AN APPROACH FOR SECURE CLOUD COMPUTING FOR FEM SIMULATION
|
|
|
- Blanche Poole
- 9 years ago
- Views:
Transcription
1 AN APPROACH FOR SECURE CLOUD COMPUTING FOR FEM SIMULATION Jörg Frochte *, Christof Kaufmann, Patrick Bouillon Dept. of Electrical Engineering and Computer Science Bochum University of Applied Science Bochum, Germany * [email protected] ABSTRACT This paper deals with the challenge to make cloud computing an acceptable way for finite element method (FEM) simulations. This is of special interest for small and mid-size engineering companies (SMEs), for whom it makes no sense to provide a computation cluster for a few big simulations per year. The approach we propose makes use of the specific properties of the FEM and with these it enables the user to simulate in the cloud without risking sensitive information. The opportunity to split the simulation on different providers increases the security of the method but leads to a quite big set of parameters for the user to choose. To make the approach attractive for end-users we integrate simulation data mining based assistance systems. KEYWORDS Cloud Computing, Safety & Security, Simulation Data Mining, Machine Learning, Assistant systems, FEM 1. INTRODUCTION Cloud computing has deeply changed the way how costumers use computers and as well the way companies work and communicate. However, after Edward Snowden's release of NSA material European companies began to have doubts about entrusting their important data to cloud services operated by US companies. To realize how common this problem is, one might think of the speech of Neelie Kroes, European Commission vice president, from 4 July 2013 (Kroes [2013]). Security is essential when it comes to CAE (computer-aided engineering) data from the product development process. CAE is the typical industrial application area for Finite Element Method (FEM) simulation and it includes significant knowledge of the company s innovations. In order to make cloud computing an accepted method for industrial users in the field of simulation, this security challenge has to be solved. It is important to enhance the acceptance because cloud computing has the potential to help resolving two problems. It promises a way to combine Green-IT if cloud computing resources are centralized in efficient data centers where energy can be produced, e.g. with water power with benefits concerning synergies in maintenance and need-based use of soft- and hardware. So it is an important task to make cloud computing safer by using technical approaches. 2. APPROACH FOR SECURE FEM SIMULATION Concerning cloud computing we focus on the area of CAE, to be precisely on the simulation of large models using the finite element method (FEM) in three dimensions. The base of FEM is a mesh of elements we consider tetrahedrons only. How fine the mesh is depends on the geometry that is to be simulated and the error tolerance for the results. For three dimensional FEM models the degrees of freedom tend to grow very
2 fast. A simple example is a cube with the edge length of one meter. If this is uniformly discretized with a grid spacing of 1 cm, we have 100 degrees of freedom to the power of three and so we end up with a million unknowns. If the grid must be refined uniformly, one already reaches eight million unknowns etc. On the one hand these problems can be solved very efficiently on computer clusters using parallelization techniques from domain decomposition. On the other hand for small and mid-size companies it makes no sense to provide a computation cluster for only a few big simulations per year. So this is a perfect use case to rent soft- and/or hardware as a service. The three primary types of cloud models, see e.g. (Borko and Armando [2010], Chapter 1), are: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). A pure IaaS would not meet the need of a small or mid-size company, among others it would need too much expertise to handle it. We address for this problem a PaaS variant, in which the provided platform is accessed by client software that runs on the company computer. The source code of the client is included to make the processing transparent for the user. Now, with this very rough architecture we will address the basic problem, which is the fact that on the one hand the data must be protected and on the other hand it must be available for the processing on the cloud server. Solving this problem we follow two basic ideas: 1. Hand-off the work, not the information! 2. Never put all eggs in one basket! So the first step is to make sure that as few sensitive data as possible need to be transferred in the cloud at all; in the optimal case even none. The approach for this purpose is illustrated by the following Figure 1: Figure 1: Sketch of application scenario From a standard program, in which the CAD data of the model are processed, a software generates job packages. Right now we are just dealing with static problems where data files with description files turn out to be the most efficient approach. On the long run we expect that time-dependent FEM models will require some code generation. So the cloud paradigms are adapted here to the specific application environment. The user at the beginning of the chain should work without the knowledge of the specific processing of his data. The client software calls the cloud provider for information about the hardware topology, e.g. memory, processors, operating systems, etc. which is offered and optimizes the