Parallel 處理 of cluster by Map Reduce

Parallel 處理 of cluster by Map Reduce Madhavi Vaidya, Department of Computer a science this monitors gives a overview of MapReduce programming model and its applications. The author Super-delegates describe ...

[Document] Pricing cloud Products

Pricing Cloud Compute commodities:a novel Financial Model in-economic, we design, study, and develop A simulate Pricing model that satisfies nonblank important constraints:the dyn ...

QVM: A mass of malware intelligent recognition technology in cloud computing environment

QVM: Massive malware intelligent recognition technology in cloud computing environment Qihoo 360 2011.11 Temp_12081209556945.pdf

[Document] Reducing total power consumption in cloud computing environment

Reducing total power consumption to Cloud Computing environments Shin-ichi Kuribayashi this monitors proposes possible Signaling sequences to exchangeinformation in power consumption inclusive ne ...

Virtual machine management based on resource contention awareness in enterprise application

Resource contention-aware Virtual Machine Management for Enterprise applications Andrew Fox, Andrew Turner, Hyong S. Kim order to achieve Service level agreements (SLAs) under VM consolidation, ...

Design and implementation of Peer-to-peer streaming media platform based on OpenStack

Design and implementation of Peer-to-peer streaming media platform based on OpenStack normal Wang the research content of the thesis is based on the National Digital Learning Engineering Technology Research Center cloudstreaming peer-to-peer Streaming media system, with OpenStack open source cloud platform as the support, to "p2p+ The new architecture model of cloud computing is discussed, and the Peer-to-peer streaming media platform based on cloud computing is designed and implemented. First of all, the system uses Peer-to-peer streaming media technology, through the video fragmentation, reorganization, video playback to achieve streaming transmission ...

Implementation of software batch deployment based on puppet tool

Implementation of batch deployment of software based on puppet tools Li Yunhu Zhengwei Liu Junbong to solve the problem of large-scale software deployment in cloud Platform service, the automation, continuity, logging and change flexibility of mass software deployment are realized, when the installed software can meet the silent installation, When two conditions are run under UNIX or Linux-like systems, the software can be deployed in bulk by applying puppet system Management tools. Describes the principles of the above deployment and the use of the common hard disk to copy the way to get the puppet tool support for the bulk deployment of more than ...

Security research and model design of IoT based on RFID

Research and model design of IoT security based on RFID the Yi of Shandong University, through the research on the development history of the Internet of things, and the analysis and overview of the research on the field of Internet security by domestic and foreign researchers, put forward the research subject of the security of RFID tag. Firstly, some key technologies of IoT, such as RFID tag technology, EPC Coding and network, are analyzed, and the security problems are studied. Then, according to the characteristics of RFID system, a set of two-way authentication protocol based on the derived key and hash function is proposed, the content and form of the protocol.

Research on the cloud computing framework of plagiarism detection based on spark

Research on the cloud computing framework based on spark detection Hu Haiho plagiarism detection is fundamentally a computational problem of text similarity, which requires rapid and accurate detection of textual originality in mass anthology, which consumes a lot of time and resources, and is a complex process of computation-intensive and data-intensive. Using distributed computing is one of the effective methods to improve the detection efficiency. This paper presents a set of distributed plagiarism detection cloud computing framework based on spark this framework uses the MapReduce computing framework that supports the memory presence by using the cluster Explorer Apache Mesos ...

Real-time data processing application of cloud computing based on storm in auto-clearing system

Real-time data processing application of cloud computing based on storm in automatic clearing system Hu Yuzhou Van Ku Kendao Miuli The large data problem brought by the increasing passenger traffic in the rail transit industry, this paper puts forward the method of using Strom cloud computing technology to solve this problem, and proves that the cloud computing technology is fully applicable to the track automatic traffic ticket (AFC) clearing system (ACC), the application of Storm cloud computing in processing the real-time data service of the clearing system is discussed. The practice shows that the cloud computing based on storm is fully applicable to rail transit ...

Large-scale Web application design based on Windows Azure

A large-scale Web application design based on Windows Azure Lu Chaohui Windows Azure, as Microsoft's future cloud computing platform, has many new features that are increasingly favored by the industry, Therefore, it is necessary to study the design and development of large-scale Web applications based on this platform at the present stage. First, analyze programming-related key components in Windows Azure cloud services, such as computing services, storage services, and database services, especially their differences from local development; On the basis of the platform proposed two sets ...

Research and design of medical monitoring system prototype based on ZigBee

Research and design of medical monitoring system based on ZigBee Kunming University of Technology Wang Mingwei This paper designs a prototype of medical monitoring system based on wireless sensor network of ZigBee technology. This system realizes the wireless transmission of the data, and develops the PC software on the monitoring base station, can read the simulated physiological data, analyze, store and display. This paper first through the Shenzhen Fei-CC2530MDK Technology Co., Ltd. production of the ZigBee development Kit, on the basis of Z-stack protocol stack, through the coordinator to establish a network, the use of terminal sensing ...

