scholarly journals Fast and Low-cost Search for Efficient Cloud Configurations for HPC Workloads

2021 ◽  
Author(s):  
Vanderson M. do Rosario ◽  
Thais A. Silva Camacho ◽  
Otávio O. Napoli ◽  
Edson Borin

The wide variety of virtual machine types, network configurations, number of instances, among others configuration tweaks, in cloud computing, makes the finding of the best configuration a hard problem. Trying to reduce costs and resource underutilization while achieving acceptable performance can be a hard task even for specialists. Thus, many approaches to find these optimal or almost optimal configurations for a given program were proposed in the literature. Observing the performance of an application in the cloud takes time and money. Therefore, most of the approaches aim not only to find good solutions but also to reduce the search cost. One of those approaches relies on Bayesian Optimization, which analyzes fewer configurations, reducing the search cost while still finding good solutions. Another approach found in the literature is the use of a technique named Paramount Iteration, which enables users to reason about cloud configurations' cost and performance without executing the application to its completion (early-stopping) this approach reduces the cost of each observation. In this work, we show that both techniques can be used together to do fewer and lower-cost observations. We demonstrate that such an approach can recommend solutions that are 1.68x better on average than Random Searching and with a 6x cheaper search.

2012 ◽  
Vol 459 ◽  
pp. 544-548 ◽  
Author(s):  
Wei Liang ◽  
Jian Bo Xu ◽  
Wei Hong Huang ◽  
Li Peng

Network security technology ensures secure data transmission in network. Meanwhile, it brings extra overhead of security system in terms of cost and performance, which seriously affects the rapid development of existing high-speed encryption systems. The existing encryption technology cannot meet the demand of high security, low cost and high real-time. For solving above problems, an ECC encryption engine architecture based on scalable public key cipher and a high-speed configurable multiplication algorithm are designed. The algorithm was tested on FPGA platform and the experiment results show that the system has better computation speed and lower cost overhead. By comparing with other systems, our system has benefits in terms of hardware overhead and encryption time ratio


Author(s):  
Lucian T. Grigorie ◽  
Ruxandra M. Botez

In this paper, an algorithm for the inertial sensors errors reduction in a strap-down inertial navigation system, using several miniaturized inertial sensors for each axis of the vehicle frame, is conceived. The algorithm is based on the idea of the maximum ratio-combined telecommunications method. We consider that it would be much more advantageous to set a high number of miniaturized sensors on each input axis of the strap-down inertial system instead of a single one, more accurate but expensive and with larger dimensions. Moreover, a redundant system, which would isolate any of the sensors in case of its malfunctioning, is obtained. In order to test the algorithm, Simulink code is used for algorithm and for the acceleration inertial sensors modeling. The Simulink resulted sensors models include their real errors, based on the data sheets parameters, and were conceived based on the IEEE analytical standardized accelerometers model. An integration algorithm is obtained, in which the signal noise power delivered to the navigation processor, is reduced, proportionally with the number of the integrated sensors. At the same time, the bias of the resulted signal is reduced, and provides a high redundancy degree for the strap-down inertial navigation system at a lower cost than at the cost of more accurate and expensive sensors.


2019 ◽  
Vol 116 (28) ◽  
pp. 13879-13884 ◽  
Author(s):  
Liza Reed ◽  
M. Granger Morgan ◽  
Parth Vaishnav ◽  
Daniel Erian Armanios

A changing generation mix and growing demand for carbon-free electricity will almost certainly require dramatic changes in the infrastructure and topology of the electricity system. Rather than build new lines, one way to minimize social opposition and regulatory obstacles is to increase the capacity of existing transmission corridors. In addition to upgrading the capacity of high-voltage alternating current (HVAC) lines, we identify a number of situations in which conversion from HVAC to high-voltage direct current (HVDC) is the least-cost strategy to increase the capacity of the corridor. If restricted to the existing right-of-way (ROW), we find DC conversion to be the least-cost, and in some cases the only, option for distances of >200 km or for increases of >50% capacity. Across all configurations analyzed, we assess HVDC conversion to be the lower-cost option at >350 km and >50% capacity increases. While we recognize that capacity expansion through HVDC conversion may be the optimal solution in only some situations, with future improvements in the cost and performance of solid-state power electronics, conversion to HVDC could be attractive in a growing set of circumstances.


10.6036/9889 ◽  
2021 ◽  
Vol 96 (3) ◽  
pp. 281-284
Author(s):  
PABLO LUQUE RODRÍGUEZ ◽  
DANIEL ÁLVAREZ MÁNTARAS ◽  
JORGE ROCES GARCIA ◽  
ALVARO MARADONA TUERO ◽  
LUCIANO SANCHEZ RAMOS

This work shows the electrification of a vehicle for the European Mountain Climbing Championship, with a design and construction that allows to maintain the performance of the designs with thermal propellant without increasing the cost. It is based on an existing space-frame vehicle and a methodology based on a multi-target optimization is implemented to define the parameters characteristic of the powertrain. The design is completed with the choice of commercial elements of cost contained to propose a final design competitive in price and performance. Keywords: Electric vehicle, motor vehicle, powertrain design, low cost, electric batteries


2013 ◽  
Vol 336-338 ◽  
pp. 1882-1886
Author(s):  
Tian Fu ◽  
Zhen Wang ◽  
Pan Deng Yang

With the gradual application of RFID technology, the problems of privacy security arouse people's great attention. To address the problems of the existing RFID authentication protocol, such as the weakness on security and privacy, the high cost and the un-stabilizing systems performance, this paper puts forward a kind effective protection of privacy and low cost RFID security authentication protocol, analyses the security and performance of this protocol. This protocol can not only effectively solve the problems of replay attacks, location privacy attack and data synchronization, but also greatly use the Reader computing resources to reduce the cost of system construction, so it is appropriate for the application of RFID system.


Efficient computations are increasing now a day, so their need is very high in the world. Infrastructure and computation techniques are not as much as efficient in conventionally or in present scenario, therefore the cloud computing is new to deal this type of problems. Sequencing of hardware and software technologies, for giving scalable and low cost computational understandings in cloud computing. The major focus of this research is to diminish the transportation cost of resource allocation along with various virtual machines in cloud computing environment. In this research paper, implementation of Vogel's Approximation Method (VAM) to obtain an Initial Basic Feasible Solution (IBFS) and an algorithm to optimize the cost of resource transportations for cloud service provider (CSP) as well as present an example also to understand the proposed method for total supply values and total demand values. Although the calculation of cost reduction until the iteration still has a non-negative values, and the calculation is done again until the last iteration. A comparison has been shown the cost of the proposed mechanism is much less from other technique.


2018 ◽  
Vol 217 ◽  
pp. 04001
Author(s):  
S. N. H. Umar ◽  
E. A. Bakar ◽  
N. M. Kamaruddin ◽  
N. Uchiyama

This study developed a new design of a low cost potentiostat circuit device. This device is an alternative electrochemical instrument applied for monitoring heavy metal ion in environmental water. It was developed to alleviate the cost burden of equipment procurement and due to the requirement for in-situ application since the existing commercialize devices are bulky and expensive. the main component of the device consist of electronics configuration of operational amplifier. the device was first modelled and simulated to acquire the design parameters and performance. the potential control algorithm was developed on open-source microcontroller platform. A dummy cell was used to validate the capabilities of the device.


2020 ◽  
Vol 68 (1) ◽  
pp. 49-56
Author(s):  
Gour Chand Mazumder ◽  
SM Nasif Shams ◽  
Md Habibur Rahman ◽  
Saiful Huque

In this paper, a low-cost water electrolyzer is developed and its performance study is presented. Locally found materials are used to develop the electrolyzer. The electrolyzer has two cells connected in parallel and bipolar electrode configuration. In common, different cells are connected in series but for this electrolyzer parallel connection has been tested. A very thin polymer, Nylon-140 has been used as separator membranes for this electrolyzer. In separator membrane assembly, the designed geometry creates two separate gas channels internally which enables the direct collection of hydrogen and oxygen gas from the designated outlet port of the electrolyzer. The geometry excludes the need of external tubing into each cell-compartments to collect hydrogen and oxygen separately. The developed electrolyzer is found to be 42% efficient with its highest production rate of 227.27 mL/min. The purity of hydrogen is found to be more than 92% and justified with the burn test. The cost is 20 times less than the commercial electrolyzers. The development method and scheme can be helpful to popularize the small scale use of hydrogen in Bangladesh for various renewable energy applications. Dhaka Univ. J. Sci. 68(1): 49-56, 2020 (January)


2020 ◽  
Vol 5 (1) ◽  
Author(s):  
Duangthip Trisrivirat ◽  
John M X Hughes ◽  
Robin Hoeven ◽  
Matthew Faulkner ◽  
Helen Toogood ◽  
...  

Abstract Successful industrial biotechnological solutions to biofuels and other chemicals production rely on effective competition with existing lower-cost natural sources and synthetic chemistry approaches enabled by adopting low-cost bioreactors and processes. This is achievable by mobilizing Halomonas as a next generation industrial chassis, which can be cultivated under non-sterile conditions. To increase the cost effectiveness of an existing sustainable low carbon bio-propane production strategy, we designed and screened a constitutive promoter library based on the known strong porin promoter from Halomonas. Comparative studies were performed between Escherichia coli and Halomonas using the reporter gene red fluorescent protein (RFP). Later studies with a fatty acid photodecarboxylase-RFP fusion protein demonstrated tuneable propane production in Halomonas and E. coli, with an ∼8-fold improvement in yield over comparable isopropyl-β-D-thiogalactoside-inducible systems. This novel set of promoters is a useful addition to the synthetic biology toolbox for future engineering of Halomonas to make chemicals and fuels.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Yuhei Watanabe ◽  
Hideki Yamamoto ◽  
Hirotaka Yoshida

Modern vehicles which have internal sensor networks are one of the examples of a cyberphysical system (CPS). The tire pressure monitoring system (TPMS) is used to monitor the pressure of the tires and to inform the driver of them. This system is mandatory for vehicles in the US and EU. To ensure the security of TPMS, it is important to reduce the cost of the cryptographic mechanisms implemented in resource-constrained devices. To address this problem, previous works have proposed countermeasures employing lightweight block ciphers such as PRESENT, SPECK, or KATAN. However, it is not clear to us that any of these works have addressed the issues of software optimization that considers TPMS packet protection as well as session key updates for architectures consisting of the vehicle TPMS ECU and four low-cost TPMS sensors equipped with the tires. In this paper, we propose the application of ISO/IEC 29192-5 lightweight hash function Lesamnta-LW to address these issues. When we apply cryptographic mechanisms to a practical system, we consider the lightweight crypto stack which contains cryptographic mechanisms, specifications for the implementation, and performance evaluation. Our approach is to apply the known method of converting Lesamnta-LW to multiple independent pseudorandom functions (PRFs) in TPMS. In our case, we generate five PRFs this way and then use one PRF for MAC generation and four for key derivation. We use the internal AES-based block cipher of Lesamnta-LW for encryption. Although we follow the NIST SP 800-108 framework of converting PRFs to key derivation functions, we confirm the significant advantage of Lesamnta-LW-based PRFs over HMAC-SHA-256 by evaluating the performance on AVR 8-bit microcontrollers, on which we consider simulating TPMS sensors. We expect that our method to achieve multiple purposes with a single cryptographic primitive will help us to reduce the total implementation cost required for TPMS security.


Sign in / Sign up

Export Citation Format

Share Document