job generation for this configuration. The produced job packages are transferred only in the form of binary form, which can connect to defined interfaces of the cloud PaaS and then get processed there. The results are returned to the company's internal client, where they are available for the user. One main aspect of this setting is that the provider of the PaaS is in general not the provider of the FEM simulation software. The user stays independent of the cloud provider as long as a standardization of the API of the provided software infrastructure could be achieved. The user can rely on the security of the processed data because he generated it on his own host computer and is able to control what he transmits to the cloud. Storage and transmission of business-critical data is thereby avoided. The design of the software architecture requires no permanent data in the cloud. However, it
3 is still possible to attack the temporary data in RAM and or grab the data by an internal attack from e.g. employees of the cloud provider. To avoid this and make sure that Hand off the work, not the information is possible, we need to have a brief look on how FEM is performed. A simplified description of FEM processing is as follows: 1. Generation of the FEM mesh from CAD data 2. Discretization of the equation, e.g. a linear elasticity model, by means of the mesh For a more detailed description see e.g. (Brenner and Scott [2008]). By discretization, in the case of a time-independent linear model as a result, a very large but sparse system of equations is obtained: Ad = b In the case of a time-dependent linear model we have obtained a system of ordinary differential equations by the method of lines: dd + Ad = f(d, t) dt Therefore, in these cases the result is a single linear system of equations or a sequence of systems which are sparse, but might include hundreds of thousands up to several million unknowns. So we have as last step of the procedure: 3. (Repeated) solution of the system of linear equations, which represent the FEM model Step 3 is the computationally most expensive part. By using a cloud to process this step we use the scalable resources where they are required without risking sensitive R&D data. The entries of the above FEM matrix A are assembled by the integration of base functions. As a matter of fact the conversion from the FEM model - consisting of mesh, PDE, material properties etc. to the FEM matrix is in the terms of cryptography a kind of one-way function. This means that there is no way back to the FEM model, if one just has the FEM matrix. The effect can be outlined by the following figure: Figure 2: Security, flexibility and performance on the different levels So if the full CAD data is sent to the cloud an attacker could steal all data of the design. In the step of mesh generation, all information on manufacturers and types of data is lost. An example is an approximation of a screw of a particular manufacturer with all catalog data by tetrahedrons and double values for material properties. So already at level 2 less information is transferred to the cloud and in some applications this might already be acceptable. However, at this level it cannot be completely ruled out that relevant data could be recovered by an attacker with expertise and time for a deep analysis. On the last level just the FEM matrices or the set of ordinary differential equations are transferred to the cloud, so no data is transmitted which allows an attacker to recover interesting data from the CAD model. Of course, there are some disadvantages of the most secure level. If one just transmits the FEM matrix, the price is a loss of flexibility and possibly as well performance. Flexibility means in this context particularly the adaptive adjustment of the mesh to the desired accuracy. Such techniques require the mesh itself. For non-linear models the host would have to perform multiple transmissions and so the network
4 traffic might become a serious problem. Because most common CAE tools use linear problems as long as possible, e.g. linear elasticity computation, level 3 still leaves a wide area of relevant linear applications. One way to make the second level more attractive and in some cases even improve the performance is by splitting the simulation on multiple providers. The approach is based on a method that is normally used for parallel simulation of FEM models. We use robust domain decomposition methods, see e.g. (Toselli and Widlund [2004]) for details, from the class of Schwarz methods. The underlying idea is quite simple and is illustrated by the following two-dimensional example in Figure 3: Figure 3: Illustrated base idea of overlapping Schwarz methods The domain Ω is divided into two subdomains Ω 1 and Ω 2 and solved separately on each domain. The computed solutions are exchanged and then the problem is solved again with this method. This iterative process may seem inefficient since the systems of equations on Ω 1 and Ω 2 must be solved repeatedly instead of just once on the domain Ω. The method is, however, used with great success in the parallel processing of partial differential equations, as a large system of equations is much more expensive with respect to CPU time than two small ones. The theoretical background lies in the fact that solving linear equation systems with direct solvers has in general a complexity of O (n m ) with m> 1. The known Gaussian method results in an increase in the number of arithmetic operations with O (n 3 ). 