Abstract: There has been renewal of interest in the relation between Green IT and cloud computing in recent years. Cloud computing has to be a highly elastic environment which provides stable services to users. The growing use of cloud computing facilities has caused marked energy consumption, putting negative pressure on electricity cost of computing center or data center. Each year more and more network devices, storages and computers are purchased and put to use, but it is not just the number of computers that is driving energy consumption upward. We could foresee that the power consumption of cloud computing facilities will double, triple, or even more in the next decade. This paper aims at resource allocation and scheduling technologies that are short of or have not well developed yet to reduce energy utilization in cloud computing platform. In particular, our approach relies on recalling services dynamically onto appropriate amount of the machines according to user’s requirement and temporarily shutting down the machines after finish in order to conserve energy. We present initial work on integration of resource and power management system that focuses on reducing power consumption such that they suffice for meeting the minimizing quality of service required by the cloud computing platform.
Abstract: This study is concerned with pH solution detection
using 2 × 4 flexible sensor array based on a plastic polyethylene
terephthalate (PET) substrate that is coated a conductive layer and a
ruthenium dioxide (RuO2) sensitive membrane with the technologies
of screen-printing and RF sputtering. For data analysis, we also
prepared a dynamic measurement system for acquiring the response
voltage and analyzing the characteristics of the working electrodes
(WEs), such as sensitivity and linearity. In this condition, an array
measurement system was designed to acquire the original signal from
sensor array, and it is based on the method of digital signal processing
(DSP). The DSP modifies the unstable acquisition data to a direct
current (DC) output using the technique of digital filter. Hence, this
sensor array can obtain a satisfactory yield, 62.5%, through the design
measurement and analysis system in our laboratory.
Abstract: The evolutionary tree is an important topic in bioinformation. In 2006, Chen and Lindsay proposed a new method to build the mixture tree from DNA sequences. Mixture tree is a new type evolutionary tree, and it has two additional information besides the information of ordinary evolutionary tree. One of the information is time parameter, and the other is the set of mutated sites. In 2008, Lin and Juan proposed an algorithm to compute the distance between two mixture trees. Their algorithm computes the distance with only considering the time parameter between two mixture trees. In this paper, we proposes a method to measure the similarity of two mixture trees with considering the set of mutated sites and develops two algorithm to compute the distance between two mixture trees. The time complexity of these two proposed algorithms are O(n2 × max{h(T1), h(T2)}) and O(n2), respectively
Abstract: Wireless Sensor Network (WSN) comprises of sensor
nodes which are designed to sense the environment, transmit sensed
data back to the base station via multi-hop routing to reconstruct
physical phenomena. Since physical phenomena exists significant
overlaps between temporal redundancy and spatial redundancy, it is
necessary to use Redundancy Suppression Algorithms (RSA) for sensor
node to lower energy consumption by reducing the transmission
of redundancy. A conventional algorithm of RSAs is threshold-based
RSA, which sets threshold to suppress redundant data. Although
many temporal and spatial RSAs are proposed, temporal-spatial RSA
are seldom to be proposed because it is difficult to determine when
to utilize temporal or spatial RSAs. In this paper, we proposed a
novel temporal-spatial redundancy suppression algorithm, Codebookbase
Redundancy Suppression Mechanism (CRSM). CRSM adopts
vector quantization to generate a codebook, which is easily used to
implement temporal-spatial RSA. CRSM not only achieves power
saving and reliability for WSN, but also provides the predictability
of network lifetime. Simulation result shows that the network lifetime
of CRSM outperforms at least 23% of that of other RSAs.
Abstract: Design for cost (DFC) is a method that reduces life
cycle cost (LCC) from the angle of designers. Multiple domain
features mapping (MDFM) methodology was given in DFC. Using
MDFM, we can use design features to estimate the LCC. From the
angle of DFC, the design features of family cars were obtained, such
as all dimensions, engine power and emission volume. At the
conceptual design stage, cars- LCC were estimated using back
propagation (BP) artificial neural networks (ANN) method and
case-based reasoning (CBR). Hamming space was used to measure the
similarity among cases in CBR method. Levenberg-Marquardt (LM)
algorithm and genetic algorithm (GA) were used in ANN. The
differences of LCC estimation model between CBR and artificial
neural networks (ANN) were provided. ANN and CBR separately
each method has its shortcomings. By combining ANN and CBR
improved results accuracy was obtained. Firstly, using ANN selected
some design features that affect LCC. Then using LCC estimation
results of ANN could raise the accuracy of LCC estimation in CBR
method. Thirdly, using ANN estimate LCC errors and correct errors in
CBR-s estimation results if the accuracy is not enough accurate.
Finally, economically family cars and sport utility vehicle (SUV) was
given as LCC estimation cases using this hybrid approach combining
ANN and CBR.
Abstract: The dynamic model of a drill in drilling process was
proposed and investigated in this study. To assure a good drilling quality, the vibration variation on the drill tips during high speed
drilling is needed to be investigated. A pre-twisted beam is used to
simulate the drill. The moving Winkler-Type elastic foundation is used to characterize the tip boundary variation in drilling. Due to the
variation of the drill depth, a time dependent dynamic model for the drill is proposed. Results simulated from this proposed model indicate that an abrupt natural frequencies drop are experienced as the drill tip
tough the workpiece, and a severe vibration is induced. The effects of parameters, e.g. drilling speed, depth, drill size and thrust force on the
drill tip responses studied.
Abstract: Single-pole switching scheme is widely used in the
Extra High Voltage system. However, the substantial negativesequence
current injected to the turbine-generators imposes the
electromagnetic (E/M) torque of double system- frequency
components during the dead time (between single-pole clearing and
line reclosing). This would induce supersynchronous resonance
(SPSR) torque amplifications on low pressure turbine generator
blades and even lead to fatigue damage. This paper proposes the
design of a mechanical filter (MF) with natural frequency close to
double-system frequency. From the simulation results, it is found that
such a filter not only successfully damps the resonant effect, but also
has the characteristics of feasibility and compact.
Abstract: In recent years there has been renewal of interest in the
relation between Green IT and Cloud Computing. The growing use of
computers in cloud platform has caused marked energy consumption,
putting negative pressure on electricity cost of cloud data center. This
paper proposes an effective mechanism to reduce energy utilization in
cloud computing environments. We present initial work on the
integration of resource and power management that aims at reducing
power consumption. Our mechanism relies on recalling virtualization
services dynamically according to user-s virtualization request and
temporarily shutting down the physical machines after finish in order
to conserve energy. Given the estimated energy consumption, this
proposed effort has the potential to positively impact power
consumption. The results from the experiment concluded that energy
indeed can be saved by powering off the idling physical machines in
cloud platforms.
Abstract: Infrared communication in the wavelength band 780-
950 nm is very suitable for short-range point-to-point communications.
It is a good choice for vehicle-to-vehicle communication in several
intelligent-transportation-system (ITS) applications such as cooperative
driving, collision warning, and pileup-crash prevention. In this
paper, with the aid of a physical model established in our previous
works, we explore the communication area of an infrared intervehicle
communication system utilizing a typical low-cost cormmercial lightemitting
diodes (LEDs) as the emitter and planar p-i-n photodiodes
as the receiver. The radiation pattern of the emitter fabricated by
aforementioned LEDs and the receiving pattern of the receiver are
approximated by a linear combination of cosinen functions. This
approximation helps us analyze the system performance easily. Both
multilane straight-road conditions and curved-road conditions with
various radius of curvature are taken into account. The condition of
a small car communicating with a big truck, i.e., there is a vertical
mounting height difference between the emitter and the receiver, is
also considered. Our results show that the performance of the system
meets the requirement of aforementioned ITS applications in terms
of the communication area.
Abstract: Security is an interesting and significance issue for
popular virtual platforms, such as virtualization cluster and cloud
platforms. Virtualization is the powerful technology for cloud
computing services, there are a lot of benefits by using virtual machine
tools which be called hypervisors, such as it can quickly deploy all
kinds of virtual Operating Systems in single platform, able to control
all virtual system resources effectively, cost down for system platform
deployment, ability of customization, high elasticity and high
reliability. However, some important security problems need to take
care and resolved in virtual platforms that include terrible viruses, evil
programs, illegal operations and intrusion behavior. In this paper, we
present useful Intrusion Detection Mechanism (IDM) software that not
only can auto to analyze all system-s operations with the accounting
journal database, but also is able to monitor the system-s state for
virtual platforms.
Abstract: The rapid improvement of the microprocessor and network has made it possible for the PC cluster to compete with conventional supercomputers. Lots of high throughput type of applications can be satisfied by using the current desktop PCs, especially for those in PC classrooms, and leave the supercomputers for the demands from large scale high performance parallel computations. This paper presents our development on enabling an automated deployment mechanism for cluster computing to utilize the computing power of PCs such as reside in PC classroom. After well deployment, these PCs can be transformed into a pre-configured cluster computing resource immediately without touching the existing education/training environment installed on these PCs. Thus, the training activities will not be affected by this additional activity to harvest idle computing cycles. The time and manpower required to build and manage a computing platform in geographically distributed PC classrooms also can be reduced by this development.
Abstract: This paper proposes a new approach to offer a private
cloud service in HPC clusters. In particular, our approach relies on
automatically scheduling users- customized environment request as a
normal job in batch system. After finishing virtualization request jobs,
those guest operating systems will dismiss so that compute nodes will
be released again for computing. We present initial work on the
innovative integration of HPC batch system and virtualization tools
that aims at coexistence such that they suffice for meeting the
minimizing interference required by a traditional HPC cluster. Given
the design of initial infrastructure, the proposed effort has the potential
to positively impact on synergy model. The results from the
experiment concluded that goal for provisioning customized cluster
environment indeed can be fulfilled by using virtual machines, and
efficiency can be improved with proper setup and arrangements.