Application of Fuzzy Logic for Problems of Evaluating States of a Computing System
The monitoring utilization and workloads of computer hardware components, such as CPU, RAM, bus, and storage, are an ideal way to evaluate the effectiveness of these components. In this paper, we surveyed the basic concepts, characteristics, and parameters of computer systems that determine system p...
Gespeichert in:
Veröffentlicht in: | Applied sciences 2019, Vol.9 (15), p.3021 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The monitoring utilization and workloads of computer hardware components, such as CPU, RAM, bus, and storage, are an ideal way to evaluate the effectiveness of these components. In this paper, we surveyed the basic concepts, characteristics, and parameters of computer systems that determine system performance, and the types of models that provide adequate modeling of these systems. We investigated and developed the applied aspects of the theory of fuzzy sets’ principles and the Matlab environment tools for monitoring and evaluating the state of computing systems. The idea of the paper is to identify the state of the computer infrastructure by using the models of Mamdani and Sugeno FIS (fuzzy inference system) to evaluate the impact of RAM and storage on CPU performance. With this approach, we observed the behavior of computer infrastructure. The results are useful for understanding performance issues with regard to specific bottlenecks and determining the correlation of performance counters. Moreover, the model presents linguistic results. Hereafter, performance counter correlations will support the development of algorithms that can detect whether the performance of a given computer will be affected by a reasonable priority. The performance assertions derived from these approaches allow resource management policies to prevent performance degradation, and as a result, the infrastructure will be able to serve safely as expected. These methods can be applied across the entire spectrum of computer systems, from personal computers to large mainframes and supercomputers, including both centralized and distributed systems. We look forward to their continued use, as well as their improvement when it is necessary to evaluate future systems. |
---|---|
ISSN: | 2076-3417 2076-3417 |
DOI: | 10.3390/app9153021 |