SlideShare a Scribd company logo
1 of 6
Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
Abstract:
A large-scale resource sharing system (e.g., collaborative cloud computing and grid computing)
creates a virtual supercomputer by providing an infrastructure for sharing tremendous amounts of
resources (e.g., computing, storage, and data)distributed over the Internet. A resource
information service, which collects resource data and provides resource search functionality for
locating desired resources, is a crucial component of the resource sharing system. In addition to
resource discovery speed and cost (i.e., efficiency), the ability to accurately locate all satisfying
resources (i.e., fidelity) is also an important metric for evaluating service quality. Previously, a
number of resource information service systems have been proposed based on Distributed Hash
Tables (DHTs) that offer scalable key-based lookup functions. However, these systems either
achieve high fidelity at low efficiency, or high efficiency at low fidelity. Moreover, some
systems have limited flexibility by only providing exact-matching services or by describing a
resource using a pre-defined list of attributes. This paper presents a resource information service
that offers high efficiency and fidelity without restricting resource expressiveness, while also
providing a similar-matching service. Extensive simulation and PlanetLab experimental results
show that the proposed service outperforms other services in terms of efficiency, fidelity, and
flexibility; it dramatically reduces overhead and yields significant enhancements in efficiency
and fidelity.
Algorithm:
 Cooperative Game Theory.[Sharing]
User friendly file sharing
u1 + v2 ≥ α
u2 + v2 ≥ α
u3 + v1 ≥ α
 Upload, Download Algorithm.
File, image upload download.
 Distributed Hase Table.
Store The File.
Key points:
1. File Uploading, Downloading.
2. Data Sharing [user to user]
EXISTING SYSTEM
The system then maps the resource point to a DHT node. This guarantees that all existing
resources that match a query are foundwith bounded costs in terms of the number ofmessages
and nodes involved. A resource has a vector, the size of which is the number of dimensions.
PIRD relies on an existing LSH technique in Euclidean spaces [32] to create a number of IDs for
a resource, and then maps the resource to DHT nodes. In a system with a tremendous number of
resource attributes, PIRD leads to dramatically high memory consumption and low efficiency of
resource ID creation due to long resource vectors.
PROPOSED SYSTEM
Schmidt and Parashar proposed a dimension reducing indexing scheme for resource discovery.
They built a multidimensional space with each coordinate representing a resource attribute. The
Fig shows an example of a 3-dimensional keyword space. The resources are viewed as base-
numbers, where is the total number of attributes in the grid system. Since one-point mapping
and PIRDbuild a pre-defined attribute list, they are not sufficiently flexible in dealing with new
attributes. To overcome this problem, our proposed LIS builds new LSH functions to transform
resources to resource IDs, which does not require a pre-defined attribute list. Thus, LIS
significantly reduces memory consumption and improves the efficiency of resource ID creation.
All methods approximately only need no more than 3 ms. This result indicates that our proposed
load balancing algorithm only generates a very short latency.
Advantage
Easy to Share files
User to User File Sharing
Provide files.
System architecture
MODULE DESCRIPTION
MODULE
Case Study and Data Collection
User
Admin Authentication
Cloud
MODULE DESCRIPTION
Case Study and Data Collection
We consider a case study of a web-based collaboration application for evaluating performance.
The application allows users to store, manage, and share documents and drawings related to large
construction projects. The service composition required for this application includes: Firewall
(x1), Intrusion Detection (x1), Load Balancer (x1), Web Server (x4), Application Server (x3),
Database Server (x1), Database Reporting Server (x1), Email Server (x1), and Server Health
Monitoring (x1). To meet these requirements, our objective is to find the best Cloud service
composition
USER
A common approach to improve reliability and other QoS parameters of a service composition is
by dynamic service selection at run time. In a dynamic service composition a set of functionally
equivalent services exists for each service invocation and actual services are incorporated into
the execution configuration depending on their most recent QoS parameters. However, two
dominant issues limit the application of dynamic compositions on a larger scale: service
selection and detection of equivalent services. Since service selection at run time is bonded by
additional constraints, like statefullness and composability, statebased reliability models need to
be applied. However, such models are prone to state explosions, making it difficult to support
more complex compositions. The other commonly used approach treats service selection as an
optimization problem.
Share Data
The user can share their data into another user in same group the data will translate by path
setting data.
Upload File
The user can upload the file to cloud. And the Admin can allow the data to store the cloud.
Download File
The user also download the cloud file by the conditions.
Admin Authentication
We propose an iterative reliability improvement method for service compositions based on the
extension of our previous work in [20]. The method consists of: reliability estimation, weak point
recommendation and weak point strengthening steps, as defined by the overview. In the rest of
this section, we briefly describe each of the stated steps.
Accept user
The admin can accept the new user request and also black the users.
Allow user file
The users can upload the file to cloud. And the admin can allow the files to cloud then only the
file can store the cloud.
CLOUD
However, other SOA implementations can be expected to gain more traction in the coming years
with the continuous proliferation of cloud computing and increasing popularity of software as a
service (SaaS) platforms . One of the most pronounced benefits of SOA are service
compositions, component-based applications built by combining the existing services. The
concept of compositions makes SOA particularly popular in designing a large variety of systems
that benefit from clear separation of interests. For instance, when designing enterprise systems,
different segments of functionality within a business process can be developed independently by
different organizational units. However, designing service compositions also presents additional
challenges as services can be deployed by third parties over which the composition developer has
no supervision. A strong concern in such an environment is the necessity to design a composition
with an adequate level of non-functional properties, like reliability, availability or other Quality
of Service (QoS)parameters.
Download File
The user also download the cloud file by the conditions.
Admin Authentication
We propose an iterative reliability improvement method for service compositions based on the
extension of our previous work in [20]. The method consists of: reliability estimation, weak point
recommendation and weak point strengthening steps, as defined by the overview. In the rest of
this section, we briefly describe each of the stated steps.
Accept user
The admin can accept the new user request and also black the users.
Allow user file
The users can upload the file to cloud. And the admin can allow the files to cloud then only the
file can store the cloud.
CLOUD
However, other SOA implementations can be expected to gain more traction in the coming years
with the continuous proliferation of cloud computing and increasing popularity of software as a
service (SaaS) platforms . One of the most pronounced benefits of SOA are service
compositions, component-based applications built by combining the existing services. The
concept of compositions makes SOA particularly popular in designing a large variety of systems
that benefit from clear separation of interests. For instance, when designing enterprise systems,
different segments of functionality within a business process can be developed independently by
different organizational units. However, designing service compositions also presents additional
challenges as services can be deployed by third parties over which the composition developer has
no supervision. A strong concern in such an environment is the necessity to design a composition
with an adequate level of non-functional properties, like reliability, availability or other Quality
of Service (QoS)parameters.

