You are on page 1of 19

Publish Log In Sign Up Top of Form Search Bottom of Form Explore Documents Books - FictionBooks - Non-fictionHealth & MedicineBrochures

/CatalogsGovernment DocsHow-To Guides/ManualsMagazines/NewspapersRecipes/MenusSchool Work+ all categories RecentFeatured People AuthorsStudentsResearchersPublishersGovernment & NonprofitsBusinessesMusiciansArtists & DesignersTeachers+ all categories Most FollowedPopular Download 0 Go BackComment Link Embed Zoom of 45 Readcast 0inShare


Based on thisnew framework. the Execution Graph contains all the concrete information required toschedule and execute the received job on the cloud. Nephele’s Job Manager transforms it into a so-called Execution Graph.Instead. A singleMap Reduce job always consists of a distinct map and reduce program. task scheduling and execution. the processing frameworks which are currently used have been designed for static. Problems like processing crawled documents or regenerating a webindex are split into several independent subtasks. . Nephele is the first data processing framework to explicitly exploit the dynamic resource allocation offered bytoday's IaaS clouds for both. theyaim at different fields of application.EXPLOITING DYNAMIC RESOURCE ALLOCATIONFOR EFFICIENT PARALLEL DATA PROCESSING INTHE CLOUD INTRODUCTION In recent years ad hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. we discuss the opportunities and challenges for efficient parallel data processing in clouds and present our research project Nephele. Although thesesystems typically share common goals (e. we perform extended evaluations of MapReduce-inspired processing jobson an IaaS cloud system and compare the results to the popular data processing framework Hadoop. MapReduce is designed to run data analysis jobs on a largeamount of data. the executionframework takes care of splitting the job into subtasks. Thevast amount of data they have to deal with every day has made traditional database solutions prohibitivelyExpensive . homogeneous cluster setups and disregard the particular nature of a cloud. PROPOSED SYSTEM: In recent years a variety of systems to facilitate MTC has been developed. Major Cloud computingcompanies have started to integrate frameworks for parallel data processing in their product portfolio.Job Scheduling and Execution: After having received a valid Job Graph from the user.In this paper.Consequently.Particular tasks of a processing job can be assigned to different types of virtual machineswhich are automatically instantiated and terminated during the job execution. the allocated compute resources may be inadequate for big parts of thesubmitted job and unnecessarily increase processing time and cost. which is expected to be stored across a large set of share-nothing commodityservers. making it easy for customers to access these services and to deploy their programs. these companies have popularized an architectural paradigm based on a largenumber of commodity servers.g. Unlike theabstract Job Graph.However. Classic representatives for these companies are operators of Internet search engines.Once a user has fit his program into the required map and reduce pattern. distributing and executing them. andcomputed in parallel. An Execution Graph is Nephele’s primarydata structure for scheduling and monitoring the execution of a Nephele job. ALGORITHMS:1. to hide issues of parallelism or fault tolerance). distributed among the available nodes. EXISTING SYSTEM: A growing number of companies have to process huge amounts of data in a costefficientmanner.

