scholarly journals Virtual Simulation Management of Data Traffic Optimization of Big Data Cloud Platform considering Multipoint Mapping Algorithm

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Haibo Wu

With the continuous development of Internet, cloud computing, and other technologies, build a cloud platform based on Cloud Computing Center, but how to effectively carry out operation and maintenance and face users to ensure the continuity and effectiveness of the platform is extremely important. In view of these needs and limitations, this paper introduces the multipoint mapping algorithm, combs the statistical methods of platform cloud traffic, carries out platform data traffic by classification, constructs the data traffic optimization management model, analyzes the relevant data samples, carries out statistical calculation for data diversion tasks, analyzes and processes the priority indicators, and forms the final results through continuous iteration, realizing the management of data flow optimization virtual simulation of big data cloud platform. Simulation results show that the multipoint mapping algorithm is effective and can effectively support the data flow of big data cloud platform and optimize virtual simulation management.

Author(s):  
Pasumpon Pandian A

The edge computing that is an efficient alternative of the cloud computing, for handling of the tasks that are time sensitive, has become has become very popular among a vast range of IOT based application especially in the industrial sides. The huge amount of information flow and the services requisition from the IOT has made the traditional cloud computing incompatible on the time of big data flow. So the paper proposes an enhanced edge model for the by incorporating the artificial intelligence along with the integration of caching to the edge for handling of the big data flow in the applications of the internet of things. The performance evaluation of the same in the network simulator 2 for enormous flow of task that are time sensitive , evinces that the proposed method has a minimized delay compared the traditional cloud computing models.


2021 ◽  
Vol 23 (2) ◽  
pp. 406-416
Author(s):  
Sally Wyatt

Since its very early days, metaphors have been used by various powerful social actors to try to convey what the Internet is and what it could be used for, now and in the future. In this short essay, I make a plea for critical scholars of the Internet and digital media to be simultaneously careful and imaginative in their own choice of metaphorical language. I revisit some of the early and recurring metaphors, such as frontier, highway and library, to illustrate the evocative power of metaphor. I then examine the more recent metaphors of cloud computing and (big) data flow to justify why it remains important to focus on metaphors. Scholars in critical and digital media studies not only need to deconstruct the metaphors of the powerful but they also need to contribute new metaphors and new ways of describing and thinking about the future.


Author(s):  
Kiran Kumar S V N Madupu

Big Data has terrific influence on scientific discoveries and also value development. This paper presents approaches in data mining and modern technologies in Big Data. Difficulties of data mining as well as data mining with big data are discussed. Some technology development of data mining as well as data mining with big data are additionally presented.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document