3. SIMULATION DATA MINING BASED ASSISTANCE SYSTEMS A critical aspect of the Schwarz method is the rate of convergence that depends on the PDE itself, which is fixed because this is the given use case, and the size as well as the position of the overlap. On the one hand we have got the fact that the wider the overlap is chosen, the faster and more robust the iteration proceeds. On the other hand increasing the overlap increases the overhead of the method significantly. For a heterogeneous application scenario with three PasS providers as displayed in Figure 4 choosing a reasonable setting is a nontrivial task, see (Bernst et al. [2014]) for details. Figure 4: Heterogeneous application scenario with three PasS providers Figure 5: Simulation Data Mining Workflow Therefore, the original set of parameters of a FEM simulation that for professional tools is not small is again expanded with parameters needed for the cloud simulation. So users are confronted with a parameter space of a challenging size and complexity. To address this we propose that a database of configurations should be pre-computed such that the behavior of similar cases can be used to guide decision making. A similar technique was used in (Burrows et al. [2011]) for supporting bridge design, while (Butnaru et al. 2012) focus on approaches for model reduction methods. In particular, simulation results based on provided hardware topology, PDE model and domain partitioning are clustered to identify cases with similar behavior. This approach will make it possible to compare different settings without actually simulating them. The learned function is the basement of assistant
5 systems that are still under development and follow the workflow from Figure 5. One of the first papers dealing with data mining from simulation results using the term simulation data mining is (Brady and Yellig [2005]). An example how this is successfully performed is described in a collaboration paper (Burrows et al. [2013]) on an example of learning overlap optimization for domain decomposition methods. 4. CONCLUSION In this paper we proposed a design concept for using cloud capacities for FEM simulation with a maximum of safety and security. The main insight was that a FEM simulation can be drawn out in a cloud without risking sensitive R&D data. This relies on the one-way behavior of the mathematical assembling. Therefore, we can provide an architecture that allows to hand off the computation job, which has the requirement for expensive hardware, to the cloud without transmitting information about products and R&D strategies of the user. A multi provider scenario makes it possible to increase the security in some use cases, leads to a higher performance and helps to gain independence for the user. The problem of the rising set of configuration parameters is addressed by using simulation data mining as a base of assistance systems. These assistance systems for numerical simulations are part of our future work. A key challenge in numerical simulation for end-users like engineers is the use of parameterized numerical simulation methods; see e.g. (Stein and Curatolo [1998]). These methods are often difficult to deploy for end-users. As a result, the most robust and parameter-independent methods, such as direct solvers for linear systems, are often preferred in many engineering contexts, even if they are less efficient. The key idea is that the parameters in this latter group can be learned in order to converge the ease of use towards the parameter-independent methods, particularly in aspects and use cases that involve code generation. ACKNOWLEDGEMENT This work is supported by the BMBF (Federal Ministry of Education and Research, Germany) under grant 03FH REFERENCES Bernst, I., Bouillon, P., Frochte J. and Kaufmann, C., An approach for load balancing for simulation in heterogeneous distributed systems using simulation data mining, Proceedings of the 11th International Conference Applied Computing, Porto, Portugal (submitted) Brady, T. F., and Yellig, E., Simulation Data Mining: A New Form of Computer Simulation Output, Proceedings of the Thirty-Seventh Winter Simulation Conference, Orlando, Florida, pp Brenner, S.C., and Scott, L.R., The mathematical theory of finite element method. Springer-Verlag, New York- Berlin-Heidelberg, 3rd edition. Borko, F., and Armando, E., Handbook of Cloud Computing, Springer Science & Business Media, USA. Burrows S., Stein, B. Frochte J., Wiesner, D. and Müller, K., Simulation Data Mining for Supporting Bridge Design, Proceedings of the Ninth Australasian Data Minig Conference, Balarat, Australia, ACM pp Burrows S., Frochte J., Völske, M., Martinez Torres, A.B. and Stein, B., Learning Overlap Optimization for Domain Decomposition Methods, 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 13), pp Butnaru, D., Peherstorfer, B., Bungartz, H., and Pfluger, D., 2012, Fast insight into high-dimensional parameterized simulation data, Machine Learning and Applications (ICMLA), th International Conference on. Vol. 2. IEEE Kroes N., Statement by Vice President Neelie Kroes "on the consequences of living in an age of total information" Stein, B. and Curatolo, D., Selection of Numerical Methods in Specific Simulation Applications, Proceedings of the Eleventh International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems. Castellon, Spain, Toselli, A., and Widlund, O., Domain Decomposition Methods Algorithms and Theory, Springer, Leipzig, Germany.
Cluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
HPC Deployment of OpenFOAM in an Industrial Setting
HPC Deployment of OpenFOAM in an Industrial Setting Hrvoje Jasak [email protected] Wikki Ltd, United Kingdom PRACE Seminar: Industrial Usage of HPC Stockholm, Sweden, 28-29 March 2011 HPC Deployment
A Simultaneous Solution for General Linear Equations on a Ring or Hierarchical Cluster
Acta Technica Jaurinensis Vol. 3. No. 1. 010 A Simultaneous Solution for General Linear Equations on a Ring or Hierarchical Cluster G. Molnárka, N. Varjasi Széchenyi István University Győr, Hungary, H-906
FRIEDRICH-ALEXANDER-UNIVERSITÄT ERLANGEN-NÜRNBERG
FRIEDRICH-ALEXANDER-UNIVERSITÄT ERLANGEN-NÜRNBERG INSTITUT FÜR INFORMATIK (MATHEMATISCHE MASCHINEN UND DATENVERARBEITUNG) Lehrstuhl für Informatik 10 (Systemsimulation) Massively Parallel Multilevel Finite
HPC enabling of OpenFOAM R for CFD applications
HPC enabling of OpenFOAM R for CFD applications Towards the exascale: OpenFOAM perspective Ivan Spisso 25-27 March 2015, Casalecchio di Reno, BOLOGNA. SuperComputing Applications and Innovation Department,
Fast Multipole Method for particle interactions: an open source parallel library component
Fast Multipole Method for particle interactions: an open source parallel library component F. A. Cruz 1,M.G.Knepley 2,andL.A.Barba 1 1 Department of Mathematics, University of Bristol, University Walk,
Back to Elements - Tetrahedra vs. Hexahedra
Back to Elements - Tetrahedra vs. Hexahedra Erke Wang, Thomas Nelson, Rainer Rauch CAD-FEM GmbH, Munich, Germany Abstract This paper presents some analytical results and some test results for different
High Performance Computing in CST STUDIO SUITE
High Performance Computing in CST STUDIO SUITE Felix Wolfheimer GPU Computing Performance Speedup 18 16 14 12 10 8 6 4 2 0 Promo offer for EUC participants: 25% discount for K40 cards Speedup of Solver
Identification of Energy Distribution for Crash Deformational Processes of Road Vehicles
Acta Polytechnica Hungarica Vol. 4, No., 007 Identification of Energy Distribution for Crash Deformational Processes of Road Vehicles István Harmati, Péter Várlaki Department of Chassis and Lightweight
Load Balancing on a Non-dedicated Heterogeneous Network of Workstations
Load Balancing on a Non-dedicated Heterogeneous Network of Workstations Dr. Maurice Eggen Nathan Franklin Department of Computer Science Trinity University San Antonio, Texas 78212 Dr. Roger Eggen Department
How to Do/Evaluate Cloud Computing Research. Young Choon Lee
How to Do/Evaluate Cloud Computing Research Young Choon Lee Cloud Computing Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing
OpenFOAM Optimization Tools
OpenFOAM Optimization Tools Henrik Rusche and Aleks Jemcov [email protected] and [email protected] Wikki, Germany and United Kingdom OpenFOAM Optimization Tools p. 1 Agenda Objective Review optimisation
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
CDBMS Physical Layer issue: Load Balancing
CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna [email protected] Shipra Kataria CSE, School of Engineering G D Goenka University,
Parallel Programming at the Exascale Era: A Case Study on Parallelizing Matrix Assembly For Unstructured Meshes
Parallel Programming at the Exascale Era: A Case Study on Parallelizing Matrix Assembly For Unstructured Meshes Eric Petit, Loïc Thebault, Quang V. Dinh May 2014 EXA2CT Consortium 2 WPs Organization Proto-Applications
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications by Samuel D. Kounev ([email protected]) Information Technology Transfer Office Abstract Modern e-commerce
FEAWEB ASP Issue: 1.0 Stakeholder Needs Issue Date: 03/29/2000. 04/07/2000 1.0 Initial Description Marco Bittencourt
)($:(%$63 6WDNHKROGHU1HHGV,VVXH 5HYLVLRQ+LVWRU\ 'DWH,VVXH 'HVFULSWLRQ $XWKRU 04/07/2000 1.0 Initial Description Marco Bittencourt &RQILGHQWLDO DPM-FEM-UNICAMP, 2000 Page 2 7DEOHRI&RQWHQWV 1. Objectives
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
METHODOLOGICAL CONSIDERATIONS OF DRIVE SYSTEM SIMULATION, WHEN COUPLING FINITE ELEMENT MACHINE MODELS WITH THE CIRCUIT SIMULATOR MODELS OF CONVERTERS.
