Simulation of Parallel and Distributed Computing: A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract : Parallel and Distributed Computing has made it possible to simulate large infrastructures like Telecom networks, air traffic etc. in an easy and effective way. It not only makes the processes faster and reliable but also provides geographical distribution among the systems. Due to its great capabilities, it has led to many types of research in this field. This led to many types of computing like, grid computing, cluster computing, utility computing and cloud computing. This paper reviews some of the various advances in the modelling and simulationaspect of this field. Some modellings techniques can be PES, the system modelling, performance modelling and network modelling. The Simulation techniques and software like SimOS, SimJava and MicroGrid are also discussed and evaluated. The paper then goes deeper into its latest form, the cloud computing.
Authors and Affiliations
Mohd Ahsan Kabir Rizvi
Fast Response Multilevel Scheduling Scheme for Wireless Sensor Networks
Abstract: Wireless sensor networks (WSNs) have a wide variety of military and civil applications. The sensor nodes are powered by batteries with limited energy. Hostile or hazardous environments where the sensor no...
Optimizing Advertisement Targeting Based on Colour and Devices
Over the last few years, we have seen revolutions in the internet technology and its adoption in advertising industry. Internet has become the common platform across the world where people visit different web sites for d...
Utility Mining Algorithm for High Utility Item sets from Transactional Databases
The discovery of item sets with high utility like profits is referred by mining high utility item sets from a transactional database. Although in recent years a number of relevant algorithms have been proposed, for high...
A Parameter free Clustering of Density Based Algortihm
Clustering is a kind of unsupervised learning process in data mining and pattern recognition, most of the clustering algorithms are sensitive to their input parameters. So it is necessary to evaluate results of the clust...
Online Password Guessing Attacks by Using Persuasive Click Point with Dynamic User Block
Abstract: The goal of knowledge-based authentication system is to guide the users in creating graphical passwords. User often creates memorable passwords that are easy for attackers to guess, but strong system assi...