scholarly journals The application of cloud computing to scientific workflows: a study of cost and performance

Author(s):  
G. Bruce Berriman ◽  
Ewa Deelman ◽  
Gideon Juve ◽  
Mats Rynge ◽  
Jens-S. Vöckler

The current model of transferring data from data centres to desktops for analysis will soon be rendered impractical by the accelerating growth in the volume of science datasets. Processing will instead often take place on high-performance servers co-located with data. Evaluations of how new technologies such as cloud computing would support such a new distributed computing model are urgently needed. Cloud computing is a new way of purchasing computing and storage resources on demand through virtualization technologies. We report here the results of investigations of the applicability of commercial cloud computing to scientific computing, with an emphasis on astronomy, including investigations of what types of applications can be run cheaply and efficiently on the cloud, and an example of an application well suited to the cloud: processing a large dataset to create a new science product.

2021 ◽  
Vol 2 (1) ◽  
pp. 46-62
Author(s):  
Santiago Iglesias-Baniela ◽  
Juan Vinagre-Ríos ◽  
José M. Pérez-Canosa

It is a well-known fact that the 1989 Exxon Valdez disaster caused the escort towing of laden tankers in many coastal areas of the world to become compulsory. In order to implement a new type of escort towing, specially designed to be employed in very adverse weather conditions, considerable changes in the hull form of escort tugs had to be made to improve their stability and performance. Since traditional winch and ropes technologies were only effective in calm waters, tugs had to be fitted with new devices. These improvements allowed the remodeled tugs to counterbalance the strong forces generated by the maneuvers in open waters. The aim of this paper is to perform a comprehensive literature review of the new high-performance automatic dynamic winches. Furthermore, a thorough analysis of the best available technologies regarding towline, essential to properly exploit the new winches, will be carried out. Through this review, the way in which the escort towing industry has faced this technological challenge is shown.


2019 ◽  
Vol 214 ◽  
pp. 03037
Author(s):  
M. Martinez Pedreira ◽  
C. Grigoras ◽  
V. Yurchenko

The ALICE experiment will undergo extensive hardware and software upgrades for the LHC Run3. This translates in significant increase of the CPU and storage resources required for data processing, and at the same time the data access rates will grow linearly with the amount of resources. JAliEn (Java ALICE Environment) is the new Grid middleware designed to scale-out horizontally to fulfil the computing needs of the upgrade, and at the same time to modernize all parts of the distributed system software. This paper will present the architecture of the JAliEn framework, the technologies used and performance measurements. This work will also describe the next generation solution that will replace our main database backend, the AliEn File Catalogue. The catalogue is an integral part of the system, containing the metadata of all files written to the distributed Grid storage and also provides powerful search and data manipulation tools. As for JAliEn, the focus has been put onto horizontal scalability, with the aim to handle near exascale data volumes and order of magnitude more workload than the currently used Grid middleware. Lastly, this contribution will present how JAliEn manages the increased complexity of the tasks associated with the new ALICE data processing and analysis framework (ALFA) and multi-core environments.


MRS Bulletin ◽  
2004 ◽  
Vol 29 (11) ◽  
pp. 805-813 ◽  
Author(s):  
Herb Goronkin ◽  
Yang Yang

AbstractThis article introduces the November 2004 issue of MRS Bulletin on the state of the art in solid-state memory and storage technologies.The memory business drives hundreds of billions of dollars in sales of electronic equipment per year. The incentive for continuing on the historical track outlined by Moore's law is huge, and this challenge is driving considerable investment from governments around the world as well as in private industry and universities. The problem is this: recognizing that current approaches to semiconductor-based memory are limited, what new technologies can be introduced to continue or even accelerate the pace of complexity? The articles in this issue highlight several commercially available memories, as well as memory technologies that are still in the research and development stages. What will become apparent to the reader is the huge diversity of approaches to this problem.


2019 ◽  
Vol 9 (23) ◽  
pp. 5159 ◽  
Author(s):  
Shichang Xuan ◽  
Yibo Zhang ◽  
Hao Tang ◽  
Ilyong Chung ◽  
Wei Wang ◽  
...  

With the arrival of the Internet of Things (IoT) era and the rise of Big Data, cloud computing, and similar technologies, data resources are becoming increasingly valuable. Organizations and users can perform all kinds of processing and analysis on the basis of massive IoT data, thus adding to their value. However, this is based on data-sharing transactions, and most existing work focuses on one aspect of data transactions, such as convenience, privacy protection, and auditing. In this paper, a data-sharing-transaction application based on blockchain technology is proposed, which comprehensively considers various types of performance, provides an efficient consistency mechanism, improves transaction verification, realizes high-performance concurrency, and has tamperproof functions. Experiments were designed to analyze the functions and storage of the proposed system.