More Related Content

What's hot

Mining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce TheoremMining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce TheoremIOSR Journals
 
gLite Information System
gLite Information SystemgLite Information System
gLite Information SystemLeandro Ciuffo
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseijccsa
 
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...iosrjce
 
Resource usage optimization in cloud based networks
Resource usage optimization in cloud based networksResource usage optimization in cloud based networks
Resource usage optimization in cloud based networksDimo Iliev
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeSumant Tambe
 
Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...ijdpsjournal
 
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...Performance evaluation of Map-reduce jar pig hive and spark with machine lear...
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...IJECEIAES
 
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...Arjun Sirohi
 

What's hot (16)

Mining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce TheoremMining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce Theorem
 
gLite Information System
gLite Information SystemgLite Information System
gLite Information System
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
 
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop fo...
 
Resource usage optimization in cloud based networks
Resource usage optimization in cloud based networksResource usage optimization in cloud based networks
Resource usage optimization in cloud based networks
 
1732 1737
1732 17371732 1737
1732 1737
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
 
7. the grid ogsa
7. the grid ogsa7. the grid ogsa
7. the grid ogsa
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
 
M035484088
M035484088M035484088
M035484088
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/Subscribe
 
C1803041317
C1803041317C1803041317
C1803041317
 
Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...
 
