Loading [MathJax]/extensions/MathMenu.js
IEEE Xplore Search Results

Showing 1-25 of 31,062 resultsfor

Filter Results

Show

Results

This letter proposes two polynomial-time approximation algorithms for the distributed server allocation problem with preventive start-time optimization against a failure. Server allocation is decided in advance to minimize the largest maximum delay among all failure patterns. We analyze the approximation performances of proposed algorithm when only the delay between servers or all the delays inclu...Show More
In order to meet the requirements of both low power consumption and high performance in embedded server systems, a single IP address cluster of low power embedded CPUs can be built, based on the following policy: the number of CPUs increases when high performance services are required, while the number of CPUs decreases when there are few requests. A cluster of embedded SH7780 CPUs, called the SH ...Show More
This paper investigates load balancing strategies for clustered Alexandria digital library (ADL) servers. The ADL system, which provides on-line information searching and browsing of spatially-referenced materials through the World Wide Web, involves intensive database I/O and heterogeneous CPU activities. Clustering servers can improve the scalability of the ADL system in response to a large numb...Show More
We describe a prototype scalable and highly available web server, built on an IBM SP-2 system, and analyze its scalability. The system architecture consists of a set of logical front-end or network nodes and a set of back-end or data nodes connected by a switch, and a load balancing component. A combination of TCP routing and Domain Name Server (DNS) techniques are used to balance the load across ...Show More
The integration of computers in everyday life activities has increased the image sizes of data transmitted on the available databases. Mobile phone and computers across the globe generate gigabytes and terabytes of images necessitating platforms that can analyse and process images in real time to meet the users' demands yet most of the available database platforms lack the capability. Distributed ...Show More
In recent years, the application of indoor positioning and tracking have become more important, which may be applied to the navigation of large building, personnel tracking, etc. Due to the limitations of GPS, some researchers have utilized the received signal strength indicator (RSSI) in the wireless environment for indoor positioning. There are two major approaches are proposed: fingerprinting a...Show More
OPC UA (Object Linking and Embedding for Process Control Unified Architecture) has drawn extensive attention in Industrial Internet of Things (IIOT), for it enables secure data exchanges between different operating systems and devices. In the field of industrial control, the applications of OPC UA are gradually extended to the field layer, which adopt the popular client-server interaction model. H...Show More
In the realm of distributed training, the utilization of a parameter server architecture has proven to be highly efficient in reducing training time. However, conventional implementations of parameter server architecture tend to overload a single server, thereby necessitating the introduction of a tree-based parameter server approach. Nevertheless, such parameter server architectures typically req...Show More
Cloud security encompass under its umbrella very extensive set of service level agreements (SLA's), methodologies which are used to secure user data, applications and resources that are connected via cloud. But, still the clients are handicapped with very little support and knowledge about what actually happens to their data after they have pushed it on to the cloud. Data ownership is important is...Show More
Cloud computing and big data play important role in data communication and IT industry. Nowadays, all corporate companies use the huge amount of big data. Distributed File Systems need large amount of storage. This paper deals with the creation of single node and multinode clusters of Hadoop distributed file system. It is proved in this paper that it improves the performance of the system during m...Show More
In the massive multi-player online game scenes single P2P topology cannot sufficiently accomplish a variety of mission. To strengthen player experience, rapidly respond client request and improve P2P network scalability and flexibility. Firstly, we propose network architecture, which is hierarchical hybrid DVE-P2P based on interested cluster to achieve this purpose. Secondly, based on this network...Show More
Use of wireless technology is applicable in most of area in information and communication technology (ICT). Rapid growth of user and devices make provider have difficulties to handle large data traffic in current system. Provider has to setup large size data center (server) to accommodate increasing number of user and data. Stability and availability of data center need to be on all the time, thus...Show More
The concept of cloud computing is becoming prominent now a days. The phenomenon of cloud computing comprises the rationing of data and resources over an accessible network. Cloud comprises a large network of nodes, which provides services to the mobile nodes and the application which falls back on to the cloud are known as the cloud applications. In the previous researches, migration of the task t...Show More
With the gradual improvement of network services, the explosive growth of concurrent business access and more complex Web transactions are a severe test for the ability of servers in the network. The multi-server cluster system is currently the main means to effectively solve the above problems. As the core of cluster system research, load balancing mainly solves the problem of reasonable allocati...Show More
Web server clusters have become the backbone of Internet infrastructure, supporting a vast array of critical applications ranging from e-commerce to cloud computing. Their performance is crucial, as it directly impacts user experience and service quality. Thus, a quantitative performance evaluation of these systems presents a significant challenge. This paper introduces a promising approach to thi...Show More
In this paper, we present a cluster architecture for Internet multimedia servers, which uses the Fibre Channel (FC) technology to overcome some of the shortcomings of existing architectures. We also explore the design issues of an FC-based multimedia server cluster. A significant advantage of the FC-based cluster is that it allows physical storage attachment to the interconnect. Because of this fe...Show More
Cluster web servers emerged as a reliable and leading resource in internet infrastructure with the growing demands for web-based applications. The key point is to increase utilization of cluster web servers through an effective and fair load balancing strategy. In this paper, we proposed a new load balancing algorithm, which considers the load and performance information of nodes and the type of r...Show More
Edge computing leverages computing resources closer to the end-users at the edge of the network, rather than distant cloud servers in the centralized IoT architecture. Edge computing nodes (ECNs), experience less transmission latency and usually save on energy while network overheads are mitigated. The ECNs can be fixed or mobile in their positions. We will focus on mobile ECNs in this survey. Thi...Show More
The Internet of things is a new type of network, based on the traditional telecommunication network and the Internet. All the ordinary physical objects in the Internet of things can be addressing, independent and able to access to the network. Internet data center in the whole Internet system plays a central role, is responsible for the control and management of possessions networking physical nod...Show More
This research work presents a hybrid blockchain-based eco-friendly energy monitoring framework. A system that gives a constant information-obtaining network for exchanging and monitoring the performance, along with the renewal energy-generating units. It typically works in a troublesome security-challenging environment. Data is gathered and pre-processed by utilizing the “Raspberry Pi” microcontro...Show More
State-of-the-art cluster-based data centers consisting of three tiers (Web server, application server, and database server) are being used to host complex Web services such as e-commerce applications. The application server handles dynamic and sensitive Web contents that need protection from eavesdropping, tampering, and forgery. Although the secure sockets layer (SSL) is the most popular protocol...Show More
It is a software defined tool or platform, that control huge number of networking, compute, and storage resources throughout a datacenter, managed by a web interface[13]. This platform includes features of integration, organization, scalability, protection and accounting. The main concept of this tool is data center virtualization, that is done by Oracle Virtual Box software and Windows Server ope...Show More
Healthcare record administration faces many obstacles, including data manipulation, security vulnerabilities, and the risks associated with centralized storage. To securely store and manage health records, we provide an innovative system that uniquely combines blockchain technology with the Interplanetary File System (IPFS). In contrast to conventional methods, our strategy makes use of a private ...Show More
This paper researched computing node and server's configuration and mathematical formula's process based on MathJax. Considering the importance of internet to the development of mathematics and sciences, we introduced MathJax to provide an excellent solution to display formulas. We mainly focused on: Principle and innovation of MathJax; Multiple comparison around plugin, image simulation, Mathemat...Show More
Recently, a demand for flexible “group communication” considering users' real-spatial information such as location and property is increasing drastically. To achieve this, we proposed the “r-Space system” that mainly consists of (a) users' data collection and (b) data delivery. In this research, we focus on data collection that can be applied to mobile nodes. Since the r-Space system delivers appl...Show More