Добірка наукової літератури з теми "Master-server"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Master-server".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Master-server"

1

Tian, Junfeng, and He Zhang. "A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism." International Journal of Grid and High Performance Computing 8, no. 3 (July 2016): 38–56. http://dx.doi.org/10.4018/ijghpc.2016070103.

Повний текст джерела
Анотація:
The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Yang, Jui-Pin. "A Novel Storage Virtualization Scheme for Network Storage Systems." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1 (January 31, 2022): 08–13. http://dx.doi.org/10.17762/ijritcc.v10i1.5514.

Повний текст джерела
Анотація:
The network storage systems are generally composed of clients, storage servers and metadata servers. In this paper, we proposed a novel storage virtualization (NSV) scheme which is capable of alleviating the heavy load of metadata server, guaranteeing the storage quality of service and dynamically adapting storage resources. The metadata server automatically constructs a dedicated storage cluster according to various requirements of storage quality of service. The storage cluster may consist of one to many storage servers which includes one master storage server and zero to many slave storage servers. In other words, a network storage system consists of at least one storage cluster. The requests of each client are forwarded to corresponding master storage server within a specific storage cluster. In addition, the master storage server determines the best storage server which handles the requests based on the conditions of storage servers. Next, the requests will be redirected to the selected storage server. Finally, the responses are directly transmitted to the client.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Cynthia, Eka Pandu, Iwan Iskandar, and Anwar Alfaruqi Sipayung. "Rancang Bangun Server HAproxy Load Balancing Master to Master MySQL (Replication) Berbasis Cloud Computing." ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA 4, no. 1 (May 4, 2020): 45. http://dx.doi.org/10.30829/algoritma.v4i1.7275.

Повний текст джерела
Анотація:
<em>At present, the development of cloud computing technology is experiencing rapid development. Also in line with the increase in the need and use of cloud computing technology itself. This rapid and high increase can cause an increase in load for the existing server so that it can result in overload on the connection path traffic. To avoid and optimize management on the server, it is necessary to share network load using various solutions available in the load balancing method. One solution is to use HAProxy software. HAProxy bridges at least 2 servers to apply load balancing and use the Round Robin scheduling algorithm. In the database management of two servers, replication Master to Master can be used by using MySQL as an existing database management media. From the results of tests conducted in this study, the HAProxy server is considered capable of handling problems compared to a single server. A replication that was tested was also considered to be a solution to bridge changes in existing data on the HAProxy server.</em>
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Heryanto, Ahmad, and Yuyun Hartati. "Backup Database Dengan Multi Master Replikasi Pada Kluster Server." JURNAL ILMIAH ILMU KOMPUTER 6, no. 1 (April 1, 2020): 7–12. http://dx.doi.org/10.35329/jiik.v6i1.118.

Повний текст джерела
Анотація:
Sistem database yang selalu tersedia merupakan kebutuhan mutlak pada insfrastruktur setiap organisasi. Data yang tersimpan harus terus tersedia pada saat dibutuhkan. Banyak hambatan dan gangguan dalam menyimpan data dalam suatu database. Hambatan dan gangguan tersebut tersebut bisa diakibatkan dari berbagai macam hal, seperti maintenance, kerusakan database, kerusakan media, data corruption dan bencana yang tak terduga (bencana alam). Oleh karena itu, diperlukan suatu Teknik replikasi yang baik untuk menjaga keutuhan data. Teknik replikasi Multi Master (Master-Master) telah diimplementasikan pada penelitian ini. Hasil penelitian ini, untuk melakukan replikasi 3 node server diperlukan waktu dengan rentang 0,1-0,2 detik
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Maulana, Agus Harya. "MULTICHANNEL VIRTUAL NETWORK COMPUTING UNTUK PEMBELAJARAN MASTER STATION SCADA DAN PENGARUHNYA TERHADAP KINERJA SERVER SCADA." Transmisi 22, no. 4 (November 23, 2020): 130–34. http://dx.doi.org/10.14710/transmisi.22.4.130-134.

