Many cloud computing platforms adopt virtualization technology to provide cloud services. To achieve high computing performance, many data parallel frameworks are adopted to run the jobs. The job is broken into pieces...
详细信息
ISBN:
(纸本)9781479920303
Many cloud computing platforms adopt virtualization technology to provide cloud services. To achieve high computing performance, many data parallel frameworks are adopted to run the jobs. The job is broken into pieces and farmed out to virtual machines (VMs) to process in parallel. The responses from these VMs are aggregated to produce the final result with concurrent flows. However, the concurrent flows adjust congestion window in an isolated manner, there will be large variance among the transmission time of each flow. It will have negative impact on the cloud application performance since the slowest flow determines the total completion time of concurrent flows. To facilitate resource utilization and VM management, these VMs usually reside in the same physical host which offers the native infrastructure for concurrent flows' integrated management. Therefore, we propose a Congestion Integrated Control (CIC) scheme which offloads each flow's independent congestion control module and sets up an integrated control platform to perform the congestion control for concurrent flows in a unified manner. The CIC scheme is implemented on the Xen platform. The performance evaluation indicates that the large variance among transmission time of each flow is substantially reduced and total completion time of concurrent flows is decreased correspondingly.
In this paper, we present an intelligent, reliable and storage-efficient video surveillance system using Apache Storm and OpenCV. As a Storm topology, we have added multiple information extraction modules that only wr...
详细信息
ISBN:
(纸本)9781509020287
In this paper, we present an intelligent, reliable and storage-efficient video surveillance system using Apache Storm and OpenCV. As a Storm topology, we have added multiple information extraction modules that only write important content to the disk. Our topology is extensible, capable of adding novel algorithms as per the use case without affecting the existing ones, since all the processing is independent of each other. This framework is also highly scalable and fault tolerant, which makes it a best option for organisations that need to monitor a large network of surveillance cameras.
As more and more software applications are migrating from local desktops to remote data centers, efficient data centers management is becoming increasingly important. The management of data centers has been facing a k...
详细信息
Cloud computing technology is considered to be the top most strategic technology in today's world. This is the result made in the advancement in storage technology towards cloud computing. The world of cloud compu...
详细信息
ISBN:
(纸本)9781467397452
Cloud computing technology is considered to be the top most strategic technology in today's world. This is the result made in the advancement in storage technology towards cloud computing. The world of cloud computing has become more and more advanced in the recent years. It has become more and more popular and powerful in gaining everyone's attention in the field axdbhof research and business as well. Advanced cryptographic techniques are proposed for performing security much stronger way. Therefore, people from different field especially for business in companies are relying on cloud storage. Auditability is considered as an important factor for securing the cloud environment to overcome the hacking issue. Data auditability has been designed for storing the cloud data. This paper discusses various data security algorithms for public cloud computing area.
Agriculture is an important sector for Indonesia. Indonesia as an agrarian country, most of the society work as a farmer. In modern agriculture / modern farming, communication and information technology plays importan...
详细信息
ISBN:
(纸本)9781509016488
Agriculture is an important sector for Indonesia. Indonesia as an agrarian country, most of the society work as a farmer. In modern agriculture / modern farming, communication and information technology plays important role to increase farmer's productivity. Thus, an Integrated Agriculture Information System (IAIS) is urgent to be developed in Indonesia. As a complex system, IAIS needs a blueprint which is going to be a reference to develop system gradually and sustainable. An approach to develop system blueprint is Enterprise Architecture (EA) using The Open Group Architecture Framework (TOGAF). In TOGAF, there are some activities which have to be done gradually. This paper discusses two early activities to develop IAIS blueprint, Preliminary Phase and Architecture Vision Phase.
Sybil attack is an encounter in which the personality of a assaulter is contaminated into huge number of incognito personality which is produced to build up the route of the network. In this paper, we deliberate the t...
详细信息
ISBN:
(纸本)9781509052561
Sybil attack is an encounter in which the personality of a assaulter is contaminated into huge number of incognito personality which is produced to build up the route of the network. In this paper, we deliberate the timestamp approach for Sybil attack in associated system, self correlate network, and cordial network system. Also assorted mechanisms to extenuate the Sybil attack are evaluated, we have proposed timestamp approach for prevention and detection of Sybil attack. We have compared our result with EBRS Approach our approach shows better results as compared to previous approach.
The distributed computing system is a hot research field. Deep learning, the Internet of Things, and other technologies are rapidly advancing, necessitating better levels of computation, storage, and communication eff...
详细信息
Computer vision has many applications that were implemented to the existing advance technology. Vehicle tracking and counting in video surveillance is one of them. Vehicle tracking allow the computer to detect and tra...
详细信息
ISBN:
(纸本)9781509016488
Computer vision has many applications that were implemented to the existing advance technology. Vehicle tracking and counting in video surveillance is one of them. Vehicle tracking allow the computer to detect and tracking the vehicles that capture through the video surveillance. Afterwards vehicle counting allow to the computer to count all of the vehicles on video. Background Subtraction is one of the method to perform object tracking and counting process for the system. This research implements Pixel Based Adaptive Segmenter Model for Background Subtraction method to perform object tracking and counting. This research used video capture of visual surveillance and vehicles as object to track and count. Result of this research is the system can track and count all vehicles on videos.
Today's competitive environment pushes technology into changing quickly, hence triggering organizations to be ready for such changes. Cloud computing is one of the popular evolving information technologies that se...
详细信息
ISBN:
(纸本)9781509032310
Today's competitive environment pushes technology into changing quickly, hence triggering organizations to be ready for such changes. Cloud computing is one of the popular evolving information technologies that seems to affect organizations in different ways, and on different levels. The academic as well as the professional literature focused on identifying the several promoters and inhibitors for adopting cloud solutions. However, the related work does not clearly identify how adopting such solutions affects the organization's IT governance, where implementing effective IT governance is required in order to survive in a competitive market. Therefore, the aim of this research paper is to study the effect of cloud solutions on organizations' IT governance. We first built this paper through an exhaustive literature review describing the various cloud computing promoters and inhibitors, along with the organizational transformations cited by several researchers. Then, in order to validate these transformations and the effects brought by the cloud, we conducted a set of twenty interviews with professionals (CIOs, CEOs, and project managers) from large organizations in France. Our findings endorse the most common elements found in the literature regarding the important considerations when adopting the cloud (security, reversibility, interoperability, etc.) New findings have also been highlighted in our data analysis;cloud computing seems to affect the technological and strategical aspects of IT governance, as well as the business transformation.
The result of training parameters described Adaptive Neuro-Fuzzy Inference System (ANFIS) performance. The speed and reliability of training effect depend on the training mechanism. There have been many methods used t...
详细信息
ISBN:
(纸本)9781509016488
The result of training parameters described Adaptive Neuro-Fuzzy Inference System (ANFIS) performance. The speed and reliability of training effect depend on the training mechanism. There have been many methods used to train the parameters of ANFIS as using GD, metaheuristic techniques, and LSE. But there are still many methods developed to achieve efficiently. One of the proposed algorithm to improve the performance of ANFIS is Chicken swarm optimization (CSO) algorithm. The experimental results of training ANFIS network for classification problems show that ANFIS-CSO algorithm achieved better accuracy.
暂无评论