Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Time Series Models For Predicting Application Gpu Utilization And Power Draw Based On Trace Data, Dorothy Xiaoshuang Parry
Time Series Models For Predicting Application Gpu Utilization And Power Draw Based On Trace Data, Dorothy Xiaoshuang Parry
Electrical & Computer Engineering Theses & Dissertations
This work explores collecting performance metrics and leveraging various statistical and machine learning time series predictive models on a memory-intensive application, Inception v3. Trace data collected using nvidia-smi measured GPU utilization and power draw for two runs of Inception3. Experimental results from the statistical and machine learning-based time series predictive algorithms showed that the predictions from statistical-based models were unable to capture the complex changes in the trace data. The Probabilistic TNN model provided the best results for the power draw trace, according to the test evaluation metrics. For the GPU utilization trace, the RNN models produced the most accurate …
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Electrical & Computer Engineering Theses & Dissertations
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …