SlideShare a Scribd company logo
1 of 22
DISSERTATION PROPOSAL : APREFETCHING
TECHNIQUE USING HMM FORWARD CHAINING
FOR THE DFS IN CLOUD
Researcher
Thilaganga.V
Reg No:16255106
Under the Guidance of
Dr.M.KARTHIKA, M.C.S.A.,
M.Phil.,Ph.D.,
Research Overview
• Abstract
• Introduction
• Cloud Computing
• Distributed File System (DFS)
• Hidden Markov Model (HMM)
• Forward Algorithm
• DFS with Forward Chain
• Client Server Transaction
• System Architecture
• Implementation
• Conclusion and Future Enhancement
Abstract
 In recent applications of Distributed File System for cloud have
managed in providing high security. The Hidden Markov Model
(HMM) has played a vital role in prediction analysis in various areas.
 Hidden Markov Model and Distributed File System (DFS) applications
have been in a variety of problems in cloud. The HMM includes
Evaluation, Decoding and Learning.
 The HMM problems can be used to solve various sequences analysis
problems, such as forward, backward and Viterbi algorithms.
 Cloud computing synchronizes the operation of all systems, with
techniques such as data center networking, the map-reduce framework
with supports data intensive computing applications in parallel and
distributed systems that provide lively resource allocation, permitting
various operating system to exists on the same physical server.
 So Distributed File System provides more reliable services.
 The paper represents client and server process, which is a storage
server, can directly pre-fetch the data from client machines. The
prefetching techniques, uses Hidden Markov Model Forward chain
and work Distributed File System for cloud.
 The prefetching techniques can be implemented to analyze the I/O
from the client machine and then send the prefetching data to the
relevant machine proactively.
 Finally, the storage server can forward the prefetching data, in prior
to the request from the client machine.
 Keywords: Distributed File System, Hidden Markov Model,
Storage Server.
Abstract Cont.…
Introduction
In this part discuss about an introduction of following as :
 Cloud Computing
 Distributed File System (DFS)
 Hidden Markov Model (HMM)
Cloud Computing
Cloud Computing Cont.…
cloud computing is the delivery of computing services servers,
storage, databases, networking, software, analytics and more over the
Internet.
Uses of cloud computing
 Create new apps and services
 Store, back up and recover data
 Host websites and blogs
 Stream audio and video
 Deliver software on demand
 Analyze data for patterns and make predictions
Distributed File System (DFS)
 In cloud computing application, distributed file system is very core
technology.
 A distributed files system for cloud is a file system that allows many
clients to have access to data and supports operations (create, delete,
modify, read, write) on that data.
 Each data file may be partitioned into several parts called chunks. Each
chunk may be stored on different remote machines, facilitating the
parallel execution of applications.
 Typically, data is stored in files in a hierarchical tree, where the nodes
represent directories.
Hidden Markov Model (HMM)
The Hidden Markov Model is a restricted set of states, each one of which
is associated with a (commonly multidimensional) possibility
distribution.
A hidden Markov model can be considered a broad view of a mixture
model someplace the hidden variables or dormant variables, which
control the mixture constituent to be designated for each observation, are
related over a Markov process somewhat than self-determining of each
other.
Types of Algorithms in HMM
 The Viterbi Algorithm
 The Forward Algorithm
 The Backward Algorithm
Forward Algorithm
 In this Algorithms are used to training for the data that are
accessed and processed with frequently. So we get trained
data that is used for finding the shortest path with values.
 In this Forward Algorithms are calculating and finding best
path value is equal 0.0315. Which means all the HMM
algorithms brings the same value using matrix format.
 The Forward Algorithm is a recursive algorithm for
calculating the observation sequence of increasing length.
Example
X —states
y —possible observations
a —state transition probabilities
b — output probabilities
 In a room that is not visible to an observer there is a genie. The room
contains urns X1, X2, X3, each of which contains a known mix of balls,
