2018
DOI: 10.1007/978-3-030-05807-4_25
|View full text |Cite
|
Sign up to set email alerts
|

Orlando Tools: Energy Research Application Development Through Convergence of Grid and Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 18 publications
0
10
0
1
Order By: Relevance
“…Taking into account the previously obtained 61 critical objects and 630 pairs of critical combinations, calculations were carried out for pairwise shutdown of all other objects of the calculation scheme, followed by a "breakdown" of bottlenecks -measures aimed at minimizing the gas shortage among consumers. These calculations were carried out using the software package [27] detailing the functioning of the gas transmission network of Russia and allowing simulating various operating conditions of its facilities, including complete shutdown. The calculations were carried out using the parallel computing methodology at [28].…”
Section: Identification Of the Most Important Combinations Of Gas Indmentioning
confidence: 99%
“…Taking into account the previously obtained 61 critical objects and 630 pairs of critical combinations, calculations were carried out for pairwise shutdown of all other objects of the calculation scheme, followed by a "breakdown" of bottlenecks -measures aimed at minimizing the gas shortage among consumers. These calculations were carried out using the software package [27] detailing the functioning of the gas transmission network of Russia and allowing simulating various operating conditions of its facilities, including complete shutdown. The calculations were carried out using the parallel computing methodology at [28].…”
Section: Identification Of the Most Important Combinations Of Gas Indmentioning
confidence: 99%
“…The IIES vulnerability analysis can be performed using different computing systems (personal computer, server, cluster, grid, or cloud) for a relatively acceptable time (hours, days), the duration of which is determined by the characteristics of the used computing resources. Integration of the listed systems into a single environment provides both the flexibility in choosing the necessary configuration of the computational infrastructure and speed in implementing experiments of various scales [17]. We use a modular approach when developing applications that operate in such an environment [14].…”
Section: Subject-oriented Environmentmentioning
confidence: 99%
“…The engineering-based approach [17] suitable for vulnerability analysis of IIES was developed on the base of [19] and provides one unified way of modeling systems to represent critical infrastructures of different types. It is oriented to use resources of public access computer center "Irkutsk Supercomputer Center of SB RAS [24].…”
Section: The Engineering-based Framework Suitable For Vulnerabilmentioning
confidence: 99%
“…where the set of feasible decisions The solving the lookahead model in (20) is not an optimal policy but it helps obtain robust behaviour by tuning  using the base model. The approach was implemented using the continuous integration methodology in the Orlando Tools framework [54]. The methodology and framework made it possible to organize a single workflow of developing and testing of the distributed application for solving the above-formulated problem.…”
Section: The Base Modelmentioning
confidence: 99%