Cloud Requirement and Cloud Analysis
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 1
Abstract
Cloud computing is model which uses combine concept of software-as-a-service and œutility computing ,provide convenient and on-demand services to requested end users. Cloud Engineering is a discipline that uses combination of the business and technology thinking for purposes of engineering a cloud. The structure and principles of cloud engineering plays an important role for the engineering of usable and economic cloud. The cloud development life cycle (CDLC) is the one of the component in structure of cloud engineering with Base, Tools & Techniques and Management components. CDLC is the iterated life cycle model for development, deployment and delivery of cloud. CDLC consists of six phases that are flexible, isolated executable and having feedback. The work on this paper focuses on the Understanding Requirement and Analysis phase of the CDLC. This paper lists and discusses the basic, content and operational requirements for the engineering of economic cloud. It also discuses feasibility checks for the requirements. Analysis part of this phase does the analysis of their cloud computing solution with another available computing solution such as grid computing, volunteer computing, utility computing, autonomic computing, client-server model and peer to peer model; and also does cloud planning for cloud implementation phase
Authors and Affiliations
Gurdev Singh, Harmandeep Singh, Amandeep Singh
Fuzzy Cognitive Maps Based Election Results Prediction System
Prediction and forecast are common words in the area of election. It can also be related with word “opinion pollâ€. Although according to dictionary the meaning/definition of prediction is limited but practically pred...
Noise Elimination for Image Subtraction in Printed Circuit Board Defect Detection Algorithm
Image subtraction operation has been frequently used for automated visual inspection of printed circuit board (PCB) defects. Even though the image subtraction operation able to detect all defects occurred on PCB, some un...
NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks...
Validation of DeLone and McLean model to analyze decision support systems success in the banking sector of Oman
The main objective of this paper is to investigate empirically the validity of DeLone and McLean model in measuring the decision support system success in the banking sector of Oman. Data was collected from decision supp...
Motif Discovery and Data Mining in Bioinformatics
Bioinformatics analyses huge amounts of biological data that demands in-depth understanding. On the other hand, data mining research develops methods for discovering motifs in biosequences. Motif discovery involves benef...