Research on an instance-intensive workflow scheduling algorithm in cloud computing environment

Case-intensive workflow scheduling algorithm in cloud computing environment Zhejiang University of Technology Fang This paper studies the case-intensive workflow scheduling algorithm under cloud computing environment, and first introduces the background, significance and research status of the instance-intensive workflow scheduling algorithm in cloud computing environment. Secondly, this paper introduces the concepts of cloud computing and cloud workflow, classifies and expounds the workflow scheduling algorithm, and emphatically discusses the existing instance-intensive workflow scheduling algorithms. Then, according to the characteristics of cloud computing environment, designed for the cloud computing environment for instance-intensive ...

Micro-blog event detection and tracking based on the incremental hierarchical density clustering of representative points in cloud computing environment

Micro-blog event detection and tracking based on representative point increment hierarchical density clustering in cloud computing environment Fung Han Nan Jadong to extract news events from a large number of real-time information generated from the microblogging service platform, a complete set of micro-blog event detection and tracking algorithm in cloud computing environment is proposed. Firstly, a new weight calculation method based on micro-Bo forwarding number and comment number is used to represent the micro-Bowenben as a vector space model, and then the incremental hierarchical density clustering (rihdbscan) algorithm based on the representative point is adopted to extract the keywords and finally realize the detection and tracking of news events. For single ...

Research and simulation of resource scheduling strategy in cloud computing environment

Research and simulation of resource scheduling strategy in cloud computing environment Zhejiang Normal University The task scheduling research content is based on the second part of Map/reduce thought, and the two aspects of virtual machine migration are worked: (1) Task Scheduling algorithm optimization, This paper focuses on how to allocate each subtask to virtual resources reasonably to improve the overall completion time of the task. Firstly, the cloud environment resource is modeled as genetic optimization and ant colony optimization task scheduling algorithm optimization problem, the task is classified, then the initial solution is obtained by the improved genetic algorithm, then the initial solution is introduced into the improved ant colony.

Design and implementation of information collection system in cloud computing environment

Design and implementation of information collection system in cloud computing environment Sun Fuquan This paper mainly introduces the information collection of virtual machine and monitoring control of cloud environment in the environment based on OpenStack Cloud platform, in order to achieve the commercial purpose of cloud computing. This paper analyzes the cloud platform OpenStack and virtualization technology used in the usage information Acquisition system KVM, XEN, evaluates and uses the Libvirt virtual software, web.py, JSON and other key technologies. The function and sex of the dosage information collection system.

Analysis and research of MapReduce multi-group fault-tolerant mechanism architecture under cloud computing

Analysis and research of MapReduce multi-group fault-tolerant mechanism architecture under cloud computing Zhang Zhibin Li Yange proposes mapreduce multiple fault-tolerant mechanisms, which are improved on traditional Hadoop mapreduce architectures, that is, adding multiple groups of relationships between task-t racker nodes in the same cabinet. This can shorten the time of discovering the failed node, reduce the load of the JOBT racker node, reduce the bandwidth usage and decrease the network congestion. It is proved by experiments that the fault-tolerant mechanism of mapreduce ...

Research on data access control method in cloud computing

Research on data access control method in cloud computing Nanjing University of Posts and telecommunications This paper proposes an attribute-based access control model (DACC) for cloud computing environment using CP-ABE encryption algorithm. The core idea is to use the AES symmetric encryption algorithm and the Cp-abe encryption algorithm, respectively to encrypt the data and symmetric key, and the user of the attribute matching to decrypt the key cipher text and the data cipher in sequence. In order to reduce the cost of storing and updating keys, the Key Distribution center KDC is introduced to manage attributes and keys. Cloud computing Service Provider ...

Research on cloud computing resource allocation strategy

Research on cloud computing resource allocation strategy Fang aged Guo Li Zhou Cloud computing is a new type of computing model, which has become a hot research field in the world. On the basis of introducing the concept of cloud computing, this paper summarizes the current research situation of cloud computing resource allocation at home and abroad, analyzes the key problems faced by cloud computing resource allocation, and then further points out the research direction of cloud computing resource allocation algorithm. Research on cloud computing resource allocation strategy

New communication of Cloud Platform

How to build Mobile information Communication service for enterprises in the new communication system of cloud Platform Han Dong, deputy general manager of Beijing Rong Lian Yi Tong Information Technology Co., Ltd. said the development trend of the communications industry in the following three categories: Mobile, 2013 mobile terminals (mobile phones, flat) shipments of more than 1.3 billion; Ott trend unstoppable, voip/ Videos, IM, audio and video conferencing, Cloud, SaaS, PaaS. The idea is to build a cloud platform to put technology and resources into a variety of standard capabilities, open API way for corporate customers to provide communications services to meet the various enterprises ...

Research and implementation of erasure code technology in cloud file system

Research and implementation of erasure code technology in cloud file system Cheng, Zhong, Meng, Li Liangshu, and Rong, Yang Tingting, Depei, Guan, Chen Wei the paper studies the application of the Erasure code technology in cloud file system, from six aspects, such as the type of erasure code, encoding object, encoding timing, data change, data access mode and data access performance, The design of erasure code in cloud file system is explored to enhance the storage model of cloud file system. On the basis of this, the paper designs and realizes the prototype system of the Erasure code, and proves that the erasure code can effectively protect the data availability of the cloud file system and save ...

Research on remote proof communication mechanism in cloud

Research on remote proof communication mechanism in cloud the development of An YANGSU Aviation Zhaopo Cloud computing technology accelerates the process of the industrialization of Geographic Information system (GIS), how to ensure that the users in the cloud to provide a secure and trusted GIS services to become the important research content in cloud GIS. To make up for the deficiencies of a single remote certifying person, The remote proof mechanism is improved, and a remote proof communication mechanism based on multi-agent model is put forward, and it is used in cloud GIS, by transforming single verifier into multiple verifier cluster to avoid the whole ...

Design and implementation of precision marketing in online payment platform

Accurate marketing design and realization of business in online payment platform the Fu of South China University of Technology in this paper, the use of data mining and distributed processing technology Hadoop to analyze the huge amount of business payment behavior Data Mining, and the results of the final strategy for the development of a precision marketing based on the solution, and the design and implementation of precision marketing are studied. First, using association Rules mining algorithm Apriori algorithm to find strong associated business, using clustering algorithm K algorithm to subdivide users. Second, when you want to target users of precision marketing, the root ...

Beyond ubuntu! Fedora 16 official version of the gorgeous experience

The gorgeous cloud computing services Fedora 16 support for cloud computing can be described in a lineup. The main cloud features of Fedora 16 include enhanced cloud support, including Aeolus conductor, Condor Cloud, Hekafs, OpenStack, and Pacemaker-cloud. Additionally, updates for Xen include: LIBVIRTD, guest Cotecna, virtual lock ma ...

Large data Resource description model supporting efficient query retrieval

A large data resource description model supporting efficient query retrieval Zhang Wenji Xianglenzhi Wangxiaofang The problem of large data resource description model which can not support efficient query retrieval in the form of a unified query interface, by extending the trace attribute of large data partition management model, the extension function is introduced, In order to support the construction of differentiated large data information resource organization pattern. On this basis, the inverted retrieval mode which supports high efficient retrieval of large data resources is given, and it is proved that it is much more efficient than traversal retrieval mode and hierarchical retrieval mode. At the same time, the unified query mechanism in dialect mode is given. At present, large data resources are traced ...

Smart Grid leads intelligent home and energy consumption innovation

Smart Grid leads intelligent home and energy consumption innovation Zhang Yunchang Zhou with the development of smart grid technology, with the access of distributed power supply, the supply and demand of household energy have changed a lot, the traditional household energy consumption pattern will make a great change, based on this, this paper probes into three aspects of the production, consumption and management of intelligent home energy. In the aspect of household energy utilization, this paper puts forward a hybrid power supply mode of Home micro-grid, DC and AC/DC, and gives the control scheme of Home Energy Control Center to realize the "Plug and play" of home micro-network. In terms of energy consumption ...

Research on the application of subjective trust cloud in text categorization

Research on the application of subjective trust cloud in text categorization Shang from the reduction of uncertainty in natural language, the subjective trust cloud is introduced into text categorization, and a text categorization method based on subjective Trust Cloud trust decision is proposed. This method, based on the concept of cloud, is used to compute the concept of text category, and the subjective trust feature vector is adopted as the similarity criterion between the text and category concepts. This method can effectively reduce the uncertainty effect of natural language, and it fully embodies its excellent classification performance in the experiment Contrast analysis of different text classification methods.

The environmental baptism of cloud

1E is a company dedicated to improving the efficiency of energy use for it enterprises. In fact, the company's vision is "to define the useless IT industry, transfer it and make the process optimization." "So, once you mention the issue of cloud computing and the need for a greener debate on cloud computing, you can hear a lot of real stories from 1E companies." Together with the company's Cessumirkarayi, we explored some of the myths about cloud computing and the factors that are necessary for a more environmentally friendly mix of the IT industry. What is the most important misconception about cloud computing? Why...

Microsoft launches integrated Cloud technology services to integrate BT Pilot

January 7 News, according to foreign media reports, Microsoft and BT (Airways TELECOM,BT) launched the integration of cloud hosting services Lync Voice. It is of great epochal significance for Microsoft to extend its Lync platform development footprint to cloud services.  At present, the company has with the telecommunications giant BT Company issued a water test plan (pilot program), in order to formally launch the Lync Voice Service enterprise-class platform to prepare. ...

Gartner: Big data will spawn billions of dollars in IT spending

The big data industry will bring nearly hundreds of billions of dollars in IT spending this year, according to a study published today by Gartner, a leading market research firm, on October 18, 2012. In its report, Gartner predicts that this year, big data will push up to $96 billion trillion in direct or indirect global IT spending, which is expected to reach $232 billion by 2016. Gartner Research reports the main conclusions are as follows: 1. Large data is not a completely different market. In fact, the data everywhere, through various possible ways to affect the business ...

Fujian Mobile Deployment Oracle Exadata Cloud Server

January 31, 2012 News, China Mobile Communications Group Fujian Co., Ltd. (Fujian Mobile) announced that the deployment of Oracle Exadata Database cloud Server to create a new generation of business Analysis System (Business analyze Support systems, Bass system) to further support its all-round development needs. Fujian Mobile is a wholly-owned subsidiary of China Mobile (Hong Kong) Limited, under the jurisdiction of 9 municipal branches, 61 counties (city) branch. At present, Fujian Mobile has been built to cover the area ...

Huawei Network disk together to build up Outlander to your hard drive data insurance

February 2012-June, Huawei Network disk together with domestic well-known it commodity value-added services Shang Jianda Outlander, for the purchase of Tatsu Blue boxed authentic Seagate HDD users, free of charge to provide the largest 250G Huawei Network disk Extreme VIP use rights. During the event will be sent out 400,000 Huawei Network disk VIP. Users can upload the files on the computer hard disk to the Huawei network disk for storage backup, really do for your personal data to provide double insurance. It is reported that the event for the national scope of synchronization. During the event, all of the built Tatsu Blue de authentic Seagate hard drive outside the box are pasted with "buy build up ..."

Total Pages: 2156 1 .... 1320 1321 1322 1323 1324 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.