This IoT is the smart connection between things and devices for the betterment of economic growth and sustainable development. cloudcomputing is the evolution of parallel processing, parallelcomputing, matrix comput...
详细信息
The Internet of Things (IoT) has enabled the development of the real-time edge computing institute for distributedcloud networks. This technology makes it possible for devices connected to the cloud to process eleven...
详细信息
distributed data center architectures have been recently developed for a more efficient and economical storage of data. In many models of distributed storage, the aim is to store the data in such a way so that the sto...
详细信息
ISBN:
(纸本)9781479905683
distributed data center architectures have been recently developed for a more efficient and economical storage of data. In many models of distributed storage, the aim is to store the data in such a way so that the storage costs are minimized and increased redundancy requirements are maintained. However, many approaches do not fully consider issues relating to delivering the data to the end user and the associated costs that this creates. We present an integer programming optimization model for determining the optimal allocation of data components among a network of cloud data servers in such a way that the total costs of additional storage, estimated data retrieval costs and network delay penalties is minimized. The method is suitable for periodic dynamic reconfiguration of the cloud data servers, so that the when localized data request spikes occur the data can be moved to a closer or cheaper data server for cost reduction and increased efficiency.
Dyana is a molecular biology code used in the study of infectious prion proteins. Like many, other scientific codes, Dyana was migrated successfully from vector supercomputers to some more cost-effective cluster of co...
详细信息
ISBN:
(纸本)0769515827
Dyana is a molecular biology code used in the study of infectious prion proteins. Like many, other scientific codes, Dyana was migrated successfully from vector supercomputers to some more cost-effective cluster of commodity PCs. A further migration to a widely distributedgridcomputing platform looks very tempting because many of these platforms promise the use of nearly free compute-cycles on the Internet. Not all codes are equally suited for all platforms. Even embarrassingly parallel codes might require a significant re-engineering effort for a migration from one platform to another A better understanding of the performance characteristics of a code is required before a migration is attempted. To address this problem, we present a systematic method to study the viability of a code migration from one platform to another, before it is actually undertaken. We construct an analytic performance model of the application. We use the previous migration from SMPs to commodity clusters of PCs to validate and calibrate the model. Finally, we extrapolate the performance of Dyana widely distributedcomputing on the grid and we suggest optimizations in the process of migration. Our general model predicts that Dyana can efficiently use up to 42000 processors with its current workload and is therefore well suited for gridcomputing on the Internet.
Massive amount of genomics data are being produced nowadays by Next Generation Sequencing machines. The suffix array is currently the best choice for indexing genomics data, because of its efficiency and large number ...
详细信息
ISBN:
(纸本)9781479947997
Massive amount of genomics data are being produced nowadays by Next Generation Sequencing machines. The suffix array is currently the best choice for indexing genomics data, because of its efficiency and large number of applications. In this paper, we address the problem of constructing the suffix array on computer cluster in the cloud. We present a solution that automates the establishment of a computer cluster in a cloud and automatically constructs the suffix array in a distributed fashion over the cluster nodes. This has the advantage of encapsulating all set-up details and execution of the algorithm. The distributed nature of the algorithm we use overcomes the problem that arises when the user wishes, due to cost issues, to use low memory machines in the cloud. Our experiments show that our implementation scales well with the increasing number of processors. The cloud cost is affordable and it provides a cost effective solution.
Searching data efficiently in distributed applications like peer-to-peer system is a challenging task due to the random distribution of data among several participating nodes. Efficient data structures are designed an...
详细信息
ISBN:
(纸本)9781467329255;9781467329224
Searching data efficiently in distributed applications like peer-to-peer system is a challenging task due to the random distribution of data among several participating nodes. Efficient data structures are designed and implemented to reduce the complexity of data searching in such an environment. In this paper a data structure called deterministic 1-2. skip list has been proposed as a solution for search problems In distributed environment. The data structure has three main operations viz. search, insert, and delete. The detailed description of the insertion, deletion and search operations are given in this paper. It is found that the message complexity of the insertion, deletion and search algorithm is O(logn) where n is the total number of nodes in the skip-list.
distributedcomputing is a form of computing in which a group of independent systems are connected to a computer network. cloudcomputing is one of the emerging domain in the field of Computer Science. With the help o...
详细信息
cloudcomputing is ubiquitous and very recent trend in computer technology. Everyday inventions carried out in cloudcomputing. cloudcomputing is developed to overcome and solve the traditional computer system proble...
详细信息
An intrusion detection system has the ability to detect known as well as unknown attacks. Conventionally, IDS uses association rules and simple partitioning scheme to handle quantitative data. Fuzzy partitioning schem...
详细信息
ISBN:
(纸本)9781467329255;9781467329224
An intrusion detection system has the ability to detect known as well as unknown attacks. Conventionally, IDS uses association rules and simple partitioning scheme to handle quantitative data. Fuzzy partitioning scheme found to overcome the problem of vagueness of boundary and association rules are also replaced with fuzzy class association rules. Evolutionary algorithms do global search in order to discover new interesting classification rules. GNP is found better than other evolutionary algorithms due to its structure. This paper describes how evolutionary computing technologies are better to build a classifier with minimum number of class association rules and maximizing accuracy of classified patterns in intrusion detection problem.
cloud is an inflection point for customers to transit the burden of infrastructure and platform management to a service provider. There is virtual centralization in cloudcomputing. This paper provides the state of th...
详细信息
暂无评论