2,988 Hits in 7.5 sec

A Multi-Model Approach for Simulation-Based Digital Twin in Resilient Services

Arnis Lektauers, Jelena Pecerska, Vitalijs Bolsakovs, Andrejs Romanovs, Janis Grabis, Artis Teilans
2021 WSEAS transactions on systems and control  
The current work presents a multi-model approach for simulation-based digital twins as a formal and technological foundation for the analysis and improvement of resilient services.  ...  sources and storages, to manage operations in real-time, as well as to enable collaboration between the users in an integrated web platform.  ...  The activity diagram shows that the implementation of the DT simulator is possible in such simulation paradigms as discrete-event system simulation and discrete time system simulation.  ... 
doi:10.37394/23203.2021.16.10 fatcat:dlm6bh3zrfbs5pw6z7lgmargra

Co-Transformation to Cloud-Native Applications - Development Experiences and Experimental Evaluation

Josef Spillner, Yessica Bogado, Walter Benítez, Fabio López-Pires
2018 Proceedings of the 8th International Conference on Cloud Computing and Services Science  
Experimental results demonstrate that the proposed methodology is capable to effectively guide a transformation process, resulting in elastic and resilient cloud-native applications.  ...  This work thus introduces a co-transformation methodology and validates it through the migration of a prototypical music identification and royalty collection application.  ...  The thread T b reads the music of the first document d b,1 , and the amount of blocks q m of that music, previously stored in Musics table and defined by its duration, then search's for a match in the  ... 
doi:10.5220/0006790305960607 dblp:conf/closer/SpillnerBBL18 fatcat:uvpd5wqeyrcuvlhcxuwyulybfu

A Cloud-Enabled Application Framework for Simulating Regional-Scale Impacts of Natural Hazards on the Built Environment

Gregory G. Deierlein, Frank McKenna, Adam Zsarnóczay, Tracy Kijewski-Correa, Ahsan Kareem, Wael Elhaddad, Laura Lowes, Matthew J. Schoettler, Sanjay Govindjee
2020 Frontiers in Built Environment  
In this paper, the modular architecture of the computational workflow models is described and illustrated through testbed applications to evaluate regional building damage under an earthquake and a hurricane  ...  By integration of multi-fidelity and multi-resolution models to assess natural hazard impacts on buildings, infrastructure systems and other constructed facilities, the approach enables the engineering  ...  framework to facilitate the integration and sharing of models and data for comprehensive analyses of natural hazards and their effects on the built environment.  ... 
doi:10.3389/fbuil.2020.558706 fatcat:ol5nzrznpnhdbiuez6xtrxkmhi

A flexible framework for accurate simulation of cloud in-memory data stores

P. Di Sanzo, F. Quaglia, B. Ciciani, A. Pellegrini, D. Didona, P. Romano, R. Palmieri, S. Peluso
2015 Simulation modelling practice and theory  
To cope with the issue of predicting/analysing the behavior of different configurations of cloud in-memory data stores, in this article we present a flexible simulation framework offering skeleton simulation  ...  Besides its flexibility, another peculiar aspect of the framework lies in that it integrates simulation and machine-learning (black-box) techniques, the latter being used to capture the dynamics of the  ...  The adequacy of the framework, and of its model instances, in predicting the dynamics of data grid systems hosted in cloud environments is a result of the combination of the discrete event simulative approach  ... 
doi:10.1016/j.simpat.2015.05.011 fatcat:j7n7bmawmjbg7bzq32frvedkim

Supply chain disruptions and resilience: a major review and future research agenda

K. Katsaliaki, P. Galetsi, S. Kumar
2021 Annals of Operations Research  
Our review also examines the most popular modeling approaches on the topic with indicative examples and the IT tools that enhance resilience and reduce disruption risks.  ...  The content analysis of these studies synthesized existing information about the types of disruptions, their impact on supply chains, resilience methods in supply chain design and recovery strategies proposed  ...  Simulation techniques such as discrete-event simulation, system dynamics, agent-based modeling, optimization-based simulation and graph theory-based simulation have been applied to describe and model the  ... 
doi:10.1007/s10479-020-03912-1 pmid:33437110 pmcid:PMC7792559 fatcat:x2ce77z4lval7ifffhit6bhnvm

Validated 3D Spatial Stepwise Quantitative Hazard, Risk and Resilience Analysis and Management of Explosive Events in Urban Areas

Ivo Häring, Malte von Ramin, Alexander Stottmeister, Johannes Schäfer, Georg Vogelbacher, Bernd Brombacher, Mercy Pfeiffer, Elena-Maria Restayn, Katharina Ross, Johannes Schneider, Stefan Hiermaier
2018 European Journal for Security Research  
Furthermore, along the presentation a set of quality requirements regarding explosive event risk and resilience analyses are provided as collected over the years from the in-field, user group and engineering  ...  The paper shows a refined process how to systematically improve resilience when using the tool, in particular through barriers at explosive sites and at exposed sites of various geometries.  ...  The authors gratefully acknowledge early contributions to the assessment process and method foundations and validations relevant for the civil security domain, in parts also to early first text  ... 
doi:10.1007/s41125-018-0035-y fatcat:f6z3hsggmre57kqkp76vkhcp7u

The CACTOS Vision of Context-Aware Cloud Topology Optimization and Simulation

Per-Olov Ostberg, Henning Groenda, Stefan Wesner, James Byrne, Dimitrios S. Nikolopoulos, Craig Sheridan, Jakub Krzywda, Ahmed Ali-Eldin, Johan Tordsson, Erik Elmroth, Christian Stier, Klaus Krogmann (+9 others)
2014 2014 IEEE 6th International Conference on Cloud Computing Technology and Science  
ACKNOWLEDGEMENTS The authors extend their gratitude to Dr. Laura Moore of SAP Global Research and Business Incubation Belfast, Belfast, Northern Ireland for work related to this research.  ...  This work is funded by the European Union's Seventh Framework Programme under grant agreement 610711.  ...  Simulation. Discrete-event simulation techniques are used to model, simulate, and evaluate software and hardware resources in large-scale, heterogeneous data center environments.  ... 
doi:10.1109/cloudcom.2014.62 dblp:conf/cloudcom/OstbergGWBNSKATESKDHBSMPWRP14 fatcat:n3sv2ynetrbuzegh5dkbt72wne

Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications

Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Manoharan Premkumar, Lucian Mihet-Popa
2020 IEEE Access  
The individual domain of the CPPS can be modelled and simulated by continuous-time based power system simulation tools and discrete-event based cyber system simulation tools, as listed in Table 5 .  ...  It includes the hybrid data fusion of cyber and physical systems to monitor the stability of CPPS.  Analysing the impact of the integration of renewable energy systems and electric vehicles in CPPS.  ... 
doi:10.1109/access.2020.3016826 fatcat:caax2ubyyrclhj37g5ynvlm66q

Synchronization methods in parallel and distributed discrete-event simulation

Shafagh Jafer, Qi Liu, Gabriel Wainer
2013 Simulation modelling practice and theory  
This requires a precise and accurate synchronization of all the LPs in the system since data and computation distribution may result in different errors related to the concurrent processing of the simulation  ...  In discrete-event simulation, the operation of a system is represented as an ordered sequence of events, where each event occurs at an instant in time.  ...  a b s t r a c t This work attempts to provide insight into the problem of executing discrete event simulation in a distributed fashion.  ... 
doi:10.1016/j.simpat.2012.08.003 fatcat:azaynxjyingybamdj2whgo5bme

Practical Adoption of Cloud Computing in Power Systems- Drivers, Challenges, Guidance, and Real-world Use Cases [article]

Song Zhang, Amritanshu Pandey, Xiaochuan Luo, Maggy Powell, Ranjan Banerji, Lei Fan, Abhineet Parchure, Edgardo Luzcando
2022 arXiv   pre-print
It follows with the discussion of the challenges and risks of migrating power grid utility workloads to the cloud.  ...  We hope that the information in this paper will serve as helpful guidance for the development of NERC guidelines and standards relevant to cloud adoption in the industry.  ...  The authors would like to thank a group of Task Force members for providing the facts about how they use cloudbased solutions to address their specific business needs.  ... 
arXiv:2108.00303v5 fatcat:sr7n5gelfbcgdcm2l56c5ahcza

Smart Flood Resilience: Harnessing Community-Scale Big Data for Predictive Flood Risk Monitoring, Rapid Impact Assessment, and Situational Awareness [article]

Faxi Yuan, Chao Fan, Hamed Farahmand, Natalie Coleman, Amir Esmalian, Cheng-Chun Lee, Flavia I. Patrascu, Cheng Zhang, Shangjia Dong, Ali Mostafavi
2021 arXiv   pre-print
Smart resilience is the beneficial result of the collision course of the fields of data science and urban resilience to flooding.  ...  Fourth, we leverage location-based and credit card transaction data in spatial analyses to proactively evaluate the recovery of communities and the impacts of floods on businesses.  ...  The authors would also like to acknowledge INRIX, Inc. and SafeGraph for providing data.  ... 
arXiv:2111.06461v2 fatcat:2ugdb6geivdsjp5ypzkspvldey

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

2021 KSII Transactions on Internet and Information Systems  
The PKI-based PDP schemes in [8] [9] [10] [11] [12] [13] audit the data stored in a single cloud and are resilient to the exposure of the audit key.  ...  Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure.  ...  University for their advice and encouragement which were very helpful in improving the quality of this work.  ... 
doi:10.3837/tiis.2021.09.013 fatcat:2hhsolgtqzeejkrsjmkex45lbq

Fatality risk estimation for industrialized urban areas considering multi-hazard domino effects triggered by earthquakes

Francesca Celano, Matjaž Dolšek
2020 Reliability Engineering & System Safety  
These models are then coupled with the Monte Carlo method to estimate the annual probability of fatality for an individual who is continuously standing in a location of interest and to estimate fatality  ...  Thus it is considered that fatalities can be caused: a) as a direct consequence of seismic damage to a unit b) as a direct physical and/or chemical consequence due to the loss of containment of hazardous  ...  Acknowledgement This research is part of the XP-RESILIENCE project, which is funded by the European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement  ... 
doi:10.1016/j.ress.2020.107287 fatcat:bzmiweykljfxjmiatnyh5dsgxa

A Survey on Cloud Computing Simulation and Modeling

Ilyas Bambrik
2020 SN Computer Science  
Cloud Computing (CC) has attracted a massive amount of research and investment in the previous decade.  ...  Alternatively, others tools are made to provide a platform and the necessary building blocks to model any desired sub-component (application/ network model, energy consumption, scheduling and Virtual Machine  ...  MDCSim Multi-tier DC Simulation Platform [50] (MDCSim) is a commercial cloud simulator built upon CSIM [51] , which is a discrete event simulator that was made to analyse interactions between the components  ... 
doi:10.1007/s42979-020-00273-1 fatcat:buaqip6emrhyvjia67bwga6iiy

Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

Ms. Vaishnavi Moorthy
2012 IOSR Journal of Engineering  
Recently many works focus on providing data dynamics and/or public verifiability to the protocols checking the remote integrity with the help of third party verifiers. In this paper, Seb´e et al.'  ...  The proposed scheme is highly efficient and resilient against the malicious data modification attack, server clouding attacks and failure.  ...  Data owners store data in the cloud and send every share of data entries to the service providers.  ... 
doi:10.9790/3021-0203496500 fatcat:2uo277xsfrcoto5fgxkrrmukvm
« Previous Showing results 1 — 15 out of 2,988 results