Cloud data centers, comprising a diverse set of heterogeneous resources working collaboratively to achieve high-performance computing, face the challenge of resource dynamism, where performance fluctuates over time. T...
详细信息
Nowadays, increasing use of Internet connection, security becomes a huge challenge for individuals as well as governments and organizations. Therefore, in the last decade, the world is moving towards green computing i...
详细信息
Cloud data centers, comprising a diverse set of heterogeneous resources working collaboratively to achieve high-performance computing, face the challenge of resource dynamism, where performance fluctuates over time. T...
Cloud data centers, comprising a diverse set of heterogeneous resources working collaboratively to achieve high-performance computing, face the challenge of resource dynamism, where performance fluctuates over time. This dynamism poses complexities in task scheduling, warranting further research on the resilience of existing static task scheduling algorithms when deployed in dynamic cloud environments. This study adapts three well-known task scheduling algorithms to the cloud computing context and conducts a comprehensive comparison to assess their resilience to dynamic conditions. The evaluation, employing simulation techniques, analyzes total energy consumption and total response time as key metrics. The results offer detailed insights into the effectiveness of the adapted algorithms, providing valuable guidance for optimizing task scheduling in dynamic cloud data centers.
The independent task scheduling problem in distributed computing environments with makespan optimization as an objective is an NP-Hard problem. Consequently, an important number of approaches looking to approximate th...
详细信息
Data mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The purpose of this study is to compare these two tools in ter...
详细信息
Data mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The purpose of this study is to compare these two tools in ter...
详细信息
ISBN:
(纸本)9781665478250
Data mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The purpose of this study is to compare these two tools in terms of detection accuracy and computation time. This comparison was conducted using a well-known NSL-KDD dataset. Experiments show that TANAGRA achieves better results than WEKA in detection accuracy. But, TANAGRA is competitive with WEKA in terms of computation time.
The features used in many image analysis-based applications are frequently of very high dimension. Feature extraction offers several advantages in high-dimensional cases, and many recent studies have used multi-task f...
详细信息
暂无评论