SEDM 24 June 16th - 18th, CPRI (Italy) METHODOLOGICL CONSIDERTIONS OF DRIVE SYSTEM SIMULTION, WHEN COUPLING FINITE ELEMENT MCHINE MODELS WITH THE CIRCUIT SIMULTOR MODELS OF CONVERTERS. Áron Szûcs BB Electrical
How To Balance In Cloud Computing
A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi [email protected] Yedhu Sastri Dept. of IT, RSET,
WORKFLOW ENGINE FOR CLOUDS
WORKFLOW ENGINE FOR CLOUDS By SURAJ PANDEY, DILEBAN KARUNAMOORTHY, and RAJKUMAR BUYYA Prepared by: Dr. Faramarz Safi Islamic Azad University, Najafabad Branch, Esfahan, Iran. Workflow Engine for clouds
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
The Big Data methodology in computer vision systems
The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of
Mesh Generation and Load Balancing
Mesh Generation and Load Balancing Stan Tomov Innovative Computing Laboratory Computer Science Department The University of Tennessee April 04, 2012 CS 594 04/04/2012 Slide 1 / 19 Outline Motivation Reliable
Research on the Performance Optimization of Hadoop in Big Data Environment
Vol.8, No.5 (015), pp.93-304 http://dx.doi.org/10.1457/idta.015.8.5.6 Research on the Performance Optimization of Hadoop in Big Data Environment Jia Min-Zheng Department of Information Engineering, Beiing
Cloud Computing and Business Intelligence
Database Systems Journal vol. V, no. 4/2014 49 Cloud Computing and Business Intelligence Alexandru Adrian TOLE Romanian American University, Bucharest, Romania [email protected] The complexity of data
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
RevoScaleR Speed and Scalability
EXECUTIVE WHITE PAPER RevoScaleR Speed and Scalability By Lee Edlefsen Ph.D., Chief Scientist, Revolution Analytics Abstract RevoScaleR, the Big Data predictive analytics library included with Revolution
P013 INTRODUCING A NEW GENERATION OF RESERVOIR SIMULATION SOFTWARE
1 P013 INTRODUCING A NEW GENERATION OF RESERVOIR SIMULATION SOFTWARE JEAN-MARC GRATIEN, JEAN-FRANÇOIS MAGRAS, PHILIPPE QUANDALLE, OLIVIER RICOIS 1&4, av. Bois-Préau. 92852 Rueil Malmaison Cedex. France
Unleashing the Performance Potential of GPUs for Atmospheric Dynamic Solvers
Unleashing the Performance Potential of GPUs for Atmospheric Dynamic Solvers Haohuan Fu [email protected] High Performance Geo-Computing (HPGC) Group Center for Earth System Science Tsinghua University
A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment
A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment Panagiotis D. Michailidis and Konstantinos G. Margaritis Parallel and Distributed
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,
Auto-Scaling Model for Cloud Computing System
Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science
Best practices for efficient HPC performance with large models
Best practices for efficient HPC performance with large models Dr. Hößl Bernhard, CADFEM (Austria) GmbH PRACE Autumn School 2013 - Industry Oriented HPC Simulations, September 21-27, University of Ljubljana,
High-fidelity electromagnetic modeling of large multi-scale naval structures
High-fidelity electromagnetic modeling of large multi-scale naval structures F. Vipiana, M. A. Francavilla, S. Arianos, and G. Vecchi (LACE), and Politecnico di Torino 1 Outline ISMB and Antenna/EMC Lab
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
Multilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Computer Aided Systems
5 Computer Aided Systems Ivan Kuric Prof. Ivan Kuric, University of Zilina, Faculty of Mechanical Engineering, Department of Machining and Automation, Slovak republic, [email protected] 1.1 Introduction
Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.
