Essays about: "distributed computing"

Showing result 16 - 20 of 216 essays containing the words distributed computing.

  1. 16. Machine Learning-based MIMO Indoor Positioning

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Qiyi Chen; [2023]
    Keywords : Technology and Engineering;

    Abstract : The most widely used positioning system is Global Navigation Satellite System (GNSS), which uses traditional positioning techniques and cannot achieve satisfactory positioning performance in indoor scenarios due to Non-Line-of-Sight (NLoS) transmission. Fingerprinting is a non-traditional positioning technique that is robust to NLoS transmission in indoor scenarios. READ MORE

  2. 17. Predicting resource usage on a Kubernetes platform using Machine Learning Methods

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Arvid Gördén; [2023]
    Keywords : Master thesis; Kubernetes; scaling; resource management; horizontal pod autoscaler; vertical scaling; machine learning; Masterarbete; Kubernetes; scaling; resurshantering; horisontell pod autoscaler; vertikal scaling; maskininlärning;

    Abstract : Cloud computing and containerization has been on the rise in recent years and have become important areas of research and development in the field of computer science. One of the challenges in distributed and cloud computing is to predict the resource utilization of the nodes that run the applications and services. READ MORE

  3. 18. Cross region cloud redundancy : A comparison of a single-region and a multi-region approach

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Oskar Lindén; [2023]
    Keywords : Cloud computing; Cross-region replication; Performance evaluation;

    Abstract : In order to increase the resiliency and redundancy of a distributed system, it is common to keep standby systems and backups of data in different locations than the primary site, separated by a meaningful distance in order to tolerate local outages. Nasdaq has accomplished this by maintaining primary-standby pairs or primary-standby-disaster triplets with at least one system residing in a different site. READ MORE

  4. 19. Auto-Tuning Apache Spark Parameters for Processing Large Datasets

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shidi Zhou; [2023]
    Keywords : Apache Spark; Cloud Environment; Spark Configuration Parameter; Resource Utilization; Ridge Regression; Elastic Net; Random Forest; Deep Neural Network; Bayesian Optimization; Particle Swarm Optimization.; Apache Spark; Molnmiljö; Apache Spark konfigurationsparameter; Resursutnyttjande; Ridge-regression; Elastisk nät; Slumpskog; Djupt neuralt nätverk; Bayesiansk optimering; Partikelsvärmsoptimering.;

    Abstract : Apache Spark is a popular open-source distributed processing framework that enables efficient processing of large amounts of data. Apache Spark has a large number of configuration parameters that are strongly related to performance. Selecting an optimal configuration for Apache Spark application deployed in a cloud environment is a complex task. READ MORE

  5. 20. Edge Computing Security for IoT : A Systematic Literature Review

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Albin Johnsson; Adam Nordling; [2023]
    Keywords : ;

    Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE