scholarly journals Microservice-Based Approach to Simulating Environmentally Friendly Equipment of Infrastructure Objects Taking into Account Meteorological Data

Atmosphere ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 1217
Author(s):  
Roman Kostromin ◽  
Olga Basharina ◽  
Alexander Feoktistov ◽  
Ivan Sidorov

Nowadays, simulation modeling is a relevant and practically significant means in the field for research of infrastructure object functioning. It forms the basis for studying the most important components of such objects represented by their digital twins. Applying meteorological data, in this context, becomes an important issue. In the paper, we propose a new microservice-based approach for organizing simulation modeling in heterogeneous distributed computing environments. Within the proposed approach, all operations related to data preparing, executing models, and analyzing the obtained results are implemented as microservices. The main advantages of the proposed approach are the parameter sweep computing within simulation modeling and possibility of integrating resources of public access supercomputer centers with cloud and fog platforms. Moreover, we provide automated microservice web forms using special model specifications. We develop and apply the service-oriented tools for studying environmentally friendly equipment of the objects at the Baikal natural territory. Among such objects are recreation tourist centers, children’s camps, museums, exhibition centers, etc. As a result, we have evaluated the costs for the possible use of heat pumps in different operational and meteorological conditions for the typical object. The provided comparative analysis has confirmed the aforementioned advantages of the proposed approach.

2021 ◽  
Author(s):  
R. Kostromin ◽  
A. Feoktistov ◽  
M. Voskoboinikov

The paper represents a prototype of service-oriented tools for developing digital twins. These tools automate most of the stages in preparing and carrying out a computational experiment reducing the possibility of human error. Computational experiments based on simulation modeling are performed using the proposed tools. As an example in applying the represented tools, a digital twin of a heat pump used as environmentally-friendly equipment of an infrastructure object on the Baikal natural territory is considered. Owing to the growing anthropogenic load, special attention is paid to the objects located at the coast of Lake Baikal. During the simulation modeling, both the heat pump performance characteristics and retrospective meteorological data are used to predict climatic conditions and select optimal control parameters. In addition, the computational experiment has obviously shown that heat pump use significantly reduces the harmful effect on the environment.


2017 ◽  
Vol 201 ◽  
pp. 524-533 ◽  
Author(s):  
I. Bychkov ◽  
G. Oparin ◽  
A. Tchernykh ◽  
A. Feoktistov ◽  
V. Bogdanova ◽  
...  

Author(s):  
Hussain Al-Aqrabi ◽  
Lu Liu

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.


2009 ◽  
pp. 279-289
Author(s):  
Emerson Loureiro ◽  
Frederico Bublitz ◽  
Loreno Oliveira ◽  
Nadia Barbosa ◽  
Angelo Perkusich ◽  
...  