Table of Contents Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined. 1.1 Cloud Computing Development... Error! Bookmark not
Automated Virtual Cloud Management: The need of future
Automated Virtual Cloud Management: The need of future Prof. (Ms) Manisha Shinde-Pawar Faculty of Management (Information Technology), Bharati Vidyapeeth Univerisity, Pune, IMRDA, SANGLI Abstract: With
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
How To Understand Cloud Computing
Virtualizing the Private Cloud for Maximum Resource Utilization C.Shreeharsha, Prof.ManasiKulkarni Computer Engineering Department, VJTI, Matunga, Mumbai, India, E-mail:[email protected]. Abstract
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
Learn How to Leverage System z in Your Cloud
Learn How to Leverage System z in Your Cloud Mike Baskey IBM Thursday, February 7 th, 2013 Session 12790 Cloud implementations that include System z maximize Enterprise flexibility and increase cost savings
FEM Software Automation, with a case study on the Stokes Equations
FEM Automation, with a case study on the Stokes Equations FEM Andy R Terrel Advisors: L R Scott and R C Kirby Numerical from Department of Computer Science University of Chicago March 1, 2006 Masters Presentation
Goal Seeking in Solid Edge
Goal Seeking in Solid Edge White Paper Goal Seeking in Solid Edge software offers a fast built-in method for solving complex engineering problems. By drawing and dimensioning 2D free-body diagrams, Goal
A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS
Mihai Horia Zaharia, Florin Leon, Dan Galea (3) A Simulator for Load Balancing Analysis in Distributed Systems in A. Valachi, D. Galea, A. M. Florea, M. Craus (eds.) - Tehnologii informationale, Editura
Introduction to the Finite Element Method
Introduction to the Finite Element Method 09.06.2009 Outline Motivation Partial Differential Equations (PDEs) Finite Difference Method (FDM) Finite Element Method (FEM) References Motivation Figure: cross
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC
ITSM in the Cloud An Overview of Why IT Service Management is Critical to The Cloud Presented By: Rick Leopoldi RL Information Consulting LLC What s Driving the Move to Cloud Computing Greater than 70%
TWO-DIMENSIONAL FINITE ELEMENT ANALYSIS OF FORCED CONVECTION FLOW AND HEAT TRANSFER IN A LAMINAR CHANNEL FLOW
TWO-DIMENSIONAL FINITE ELEMENT ANALYSIS OF FORCED CONVECTION FLOW AND HEAT TRANSFER IN A LAMINAR CHANNEL FLOW Rajesh Khatri 1, 1 M.Tech Scholar, Department of Mechanical Engineering, S.A.T.I., vidisha
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
CALIBRATION OF A ROBUST 2 DOF PATH MONITORING TOOL FOR INDUSTRIAL ROBOTS AND MACHINE TOOLS BASED ON PARALLEL KINEMATICS
CALIBRATION OF A ROBUST 2 DOF PATH MONITORING TOOL FOR INDUSTRIAL ROBOTS AND MACHINE TOOLS BASED ON PARALLEL KINEMATICS E. Batzies 1, M. Kreutzer 1, D. Leucht 2, V. Welker 2, O. Zirn 1 1 Mechatronics Research
Finite Element Method (ENGC 6321) Syllabus. Second Semester 2013-2014
Finite Element Method Finite Element Method (ENGC 6321) Syllabus Second Semester 2013-2014 Objectives Understand the basic theory of the FEM Know the behaviour and usage of each type of elements covered
Virtual Machine Instance Scheduling in IaaS Clouds
Virtual Machine Instance Scheduling in IaaS Clouds Naylor G. Bachiega, Henrique P. Martins, Roberta Spolon, Marcos A. Cavenaghi Departamento de Ciência da Computação UNESP - Univ Estadual Paulista Bauru,
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology
VIEW POINT. Getting cloud management and sustenance right! It is not about cloud, it s about tomorrow s enterprise
VIEW POINT Getting cloud management and sustenance right! It is not about cloud, it s about tomorrow s enterprise Soma Sekhar Pamidi, Vinay Srivastava, Mayur Chakravarty The dynamic technologies of cloud
Comparison of Various Particle Swarm Optimization based Algorithms in Cloud Computing