2018 ◽  
Vol 5 (3) ◽  
pp. 107-112 ◽  
Author(s):  
Mehrdad Amiri ◽  
Javad Majrouhi Sardroud ◽  
Ali Golsoorat Pahlaviani

Nanotechnology will serve as a suitable solution to achieve high performance in future construction. Using this new technology results in creativity and innovation in the construction industry. One of these new technologies is the smart concrete which has received much emphasis in recent years. Many research and experiments have been conducted in scientific research centers around the world in this regard. It is an undeniable fact that concrete structures are prone to cracking. Natural processes have caused cracks in the concrete through which harmful substances entered the concrete leading to steel corrosion. To tackle this issue through the conventional method of concrete restorative, materials, especially polymers which are also harmful to the environment, are used. An alternative that the scientists have achieved is to employ bacteria in concrete through which to produce self-healing concrete and also to reduce the problems regarding the maintenance of concrete for the environment. Bacteria contribute to the durability and performance of the concrete and increase the service life of the concrete.


2020 ◽  
Vol 245 ◽  
pp. 02020
Author(s):  
Kevin Pedro

The HL-LHC and the corresponding detector upgrades for the CMS experiment will present extreme challenges for the full simulation. In particular, increased precision in models of physics processes may be required for accurate reproduction of particle shower measurements from the upcoming High Granularity Calorimeter. The CPU performance impacts of several proposed physics models will be discussed. There are several ongoing research and development efforts to make efficient use of new computing architectures and high performance computing systems for simulation. The integration of these new R&D products in the CMS software framework and corresponding CPU performance improvements will be presented.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Mbasa Joaquim Molo ◽  
Joke A. Badejo ◽  
Emmanuel Adetiba ◽  
Vingi Patrick Nzanzu ◽  
Etinosa Noma-Osaghae ◽  
...  

Cloud computing is a technology that allows dynamic and flexible computing capability and storage through on-demand delivery and pay-as-you-go services over the Internet. This technology has brought significant advances in the Information Technology (IT) domain. In the last few years, the evolution of cloud computing has led to the development of new technologies such as cloud federation, edge computing, and fog computing. However, with the development of Internet of Things (IoT), several challenges have emerged with these new technologies. Therefore, this paper discusses each of the emerging cloud-based technologies, as well as their architectures, opportunities, and challenges. We present how cloud computing evolved from one paradigm to another through the interplay of benefits such as improvement in computational resources through the combination of the strengths of various Cloud Service Providers (CSPs), decrease in latency, improvement in bandwidth, and so on. Furthermore, the paper highlights the application of different cloud paradigms in the healthcare ecosystem.


Author(s):  
Abirami. S ◽  
Shanmuga Priya. P

Cloud computing associate the computing and storage resources controlled by different operating systems to make available services such as large-scaled data storage and high performance computing to users. The benefits of low-cost, negligible management (from a user's perspective), and greater flexibility come with increased security concerns is one of the most crucial aspects among those prohibiting the wide-spread adoption of cloud computing. The data outsourced to a public cloud must need to be secured. This work gives Division and Replication of Data (DROPs) inside the Cloud for Optimal Performance and Security that judicially fragments user files into portions and replicates them at strategic places in the cloud. The division of a files into fragments is achieved based on a given consumer standards such that the individual fragments do not comprise any meaningful facts. The node separation is ensured by the means of the Grid Topology algorithm. To further improve the retrieval time, replicate fragments over the nodes that generate the highest read/write requests. The data encrypted using AES encryption algorithm. Duplication checking is implementing to provide efficient storage and time based access control for secure file access system.


2000 ◽  
Vol 122 (11) ◽  
pp. 70-79 ◽  
Author(s):  
Daniel S. Goldin ◽  
Samuel L. Venneri ◽  
Ahmed K. Noor

This article discusses that a wealth of technological breakthroughs is likely to come from mimicking the interactions of biological systems and their response to the environment. The following next few decades will witness thinking, learning, evolvable aerospace systems. It will also see systems-on-a-chip, in which miniaturization allows all electronic systems of an aerospace vehicle (computer, memory, guidance, navigation, communications, power, and sensors) to fit on a tiny chip. Such aerospace systems cannot be realized with present technologies. The synergistic coupling of biotechnology, nanotechnology, and information technology with other leading edge aerospace technologies can produce breakthroughs in vehicle concepts and exploration missions, enable new science, and reshape our frame of reference for the future. The potential benefits of these technologies are pervasive and extend to several non-aerospace fields, such as high-performance computing and communications, land and sea transportation systems, health care, and advanced energy conversion and storage.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Mohammad Shirzadi

This paper proposes algorithm for Increasing Virtual Machine Security Strategy in Cloud Computing computations. Imbalance between load and energy has been one of the disadvantages of old methods in providing server and hosting, so that if two virtual severs be active on a host and energy load be more on a host, it would allocated the energy of other hosts (virtual host) to itself to stay steady and this option usually leads to hardware overflow errors and users dissatisfaction. This problem has been removed in methods based on cloud processing but not perfectly, therefore,providing an algorithm not only will implement a suitable security background but also it will suitably divide energy consumption and load balancing among virtual severs. The proposed algorithm is compared with several previously proposed Security Strategy including SC-PSSF, PSSF and DEEAC. Comparisons show that the proposed method offers high performance computing, efficiency and consumes lower energy in the network.


Sign in / Sign up

Export Citation Format

Share Document