The Application of Distributed Computing Based on Cloud Computing in Statistical Work

2013 ◽  
Vol 694-697 ◽  
pp. 2374-2377
Author(s):  
Wei Li

With the rapid and effective development of social economy, all departments make an increasingly greater demand on statistical work. However, for a variety of reasons, all circles have been questioning the data quality of statistics departments. Specific to deficiencies of statistical work, this paper presents the basic thinking via which the distributed computing is applied to implementing statistical work under cloud computing. Besides, it compares the differences between ordinary cloud computing and distributed computing in the implementation process. Eventually, it mentions the development prospect of the application of distributed computing in statistical work under cloud computing.

A distributed computing is one of the most amazing administration offered by means of web which makes a stage to store and recover information Since client's close to home information is being put away in a decoded arrangement on a remote machine worked by outsider merchants who give different administrations, the effect of client's personality and unapproved access or revelation of records are extremely high.In this proposed system is using Dependability of the Users,Privacy and Integrity of Data (DPI) algorithms using improve the Execution assessment of Cloud Computing foundations is required to anticipate and measure the money saving advantage of a technique portfolio and the relating Quality of Service (QoS) experienced by clients. Along these lines, concentrating on Load adjusting in the distributed computing condition importantly affects the presentation. This paper deals with multi target asset provisioning plan for taking care of different errand classes for different outstanding task at hand office. In this proposal, project is using a Best Partition Searching for distributing a file system to another cloud environment. This methodology gives a security regarding client verification for "approval" to enter the system which is made by means of Image Sequencing secret key to demonstrate that the personality is unique client, RSA calculation to encode the information to give information respectability, a profoundly parallel conveyed information the executives administration that empowers to peruse/compose and add gigantic informational collections that are divided and circulated at a huge scale. Subsequently this methodology gives a general security to the customer's close to home information and the issue of simultaneousness, volume of information can be settled with these procedures


In distributed computing different cloud clients could demand number about cloud benefits all the while. Provisioning remains completed so that every resource was completed accessible in the direction of client's solicitation within an effective way toward fulfil their requirements. The present contribute dependent on interest because resources were planned based on specific arrangements. So as to battle as well as settle Virtual Machine (VM) planning issue during distributed computing, Novel Unique Tabu Search (NUTS) resource supported booking method while have its premise up auction sale method remains appeared via remembering numerous components incorporating the band with along with due date considering system as well as sale. The offers about customers were initially ordered inside the challenge due date. Besides, a displaying about the customer gathering remains completed as well as the VM resource such compares toward it remains arranged in understanding towards insignificant expense about the service suppliers. Ultimately, instalment cost remains settled via accepting normal instalment just as instalment completed via contenders into reflection in this way empowering auspicious finishing about VM resource job. The after-effects about reenactment examinations demonstrate the present method suggestion that was ready remains equipped for improving proficiently QoS otherwise Quality of Service about cloud context, and furthermore guarantee the present benefits about suppliers of cloud management as well as charge about resource usage of VMs were productively finished.


This paper examines the figuring of cloud and imposing security over information in the available cloud data by investigating information over cloud and its viewpoints that are identified with every possible security. It provides subtleties of information to impose security policies and approaches that are utilized through the world to provide assurance of extreme information by reducing dangers. Accessibility of information in the cloud is productive for a number of applications that exists and presents information over various applications that required security provisions by utilizing virtualization over distributed computing that may become hazard information when a visitor OS is implemented over a hypervisor without possessing the firm quality of visitor OS which may comprises of security provision in the cloud.


