Parallel Matrix Multiplication for Business Applications

Author(s):  
Mais Haj Qasem ◽  
Mohammad Qatawneh
Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


Author(s):  
Yaniv Aspis ◽  
Krysia Broda ◽  
Alessandra Russo ◽  
Jorge Lobo

We introduce a novel approach for the computation of stable and supported models of normal logic programs in continuous vector spaces by a gradient-based search method. Specifically, the application of the immediate consequence operator of a program reduct can be computed in a vector space. To do this, Herbrand interpretations of a propositional program are embedded as 0-1 vectors in $\mathbb{R}^N$ and program reducts are represented as matrices in $\mathbb{R}^{N \times N}$. Using these representations we prove that the underlying semantics of a normal logic program is captured through matrix multiplication and a differentiable operation. As supported and stable models of a normal logic program can now be seen as fixed points in a continuous space, non-monotonic deduction can be performed using an optimisation process such as Newton's method. We report the results of several experiments using synthetically generated programs that demonstrate the feasibility of the approach and highlight how different parameter values can affect the behaviour of the system.


1983 ◽  
Author(s):  
I. V. Ramakrishnan ◽  
P. J. Varman

Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


2002 ◽  
Vol 109 (8) ◽  
pp. 763
Author(s):  
Sung Soo Kim ◽  
Richard Johnsonbaugh ◽  
Ronald E. Prather ◽  
Donald Knuth

Sign in / Sign up

Export Citation Format

Share Document