Virtual Machine Planning for Cloud Brokering Considering Geolocation and Data Transfer

Author(s):  
Javier Alsina ◽  
Santiago Iturriaga ◽  
Sergio Nesmachnow ◽  
Andrei Tchernykh ◽  
Bernabe Dorronsoro
2019 ◽  
Vol 12 ◽  
pp. 220-225
Author(s):  
Krzysztof Mazur ◽  
Damian Mazur

The aim of the article is to compare and analyze the impact of technologies and data transfer techniques in term of displaying the image using a holographic pyramid. When assessing the usability of the solution, the following parameters will be taken into account: time of image transfer, use of physical parameters of the machine and parameters of the Java Virtual Machine.


Author(s):  
M.F. Schmid ◽  
R. Dargahi ◽  
M. W. Tam

Electron crystallography is an emerging field for structure determination as evidenced by a number of membrane proteins that have been solved to near-atomic resolution. Advances in specimen preparation and in data acquisition with a 400kV microscope by computer controlled spot scanning mean that our ability to record electron image data will outstrip our capacity to analyze it. The computed fourier transform of these images must be processed in order to provide a direct measurement of amplitudes and phases needed for 3-D reconstruction.In anticipation of this processing bottleneck, we have written a program that incorporates a menu-and mouse-driven procedure for auto-indexing and refining the reciprocal lattice parameters in the computed transform from an image of a crystal. It is linked to subsequent steps of image processing by a system of data bases and spawned child processes; data transfer between different program modules no longer requires manual data entry. The progress of the reciprocal lattice refinement is monitored visually and quantitatively. If desired, the processing is carried through the lattice distortion correction (unbending) steps automatically.


1982 ◽  
Vol 21 (04) ◽  
pp. 181-186 ◽  
Author(s):  
M. A. A. Moussa

A drug information system (DARIS) has been created for handling reports on suspected drug reactions. The system is suitable for being run on desktop computers with a minimum of hardware requirements: 187 K read/write memory, flexible or hard disc drive and a thermal printer. The data base (DRUG) uses the QUERY and IMAGE programming capabilities for data entry and search. The data base to statistics link program (DBSTAT) enables data transfer from the data base into a file for statistical analysis and signalling suspected adverse drug reactions.The operational, medical and statistical aspects of the general population voluntary adverse drug reaction monitoring programme—recently initiated in the State of Kuwait—are described.


Author(s):  
B. G. Shadrin ◽  
◽  
D. E. Zachateyskiy ◽  
V. A. Dvoryanchikov Dvoryanchikov ◽  
◽  
...  

2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


Author(s):  
S. K. Saravanan ◽  
G. N. K. Suresh Babu

In contemporary days the more secured data transfer occurs almost through internet. At same duration the risk also augments in secure data transfer. Having the rise and also light progressiveness in e – commerce, the usage of credit card (CC) online transactions has been also dramatically augmenting. The CC (credit card) usage for a safety balance transfer has been a time requirement. Credit-card fraud finding is the most significant thing like fraudsters that are augmenting every day. The intention of this survey has been assaying regarding the issues associated with credit card deception behavior utilizing data-mining methodologies. Data mining has been a clear procedure which takes data like input and also proffers throughput in the models forms or patterns forms. This investigation is very beneficial for any credit card supplier for choosing a suitable solution for their issue and for the researchers for having a comprehensive assessment of the literature in this field.


Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


Sign in / Sign up

Export Citation Format

Share Document