2020 ◽  
Vol 27 (3) ◽  
Author(s):  
Jobel Santos Corrêa ◽  
Mauro Sampaio ◽  
Rodrigo de Castro Barros

Abstract The concept of Logistics 4.0 works closely to that of Industry 4.0. While Industry 4.0 proposes a disruptive change in manufacturing, Logistics 4.0 advocates a transformation in the way organizations buy, manufacture, sell, and deliver products. The objective of this paper is to identify, in Brazilian companies, the degree of interest in the investment in six emerging technologies applicable to logistics, according to scientific literature, as well as to identify the current perception of data quality of these companies. To achieve these objectives, an online survey was conducted. The research showed that the technologies that most interest Brazilian companies are Internet of Things (IoT) and cloud computing, both with 82% of investment intention. The two technologies that least interested companies are crowdsourcing and 3D printing, both with 68% investment disinterest among respondents.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


2018 ◽  
Vol 1 ◽  
pp. 198
Author(s):  
Lusy Tunik Muharlisiani ◽  
Henny Sukrisno ◽  
Emmy Wahyuningtyas ◽  
Shofiya Syidada ◽  
Dina Chamidah

Service at the “Kelurahan” is a very important part in determining the success of development, especially in public service. The problem faced is the lack of skill level of the “Kelurahan” apparatus with the more dynamic demands of the community and the archive management system is still conventional and manual that is writing the identity of the archive into the book agenda, expedition, control card, and borrowed archive card, so it takes a more practical electronic system, effective and efficient so required to develop themselves in order to improve public services. Conventional administration and archive management must be transformed into cloud-based computing (digital), for which archiving managers should always be responsive and follow these developments and wherever possible in order to utilize for archival activities, with greater access expected archives are evidence at once able to talk about historical facts and events and be able to give meaning and benefit to human life, so archives that were only visible and readable at archival centers can now be accessed online, and even their services have led to automated service systems. Using Microsoft Access which its main function is to handle the process of data manipulation and manufacture of a system, this system is built so that the bias runs on Cloud which means Cloud itself is a paradigm in which information is permanently stored on servers on the internet and stored. The purpose of this program is the implementation of administrative management that has been based cloud computing (digital) and is expected to be a solution in managing the archive so that if it has been designed and programmed, it can be stored in the computer and benefi- cial to the “Kelurahan” apparatus and add in the field of management archives in the form of improving the quality of service to the community, can facilitate and scientific publications.


2017 ◽  
Vol 4 (1) ◽  
pp. 25-31 ◽  
Author(s):  
Diana Effendi

Information Product Approach (IP Approach) is an information management approach. It can be used to manage product information and data quality analysis. IP-Map can be used by organizations to facilitate the management of knowledge in collecting, storing, maintaining, and using the data in an organized. The  process of data management of academic activities in X University has not yet used the IP approach. X University has not given attention to the management of information quality of its. During this time X University just concern to system applications used to support the automation of data management in the process of academic activities. IP-Map that made in this paper can be used as a basis for analyzing the quality of data and information. By the IP-MAP, X University is expected to know which parts of the process that need improvement in the quality of data and information management.   Index term: IP Approach, IP-Map, information quality, data quality. REFERENCES[1] H. Zhu, S. Madnick, Y. Lee, and R. Wang, “Data and Information Quality Research: Its Evolution and Future,” Working Paper, MIT, USA, 2012.[2] Lee, Yang W; at al, Journey To Data Quality, MIT Press: Cambridge, 2006.[3] L. Al-Hakim, Information Quality Management: Theory and Applications. Idea Group Inc (IGI), 2007.[4] “Access : A semiotic information quality framework: development and comparative analysis : Journal ofInformation Technology.” [Online]. Available: http://www.palgravejournals.com/jit/journal/v20/n2/full/2000038a.html. [Accessed: 18-Sep-2015].[5] Effendi, Diana, Pengukuran Dan Perbaikan Kualitas Data Dan Informasi Di Perguruan Tinggi MenggunakanCALDEA Dan EVAMECAL (Studi Kasus X University), Proceeding Seminar Nasional RESASTEK, 2012, pp.TIG.1-TI-G.6.


Sign in / Sign up

Export Citation Format

Share Document