computer node
Recently Published Documents


TOTAL DOCUMENTS

7
(FIVE YEARS 6)

H-INDEX

0
(FIVE YEARS 0)

2022 ◽  
Author(s):  
Tsuyoshi Ichimura ◽  
Kohei Fujita ◽  
Kentaro Koyama ◽  
Ryota Kusakabe ◽  
Yuma Kikuchi ◽  
...  

2021 ◽  
Vol 2021 (3-4) ◽  
pp. 25-30
Author(s):  
Kirill Tkachenko

The article proposes a new approach for adjusting the parameters of computing nodes being a part of a data processing system based on analytical simulation of a queuing system with subsequent estimation of probabilities of hypotheses regarding the computing node state. Methods of analytical modeling of queuing systems and mathematical statistics are used. The result of the study is a mathematical model for assessing the information situation for a computing node, which differs from the previously published system model used. Estimation of conditional probabilities of hypotheses concerning adequate data processing by a computing node allows making a decision on the need of adjusting the parameters of a computing node. This adjustment makes it possible to improve the efficiency of working with tasks on the computing node of the data processing system. The implementation of the proposed model for adjusting the parameters of the computer node of the data processing system increases both the efficiency of process applications on the node and, in general, the efficiency of its operation. The application of the approach to all computing nodes of the data processing system increases the dependability of the system as a whole.


Author(s):  
Kirill Tkachenko ◽  

Advanced computers with high accuracy and speed in interactive mode increase the flexibility of processes in terms of objective control of performance, including due to the fact that automatic control of various devices is performed based on the results of their interactions with each other through communication channels. Simulation of human thinking using computers is a mechanism that can guarantee work in conditions of uncertainty. The accompanying increase in the volume of processed information makes it impossible to process it without the active use of computer technology, and, in turn, the complexity of computer tools leads to the complexity of managing them. Therefore, computer nodes must be managed. A convenient tool for managing computer nodes with the participation of an expert is obtained. To manage a computer node, you need to adjust its parameters. Adjustment of the computer node parameters should be made after and based on the analysis of information about the current functioning of the computer node. As the analysis is carried out verification of statistical hypotheses about node status. The proposed approach to the development of computer technology can be applied to the design of complex structured computer systems and networks. The paper uses analytical modeling of queuing systems and methods of nonparametric statistics. Adjusting the parameters of computer nodes allows you to improve their performance.


2020 ◽  
Author(s):  
Leya Badat ◽  
Vinicius Vidal ◽  
Laércio Pioli ◽  
Jean-Francois Mehaut ◽  
Leonardo Honorio ◽  
...  

This paper describes an experimental research work, which was conducted to gather different types of cameras and computer node, as IIoT (Industrial IoT) devices, to produce support to a digital transformation with a 3D reconstruction virtualization for a real engineering application. The computational approach considered was a heterogeneous edge computing environment. In this environment, different cameras and computer node architectures, collaborate as heterogeneous IIoT processing elements, to provide a better, and as fast as possible, images to a virtualization project. The challenge and complexity related to software packages orchestration, from these IIoT devices, are also reported.


2020 ◽  
Vol 10 (23) ◽  
pp. 8596
Author(s):  
Tomoya Kawakami

Sensor data which relate to the specific geographical positions, areas, and time are strongly expected in IoT. The author has studied overlay networks to efficiently process interval queries which have specific time intervals and the actual users tend to request. However, unfairness and a concentration of the loads occur for the specific processing computer (node) in the previous method because the density of data or those generators/providers is different from those related values. In this paper, the author proposes the enhanced scheme for structured overlay networks based on multiple different time intervals. The proposed method uses node virtualization to equalize the loads of each real (physical) node. The simulation results showed that the proposed method can increase the fairness of the number of the assigned data among physical nodes.


Author(s):  
Nilufer Nilufer ◽  
Zeynep Yeni Erol

The blockchain technology has given a new shape to the world and disrupted a wide variety of technology-based industries. The disruptive characteristics of blockchain technology have molded the way of doing things. Since the importance of blockchain technology in business and social environment is increasing day by day, this study aimed to underline risks of blockchain technology within the network. Two strategies were made to infer the technology-based risk in the blockchain ecosystem. First, the study examined to find the technology-based risk at the point where a user executes the transaction from his/her computer ‘Node’. Second, this study attempts to figure out the security concerns within the web of the blockchain. After assessment of benefits and risks of this technology, this study concluded with the findings that blockchain is very much secure and trustable system which provides peer-to-peer transactions without needing any trusted third party, besides, once the information of the transaction is recorded, the system stores multiple copies of it, so there is no chance to change or delete it from the system. In the case of negligence, there is a possibility of forgery at the node, but numerous software has been developed for protecting the computer. The approach of the study is grounded in the literature review of journal articles, reports, and conference proceedings from authenticated sources via content analysis of the keywords such as blockchain, security, trust, technology-based risks. Blockchain technology is not associated with finance but it has high usage in other areas like health, education, supply chain, the music industry and many more to explore.


2014 ◽  
Vol 536-537 ◽  
pp. 678-682
Author(s):  
Zhi Hong Liang ◽  
Zhi Qiang Liang ◽  
Yi Ming Tan ◽  
Xue Cheng Lv

Currently, the study of virtual machine migration in cloud computing platform which usually did not consider the trustworthiness of target physical machine. For this, the paper proposes a trusted virtual machine migration with performance constraints algorithm (TVM2PC). The trustworthiness of target physical machine includes direct trustworthiness and indirect trustworthiness. By this method, a virtual machine will be migrated to a trusted physical machine. A large of experiment shows that the proposed method can give a better result than the existing method in load balancing and trustworthiness.


Sign in / Sign up

Export Citation Format

Share Document