each ball labeled y1, y2, y3.
 In a room that is not visible to an observer there is a genie. The room
contains urns X1, X2, X3, each of which contains a known mix of balls,
each ball labeled y1, y2, y3.
 In HMM chaining algorithms are finding best solution path with values.
It is Combined and worked with Distributed File System for Cloud and
bring a best solution for the clients and servers.
 Distributed file system allows to multiple clients to access the data and
support operations (create, delete, modify, read, write) on that data. Each
data file may be partitioned into several parts called chunks.
 Each chunk may be stored on different remote machines, facilitating the
parallel execution of applications.
DFS with Forward Chain
Master Server
Chunks Handled and Replicas Locations
Client Server Transaction
Server Caching
 Server caching is automatic at the server in that the same buffer cache is
used as for all other files on the server.
 To avoid unexpected data loss if the server dies.
Client Caching
 The goal of client caching is to reduce the amount of remote operations.
Transfers of data are done in large chunks.
 As soon as a chunk is received, the client immediately requests the next
8K-byte chunk.
 This is known as read-ahead. This way, by the time we do, it will either be
there or we don’t have to wait too long for it since it is on its way.
Client Server Transaction Cont.…
System Architecture
Implementation
Client File System:
 Client file system is responsible for collecting the information about the
client file system and applications, as well as piggybacking it onto real I/O
requests.
Storage Server:
 It handles file management and provides the actual file I/O service for
client file systems and performs initiative prefetching. It records the block
access events with the piggybacked information sent by the client file
systems.
Training Data Input:
 The input test data is a one dimensional continuous series which cannot be
used as such unless it is converted into Usable/Classical dataset where
shape based clustering can be done. This series though one dimensional is
dependent on past values and the series is modeled in terms of predictor
and dependent variables.
Conclusion
 The proposed, implemented and evaluated in data prefetching Distributed
File System for Cloud, which the client machines can receive relevant data
proactively through by the storage server in a cloud environment.
 The storage servers are capable to analyze and predict the client I/O events
and then they proactively push data to the relevant client machines for
satisfying client’s future applications requests.
 The purpose of forward I/O events and regarding client machine
information’s are piggybacked and then transferred to corresponding
storage server from the client nodes.
 The Hidden Markov Model Froward Algorithm computes probability
much more efficiently than the naïve approach, which very quickly ends
up in combinational explosion. It can provide the probability of a given
emission or observation at each position in the sequence of observations.
 The current implementation of proposed data prefetching
process in Distributed File System for cloud using Hidden
Markov Model Froward prediction algorithms for proactively
fetch disk I/O events from the client nodes.
 Using forward chain the data is trained and increases the
learning process.
 The current implementation of proposed initiative prefetching
scheme can classify only two access patterns and support two
corresponding prediction algorithms for predicting future disk
I/O access.
Conclusion Cont.…
Future Enhancement
 In this work of implementation is using Hidden Markov Model Forward
Chain for predict the data during process time over the networks.
 In Future enhancement of prediction algorithm using the Viterbi
algorithm is a dynamic programming algorithm for finding the
most likely sequence of hidden states called the Viterbi path that results in
a sequence of observed events, especially in the context of Markov
information sources and hidden Markov models.
 Using Hidden Markov Model Viterbi Chain for predict the data during
process or run time over the network connections.
 Using this Viterbi algorithm should be trained data when it predict or
analyze the data retrieve processing.
Screen Shots
Input
Output
Thilaganga mphil cs viva presentation ppt

More Related Content

What's hot

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architecture
Kumar
 

What's hot (20)

Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and Administrator
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
 
Fundamentals of Database system
Fundamentals of Database systemFundamentals of Database system
Fundamentals of Database system
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
 
Dbms schema & instance
Dbms schema & instanceDbms schema & instance
Dbms schema & instance
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
Geoscience satellite image processing
Geoscience satellite image processingGeoscience satellite image processing
Geoscience satellite image processing
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Users
 
SLA Management in Cloud
SLA Management in CloudSLA Management in Cloud
SLA Management in Cloud
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Osi model
Osi modelOsi model
Osi model
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
ECG ANALYSIS IN CLOUD COMPUTING
ECG ANALYSIS IN CLOUD COMPUTINGECG ANALYSIS IN CLOUD COMPUTING
ECG ANALYSIS IN CLOUD COMPUTING
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architecture
 

Similar to Thilaganga mphil cs viva presentation ppt

seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
Dipak Badhe
 
E031102034039
E031102034039E031102034039
E031102034039
theijes
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 

Similar to Thilaganga mphil cs viva presentation ppt (20)

thilaganga journal 2
thilaganga journal 2thilaganga journal 2
thilaganga journal 2
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
E045026031
E045026031E045026031
E045026031
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
El35782786
El35782786El35782786
El35782786
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 

Recently uploaded

Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 

Recently uploaded (19)

Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentation
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 

Thilaganga mphil cs viva presentation ppt

  • 1. DISSERTATION PROPOSAL : APREFETCHING TECHNIQUE USING HMM FORWARD CHAINING FOR THE DFS IN CLOUD Researcher Thilaganga.V Reg No:16255106 Under the Guidance of Dr.M.KARTHIKA, M.C.S.A., M.Phil.,Ph.D.,
  • 2. Research Overview • Abstract • Introduction • Cloud Computing • Distributed File System (DFS) • Hidden Markov Model (HMM) • Forward Algorithm • DFS with Forward Chain • Client Server Transaction • System Architecture • Implementation • Conclusion and Future Enhancement
  • 3. Abstract  In recent applications of Distributed File System for cloud have managed in providing high security. The Hidden Markov Model (HMM) has played a vital role in prediction analysis in various areas.  Hidden Markov Model and Distributed File System (DFS) applications have been in a variety of problems in cloud. The HMM includes Evaluation, Decoding and Learning.  The HMM problems can be used to solve various sequences analysis problems, such as forward, backward and Viterbi algorithms.  Cloud computing synchronizes the operation of all systems, with techniques such as data center networking, the map-reduce framework with supports data intensive computing applications in parallel and distributed systems that provide lively resource allocation, permitting various operating system to exists on the same physical server.  So Distributed File System provides more reliable services.
  • 4.  The paper represents client and server process, which is a storage server, can directly pre-fetch the data from client machines. The prefetching techniques, uses Hidden Markov Model Forward chain and work Distributed File System for cloud.  The prefetching techniques can be implemented to analyze the I/O from the client machine and then send the prefetching data to the relevant machine proactively.  Finally, the storage server can forward the prefetching data, in prior to the request from the client machine.  Keywords: Distributed File System, Hidden Markov Model, Storage Server. Abstract Cont.…
  • 5. Introduction In this part discuss about an introduction of following as :  Cloud Computing  Distributed File System (DFS)  Hidden Markov Model (HMM)
  • 7. Cloud Computing Cont.… cloud computing is the delivery of computing services servers, storage, databases, networking, software, analytics and more over the Internet. Uses of cloud computing  Create new apps and services  Store, back up and recover data  Host websites and blogs  Stream audio and video  Deliver software on demand  Analyze data for patterns and make predictions
  • 8. Distributed File System (DFS)  In cloud computing application, distributed file system is very core technology.  A distributed files system for cloud is a file system that allows many clients to have access to data and supports operations (create, delete, modify, read, write) on that data.  Each data file may be partitioned into several parts called chunks. Each chunk may be stored on different remote machines, facilitating the parallel execution of applications.  Typically, data is stored in files in a hierarchical tree, where the nodes represent directories.
  • 9. Hidden Markov Model (HMM) The Hidden Markov Model is a restricted set of states, each one of which is associated with a (commonly multidimensional) possibility distribution. A hidden Markov model can be considered a broad view of a mixture model someplace the hidden variables or dormant variables, which control the mixture constituent to be designated for each observation, are related over a Markov process somewhat than self-determining of each other. Types of Algorithms in HMM  The Viterbi Algorithm  The Forward Algorithm  The Backward Algorithm
  • 10. Forward Algorithm  In this Algorithms are used to training for the data that are accessed and processed with frequently. So we get trained data that is used for finding the shortest path with values.  In this Forward Algorithms are calculating and finding best path value is equal 0.0315. Which means all the HMM algorithms brings the same value using matrix format.  The Forward Algorithm is a recursive algorithm for calculating the observation sequence of increasing length.
  • 11. Example X —states y —possible observations a —state transition probabilities b — output probabilities  In a room that is not visible to an observer there is a genie. The room contains urns X1, X2, X3, each of which contains a known mix of balls, each ball labeled y1, y2, y3.  In a room that is not visible to an observer there is a genie. The room contains urns X1, X2, X3, each of which contains a known mix of balls, each ball labeled y1, y2, y3.
  • 12.  In HMM chaining algorithms are finding best solution path with values. It is Combined and worked with Distributed File System for Cloud and bring a best solution for the clients and servers.  Distributed file system allows to multiple clients to access the data and support operations (create, delete, modify, read, write) on that data. Each data file may be partitioned into several parts called chunks.  Each chunk may be stored on different remote machines, facilitating the parallel execution of applications. DFS with Forward Chain
  • 13. Master Server Chunks Handled and Replicas Locations Client Server Transaction
  • 14. Server Caching  Server caching is automatic at the server in that the same buffer cache is used as for all other files on the server.  To avoid unexpected data loss if the server dies. Client Caching  The goal of client caching is to reduce the amount of remote operations. Transfers of data are done in large chunks.  As soon as a chunk is received, the client immediately requests the next 8K-byte chunk.  This is known as read-ahead. This way, by the time we do, it will either be there or we don’t have to wait too long for it since it is on its way. Client Server Transaction Cont.…
  • 16. Implementation Client File System:  Client file system is responsible for collecting the information about the client file system and applications, as well as piggybacking it onto real I/O requests. Storage Server:  It handles file management and provides the actual file I/O service for client file systems and performs initiative prefetching. It records the block access events with the piggybacked information sent by the client file systems. Training Data Input:  The input test data is a one dimensional continuous series which cannot be used as such unless it is converted into Usable/Classical dataset where shape based clustering can be done. This series though one dimensional is dependent on past values and the series is modeled in terms of predictor and dependent variables.
  • 17. Conclusion  The proposed, implemented and evaluated in data prefetching Distributed File System for Cloud, which the client machines can receive relevant data proactively through by the storage server in a cloud environment.  The storage servers are capable to analyze and predict the client I/O events and then they proactively push data to the relevant client machines for satisfying client’s future applications requests.  The purpose of forward I/O events and regarding client machine information’s are piggybacked and then transferred to corresponding storage server from the client nodes.  The Hidden Markov Model Froward Algorithm computes probability much more efficiently than the naïve approach, which very quickly ends up in combinational explosion. It can provide the probability of a given emission or observation at each position in the sequence of observations.
  • 18.  The current implementation of proposed data prefetching process in Distributed File System for cloud using Hidden Markov Model Froward prediction algorithms for proactively fetch disk I/O events from the client nodes.  Using forward chain the data is trained and increases the learning process.  The current implementation of proposed initiative prefetching scheme can classify only two access patterns and support two corresponding prediction algorithms for predicting future disk I/O access. Conclusion Cont.…
  • 19. Future Enhancement  In this work of implementation is using Hidden Markov Model Forward Chain for predict the data during process time over the networks.  In Future enhancement of prediction algorithm using the Viterbi algorithm is a dynamic programming algorithm for finding the most likely sequence of hidden states called the Viterbi path that results in a sequence of observed events, especially in the context of Markov information sources and hidden Markov models.  Using Hidden Markov Model Viterbi Chain for predict the data during process or run time over the network connections.  Using this Viterbi algorithm should be trained data when it predict or analyze the data retrieve processing.