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...Performance evaluation of Map-reduce jar pig hive and spark with machine lear...
Performance evaluation of Map-reduce jar pig hive and spark with machine lear...
 
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...
Context-Sensitive Indexes for Performance Optimization of SQL Queries in Mult...
 

Viewers also liked

Мультимедійні технології
Мультимедійні технологіїМультимедійні технології
Мультимедійні технологіїtarlykovapgf25
 
Space efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationSpace efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationCloudTechnologies
 
запись географических названий
запись географических названийзапись географических названий
запись географических названийxshadow2013
 
Genre Analysis
Genre Analysis Genre Analysis
Genre Analysis downerj
 
Question 6- What have you learnt about technologies from the process of const...
Question 6- What have you learnt about technologies from the process of const...Question 6- What have you learnt about technologies from the process of const...
Question 6- What have you learnt about technologies from the process of const...downerj
 
Digipak Analysis
Digipak Analysis Digipak Analysis
Digipak Analysis downerj
 
Page a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computationPage a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computationCloudTechnologies
 
Genre Analysis
Genre Analysis Genre Analysis
Genre Analysis downerj
 
Annotated lyrics
Annotated lyrics Annotated lyrics
Annotated lyrics downerj
 
Query aware determinization of uncertain objects
Query aware determinization of uncertain objectsQuery aware determinization of uncertain objects
Query aware determinization of uncertain objectsCloudTechnologies
 
Shot List
Shot List Shot List
Shot List downerj
 

Viewers also liked (13)

Мультимедійні технології
Мультимедійні технологіїМультимедійні технології
Мультимедійні технології
 
Space efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationSpace efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolation
 
запись географических названий
запись географических названийзапись географических названий
запись географических названий
 
Genre Analysis
Genre Analysis Genre Analysis
Genre Analysis
 
Script
Script Script
Script
 
Question 6- What have you learnt about technologies from the process of const...
Question 6- What have you learnt about technologies from the process of const...Question 6- What have you learnt about technologies from the process of const...
Question 6- What have you learnt about technologies from the process of const...
 
Digipak Analysis
Digipak Analysis Digipak Analysis
Digipak Analysis
 
Page a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computationPage a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computation
 
Genre Analysis
Genre Analysis Genre Analysis
Genre Analysis
 
Annotated lyrics
Annotated lyrics Annotated lyrics
Annotated lyrics
 
Query aware determinization of uncertain objects
Query aware determinization of uncertain objectsQuery aware determinization of uncertain objects
Query aware determinization of uncertain objects
 
Script
Script Script
Script
 
Shot List
Shot List Shot List
Shot List
 

Similar to Combining efficiency, fidelity, and flexibility in resource information services

Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceEditor Jacotech
 
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...IJCI JOURNAL
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
 
A Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud ComputingA Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud Computingneirew J
 
Cloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureCloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureJohnny Le
 
Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service BusHamed Hatami
 
Technology Overview
Technology OverviewTechnology Overview
Technology OverviewLiran Zelkha
 
Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecturemeenalkakkar
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASijseajournal
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Survey_Report_on_AWS_by_Praval_&_Arjun
Survey_Report_on_AWS_by_Praval_&_ArjunSurvey_Report_on_AWS_by_Praval_&_Arjun
Survey_Report_on_AWS_by_Praval_&_ArjunPraval Panwar
 
Cloud migration-main
Cloud migration-mainCloud migration-main
Cloud migration-mainsaifam
 
Real time service oriented cloud computing
Real time service oriented cloud computingReal time service oriented cloud computing
Real time service oriented cloud computingwww.pixelsolutionbd.com
 

Similar to Combining efficiency, fidelity, and flexibility in resource information services (20)

Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
 
A Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud ComputingA Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud Computing
 
M 94 4
M 94 4M 94 4
M 94 4
 
Cloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architectureCloud application services (saa s) – multi tenant data architecture
Cloud application services (saa s) – multi tenant data architecture
 
Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service Bus
 
Technology Overview
Technology OverviewTechnology Overview
Technology Overview
 
Cloud computing architecture
Cloud computing architectureCloud computing architecture
Cloud computing architecture
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
F1034047
F1034047F1034047
F1034047
 
B03410609
B03410609B03410609
B03410609
 
Survey_Report_on_AWS_by_Praval_&_Arjun
Survey_Report_on_AWS_by_Praval_&_ArjunSurvey_Report_on_AWS_by_Praval_&_Arjun
Survey_Report_on_AWS_by_Praval_&_Arjun
 
Cloud migration-main
Cloud migration-mainCloud migration-main
Cloud migration-main
 
Cloud migration-main
Cloud migration-mainCloud migration-main
Cloud migration-main
 
Real time service oriented cloud computing
Real time service oriented cloud computingReal time service oriented cloud computing
Real time service oriented cloud computing
 

More from CloudTechnologies

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...CloudTechnologies
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersCloudTechnologies
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...CloudTechnologies
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station systemCloudTechnologies
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...CloudTechnologies
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesCloudTechnologies
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...CloudTechnologies
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationCloudTechnologies
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List CloudTechnologies
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)CloudTechnologies
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoTCloudTechnologies
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTCloudTechnologies
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...CloudTechnologies
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTCloudTechnologies
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersCloudTechnologies
 

More from CloudTechnologies (20)

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Io t projects
Io t projectsIo t projects
Io t projects
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Data mining projects
Data mining projectsData mining projects
Data mining projects
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Combining efficiency, fidelity, and flexibility in resource information services

