scholarly journals Cloud Infrastructures forIn SilicoDrug Discovery: Economic and Practical Aspects

2013 ◽  
Vol 2013 ◽  
pp. 1-19 ◽  
Author(s):  
Daniele D'Agostino ◽  
Andrea Clematis ◽  
Alfonso Quarati ◽  
Daniele Cesini ◽  
Federica Chiappori ◽  
...  

Cloud computing opens new perspectives for small-medium biotechnology laboratories that need to perform bioinformatics analysis in a flexible and effective way. This seems particularly true for hybrid clouds that couple the scalability offered by general-purpose public clouds with the greater control and ad hoc customizations supplied by the private ones. A hybrid cloud broker, acting as an intermediary between users and public providers, can support customers in the selection of the most suitable offers, optionally adding the provisioning of dedicated services with higher levels of quality. This paper analyses some economic and practical aspects of exploiting cloud computing in a real research scenario for thein silicodrug discovery in terms of requirements, costs, and computational load based on the number of expected users. In particular, our work is aimed at supporting both the researchers and the cloud broker delivering an IaaS cloud infrastructure for biotechnology laboratories exposing different levels of nonfunctional requirements.

Author(s):  
Adrian Jackson ◽  
Michèle Weiland

This chapter describes experiences using Cloud infrastructures for scientific computing, both for serial and parallel computing. Amazon’s High Performance Computing (HPC) Cloud computing resources were compared to traditional HPC resources to quantify performance as well as assessing the complexity and cost of using the Cloud. Furthermore, a shared Cloud infrastructure is compared to standard desktop resources for scientific simulations. Whilst this is only a small scale evaluation these Cloud offerings, it does allow some conclusions to be drawn, particularly that the Cloud can currently not match the parallel performance of dedicated HPC machines for large scale parallel programs but can match the serial performance of standard computing resources for serial and small scale parallel programs. Also, the shared Cloud infrastructure cannot match dedicated computing resources for low level benchmarks, although for an actual scientific code, performance is comparable.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Anastasia Panori ◽  
Agustín González-Quel ◽  
Miguel Tavares ◽  
Dimitris Simitopoulos ◽  
Julián Arroyo

During the last decade, there has been an increased interest on cloud computing and especially on the adoption of public cloud services. The process of developing cloud-based public services or migrating existing ones to the Cloud is considered to be of particular interest—as it may require the selection of the most suitable applications as well as their transformation to fit in the new cloud environment. This paper aims at presenting the main findings of a migration process regarding smart city applications to a cloud infrastructure. First, it summarises the methodology along with the main steps followed by the cities of Agueda (Portugal), Thessaloniki (Greece) and Valladolid (Spain) in order to implement this migration process within the framework of the STORM CLOUDS project. Furthermore, it illustrates some crucial results regarding monitoring and validation aspects during the empirical application that was conducted via these pilots. These findings should be received as a helpful experience for future efforts designed by cities or other organisations that are willing to move their applications to the Cloud.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-30
Author(s):  
H. M. Dipu Kabir ◽  
Abbas Khosravi ◽  
Subrota K. Mondal ◽  
Mustaneer Rahman ◽  
Saeid Nahavandi ◽  
...  

The rapid growth of the cloud industry has increased challenges in the proper governance of the cloud infrastructure. Many intelligent systems have been developing, considering uncertainties in the cloud. Intelligent approaches with the consideration of uncertainties bring optimal management with higher profitability. Uncertainties of different levels and different types exist in various domains of cloud computing. This survey aims to discuss all types of uncertainties and their effect on different components of cloud computing. The article first presents the concept of uncertainty and its quantification. A vast number of uncertain events influence the cloud, as it is connected with the entire world through the internet. Five major uncertain parameters are identified, which are directly affected by numerous uncertain events and affect the performance of the cloud. Notable events affecting major uncertain parameters are also described. Besides, we present notable uncertainty-aware research works in cloud computing. A hype curve on uncertainty-aware approaches in the cloud is also presented to visualize current conditions and future possibilities. We expect the inauguration of numerous uncertainty-aware intelligent systems in cloud management over time. This article may provide a deeper understanding of managing cloud resources with uncertainties efficiently to future cloud researchers.


2021 ◽  
Vol 33 (4) ◽  
pp. 44-69
Author(s):  
Asvija B. ◽  
Eswari R. ◽  
Bijoy M. B.

Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security. In this article, the authors employ the concept of Bayesian networks and attack graphs to carry out sensitivity analysis on the different components involved in virtualization security for infrastructure as a service (IaaS) cloud infrastructures. They evaluate the Bayesian attack graph (BAG) for the IaaS model to reveal the sensitive regions and thus help the administrators to secure the high risk components in the stack. They present a formal definition of the sensitivity analysis and then evaluate using the BAG model for IaaS stack. The model and analysis presented here can also be used by security analysts and designers to make a selection of the security solutions based on the risk profile of vulnerable nodes and the corresponding cost involved in adding a defense against the identified vulnerabilities.


Author(s):  
Frederico Alvares de Oliveira ◽  
Adrien Lèbre ◽  
Thomas Ledoux ◽  
Jean-Marc Menaud

As a direct consequence of the increasing popularity of cloud computing solutions, data centers are growing amazingly and hence have to urgently face with the energy consumption issue. Available solutions are focused basically on the system layer, by leveraging virtualization technologies to improve energy efficiency. Another body of works relies on cloud computing models and virtualization techniques to scale up/down applications based on their performance metrics. Although those proposals can reduce the energy footprint of applications and by transitivity of cloud infrastructures, they do not consider the internal characteristics of applications to finely define a trade-off between applications Quality of Service and energy footprint. In this paper, the authors propose a self-adaptation approach that considers both application internals and system to reduce the energy footprint in cloud infrastructure. Each application and the infrastructure are equipped with control loops, which allow them to autonomously optimize their executions. The authors implemented the control loops and simulated them in order to show their feasibility. In addition, the chapter shows how the solution fits in federated clouds through a motivating scenario. Finally, it provides some discussion about open issues on models and implementation of the proposal.


2011 ◽  
Vol 225-226 ◽  
pp. 706-709 ◽  
Author(s):  
Shu Guo Yang

Cloud computing is regarded as one of the most enticing technologies and potential silver bullet in the IT industry. Because of open condition and general-purpose nature of cloud, security issue is becoming a bottle neck of rapid development and broad application of cloud computing. Firstly, this paper addresses cloud customers’ significant concerns about and requirements of cloud security. Secondly, cloud security risks and threats posed by the pervasive and ad hoc nature of the cloud are comprehensively analyzed. Finally, some effective and dependable security mechanisms are proposed to lower cloud security risks and meet security requirements of cloud customers. Especially, a novel scheme for integrity and copyright protection of customers’ works in the cloud is presented based on digital watermarking and digital signature.


2009 ◽  
Vol 2 (2) ◽  
pp. 243-258
Author(s):  
Mónica Domínguez Pérez

This study deals with children's literature translated from Castilian Spanish into Galician, Basque and Catalan by a different publisher from that of the source text, between 1940 and 1980, and with the criteria used to choose books for translation during that period. It compares the different literatures within Spain and examines the intersystemic and intercultural relations that the translations reflect. Following the polysystems theory, literature is here conceived as a network of agents of different kinds: authors, publishers, readers, and literary models. Such a network, called a polysystem, is part of a larger social, economic, and cultural network. These extra-literary considerations play an important role in determining the selection of works to be translated. The article suggests that translations can be said to establish transcultural relations, and that they demonstrate different levels of power within a specific interliterary community. It concludes that, while translations may aim to change the pre-existent relationships, frequently they just reflect the status quo.


Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


Sign in / Sign up

Export Citation Format

Share Document