the LS retrieves (and reports to theAZ) a candidate set (CS) that is guaranteed to contain the query results for any possible user location inside the ASR. The default channeltypes are network channels. specified an anonymity degree K by u. TheASR is then forwarded to the LS. Parallelization and Scheduling Strategies: If constructing an Execution Graph from a user’s submitted Job Graph may leavedifferent degrees of freedom to Nephele. A client also shares any of its resources. • We identify the crucial concept of border nodes. NETWORK MODULE: Server . 3. 2. she sends her location to a trusted server. • We consider various edge orderings. LBS SERVICES: In particular. The latter obfuscates her location. called clients. The user provides any job annotation whichcontains more specific instructions we currently pursue simple default strategy: Eachvertex of the Job Graph is transformed into one Execution Vertex. Each Execution Vertex is by default assigned to its ownExecution Instance unless the user’s annotations or other scheduling restrictions (e. Oftenclients and servers operate over a computer network on separate hardware. whichguarantees K-anonymity under the strict reciprocity requirement (described later).g. an important indicator of the CS size andof the query processing cost at the LS. theusage of in-memory channels) prohibit it. users are reluctant to use LBSs. A server machine is ahigh-performance host that is running one or more server programs which share its resources withclients. the anonymizer through a secure connection (SSL). Ignoring where exactly u is. • We propose an edge ordering anonymization approach for users in road networks. the ASR satisfies two properties: (i) it containsu and at least another K * 1 users.2.Client computing or networking is a distributed application architecture that partitionstasks or workloads between service providers (servers) and service requesters.Particularly. The AZ receives the CS and reports to u the subset of candidates thatcorresponds to her original query. When a user u wishes to pose a query. Even though a user may create a fake ID to access the service. • . SYSTEM MODEL: The ASR construction at the anonymization process abides by the user’s privacy requirements. replacing it with an anonymizing spatial region (ASR) that encloses u. Linking a position to an individual is possible by various means.suchas publicly available information city maps. and qualitatively assess their query performance basedon border nodes. since revealing their position may link to their identity. Clients therefore initiate communication sessionswith servers which await (listen to) incoming requests. her location alone maydisclose her actual identity. MODULE DESCRIPTION:1. and (ii) even if the LS knew the exact locations of all users inthe system.

C# • Database :Sql Server 2005. even when malicious LS is equipped/advanced enough to possess all user locations. It is readily deployable. . • Coding Language : ASP . • Floppy Drive: 1. the queries are evaluated in a batch.4 GHz. In the following. In addition to user privacy. even though alternative models are emerging. SOFTWARE REQUIREMENTS: • Operating system : Windows XP Professional. NAP achieves low computational andcommunication costs. and can be easily adapted to different network storage schemes. This offers privacy protection in the sense that the actual user position u cannot bedistinguished from others in the ASR. HARDWARE & SOFTWARE REQUIREMENTS:HARDWARE REQUIREMENTS: • System : Pentium IV 2.We design efficient query processing mechanisms that exploit existing network databaseinfrastructure. and qualitatively compare alternatives. and guarantee CS inclusiveness and minimality. We identify the ordering characteristics that affect subsequent processing. At the end.anonymous query processing in roadnetworks. Inthis case. QUERY PROCESSING: Processing is based on implementation of the theorem uses (network-based) search operationsas off the shelf building blocks. • Ram : 512 MB. the NAP query evaluation methodology is readilydeployable on existing systems. NAP relies on a global user ordering and bucketization that satisfies reciprocity andguarantees K-anonymity. Thus. • We devise batch execution techniques for anonymous queries that significantly reduce theoverhead of the LS by computation sharing.we cover alternative location privacy approaches and discuss why they are inappropriate to our problem setting. the first system for K. SCHEDULED TASK: Recently. considerable research interest has focused on preventing identity inference inlocation-based services. they apply tovarious network storage schemes. Then. we propose query evaluation techniquesthat exploit these characteristics. This spatial K-anonymity model is most widely used in location privacyresearch/applications. 5. and quick responses overall. we describeexisting techniques for ASR computation (at the AZ) and query processing (at the LS).44 Mb. 4. we propose the networkbased anonymization and processing (NAP) framework. requiring only basicnetwork operations. Furthermore. • Hard Disk : 40 GB. Proposing spatial cloaking techniques.Net.

2. that is.The user must not feel threatened by the system. as only minimal or null changes are required for implementing this system. The developed system must have a modest requirement. This is to ensure that the proposed system is not a burden to the company. The level of acceptance by the users solely depends on the methods thatare employed to educate the user about the system and to make him familiar withit. Any system developed must not have a highdemand on the available technical resources. The expenditures must be justified. It means for use by developers and will be the .1 FEASIBILITY STUDY The feasibility of the project is analyzed in this phase and business proposalis put forth with a very general plan for the project and some cost estimates. Thus the developed system as well within the budget and this wasachieved because most of the technologies used are freely available. as he is the final user of the system. 4. This will lead to high demands on theavailable technical resources. instead must accept it as anecessity. SOCIAL FEASIBILITY The aspect of study is to check the level of acceptance of the system bythe user. For feasibility analysis. This includes the process of training the user to use the system efficiently. some understanding of the major requirements for the systemis essential.Three key considerations involved in the feasibility analysis are ♦ ECONOMICAL FEASIBILITY ♦ TECHNICAL FEASIBILITY ♦ SOCIAL FEASIBILITY ECONOMICAL FEASIBILITY This study is carried out to check the economic impact that the systemwill have on the organization. SYSTEM STUDY 2. Only thecustomized products had to be purchased. The amount of fund that the company can pour intothe research and development of the system is limited.During system analysis the feasibility study of the proposed system is to be carriedout. which is welcomed. SDLC METHDOLOGIES This document play a vital role in the development of life cycle (SDLC) as it describes thecomplete requirement of the system. thetechnical requirements of the system. TECHNICAL FEASIBILITY This study is carried out to check the technical feasibility. His level of confidence must be raised so that he is also able to make someconstructive criticism. This will lead to high demands being placed on theclient.

Each phase startswith a design goal and ends with a client reviewing the progress thus far. • The preceding steps are iterated until the customer is satisfied that the refined prototyperepresents the final product desired. Analysis andengineering efforts are applied at each phase of the project. another prototype is developed from it according to the fourfold procedure outlined above. in the customer’s judgment. • A first prototype of the new system is constructed from the preliminary design. Any changes made to the requirements in the future will have to go through formalchange approval process. The steps for Spiral Model can be generalized as follows: • The new system requirements are defined in as much details as possible.and if necessary. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. “A spiral Model of SoftwareDevelopment and Enhancement.SPIRAL MODEL was defined by Barry Boehm in his 1988 article. and risks. • The final system is constructed. • The final system is thoroughly evaluated and tested. This isusually a scaled-down system. • A preliminary design is created for the new system. result in a lessthan-satisfactory final product.Defining the requirements of the second prototype. This usuallyinvolves interviewing a number of users representing all the external or internal usersand other aspects of the existing system.2. • At the customer option. operating-cost miscalculation. but it was the first model to explain why the iteration models.Constructing and testing the second prototype. the entire project can be aborted if the risk is deemed too great.or any other factor that could.Evaluating the first prototype in terms of its strengths. • The existing prototype is evaluated in the same manner as was the previous prototype.basic duringtesting phase.4. weakness. the iterations were typically 6 months to 2 years long. and represents an approximation of the characteristics of the final product. The following diagram shows how a spiral model acts like: . This model was not the first model to discuss iterativedevelopment.Risk factors might involved development cost overruns. with an eye toward the end goal of the project. based on the refined prototype.As originally envisioned.3. • A second prototype is evolved by a fourfold procedure:1.Planning an designing the second prototype.

ADVANTAGES: • Estimates(i. schedule etc . • .e. budget.) become more relistic as work progresses. becauseimportant issues discovered earlier.

7. 9. UML DiagramsUnified Modeling Language : The Unified Modeling Language allows the software engineer to express an analysis model usingthe modeling notation that is governed by a set of syntactic semantic and pragmatic rules. depicting the interactions of collection between various structural elements described in the user model and structural modelview.This view represents the system from the users perspective. this focuses on the user model and structural model views of thesystem. It provides a means to describe the structure of text-based information in a document — bydenoting certain text as headings.The analysis representation describes a usage scenario from the end-users perspective.2 IMPLEMENTATIONHTML HTML. embedded images. • Behavioral Model ViewIt represents the dynamic of behavioral as parts of the system. which is as follows. and other objects. • Implementation Model ViewIn this the structural and behavioral as parts of the system are represented as they are to be built. which focuses on the behavioral modeling.UML is specifically constructed through two different domains they are:  UML Analysis modeling.It is more able to cope with the changes that are software development generally entails.ii.This model view models the static structures. Examples of actors include users likeadministrator. • Structural model viewi.Actors are external entities that interact with the system. is the predominant markup language for web pages. HTML is .In this model the data and functionality are arrived from inside the system. implementation modelingand environmental model views. Each view is defined by a set of diagram. and so on — and to supplement that text withinteractive forms.A UML system is represented using five different views that describe the system fromdistinctly different perspective. an initialize of Hypertext Markup Language. lists. paragraphs.Use case Diagrams represent the functionality of the system from a user’s point of view. or another system like central database. • Software engineers can get their hands in and start working on the core of a project earlier.  UML design modeling.ii.Use cases focus on the behavior of the system from external point of view. Use casesare used during requirements elicitation and analysis to represent the functionality of the system. bank customer etc. • User Model Viewi.. • Environmental Model ViewIn this the structural and behavioral aspects of the environment in which the system is to beimplemented are represented.

</FORM>Encloses a fill-out formDefines a particular frame in a set of frames<H#>…</H#>Creates headings of different levels( 1 – 6 )Contains tags that specify information about a document<HR>. which can begeographically at a different location.written in the form of labels(known as tags). projectdocumentation-120414013011-phpapp02 Download or Print .The idea behind Hypertext is that instead of reading text in rigid linear structure. SGML(Standard Generalized Markup Language). A markup language is simply a series of elements. surrounded by angle brackets. color.HTML is also often used to refer to content of the MIME type text/html or even more broadly as ageneric term for HTML whether in its XML-descended form (such as XHTML 1. Anything that is not a tag is part of the document itself.</DL>Creates definition list<FONT>… </FONT> Formats text with a particular font<FORM>.. but specialized to hypertext and adapted to the Web.</CENTER> Creates text<DD>…</DD>Definition of a term<DL>. It is a versatile language and can be used on any platform or desktop. can enhance the presentation of thedocument..-->specifies comments<A>………. we can easily jump from one point to another point. Result 00 of 00 00 results for result for  p. theappearance and semantics of a document.. fonts. etc.. graphics and pointer to other Web pages(Hyperlinks). the languages of the World Wide Web (WWW). HTML tags are notcase-sensitive. to some degree.. allowsusers to produces Web pages that include text.</B>Formats text as bold<BIG>………. Hyperlinks are underlined or emphasized works that load to other documents or some portions of the same document.. HTML can also describe. We can navigate through the information based on our interest and preference. Using graphics.Basic HTML Tags:<! -...HTML can be used to display any type of document on the host computer.</BIG> Formats text in large font. different sizes.</HR>Creates a horizontal rule<HTML>…</HTML> Contains all other HTML tagsProvides meta-information about a document<SCRIPT>…</SCRIPT> Contains client-side or server-side script Top of Form Search Bottom of Form Search History: Searching. and can include embedded scripting language codewhich can affect the behavior of web browsers and other HTML processors. each delimited withspecial characters that define how text or other items enclosed within the elements should bedisplayed..0 and later) or itsform descended directly from SGMLHyper Text Markup LanguageHypertext Markup Language (HTML).HTML is not a programming language but it is an application of ISO Standard 8879.Contains all tags and text in the HTML document<CENTER>.</A>Creates hypertext links<B>………... HTML provides tags (special codes) to make the document look attractive.

Flag document for inapproriate content More From This User . Published by nishuskyblue Follow Top of Form Search Bottom of Form TIP Press Ctrl-FF to search anywhere in the document. Info and Rating Category: Uncategorized. Free download as PDF File (. Rating: Upload Date: 05/17/2012 Copyright: Attribution Non-commercial Tags: This document has no tags. text file (.pdf).Add To Collection 107 Reads 1 Readcasts 0 Embed Views This is a private document.txt) or read online for free.

18 p. R09-CSE-Lab-3-4 nishuskyblue 5 Reads 45 p. projectdocumentation-120414013011-phpapp02 nishuskyblue 107 Reads Related .

DMir_1912_05_14_01-titanic Trilogia Titanicware 64 Reads 419 p.16 p. Disappearing Cryptography d2707974 625 Reads .

Essays on Mathematics. Disappearing Cryptography singingstrings 32 Reads 12 p.. Rota.Discrete Thoughts . Steven Riznyk Mitchell Davis 1055 Reads Next 419 p.. Sc.2 p. lenixen . Schwartz . Vedic Mathematical Concepts and Their Application .Kapoor AMTR 90 Reads Previous| Next 281 p. Kac. ConceptualModeling-p112-navathe Nikhil Dhawan 14 Reads 30 p.

400 Reads 47 p. Procedure call instead of GO TO on WHENEVER alinushca88 757 Reads Previous| Next 47 p. Upstream Interm B2 WorkBook(2) kwiat134 2596 Reads . Made in Marrakech fête ses 5 ans Tendre Tazi 20 Reads 2 p. Gemini 24: Children skating on ice Starling 32 Reads Previous| Next 144 p. Does I_OCK SHARED acquire an S lock or an SIX lock [9]? If the alinushca88 757 Reads 47 p. 3401 alinushca88 757 Reads 2 p.

. LM System Description Bob Andrepont 137 Reads Previous| Next 38 p.7 p. Man + Wife Typographic Poster Stephanie S 21 Reads 8 p. DMir_1912_05_23_001-navio misterioso Trilogia Titanicware 81 Reads Previous| Next 110 p. January 1986. Fitness Guide Aubrie Goodson 307 Reads 1048 p. Agriculture Law: 06-01 aglaw 234 Reads 16 p. Science of Mind Magazine Matthew Thompson 99 Reads 1 p.

Summer 1988) Ranko Kohime 526 Reads Previous| Next 52 p.Volume 27. Number 2.discrete maths Kartik Maheshbhai Mehta 785 Reads 48 p. 2600: The Hacker Quarterly (Volume 5. Other login options Login with Facebook Top of Form Bottom of Form Signup I don't have a Facebook account Top of Form . You must be logged in to leave a comment.. You must be logged in to leave a comment. Submit Characters: . The Stony Brook Press . Bottom of Form Use your Facebook login and see what your friends are reading and sharing.. Submit Characters: 400 Bottom of Form Top of Form Comment must not be empty. Issue 3 The Stony Brook Press 1044 Reads Previous Leave a Comment Top of Form Comment must not be empty.

Sign Up Privacy policy You will receive email notifications regarding your account activity. Share Your Reading Interest On Scribd and social sites like Facebook and Twitter Already have a Scribd account? Top of Form email address or username password Log In Trouble logging in? Bottom of Form Login Successful Sign Up Successful Now bringing you back. We promise to respect your privacy.. Reset Your Password « Back to Login Please enter your email address below to reset your address (required) create username (required) password (required) Send me the Scribd Newsletter. Bottom of Form Why Sign up? 1. and occasional account related communications. Publish Your Documents Quickly and easily 3. You can manage these notifications in your account settings.. We will send you an email with instructions on how to continue. Login Submit Bottom of Form About About Scribd Blog Join our team! Contact Us Advertise with us . Discover and Connect With people of similar interests 2. Top of Form Email Address: You need to provide a login for this account as well.

Language: English Choose the language in which you want to experience Scribd: English Español Português 40c976e8-2152-411b-abef-248e6e617fad Y2:40c976e8-2152-411b-abef-248e6e617fad .Get started AdChoices Support Help FAQ Press Partners Publishers Developers / API Legal Terms Privacy Copyright © Copyright 2012 Scribd Inc.