Comparison of Various Particle Swarm Optimization based Algorithms in Cloud Computing Er. Talwinder Kaur M.Tech (CSE) SSIET, Dera Bassi, Punjab, India Email- [email protected] Er. Seema Pahwa Department
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
Domain Decomposition Methods. Partial Differential Equations
Domain Decomposition Methods for Partial Differential Equations ALFIO QUARTERONI Professor ofnumericalanalysis, Politecnico di Milano, Italy, and Ecole Polytechnique Federale de Lausanne, Switzerland ALBERTO
Introduction to the Siemens PLM End to End Solution for Composites
Introduction to the Siemens PLM End to End Solution for Composites Restricted Siemens AG 2014 2013 All rights reserved. Page 1 Siemens PLM is Dedicated to the Future of Lightweight Engineering Bringing
Poisson Equation Solver Parallelisation for Particle-in-Cell Model
WDS'14 Proceedings of Contributed Papers Physics, 233 237, 214. ISBN 978-8-7378-276-4 MATFYZPRESS Poisson Equation Solver Parallelisation for Particle-in-Cell Model A. Podolník, 1,2 M. Komm, 1 R. Dejarnac,
Axceleon s CloudFuzion Turbocharges 3D Rendering On Amazon s EC2
Axceleon s CloudFuzion Turbocharges 3D Rendering On Amazon s EC2 In the movie making, visual effects and 3D animation industrues meeting project and timing deadlines is critical to success. Poor quality
Finite Elements Infinite Possibilities. Virtual Simulation and High-Performance Computing
Microsoft Windows Compute Cluster Server 2003 Partner Solution Brief Finite Elements Infinite Possibilities. Virtual Simulation and High-Performance Computing Microsoft Windows Compute Cluster Server Runs
Development and Runtime Platform and High-speed Processing Technology for Data Utilization
Development and Runtime Platform and High-speed Processing Technology for Data Utilization Hidetoshi Kurihara Haruyasu Ueda Yoshinori Sakamoto Masazumi Matsubara Dramatic increases in computing power and
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
Benchmark Tests on ANSYS Parallel Processing Technology
Benchmark Tests on ANSYS Parallel Processing Technology Kentaro Suzuki ANSYS JAPAN LTD. Abstract It is extremely important for manufacturing industries to reduce their design process period in order to
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
A Survey on Load Balancing and Scheduling in Cloud Computing
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel
Security Benefits of Cloud Computing
Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: [email protected] Abstract: The nature of the Internet is
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Cloud Computing and Advanced Relationship Analytics
Cloud Computing and Advanced Relationship Analytics Using Objectivity/DB to Discover the Relationships in your Data By Brian Clark Vice President, Product Management Objectivity, Inc. 408 992 7136 [email protected]
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Performance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Neural Network Design in Cloud Computing
International Journal of Computer Trends and Technology- volume4issue2-2013 ABSTRACT: Neural Network Design in Cloud Computing B.Rajkumar #1,T.Gopikiran #2,S.Satyanarayana *3 #1,#2Department of Computer
Cloud Computing and Software Agents: Towards Cloud Intelligent Services
Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy [email protected] Abstract Cloud computing systems provide large-scale
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 MOTIVATION OF RESEARCH Multicore processors have two or more execution cores (processors) implemented on a single chip having their own set of execution and architectural recourses.
Mixed Precision Iterative Refinement Methods Energy Efficiency on Hybrid Hardware Platforms
Mixed Precision Iterative Refinement Methods Energy Efficiency on Hybrid Hardware Platforms Björn Rocker Hamburg, June 17th 2010 Engineering Mathematics and Computing Lab (EMCL) KIT University of the State