  • 1. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services Abstract: A large-scale resource sharing system (e.g., collaborative cloud computing and grid computing) creates a virtual supercomputer by providing an infrastructure for sharing tremendous amounts of resources (e.g., computing, storage, and data)distributed over the Internet. A resource information service, which collects resource data and provides resource search functionality for locating desired resources, is a crucial component of the resource sharing system. In addition to resource discovery speed and cost (i.e., efficiency), the ability to accurately locate all satisfying resources (i.e., fidelity) is also an important metric for evaluating service quality. Previously, a number of resource information service systems have been proposed based on Distributed Hash Tables (DHTs) that offer scalable key-based lookup functions. However, these systems either achieve high fidelity at low efficiency, or high efficiency at low fidelity. Moreover, some systems have limited flexibility by only providing exact-matching services or by describing a resource using a pre-defined list of attributes. This paper presents a resource information service that offers high efficiency and fidelity without restricting resource expressiveness, while also providing a similar-matching service. Extensive simulation and PlanetLab experimental results show that the proposed service outperforms other services in terms of efficiency, fidelity, and flexibility; it dramatically reduces overhead and yields significant enhancements in efficiency and fidelity. Algorithm:  Cooperative Game Theory.[Sharing] User friendly file sharing u1 + v2 ≥ α u2 + v2 ≥ α u3 + v1 ≥ α
  • 2.  Upload, Download Algorithm. File, image upload download.  Distributed Hase Table. Store The File. Key points: 1. File Uploading, Downloading. 2. Data Sharing [user to user] EXISTING SYSTEM The system then maps the resource point to a DHT node. This guarantees that all existing resources that match a query are foundwith bounded costs in terms of the number ofmessages and nodes involved. A resource has a vector, the size of which is the number of dimensions. PIRD relies on an existing LSH technique in Euclidean spaces [32] to create a number of IDs for a resource, and then maps the resource to DHT nodes. In a system with a tremendous number of resource attributes, PIRD leads to dramatically high memory consumption and low efficiency of resource ID creation due to long resource vectors. PROPOSED SYSTEM Schmidt and Parashar proposed a dimension reducing indexing scheme for resource discovery. They built a multidimensional space with each coordinate representing a resource attribute. The Fig shows an example of a 3-dimensional keyword space. The resources are viewed as base- numbers, where is the total number of attributes in the grid system. Since one-point mapping and PIRDbuild a pre-defined attribute list, they are not sufficiently flexible in dealing with new attributes. To overcome this problem, our proposed LIS builds new LSH functions to transform resources to resource IDs, which does not require a pre-defined attribute list. Thus, LIS significantly reduces memory consumption and improves the efficiency of resource ID creation.
  • 3. All methods approximately only need no more than 3 ms. This result indicates that our proposed load balancing algorithm only generates a very short latency. Advantage Easy to Share files User to User File Sharing Provide files. System architecture MODULE DESCRIPTION MODULE Case Study and Data Collection User Admin Authentication
  • 4. Cloud MODULE DESCRIPTION Case Study and Data Collection We consider a case study of a web-based collaboration application for evaluating performance. The application allows users to store, manage, and share documents and drawings related to large construction projects. The service composition required for this application includes: Firewall (x1), Intrusion Detection (x1), Load Balancer (x1), Web Server (x4), Application Server (x3), Database Server (x1), Database Reporting Server (x1), Email Server (x1), and Server Health Monitoring (x1). To meet these requirements, our objective is to find the best Cloud service composition USER A common approach to improve reliability and other QoS parameters of a service composition is by dynamic service selection at run time. In a dynamic service composition a set of functionally equivalent services exists for each service invocation and actual services are incorporated into the execution configuration depending on their most recent QoS parameters. However, two dominant issues limit the application of dynamic compositions on a larger scale: service selection and detection of equivalent services. Since service selection at run time is bonded by additional constraints, like statefullness and composability, statebased reliability models need to be applied. However, such models are prone to state explosions, making it difficult to support more complex compositions. The other commonly used approach treats service selection as an optimization problem. Share Data The user can share their data into another user in same group the data will translate by path setting data. Upload File The user can upload the file to cloud. And the Admin can allow the data to store the cloud.
  • 5. Download File The user also download the cloud file by the conditions. Admin Authentication We propose an iterative reliability improvement method for service compositions based on the extension of our previous work in [20]. The method consists of: reliability estimation, weak point recommendation and weak point strengthening steps, as defined by the overview. In the rest of this section, we briefly describe each of the stated steps. Accept user The admin can accept the new user request and also black the users. Allow user file The users can upload the file to cloud. And the admin can allow the files to cloud then only the file can store the cloud. CLOUD However, other SOA implementations can be expected to gain more traction in the coming years with the continuous proliferation of cloud computing and increasing popularity of software as a service (SaaS) platforms . One of the most pronounced benefits of SOA are service compositions, component-based applications built by combining the existing services. The concept of compositions makes SOA particularly popular in designing a large variety of systems that benefit from clear separation of interests. For instance, when designing enterprise systems, different segments of functionality within a business process can be developed independently by different organizational units. However, designing service compositions also presents additional challenges as services can be deployed by third parties over which the composition developer has no supervision. A strong concern in such an environment is the necessity to design a composition with an adequate level of non-functional properties, like reliability, availability or other Quality of Service (QoS)parameters.
  • 6. Download File The user also download the cloud file by the conditions. Admin Authentication We propose an iterative reliability improvement method for service compositions based on the extension of our previous work in [20]. The method consists of: reliability estimation, weak point recommendation and weak point strengthening steps, as defined by the overview. In the rest of this section, we briefly describe each of the stated steps. Accept user The admin can accept the new user request and also black the users. Allow user file The users can upload the file to cloud. And the admin can allow the files to cloud then only the file can store the cloud. CLOUD However, other SOA implementations can be expected to gain more traction in the coming years with the continuous proliferation of cloud computing and increasing popularity of software as a service (SaaS) platforms . One of the most pronounced benefits of SOA are service compositions, component-based applications built by combining the existing services. The concept of compositions makes SOA particularly popular in designing a large variety of systems that benefit from clear separation of interests. For instance, when designing enterprise systems, different segments of functionality within a business process can be developed independently by different organizational units. However, designing service compositions also presents additional challenges as services can be deployed by third parties over which the composition developer has no supervision. A strong concern in such an environment is the necessity to design a composition with an adequate level of non-functional properties, like reliability, availability or other Quality of Service (QoS)parameters.