The fast development on microelectronics has promoted the increase on the computational power of hardware components. On the other hand, we are facing a significant improvement on energy consumption as well as the reduction of the physical size of such components. These improvements and the emergence of wireless networking technologies are enabling the development of small and powered mobile devices. Due to this scenario, the so-called pervasive computing paradigm, introduced by Mark Weiser in 1991 (Weiser, 1991) is becoming a reality. Such a paradigm envisions a world where environments are inhabited by computing devices, all of them seamlessly integrated into peoples’ lives, and effectively helping to carry on their daily tasks. Among others, one major characteristic of Weiser’s vision is that each device in an environment becomes a potential client or provider of resources. Not surprisingly, pervasive computing environments are becoming dynamic repositories of computational resources, all of them available to mobile users from the palm of their hands. However, devices can unpredictably join and leave such environments. Thus, resources can be dynamically made available or unavailable. Such a scenario has a great impact on the way that resources are found and used. In the case of static environments, such as the Web, it is reasonable to look up and access resources, such as Web pages, knowing the address of their providers beforehand. On the other hand, for dynamic environments, such as the pervasive computing ones, this is not a reasonable approach. This is due to the fact that one cannot guarantee that the provider of a resource will be available at any moment, because it may have left the environment or simply turned off. A better approach would be to discover these resources based on their descriptions, or any other feature that does not require the client to know the specific address of their providers. To this end, some of the current pervasive computing solutions, like Wings (Loureiro, Bublitz, Oliveira, Barbosa, Perkusich, Almeida, & Ferreira, 2006), Green (Sivaharan, Blair, & Coulson, 2005), RUNES (Costa, Coulson, Mascolo, Picco, & Zachariadis, 2005), and Scooby (Robinson, Wakeman, & Owen, 2004), are making use of a novel approach from the branch of distributed applications, the service-oriented computing paradigm (Papazoglou, 2003; Huhns & Singh, 2005). This is due to the fact that such a paradigm provides a crucial element for pervasive computing systems, the ability for dynamically binding to remote resources (Bellur & Narenda, 2005), which enables mobile devices to find needed services on demand. However, pervasive environments may be structured in different ways. They can range from wired networks to completely wireless ones, where communication among the devices is performed in an ad hoc way. Such a characteristic indicates that the way services are provisioned in a pervasive computing environment should fit in its organization, in order to enhance the access to the services available. Considering the above discussion, in this article we provide a review on service provision and its applicability in pervasive computing. More precisely, we will list the existing service provision approaches and discuss the characteristics and problems associated with each one, as well as their usage in pervasive computing environments. We start by providing introductory concepts of service-oriented and pervasive computing, respectively in the service-oriented computing and pervasive computing sections. Next, we present the service provision techniques available and how they can be applied for pervasive computing environments. The main current solutions within this scope will be introduced in the service oriented technologies section. Some of the future trends associated with research for service provision in pervasive computing environments will be presented in the future research trends section. Finally, in the conclusions sect


Author(s):  
Sonia Ben Mokhtar ◽  
Pierre-Guillaume Raverdy ◽  
Aitor Urbieta ◽  
Roberto Speicys Cardoso

The inherent heterogeneity of ambient computing environments and their constant evolution requires middleware platforms to manage networked components designed, developed, and deployed independently. Such management must also be efficient to cater for resource-constrained devices and highly dynamic situations due to the spontaneous appearance and disappearance of networked resources. For service discovery protocols (SDP), one of the main functions of service-oriented architectures (SOA), the efficiency of the matching of syntactic service descriptions is most often opposed to the fullness of the semantic approach. As part of the PLASTIC middleware, the authors present an interoperable discovery platform that features an efficient matching and ranking algorithm able to process service descriptions and discovery requests from both semantic and syntactic SDPs. To that end, the paper defines a generic, modular description language able to record service functional properties, potentially extended with semantic annotations. The proposed discovery platform leverages the advanced communication capabilities provided by the PLASTIC middleware to discover services in multi-network environments. An evaluation of the prototype implementation demonstrates that multi-protocols service matching supporting various levels of expressiveness can be achieved in ambient computing environments.


Author(s):  
Laurent Cicurel ◽  
José Luis Bas Uribe ◽  
Sergio Bellido Gonzalez ◽  
Jesús Contreras ◽  
José-Manuel López-Cobo ◽  
...  

Offering public access to efficient transactional stock market functionalities is of interest to all banks and bank users. Traditional service oriented architecture (SOA) technology succeeds at providing reasonable, good Web-based brokerage solutions, but may lack extensibility possibilities. By introducing Semantic Web Services (SWS) as a way to integrate third party services from distributed service providers, we propose in this chapter an innovative way to offer online real-time solutions that are easy-to-use for customers. The combined use of ontologies and SWS allows different users to define their own portfolio management strategies regardless of the information provider. In deed the semantic layer is a powerful way to integrate the information of many providers in an easy way. With due regard for more development of security technological issues, research on SWS has shown that the deployment of the technology in commercial solutions is within sight.


Sign in / Sign up

Export Citation Format

Share Document