Повний текст джерела
Анотація:
Kondisi New Normal di Indonesia menyebabkan metode pembelajaran berubah dari secara konvensional menjadi digital. Walaupun efektif untuk mengatasi terhentinya pembelajaran, namun demikian belum tersedia fasilitas untuk pelaksanaan praktek oleh siswa secara jarak jauh. Untuk mengatasi permasalahan ini maka diperlukan suatu metode agar siswa di remote area tetap dapat melakukan praktek dengan cara mengakses peralatan di laboratorium UPDL Semarang. Berdasarkan penelusuran di dunia praktis ditemukan adanya metode Virtual Network Computing yang memungkinkan client di remote area dapat mengakses secara jarak jauh dengan berbagai karakteristiknya. Bahkan pada operating system Solaris 10, yang merupakan operating system server SCADA, memiliki kemampuan untuk akses secara multichannel hingga 15 channel pada satu server. Dari hasil percobaan yang dilakukan, akses client dari remote area terhadap 15 channel VNC secara bersamaan berjalan dengan baik, dibuktikan dengan tampilan GUI SCADA yang tetap normal, semua client dapat bekerja pada server SCADA tanpa ada interupsi antara satu client dengan client yang lain, dan tidak terjadinya penurunan kinerja server SCADA secara signifikan. Dengan demikian metode praktek jarak jauh menggunakan multichannel VNC ini dapat diterapkan sebagai solusi pembelajaran praktek operasi dan pemeliharaan master station SCADA di UPDL Semarang, dan dapat dikembangkan secara korporat di PT PLN (Persero).
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ru, Beibei, Yin Tong, and Jiangwen Zhang. "MR4Cancer: a web server prioritizing master regulators for cancer." Bioinformatics 35, no. 4 (July 23, 2018): 636–42. http://dx.doi.org/10.1093/bioinformatics/bty658.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Abbood, Doaa, Osama Al-Atbee, and Ali Marhoon. "Theft Control Based Master Meter Using Different Network Technologies." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (July 31, 2021): 46–51. http://dx.doi.org/10.37917/ijeee.17.2.6.

Повний текст джерела
Анотація:
The power theft is one of the main problems facing the electric energy sector in Iraq, where a large amount of electrical energy is lost due to theft. It is required to design a system capable of detecting and locating energy theft without any human interaction. This paper presents an effective solution with low cost to solve power theft issue in distribution lines. Master meter is designed to measures the power of all meters of the homes connected to it. All the measured values are transmitted to the server via GPRS. The values of power for all energy meters within the grid are also transmitted. The comparison between the power of the master meter and all the other meters are transmitted to the server. If there is a difference between the energy meters, then a theft is happened and the server will send a signal via GSM to the overrun meter to switch off the power supply. Raspberry pi is used as a server and equipped and programmed to detect the power theft.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sujana, Aprianti Putri. "Implementasi Cluster Server Pada Raspberry Pi Dengan Menggunakan Metode Load Balancing." Komputika : Jurnal Sistem Komputer 8, no. 1 (June 12, 2019): 37–43. http://dx.doi.org/10.34010/komputika.v8i1.1623.

Повний текст джерела
Анотація:
Ketika server mengalami overload, hal ini akan membuat server melambat, efeknya adalah waktu akses layanan bertambah yang akan membuat client tidak nyaman dalam menggunakan layanan yang ada pada server. Cluster server menawarkan solusi agar beban terbagi secara merata, sistem ini memanfaatkan beberapa komputer yang di konfigurasi sedemikian rupa agar dapat berkerja bersama-sama. Hasil dari pengujian cluster server menunjukan peningkatan waktu respon http request sebesar 59% lebih cepat dibandingkan tanpa menggunakan sistem cluster server. Keuntungan lain menggunakan cluster server adalah adanya redudancy, jadi ketika salah satu anggota node tidak aktif maka secara otomatis master node atau load balancer akan memindahkan request menuju node yang masih aktif.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Setiawan, Aep, and Wini Muthia Kansha. "PEMBUATAN SISTEM DATABASE CLUSTER MENGGUNAKAN APLIKASI GALERA CLUSTER DI SEKOLAH VOKASI IPB UNIVERSITY." Jurnal Sains Terapan 11, no. 2 (December 30, 2021): 49–59. http://dx.doi.org/10.29244/jstsv.11.2.49-59.

Повний текст джерела
Анотація:
ABSTRAKServer yang terdapat di Sekolah Vokasi Institut Pertanian Bogor (SV-IPB) diinstal Modular Object-Oriented Dynamic Learning Environment (MOODLE) yang merupakan aplikasi e-learning berbasis web. MOODLE membutuhkan database yang berfungsi sebagai sebuah sistem penyimpanan data dari berbagai aktivitas yang dilakukan. Database server yang tersedia di SV-IPB berupa single database server. SV-IPB memiliki 17 program studi, jumlah mahasiswa Sekolah Vokasi untuk tiga angkatan sekitar 6 300 mahasiswa, hal tersebut bisa menyebabkan pengaksesan layanan MOODLE dan beban yang ditanggung server menjadi tinggi. Mengatasi masalah tersebut salah satu solusinya diimplementasikan teknologi database cluster pada server SV-IPB serta membuat sebuah server load balancing. Pembuatan database cluster menggunakan aplikasi Galera Cluster, serta digunakan HAProxy sebagai load balancer yang berperan sebagai pembagi beban antar database server dalam database cluster. Ketika database server down maka ada database server lain yang dapat menggantikan tugas dari database server yang down tersebut.Kata Kunci : Database Cluster, Galera Cluster, HAProxy, Multi-master, MySQL ABSTRACTThe server in the Vocational School, Bogor Agricultural University (SV-IPB) is installed with Modular Object-Oriented Dynamic Learning Environment (MOODLE) which is a web-based e-learning application. MOODLE requires a database that functions as a data storage system for various activities carried out. The database server available at SV-IPB is a single database server. SV-IPB has 17 study programs, the number of Vocational School students for three batches is around 6 300 students, this can cause access to MOODLE services and the burden on the server to be high. One of the solutions to overcome this problem is to implement database cluster technology on the SV-IPB server and create a load balancing server. Creating a cluster database using the Galera Cluster application, and using HAProxy as a load balancer that acts as a load divider between database servers in the database cluster. When the database server is down, there is another database server that can replace the task of the down database server.Keyword: Database Cluster, Galera Cluster, HAProxy, Multi-master, MySQL
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Irwan, Dadan, Heru Sukoco, and Sri Wahjuni. "Service High Availability Pada Native Server dan Virtual Server Menggunakan Proxmox VE." Jurnal Kajian Ilmiah 20, no. 2 (May 26, 2020): 137–44. http://dx.doi.org/10.31599/jki.v20i2.87.

Повний текст джерела
Анотація:
Teknologi virtualisasi dapat meningkatkan kemampuan layanan menjadi dua mesin server atau lebih secara virtual. Sistem failover dan failback merupakan teknik high availability dalam mengatasi terjadinya kegagalan layanan pada master server. Penelitian ini bertujuan untuk menganalisis kemampuan service high availability dengan sistem failover dan failback pada dua arsitektur server yang berbeda yaitu native server dan virtual server menggunakan sistem virtualisasi Proxmox VE. Metodologi penelitian menggunakan tahapan analisa permasalahan dan kebutuhan sistem, disain arsitektur dan implementasi, pengujian dengan pengukuran kemampuan sistem, dan analisa hasil. Berdasarkan proses pengujian, high availability pada sistem virtual server memiliki tingkat kinerja lebih rendah rata-rata 4.15% dengan sistem native server. Kesimpulannya sistem virtualisasi memiliki keunggulan karena dapat memberikan dua layanan server virtual yang berbeda pada satu mesin native server sehingga lebih efisien dari sisi anggaran dan lebih efektif dalam pengelolaan sistem administrasi server.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Master-server"

1

Kukačka, Pavel. "Master Data Management a jeho využití v praxi." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-73506.

Повний текст джерела
Анотація:
This thesis deals with the Master Data Management (MDM), specifically its implementation. The main objectives are to analyze and capture the general approaches of MDM implementation including best practices, describe and evaluate the implementation of MDM project using Microsoft SQL Server 2008 R2 Master Data Services (MDS) realized in the Czech environment and on the basis of the above theoretical background, experiences of implemented project and available technical literature create a general procedure for implementation of the MDS tool. To achieve objectives above are used these procedures: exploration of information resources (printed, electronic and personal appointments with consultants of Clever Decision), cooperation on project realized by Clever Decision and analysis of tool Microsoft SQL Server 2008 R2 Master Data Services. Contributions of this work are practically same as its goals. The main contribution is creation of a general procedure for implementation of the MDS tool. The thesis is divided into two parts. The first (theoretically oriented) part deals with basic concepts (including definition against other systems), architecture, implementing styles, market trends and best practices. The second (practically oriented) part deals at first with implementation of realized MDS project and hereafter describes a general procedure for implementation of the MDS tool.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Simon, Jakub. "Řízení modelu manipulátoru." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377091.

Повний текст джерела
Анотація:
The task was to study the physical model of the coordinate manipulator. It is controlled by two stepping motors by Schneider Electric and Beckhoff¨s industrial IPC. Then get to know the TwinCAT control software communicating on the EtherCAT network. Then revive the model and create a task to illustrate the functionality of the model with a simple ON / OFF third axis, as well as revive the industrial camera. Then create your own design of a full-fledged third axis and let it be realized. Finally, create an illustration application with the full-fledged third axis manipulator.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Semprini, Gloria. "Resilienza di applicazioni e Cluster Kubernetes." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23103/.

Повний текст джерела
Анотація:
La tesi mira a costruire uno strumento dedicato agli studenti dell'insegnamento di Systems Integration del Corso di Studio in Ingegneria e Scienze Informatiche. Lo strumento vuole mettere a disposizione degli studenti un Cluster Kubernetes i cui nodi siano macchine virtuali tutte operanti su una singola macchina fisica. Rispetto ad altri strumenti didattici pre-esistenti, questo cluster Kubernetes sarà composto da più nodi e permetterà di effettuare sperimentazioni dirette sulle funzionalità di resilienza del cluster. Infatti, lo strumento implementa la tecnologia HA (High Availability) di Kubernetes, replicando i nodi che svolgono le funzionalità di Master ed esponendo all'esterno, come punto di accesso, un nodo, denominato load balancer, con funzioni di bilanciamento di carico tra i master. Lo strumento utilizza l'hypervisor virtualbox operante su una macchina fisica Windows e sfrutta 7 macchine virtuali con sistema operativo Ubuntu server 20.10.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Solorio, Rigoberto. "A WEB-BASED TEMPERATURE MONITORING SYSTEM FOR THE COLLEGE OF ARTS AND LETTERS." CSUSB ScholarWorks, 2015. https://scholarworks.lib.csusb.edu/etd/129.

Повний текст джерела
Анотація:
In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure. The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power failures that affected the Air Conditioning Unit (AC) and as a result the room became overheated for a long time, causing hardware failure to server units. This is why this project is important for the College and needs to be implemented as soon as possible. The administrator’s old method of controlling server room temperature was by manually adjusting the temperature box inside of the server room. Now it can be controlled and monitored using remote access. The purpose of A Web-Based Temperature Monitoring System for the College of Arts and Letters proposed in this project is to allow users to monitor the server room temperature through a website by using any computer or mobile device that has Internet access. Also, this system notifies users when the room attains a critical temperature by sending an email/text to the server room administrator. A Web-Based Temperature Monitoring System for the College of Arts and Letters project is for the exclusive use of the College of Arts & Letters (CAL) server room. The administrator is the only person that can grant access to others by creating a proper account. For this project three prototypes will be implemented, first to measure the current server room temperature, the second to show the temperature history of the room, and third to use the built-in search system to locate times that given temperatures were attained.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Merzky, Alexander. "LDAP UBIK Entwicklung einer SPOF-freien Methode zur Replikation von openLDAP-Server /." Master's thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500593.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Delwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /." ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Afanasiev, S. V., S. A. Ivanets, and N. S. Poberezkyi. "Using Remote Hardware Education Kit to Study Electronics Courses." Thesis, 2020. https://openarchive.nure.ua/handle/document/17540.

Повний текст джерела
Анотація:
Using of remote tools for studying courses in electronics (digital design or microcontroller programming) can increase the efficiency of student learning. RHE (Remote Hardware Education) is a set of software and hardware equipment. And also, to reduce the load on the use of hardware testing, which will entail a reduction in costs for the purchase of components.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Guiza, Mohamed Wissem. "Course management support application-iMaster.Process." Master's thesis, 2019. http://hdl.handle.net/10198/23223.

Повний текст джерела
Анотація:
Mestrado de dupla diplomação com a Université Libre de Tunis
This project is a part of my graduation to obtain a computer engineering degree and a Master degree in Information Systems. It was realized within IPB and during this period I tried to develop a solution to facilitate the management of the masters courses in IPB. The master process is complex and time consuming and thats how was the born of the iMasters Process idea. iMasters Process aims to handle the submission, approval and assignment process in the masters section at IPB. It aims also to help monitoring the development of the work until the final submission and to handle the jury assignment process for the final defence. In order to achieve that, i had to understand some new technologies and methodology that helped me to conceive and to develop an optimized solution. Based on the literature review, ASP.NET Core and MySQL were chosen for the back-end development and React Js for the frontend development of the application.
Este projeto faz parte da minha graduação para a obtenção do curso de Engenharia da Computação e do Mestrado em Sistemas de Informação. Foi realizado dentro do laboratório do IPB e durante este período procurei desenvolver uma solução que facilitasse a gestão de mestrado no IPB. Para tal, tive que compreender algumas novas tecnologias e metodologias que me ajudaram a conceber e desenvolver uma solução otimizada
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Master-server"

1

Pyles, James. Master visually Windows Server 2003. Hoboken, NJ: Wiley, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Suzanne, Selhorn, ed. Microsoft SQL server 2008 R2 master data services: Implementation & administration. New York: McGraw-Hill, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

service), ScienceDirect (Online, ed. Microsoft virtualization: Master Microsoft server, desktop, application, and presentation virtualization. Amsterdam: Syngress, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Pav, Kumar-Chatterjee, ed. DB2 PureXML cookbook: Master the power of IBM's hybrid data server. Indianapolis: Internatioal Business Machines Corp., 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

ASP.net 2.0 design: CSS, themes, and master pages. Indianapolis, IN: Wiley, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

service), SpringerLink (Online, ed. Pro Telerik ASP.NET and Silverlight Controls: Master Telerik Controls for Advanced ASP.NET and Silverlight Projects. Berkeley, CA: Apress, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sybase SQL server: Master index for server publications. 2nd ed. Emeryville, Calif. [u.a.]: Sybase, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Master Visually Windows 2000 Server. Visual, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Microsoft Sql Server 2012 Master Data Services. McGraw-Hill/Osborne Media, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition. Packt Publishing, 2018.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Master-server"

1

Lai-Cheng, Cao, and Liang Lei. "A New Scheme for Protecting Master-Key of Data Centre Web Server in Online Banking." In Web Information Systems and Mining, 179–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16515-3_23.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Blinn, Eric. "SQL Server Master Keys." In Managing SQL Server Encryption Certificates. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5151-5_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tian, Junfeng, and He Zhang. "A Credible Cloud Service Model Based on Behavior Graphs and Tripartite Decision-Making Mechanism." In Cloud Security, 903–22. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch047.

Повний текст джерела
Анотація:
The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sevugan, Prabu, Swarnalatha Purushotham, and Ajay Chandran. "Expert System through GIS-Based Cloud." In Advanced Image Processing Techniques and Applications, 387–98. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2053-5.ch017.

Повний текст джерела
Анотація:
Enthusiasm for accuracy farming practices and advances is becoming quickly all through the agrarian world. The accuracy farming can make utilization of the current methods, for example, GPS (Global Positioning System) innovation, GIS (Geographical Information System) innovation, RS (Remote Sensing) innovation and ES (Expert System) innovation et cetera, with a specific end goal to separate the agribusiness specialized measures among plots to acquire the better peripheral advantage of economy and environment. The study demonstrates to those generally accepted methods to utilize GIS (Geography Information System), Data mining and Web innovations in the rural master choice framework. This security with mass storage is satisfied by using GIS cloud server. This chapter discuss with an Integrated Geographic Information System with ES using Cloud Computing.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Balasubramanian, Kannan, and M. Rajakani. "Implementation of Algorithms for Identity Based Encryption and Decryption." In Research Anthology on Artificial Intelligence Applications in Security, 315–27. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch015.

Повний текст джерела
Анотація:
Identity-based cryptosystems were introduced to overcome one of the main problems in public key encryption, the generation of public and private keys. In the identity-based cryptosystem, an identifier such as an e-mail address of a user can be used to generate public and private keys by a trusted third party. The trusted third party uses a system-wide master secret to provide private keys to a user. Identity-based cryptosystems can be constructed using the idea of pairings. This article discusses four different identity-based cryptosystems: the Boneh-Franklin scheme, the Cock's scheme, the Authenticated IBE scheme and the Hierarchical IBE scheme. This article also discusses the security notions considered for the identity-based cryptosystem. The security notions considered are: one-wayness, indistinguishability, semantic security and non-malleability. An architecture consisting of a public parameter server and private key generator for the implementation of the identity-based cryptosystems is also discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Balasubramanian, Kannan, and M. Rajakani. "Implementation of Algorithms for Identity Based Encryption and Decryption." In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, 320–32. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5351-0.ch019.

Повний текст джерела
Анотація:
Identity-based cryptosystems were introduced to overcome one of the main problems in public key encryption, the generation of public and private keys. In the identity-based cryptosystem, an identifier such as an e-mail address of a user can be used to generate public and private keys by a trusted third party. The trusted third party uses a system-wide master secret to provide private keys to a user. Identity-based cryptosystems can be constructed using the idea of pairings. This article discusses four different identity-based cryptosystems: the Boneh-Franklin scheme, the Cock's scheme, the Authenticated IBE scheme and the Hierarchical IBE scheme. This article also discusses the security notions considered for the identity-based cryptosystem. The security notions considered are: one-wayness, indistinguishability, semantic security and non-malleability. An architecture consisting of a public parameter server and private key generator for the implementation of the identity-based cryptosystems is also discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Balasubramanian, Kannan, and M. Rajakani. "Implementation of Algorithms for Identity Based Encryption and Decryption." In Research Anthology on Artificial Intelligence Applications in Security, 315–27. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch015.

Повний текст джерела
Анотація:
Identity-based cryptosystems were introduced to overcome one of the main problems in public key encryption, the generation of public and private keys. In the identity-based cryptosystem, an identifier such as an e-mail address of a user can be used to generate public and private keys by a trusted third party. The trusted third party uses a system-wide master secret to provide private keys to a user. Identity-based cryptosystems can be constructed using the idea of pairings. This article discusses four different identity-based cryptosystems: the Boneh-Franklin scheme, the Cock's scheme, the Authenticated IBE scheme and the Hierarchical IBE scheme. This article also discusses the security notions considered for the identity-based cryptosystem. The security notions considered are: one-wayness, indistinguishability, semantic security and non-malleability. An architecture consisting of a public parameter server and private key generator for the implementation of the identity-based cryptosystems is also discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Cain, Robert. "Reading from the Master Database." In PowerShell Core for SQL Server. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5990-0_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Petersen, Wesley, and Peter Arbenz. "MIMD, Multiple Instruction, Multiple Data." In Introduction to Parallel Computing. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780198515760.003.0010.

Повний текст джерела
Анотація:
The Multiple instruction, multiple data (MIMD) programming model usually refers to computing on distributed memory machines with multiple independent processors. Although processors may run independent instruction streams, we are interested in streams that are always portions of a single program. Between processors which share a coherent memory view (within a node), data access is immediate, whereas between nodes data access is effected by message passing. In this book, we use MPI for such message passing. MPI has emerged as a more/less standard message passing system used on both shared memory and distributed memory machines. It is often the case that although the system consists of multiple independent instruction streams, the programming model is not too different from SIMD. Namely, the totality of a program is logically split into many independent tasks each processed by a group (see Appendix D) of processes—but the overall program is effectively single threaded at the beginning, and likewise at the end. The MIMD model, however, is extremely flexible in that no one process is always master and the other processes slaves. A communicator group of processes performs certain tasks, usually with an arbitrary master/slave relationship. One process may be assigned to be master (or root) and coordinates the tasks of others in the group. We emphasize that the assignments of which is root is arbitrary—any processor may be chosen. Frequently, however, this choice is one of convenience—a file server node, for example. Processors and memory are connected by a network, for example, Figure 5.1. In this form, each processor has its own local memory. This is not always the case: The Cray X1, and NEC SX-6 through SX-8 series machines, have common memory within nodes. Within a node, memory coherency is maintained within local caches. Between nodes, it remains the programmer’s responsibility to assure a proper read–update relationship in the shared data. Data updated by one set of processes should not be clobbered by another set until the data are properly used.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hu, Yong, Xiangzhou Zhang, Bin Feng, Kang Xie, and Mei Liu. "iTrade." In Intelligent Systems, 995–1014. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5643-5.ch041.

Повний текст джерела
Анотація:
Among all investors in the Chinese stock market, more than 95% are non-professional individual investors. These individual investors are in great need of mobile apps that can provide professional and handy trading analysis and decision support everywhere. However, financial data is challenging to analyze because of its large-scale, non-linear and noisy characteristics in a varying stock environment. This paper develops a Mobile Data-Driven Stock Trading System (iTrade), which is a mobile app system based on Client-Server architecture and various data mining techniques. The iTrade is characterized by 1) a data-driven intelligent learning model, which can provide further insight compared to empirical technical analysis, 2) a concept drift adaptation process, which facilitates the model adaptation to market structure changes, and 3) a rigorous benchmark analysis, including the Buy-and-Hold strategy and the strategies of three world-famous master investors (e.g., Warren E. Buffett). Technologies used in iTrade include the Least Absolute Shrinkage and Selection Operator (Lasso) algorithm, Support Vector Machine (SVM) and risk-adjusted portfolio optimization. An application case of iTrade is presented, which is based on a seven-year (2005-2011) back-testing. Evaluation results indicated that iTrade could gain much higher cumulative return compared to the benchmark (Shanghai Composite Index). To the best of our knowledge, this is the first study and mobile app system that emphasizes and investigates the concept drift phenomenon in stock market, as well as the performance comparison between data-driven intelligent model and strategies of master investors.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Master-server"

1

Vagas, Marek, and Alena Galajdova. "Capabilities of the IO-Link Master Device Inegration Through the Web Server." In 2021 22nd International Carpathian Control Conference (ICCC). IEEE, 2021. http://dx.doi.org/10.1109/iccc51557.2021.9454606.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Linczuk, Maciej, and Piotr Więckowski. "Realization of the diagnostic DOOCS server for the FLASH accelerator's master oscillator system." In Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2011, edited by Ryszard S. Romaniuk. SPIE, 2011. http://dx.doi.org/10.1117/12.905444.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Shah, Purshotam. "Adaptive Application Master for Elastic Web Server Farms for Cloud Based on Hadoop YARN." In 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia). IEEE, 2013. http://dx.doi.org/10.1109/cloudcom-asia.2013.34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Yang, Hualin, Zhenxing Zhao, and Junyou Shi. "Research of the Part Family Master Model Automatic Variant Technology Based on Web Server." In 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2012. http://dx.doi.org/10.1109/cicn.2012.176.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zhang, Shilong, Quan Liu, Wenjun Xu, and Zaiqun Liu. "RFID Indoor Localization Using Master-Slave Reference Tags Scheme for Manufacturing Environment." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4083.

Повний текст джерела
Анотація:
In manufacturing process, the indoor location information of physical object is an essential part in storage and transport link. The efficient perception of indoor location is able to significantly reduce the system load and also improves its real-time performance. In this paper, a novel RFID indoor localization algorithm using Master-Slave reference tags scheme (MSRT) is presented. The algorithm divides the sensing area into several subspaces with master reference tags to realize rough location. In each subspaces, slave reference tags are used to perform partial location. A set of experiments have been conducted and the results demonstrate that the proposed method can reduce system redundancy and server load without decrement of accuracy.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Agrawal, Abhishek K., Karthik Ramani, and Christoph M. Hoffmann. "CADDAC: Multi-Client Collaborative Shape Design System With Server-Based Geometry Kernel." In ASME 2002 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/detc2002/cie-34465.

Повний текст джерела
Анотація:
New and efficient paradigms for web-based product design will be driven by increased outsourcing in a global economy, increased competition, and a reduction in product development time. We have developed a three-tier (client-server-database) architecture based collaborative shape design system, Computer Aided Distributed Design and Collaboration (CADDAC). CADDAC has a centralized geometry kernel and constraint solver. The server-side provides support for solid modeling, constraint solving operations, data management, and synchronization of clients. The server also holds the master copy of the CAD model that is used to update the local version of the shape model on the clients. The client-side performs real-time creation, modification, and deletion of geometry over the network. The clients are also capable of viewing three-dimensional model and manipulating it by applying rotational, translation, and scaling transformations. In order to keep the clients thin, many computationally intensive operations, such as solid modeling and constraint solving, are performed at the server. Only the graphics rendering pipeline operations comprising of matrix transformations, clipping, viewport mapping, rasterization, and pixel operations, are performed at the client-side. Our work lead to a thin client-side that is capable of geometry and constraint creation, modification, and deletion over the network.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Yu, Chan, Nan Liu, Kishore Pochiraju, Souran Manoochehri, and K. H. Ko. "Development of Distributed Computing Framework for Parallel Multi-Disciplinary Optimization." In ASME 2006 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/detc2006-99496.

Повний текст джерела
Анотація:
This paper discusses the detailed design and development of a web based parallel multi-disciplinary optimization (PMDO) framework in the distributed computing environment. This system consists of the HTTP server, the XML parser and the communication module based on TCP/IP, and is built around a computational kernel called the ACES kernel, which provides powerful computation and evaluation capabilities as well as optimization routines specifically designed for engineering purposes. We formulate and subdivide an optimization problem into several sub-problems such that one node is designated as a master which solves the overall problem and the others are distributed to client nodes each of which handles each independent sub-optimization problem. In the iteration to solve the overall optimization problem, the master forwards necessary data to each client for updated values which are the solutions of sub-optimization problems and collects the results from all the client nodes. The master continues the iteration until the optimum is reached. All optimization problems are represented in XML form and provided as input to the master and each client node.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ji, Jinlong, Xuhui Chen, Qianlong Wang, Lixing Yu, and Pan Li. "Learning to Learn Gradient Aggregation by Gradient Descent." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/363.

Повний текст джерела
Анотація:
In the big data era, distributed machine learning emerges as an important learning paradigm to mine large volumes of data by taking advantage of distributed computing resources. In this work, motivated by learning to learn, we propose a meta-learning approach to coordinate the learning process in the master-slave type of distributed systems. Specifically, we utilize a recurrent neural network (RNN) in the parameter server (the master) to learn to aggregate the gradients from the workers (the slaves). We design a coordinatewise preprocessing and postprocessing method to make the neural network based aggregator more robust. Besides, to address the fault tolerance, especially the Byzantine attack, in distributed machine learning systems, we propose an RNN aggregator with additional loss information (ARNN) to improve the system resilience. We conduct extensive experiments to demonstrate the effectiveness of the RNN aggregator, and also show that it can be easily generalized and achieve remarkable performance when transferred to other distributed systems. Moreover, under majoritarian Byzantine attacks, the ARNN aggregator outperforms the Krum, the state-of-art fault tolerance aggregation method, by 43.14%. In addition, our RNN aggregator enables the server to aggregate gradients from variant local models, which significantly improve the scalability of distributed learning.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mohamed, Khaled A. "Web-Based Collaborative Concurrent Engineering for Product Design and Manufacturing." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-59608.

Повний текст джерела
Анотація:
We present a developed Web-based product design and manufacturing system that supports collaborative Concurrent Engineering. It models distributed systems and databases using Web technologies, so that these distributed system and databases can be accessed anywhere in the world. In such system, product developers can exchange and share product data, communicate with other team members, modify geometry data on particular aspects of the design and maintain operations consistency in all the distributed cooperative sites on a wide variety of platforms. The new system is a Client/Server architecture. The server manages the sharing of the common model, as well as the coordination among multiple users, in which different users can modify different parts of the shared model. In addition, the server supports many client through the Internet, and it also allows peer to peer negotiation, sharing different databases located in different machines, establishing relations between them at run time. A group of users can work together in a common single write mode, which continuously synchronized with the master copy on the central server. The proposal model is producing a new manner and has many algorithms for viewing, editing, synchronizing, and collaboration coordination. It utilizes Java 3D to view 3D CAD files in interactive manner. It introduces an intelligent user interface for editing and modification. STEP, which is international standard introduced by the International Standards Organization (ISO), is used to exchange engineering information. Java Server Page (JSP) is used for Collaboration coordination and semantic-based coordination.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"From Ignorance Map to Informing PKM4E Framework: Personal Knowledge Management for Empowerment." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3984.

Повний текст джерела
Анотація:
Aim/Purpose: [This Proceedings paper was revised and published in the 2018 issue of the journal Issues in Informing Science and Information Technology, Volume 15] The proposed Personal Knowledge Management (PKM) for Empowerment (PKM4E) Framework expands on the notions of the Ignorance Map and Matrix for further supporting the educational concept of a PKM system-in-progress. Background: The accelerating information abundance is depleting the very attention our cognitive capabilities are able to master, one key cause of individual and collective opportunity divides. Support is urgently needed to benefit Knowledge Workers independent of space (developed/developing countries), time (study or career phase), discipline (natural or social science), or role (student, professional, leader). Methodology: The Design Science Research (DSR) project introducing the novel PKM System (PKMS) aims to support a scenario of a ‘Decentralizing KM Revolution’ giving more power and autonomy to individuals and self-organized groups. Contribution: The portrayal of potential better solutions cannot be accommodated by one-dimensional linear text alone but necessitates the utilization of visuals, charts, and blueprints for the concept as well as the use of colors, icons, and catchy acronyms to successfully inform a diverse portfolio of audiences and potential beneficiaries. Findings: see Recommendation for Researchers Recommendations for Practitioners: The PKM4E learning cycles and workflows apply ‘cumulative synthesis’, a concept which convincingly couples the activities of researchers and entrepreneurs, and assists users to advance their capability endowments via applied learning. Recommendation for Researchers: In substituting document-centric with meme-based knowledge bases, the PKMS approach merges distinctive voluntarily shared knowledge objects/assets of diverse disciplines into a single unified digital knowledge repository and provides the means for advancing current metrics and reputation systems. Impact on Society: The PKMS features provide the means to tackle the widening opportunity divides by affording knowledge workers with continuous life-long support from trainee, student, novice, or mentee towards professional, expert, mentor, or leader. Future Research: After completing the test phase of the PKMS prototype, its transformation into a viable PKM system and cloud-based server based on a rapid development platform and a noSQL-database is estimated to take 12 months.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії