APPLICATION OF DISTRIBUTED COMPUTING SYSTEMS FOR IMAGE PROCESSING IN ORDER TO SEARCH FOR UNMANNED AERIAL VEHICLES

Author(s):  
A. I. Kalyaev

This article describes an approach to solving the problem of searching, identifying and tracking UAVs (Unmanned Aerial Vehicles) using a distributed computing system for processing images from multiple surveillance cameras. Today, the problem of finding UAVs is becoming especially relevant due to their widespread distribution and low cost, which gives a wide scope for illegal use: the implementation of terrorist attacks in crowded places and critical infrastructure, as well as unauthorized tracking of specially protected areas. At the same time, modern radars have low efficiency for searching for UAVs, so today visual detection tools are used, for which effective work requires complex calculations. In this article, it is proposed to use distributed computing systems to solve these complex problems of processing a video stream for the purpose of searching, identifying and tracking objects (UAVs). For this, the author of the article, proceeding from the potential areas of application of such systems, decided to apply a multiagent approach, which makes it possible to create fault-tolerant and scalable systems. In the course of work on the article, softwarefor a distributed computing system for image processing in order to search for unmanned aerial vehicleswas created, a hardware stand was assembled to test it. While performing tests, it was concluded that the proposed method can be applied to implement high-resolution video processing and frame rate in a distributed computing system.

Author(s):  
Ghada Farouk Elkabbany ◽  
Mohamed Rasslan

Distributed computing systems allow homogenous/heterogeneous computers and workstations to act as a computing environment. In this environment, users can uniformly access local and remote resources in order to run processes. Users are not aware of which computers their processes are running on. This might pose some complicated security problems. This chapter provides a security review of distributed systems. It begins with a survey about different and diverse definitions of distributed computing systems in the literature. Different systems are discussed with emphasize on the most recent. Finally, different aspects of distributed systems security and prominent research directions are explored.


Author(s):  
Vidya S. Handur, Et. al.

Development of technology like Cloud Computing and its widespread usage has given rise to exponential increase in the volume of traffic. With this increase in huge traffic the resources in the network would either be insufficient to handle the traffic or the situation may cause some of the resources to be over utilized or underutilized. This condition leads to reduced performance of the system. To improve the performance of the system the traffic requires to be regulated such that all the resources are utilized conferring to their capacity which is known as load balancing. Load balancing has been one of the concerns in the distributed computing systems where the computing nodes do not have a global view of the network. There have been constant efforts to provide an efficient solution for load balancing through the approaches like game theory, fuzzy logic, heuristics and metaheuristics. Even though various solutions exist for balancing the load, the issue is challenging as there does not exist one best fit solution. The paper aims at the study of how Particle Swarm Optimization approach is used to achieve an optimal solution for load balancing in distributed computing system.


Author(s):  
Nutan Kumari Chauhan ◽  
Harendra Kumar

Distributed computing system (DCS) is a very popular field of computer science. DCS consists of various computers (processors) located at possibly different sites and connected by a communication link in such a manner that it appears as one system to the user. Tasks scheduling is a very interesting field of research in DCS. The main objectives of tasks scheduling problems are load balancing of processors, maximization of system reliability, minimizing the system cost, and minimizing the response time. Obviously, it is very complicated to satisfy all of the above objectives simultaneously. So, most of the researchers have solved the tasks scheduling problem with one or more objectives. The purpose of this chapter is to produce an overview of much (certainly not all) of tasks scheduling algorithms. The chapter is covering the little much valuable survey, tasks scheduling strategies, and different approaches used for tasks scheduling with one or more objectives.


2019 ◽  
Vol 23 (2) ◽  
pp. 153-173
Author(s):  
M. Sadeq Jaafar

Purpose of research. The object of the study is a network cloud service built on the basis of a replicated database. Data in distributed computing systems are replicated in order to ensure the reliability of their storage, facilitate access to data as well as to improve the storage system performance. In this regard, the problem of analyzing the effectiveness of processing the queries to replicated databases in a network-based cloud environment, and, in particular, the problem of organizing priority query queues for updating databae copies (update requests) and for searching and reading information in databases (query-requests). The purpose of this work is to study and organize priority modes in a network distributed computing system with cloud service architecture.Methods. The study was conducted on the basis of two types of behavioural patterns: models based on Petri nets to describe and verify the functioning of a distributed computing system with replicated databases represented as a pool of resource units with several units, and models based on the GPSS simulation language for possible evaluation of passage of query time of each type in queues depending on the priority of queries.Results. Based on two simulation methods, the operation of a cloud system with database replicas was analyzed. In this system two distributed cloud computing systems interact: MANET Cloud based on a wireless network and Internet Cloud based on the Internet. These databases together are the basis of the DBaaSoD (Data Bases as a Service on Demand) cloud service (databases as a service organized at user’s query). To study this system the models of two classes were developed. The model based on Petri nets is designed to test the simulated distributed application for proper functioning. The decisions on the mapping of Petri nets on the architecture of computer networks are discussed. The simulation statistical model is used to compare the priority and non-priority maintenance modes of query- and update-requests by the criterion of average passage of time of queries in queues.Conclusion. System models based on Petri nets were tested, which showed their liveness and security, which makes it possible to move from models to building formalized specifications for network applications for network cloud services in distributed computing systems with replicated databases. The study of GPSS-model showed that in the case of priority service of update-requests, the time of passage for them is reduced by about 2 to 4 times compared with query-requests, depending on the intensity of the query-requests. In the non-priority mode, the serving conditions for update-queries deteriorate and the time of passage in the queue for them increases by about 2 to 6 times as compared with query-requests depending on the intensity of the query-requests.


2018 ◽  
pp. 381-418
Author(s):  
Ghada Farouk Elkabbany ◽  
Mohamed Rasslan

Distributed computing systems allow homogenous/heterogeneous computers and workstations to act as a computing environment. In this environment, users can uniformly access local and remote resources in order to run processes. Users are not aware of which computers their processes are running on. This might pose some complicated security problems. This chapter provides a security review of distributed systems. It begins with a survey about different and diverse definitions of distributed computing systems in the literature. Different systems are discussed with emphasize on the most recent. Finally, different aspects of distributed systems security and prominent research directions are explored.


Author(s):  
Nutan Kumari Chauhan ◽  
Harendra Kumar

Distributed computing system (DCS) is a very popular field of computer science. DCS consists of various computers (processors) located at possibly different sites and connected by a communication link in such a manner that it appears as one system to the user. Tasks scheduling is a very interesting field of research in DCS. The main objectives of tasks scheduling problems are load balancing of processors, maximization of system reliability, minimizing the system cost, and minimizing the response time. Obviously, it is very complicated to satisfy all of the above objectives simultaneously. So, most of the researchers have solved the tasks scheduling problem with one or more objectives. The purpose of this chapter is to produce an overview of much (certainly not all) of tasks scheduling algorithms. The chapter is covering the little much valuable survey, tasks scheduling strategies, and different approaches used for tasks scheduling with one or more objectives.


Sign in / Sign up

Export Citation Format

Share Document