We attempt to solve in this research a problem of efficiency and, at the same time, the reduction of the operating costs when creating complex banking IT systems. We propose an approach based on micro-service architec...
详细信息
ISBN:
(纸本)9783030290351;9783030290344
We attempt to solve in this research a problem of efficiency and, at the same time, the reduction of the operating costs when creating complex banking IT systems. We propose an approach based on micro-service architecture. the article describes functionalities as well as methods and algorithms used during model development. the work emphasizes the importance of the methodically chosen system architecture to properly implement the user requirements and meet their expectations related to independence of scaling, ease of maintenance, and the reduced mutual blockages of websites.
In this paper, a novel architecture for a streaming intrusion detection system for Grid computing environments is presented. Detection mechanisms based on traditional log-files or single host databases are replaced by...
详细信息
ISBN:
(纸本)9781424446001
In this paper, a novel architecture for a streaming intrusion detection system for Grid computing environments is presented. Detection mechanisms based on traditional log-files or single host databases are replaced by a streaming database approach. the streaming architecture allows processing of temporal attack data across multiple sites and offers the potential for performance benefits in large scale systems, since data is processed during its natural flow and only stored as long as necessary for analysis. Two cross-site example attacks in a Grid environment and the streaming detection logic for these attacks are presented to illustrate the approach. Experimental results of a prototypical implementation are presented.
While developing the control system process in which robot performing various operations it is essential observance of many limitations. Currently, there are technological capabilities to take into account many factor...
详细信息
While developing the control system process in which robot performing various operations it is essential observance of many limitations. Currently, there are technological capabilities to take into account many factors in the estimating of the large amount of calculations associated withthe existing of factors and constraints. It is known that there are many factors occur at random during the execution of operations. To solve the explicit and implicit factors it is necessary to improve the architecture of existing system. In this paper we analysis previously developed MAS, focusing on its architecture and its agents. As the result of analysis there found main indicators of MAS in terms of their structures, actions, parameters, type, number and purpose. Described the agent forming procedure, where it is carries out movements in a predetermined pattern. During the execution of tasks agent is in an environment, where it is meet different obstacles in form, type and level of complexity. Also we considered several obstacles avoidance algorithms. Presented architecture of the agents will be used in the multi-agent based pest control systems, which will be used in agriculture. (C) 2015 the Authors. Published by Elsevier B.V
Service Oriented architecture (SOA) is an architectural style for developing and integrating enterprise applications to enable an enterprise to deliver self-describing and platform independent business functionality. ...
详细信息
ISBN:
(纸本)9780982148907
Service Oriented architecture (SOA) is an architectural style for developing and integrating enterprise applications to enable an enterprise to deliver self-describing and platform independent business functionality. Grid computing (GC) is a framework that allows pooling of physical resources to enable virtualisation of distributed computing, enterprise data and enterprise functionality. the two are synergetic in the sense that, whereas SOA can provide a strong basis for GC. technical framework based on GC provides the optimum foundation for SOA. this paper discusses the two paradigms and provides some useful information for the benefit of large enterprises that wish to embark on the development and implementation of SOA based on Grid computing.
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. the paper sugg...
详细信息
ISBN:
(纸本)9781424451319
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. the paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. the openness of a true pervasive environment has been encountered withthe interaction history and recommendations. the architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. the nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but withthe minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
the evolution of emerging Volunteer computingsystems is placing an ever greater emphasis on the use of a loosely coupled decentralized architecture, mainly to address concerns of scalability and robustness. We propos...
详细信息
ISBN:
(纸本)9781424452910
the evolution of emerging Volunteer computingsystems is placing an ever greater emphasis on the use of a loosely coupled decentralized architecture, mainly to address concerns of scalability and robustness. We propose to build the next generation Volunteer computingsystems on top of well studied Peer-to-Peer techniques to fully take advantage of its decentralized characteristic and its very large, shared data storage capacity. this paper sketches the design of such a completely decentralized and fault tolerant Volunteer computing system by using a Peer-to-Peer based Tuple Space formed by volunteer peers. Both simulation and software prototype evaluation results show support for the proposed design even when all peers are having a high churn rate of Mean Time Before Failure of 2 hours.
In this paper we discuss a general approach and architecture for design of distributed cyber-physical systems in order to make them resilient to communication faults. In this approach, each node exploits physical conn...
详细信息
Recently, there has been an increased reliance on computingsystems supported by a multi-tier architecture. In multi-tier computingsystems, it is important to appropriately manage resource allocation to ensure fairne...
详细信息
ISBN:
(纸本)9781424427284
Recently, there has been an increased reliance on computingsystems supported by a multi-tier architecture. In multi-tier computingsystems, it is important to appropriately manage resource allocation to ensure fairness of a QoS (Quality of Service) level avoiding overload conditions in tiers. this paper proposes an adaptive resource management algorithm for multi-tier computingsystems in order that all clients have the same QoS level. We introduce a computingarchitecture which consists of multiple tiers, a group of resource managers, and an arbiter. Each tier is specialized to execute each subtask of clients and hosts virtual machines on its server pool. Each resource manager handles resource allocation of each client and updates the resources by locally exchanging a QoS level of its client with some other resource managers. then, the resource managers request the resources to the arbiter. the arbiter compensates the requested resources to avoid overload conditions in tiers. Based on the compensation by the arbiter, each resource manager reallocates the resources to the subtasks of its client. We show sufficient conditions for the proposed resource management algorithm to achieve a fair QoS level avoiding overload conditions in all tiers at each time.
Mobile computing has experienced a rapid growth and there are nowadays many applications being developed. According to the literature, many of these applications are designed for collaborative work or learning and sha...
详细信息
ISBN:
(纸本)9781424435340
Mobile computing has experienced a rapid growth and there are nowadays many applications being developed. According to the literature, many of these applications are designed for collaborative work or learning and share the same requirements: they implement a peer-to-peer communication architecture, there are subgroups inside the group of participants which have to work together and coordinate withthe rest of the groups and they need to implement a proper human-computer interaction paradigm since they have a reduced area to interact withthe application's interface. It is then quite natural to think about the development of a framework supporting this kind of applications. In this paper we present such a framework and an example of its application.
Multicore processors get more and more popular, even in embedded systems. Due to the deeply integrated threading concept, Java is a perfect choice to deal withthe necessary thread-level parallelism required for the p...
详细信息
ISBN:
(纸本)9783642004537
Multicore processors get more and more popular, even in embedded systems. Due to the deeply integrated threading concept, Java is a perfect choice to deal withthe necessary thread-level parallelism required for the performance potential of a multicore. Accordingly, the software developers are familiar withthe threading concept, which means that single core applications already fit very well on a multicore processor and are able to utilize its advantage. Nevertheless, a drawback of Java has to be mentioned: the required garbage collection. Especially in multicore environments the most often used stop-the-world collectors reach their limits because all cores have to be suspended at the time a single thread requires a garbage collection cycle. Hence, the performance of the other cores is harmed tremendously. In this paper we present a garbage collection technique that runs in parallel to the application threads within a multithreaded multicore without any stop-the-world behavior.
暂无评论