulator
2. C3 Testbed:
➢m5a.xlarge AWS general purpose
instance
➢One twelve-core AMD Ryzen
Threadripper 2920X processor at
3.5GHz and 32GB of RAM
➢RPi and NVIDIA Jetson Nano as the one-
hop devices connected to data source
Experimental setups
28. Performance metrics
• Stream processing time: completion time of the msnk microservice;
μ(A)⊆R:
28
msrc m3
m2
m4 msnk 𝐶 𝐴, 𝑅 = 𝐶(𝑚𝑠𝑛𝑘, 𝑅)
29. • Stream processing time: completion time of the msnk microservice;
μ(A)⊆R:
• Total streaming traffic: total traffic aggregates the traffic across all
network channels:
29
msrc m3
m2
m4 msnk 𝐶 𝐴, 𝑅 = 𝐶(𝑚𝑠𝑛𝑘, 𝑅)
r1
r3
r2
r4
Performance metrics
30. • Stream processing time: completion time of the msnk microservice;
μ(A)⊆R:
• Total streaming traffic: total traffic aggregates the traffic across all
network channels:
30
msrc m3
m2
m4 msnk 𝐶 𝐴, 𝑅 = 𝐶(𝑚𝑠𝑛𝑘, 𝑅)
r1
r3
r2
r4
Performance metrics
31. Related work comparisons
• Three state-of-the-art approaches:
➢ Heterogeneous Earliest Finish Time–only Cloud (HEFT-oC)
➢ Response Time Rate with Region Patterns (RTR-RP)
➢ CloudPath
31
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
32. Simulation scenarios
• First scenario:
➢CPU load of {10000, 20000, 30000, 40000} MI,
➢Data size of dataui[x] = 10MB.
• Second scenario:
➢Data size of {0.1, 1, 5, 10} MB,
➢CPU load = 15000 MI.
32
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
36. Real-testbed scenarios
• First scenario:
➢ encoding bitrate ∈ {200,1500,3000,6500,20000} kbps,
➢ dataui[x]=2560kB.
• Second scenario:
➢ dataui[x] ∈ {35,300,420,1350,2560} kB,
➢ bitrate= 20000kbps.
36
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
37. Conclusion and future work
• Proposed CODA for running
stream processing applications on
Cloud-Fog resources,
• considered stream processing
time and the streaming traffic as
our main goals,
• achieved 11-45% lower stream
processing times and 1.3-20%
lower streaming traffic.
37
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
38. Conclusion and future work
• Future works:
➢ Investigating the scheduling
algorithm based on matching theory,
➢ Inspecting the dynamicity of
applications and resources.
• Proposed CODA for running
stream processing applications on
Cloud-Fog resources,
• considered stream processing
time and the streaming traffic as
our main goals,
• achieved 11-45% lower stream
processing times and 1.3-20%
lower streaming traffic.
38
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
39. References
1. B. Confais, B. Parrein and A. Lebre, "Data Location Management Protocol for Object Stores in a Fog Computing Infrastructure," in IEEE
Transactions on Network and Service Management, vol. 16, no. 4, pp. 1624-1637, Dec. 2019.
2. Seyed Hossein Mortazavi, Mohammad Salehe, Carolina Simoes Gomes, Caleb Phillips, and Eyal de Lara. Cloudpath: A multi-tier cloud
computing framework. In Proceedings of the Second ACM/IEEE Symposium on Edge Computing, pages 1–13, 2017.
3. Alexandre da Silva Veith, Marcos Dias de Assuncao, and Laurent Lefevre. Latency-aware placement of data stream analytics on edge
computing. In International Conference on Service-Oriented Computing, pages 215–229. Springer, 2018.
4. David Gale and Lloyd S Shapley. College admissions and the stability of marriage. The American Mathematical Monthly, 69(1):9–15,
1962.
5. Marcos Dias de Assuncao, Alexandre da Silva Veith, and Rajkumar Buyya. Distributed data stream processing and edge computing: A
survey on resource elasticity and future directions. Journal of Network and Computer Applications, 103:1–17, 2018.
6. S Segvic, K Brkic, Z Kalafatic, V Stanisavljevic, M Sevrovic, Damir Budimir, and I Dadic. A computer vision assisted geoinformation
inventory for traffic infrastructure. In 13th International IEEE Conference on Intelligent Transportation Systems, pages 66–73. IEEE, 2010.
7. Ali Reza Zamani, Mengsong Zou, Javier Diaz-Montes, Ioan Petri, Omer Farooq Rana, Ashiq Anjum, and Manish Parashar. Deadline
constrained video analysis via in-transit computational environments. IEEE Transactions on Services Computing, 2017.
8. Dragi Kimovski, Roland Matha, Josef Hammer, Narges Mehran, Hermann Hellwagner, and Radu Prodan. Cloud, fog or edge: Where to
compute? IEEE Internet Computing, 2021.
9. Mahsa Ehsanpour, Siavash Bayat, and Ali Mohammad Afshin Hemmatyar. An efficient and social-aware distributed in-network caching
scheme in named data networks using matching theory. Computer Networks, 158:175–183, 2019.
39
Mehran, Kimovski, Prodan. “A Two-Sided Matching Model for Data Stream Processing in the Cloud-Fog ..,” CCGrid2021.
40. Thanks for your attention ☺
A Two-Sided Matching Model for Data
Stream Processing in the Cloud-Fog
Continuum
Narges Mehran, Dragi Kimovski, Radu Prodan
Klagenfurt University, Klagenfurt, Austria
Email: Narges.Mehran@aau.at
Code: https://github.com/SiNa88/CODA