Authenticated key agreement protocol based on hierarchical identity for provable security

Authenticated key agreement protocol based on hierarchical identity Cao Chenlei Liu Mingxi Zhang Ju Yang Yixian The current Identity-based Authentication Key agreement protocol is a trusted third party with a single private key generator (PKG), but it is difficult to meet the requirement of identity layering registration and authentication. This paper reconstructs the constituent elements of the private key based on the hierarchical Identity Encryption (Hibe) system. A authenticated key agreement protocol based on hierarchical identity is proposed by using bilinear mapping on elliptic curve multiplication cyclic group, which provides a secure session key bargaining machine for cloud entities belonging to different levels.

Research on Coordination point selection mechanism based on vehicle-linked cloud

Research on Coordination point selection mechanism based on vehicle-linked cloud the Ma Jinguo of Inner Mongolia University this paper analyzes the current research status of vehicle-linked cloud at home and abroad, combining the main technical features of cloud computing and vanet, a selection mechanism of vehicle-joint cloud coordination point is proposed, which can realize the aggregation and distribution of vehicle resource in the context of autonomous vehicle combined cloud. Achieve the goal of effectively managing and allocating computer resources like cloud computing cluster controllers. The selection mechanism of vehicle-joint-cloud coordination node consists of two parts: (1) The selection criteria of the coordination point are determined by the node's computing ability, storage capacity, network ability and life time.

Design and implementation of file backup system based on tape grading storage

Design and implementation of file backup system based on tape grading storage Wang Yuexi Hu Xiaoqin Huang with the decreasing of disk price, more and more disaster-tolerant backup system uses local data to be transferred to server disk for backup, but the advent of large data age, resulting in increasing storage pressure. However, in the vast data, a large percentage of data activity is not high. A file backup and recovery system based on tape grading storage is designed and implemented, and the backup files are recorded and organized by means of index, and the incremental backup is realized. The system splits the server side into two parts, first the article ...

Data system planning and design of power generation group based on large data

Data system planning and design of power generation group based on large data Sching collar Huang Shesong wenming in order to enhance the management and control ability of enterprises, it is necessary to effectively integrate and apply the intangible assets, i.e. information resources. This paper makes a preliminary study and discussion on the planning, design and construction of the data system of the group enterprise, defines the content of the data system planning and makes clear the research methods. Through the analysis of the enterprise value chain and the business activities, the paper establishes the information resource architecture of the group company, and combines with the large data technology, designs the technology platform of data management and application, which is used to guide the enterprise data flat based on large data technology.

Research and implementation of competitive intelligence system based on large data

Research and realization of competitive intelligence system based on large data Yong Xu Zhongtao Diana in order to enable enterprises to obtain accurate and reliable competitive intelligence in a large data environment in time, this paper puts forward the construction of enterprise competitive intelligence system based on large data. Through b/S (browser/server) architecture, Using the network crawler of focusing crawler to carry on the collection of information, and using the KNN algorithm based on Hadoop to process and classify the information, overcome the problem of high time complexity of KNN classification algorithm under large data, and the system supports user customization. Competitive intelligence based on large data ...

Research on data security technology of coal mine cloud computing based on multidimensional immunity

Research on data security technology of coal mine cloud computing based on multidimensional immunity Wang Hairong coal industry as China's main energy industry in the data construction seriously inadequate, the current data level seriously restricts the development of coal mine enterprises. Cloud computing as a new revolutionary technology, is based on the network, can deal with all tasks, fully play the advantages of network media, has a strong function, fully adapt to the development needs of coal enterprises, to solve the digital construction of coal mining enterprises to provide technical support. This paper introduces some cloud computing service systems that can be applied to coal enterprises, and analyzes the ...

Real-time query processing based on mass data

Real-time query processing based on massive data in Wuhan University of Caofang based on the S4 system, this paper discusses the development of Java Library by introducing the query feature and the mechanism of processing data node to increase the usability of S4 system, which is called s4_s in the paper. S4_s replaces the original system's code extension mechanism, the user can create a new streaming application by writing a continuous declaration statement. At the end of the paper, we will prove the ability to improve the system processing data, and use the Network Service monitor and forecast Sina Weibo topic two applications to prove the use of this department ...

Cloud computing virtual machine allocation method based on grey relational degree

Cloud computing virtual machine allocation method based on grey relational heli the coordination problem between the utilization of the resource and the decrease of the system energy consumption in cloud computing system a new virtual machine allocation method based on grey relational degree is proposed, and the basic theory of Grey relational degree is used to establish the breach rate of Service Layer Protocol (SLA). The virtual machine allocation decision model of system energy consumption and server load evaluation function is constructed, and the virtual machine allocation algorithm based on grey relational degree is built, and the experiment is carried out on Cloudsim simulation platform. Cloud computing virtual machine allocation method based on grey relational degree

Total Pages: 2156 1 .... 1329 1330 1331 1332 1333 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.