-
Accelerated Design and Deployment of Low-Carbon Concrete for Data Centers
Authors:
Xiou Ge,
Richard T. Goodwin,
Haizi Yu,
Pablo Romero,
Omar Abdelrahman,
Amruta Sudhalkar,
Julius Kusuma,
Ryan Cialdella,
Nishant Garg,
Lav R. Varshney
Abstract:
Concrete is the most widely used engineered material in the world with more than 10 billion tons produced annually. Unfortunately, with that scale comes a significant burden in terms of energy, water, and release of greenhouse gases and other pollutants; indeed 8% of worldwide carbon emissions are attributed to the production of cement, a key ingredient in concrete. As such, there is interest in c…
▽ More
Concrete is the most widely used engineered material in the world with more than 10 billion tons produced annually. Unfortunately, with that scale comes a significant burden in terms of energy, water, and release of greenhouse gases and other pollutants; indeed 8% of worldwide carbon emissions are attributed to the production of cement, a key ingredient in concrete. As such, there is interest in creating concrete formulas that minimize this environmental burden, while satisfying engineering performance requirements including compressive strength. Specifically for computing, concrete is a major ingredient in the construction of data centers.
In this work, we use conditional variational autoencoders (CVAEs), a type of semi-supervised generative artificial intelligence (AI) model, to discover concrete formulas with desired properties. Our model is trained just using a small open dataset from the UCI Machine Learning Repository joined with environmental impact data from standard lifecycle analysis. Computational predictions demonstrate CVAEs can design concrete formulas with much lower carbon requirements than existing formulations while meeting design requirements. Next we report laboratory-based compressive strength experiments for five AI-generated formulations, which demonstrate that the formulations exceed design requirements. The resulting formulations were then used by Ozinga Ready Mix -- a concrete supplier -- to generate field-ready concrete formulations, based on local conditions and their expertise in concrete design. Finally, we report on how these formulations were used in the construction of buildings and structures in a Meta data center in DeKalb, IL, USA. Results from field experiments as part of this real-world deployment corroborate the efficacy of AI-generated low-carbon concrete mixes.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
Storms in Mobile Networks
Authors:
Gokce Gorbil,
Omer H. Abdelrahman,
Mihajlo Pavloski,
Erol Gelenbe
Abstract:
Mobile networks are vulnerable to signalling attacks and storms that are caused by traffic patterns that overload the control plane, and differ from distributed denial of service (DDoS) attacks in the Internet since they directly attack the control plane, and also reserve wireless bandwidth without actually using it. Such attacks can result from malware and mobile botnets, as well as from poorly d…
▽ More
Mobile networks are vulnerable to signalling attacks and storms that are caused by traffic patterns that overload the control plane, and differ from distributed denial of service (DDoS) attacks in the Internet since they directly attack the control plane, and also reserve wireless bandwidth without actually using it. Such attacks can result from malware and mobile botnets, as well as from poorly designed applications, and can cause service outages in 3G and 4G networks which have been experienced by mobile operators. Since the radio resource control (RRC) protocol in 3G and 4G networks is particularly susceptible to such attacks, we analyze their effect with a mathematical model that helps to predict the congestion that is caused by an attack. A detailed simulation model of a mobile network is used to better understand the temporal dynamics of user behavior and signalling in the network and to show how RRC based signalling attacks and storms cause significant problems in the control plane and the user plane of the network. Our analysis also serves to identify how storms can be detected, and to propose how system parameters can be chosen to mitigate their effect.
△ Less
Submitted 5 November, 2014;
originally announced November 2014.
-
Search in the Universe of Big Networks and Data
Authors:
Erol Gelenbe,
Omer H. Abdelrahman
Abstract:
Searching in the Internet for some object characterised by its attributes in the form of data, such as a hotel in a certain city whose price is less than something, is one of our most common activities when we access the Web. We discuss this problem in a general setting, and compute the average amount of time and the energy it takes to find an object in an infinitely large search space. We conside…
▽ More
Searching in the Internet for some object characterised by its attributes in the form of data, such as a hotel in a certain city whose price is less than something, is one of our most common activities when we access the Web. We discuss this problem in a general setting, and compute the average amount of time and the energy it takes to find an object in an infinitely large search space. We consider the use of N search agents which act concurrently. Both the case where the search agent knows which way it needs to go to find the object, and the case where the search agent is perfectly ignorant and may even head away from the object being sought. We show that under mild conditions regarding the randomness of the search and the use of a time-out, the search agent will always find the object despite the fact that the search space is infinite. We obtain a formula for the average search time and the average energy expended by N search agents acting concurrently and independently of each other. We see that the time-out itself can be used to minimise the search time and the amount of energy that is consumed to find an object. An approximate formula is derived for the number of search agents that can help us guarantee that an object is found in a given time, and we discuss how the competition between search agents and other agents that try to hide the data object, can be used by opposing parties to guarantee their own success.
△ Less
Submitted 12 May, 2014;
originally announced May 2014.
-
Signalling Storms in 3G Mobile Networks
Authors:
Omer H. Abdelrahman,
Erol Gelenbe
Abstract:
We review the characteristics of signalling storms that have been caused by certain common apps and recently observed in cellular networks, leading to system outages. We then develop a mathematical model of a mobile user's signalling behaviour which focuses on the potential of causing such storms, and represent it by a large Markov chain. The analysis of this model allows us to determine the key p…
▽ More
We review the characteristics of signalling storms that have been caused by certain common apps and recently observed in cellular networks, leading to system outages. We then develop a mathematical model of a mobile user's signalling behaviour which focuses on the potential of causing such storms, and represent it by a large Markov chain. The analysis of this model allows us to determine the key parameters of mobile user device behaviour that can lead to signalling storms. We then identify the parameter values that will lead to worst case load for the network itself in the presence of such storms. This leads to explicit results regarding the manner in which individual mobile behaviour can cause overload conditions on the network and its signalling servers, and provides insight into how this may be avoided.
△ Less
Submitted 12 May, 2014;
originally announced May 2014.
-
Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach
Authors:
Omer H. Abdelrahman,
Erol Gelenbe,
Gökçe Görbil,
Boris Oklander
Abstract:
Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper we present our research vision that aims to develop a network-based security solution combining analytical modelling, simulation and learning, together with billing and control-plane data, to detect anomalies and attacks, and elimina…
▽ More
Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper we present our research vision that aims to develop a network-based security solution combining analytical modelling, simulation and learning, together with billing and control-plane data, to detect anomalies and attacks, and eliminate or mitigate their effects, as part of the EU FP7 NEMESYS project. These ideas are supplemented with a careful review of the state-of-the-art regarding anomaly detection techniques that mobile network operators may use to protect their infrastructure and secure users against malware.
△ Less
Submitted 17 May, 2013;
originally announced May 2013.
-
Search in Random Media with Lévy Flights
Authors:
Erol Gelenbe,
Omer H. Abdelrahman
Abstract:
We review some of our work regarding search which has been motivated by a variety of applications in engineering and technology, including traffic routing and security in communication networks, explosive mine detection and removal, tactical operations as well as emergency management. We develop the basic mathematical model representing N searchers that proceed independently, and which can be affe…
▽ More
We review some of our work regarding search which has been motivated by a variety of applications in engineering and technology, including traffic routing and security in communication networks, explosive mine detection and removal, tactical operations as well as emergency management. We develop the basic mathematical model representing N searchers that proceed independently, and which can be affected by destruction or loss, and time-outs. An approach based on Laplace transform is then developed for the case where the success of the search requires that k out of the N searchers be successful, and we estimate the amount of energy expended and the number of searchers that are required to conduct a successful search in time B, provided B is large. Finally, we present an iterative numerical solution approach that allows us to analyse the search time and the energy needed to find an object when the search space is non-homogeneous.
△ Less
Submitted 15 July, 2013; v1 submitted 15 May, 2013;
originally announced May 2013.