StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing in Trust Building Knowledge Discovery - Coursework Example

Summary
This coursework "Cloud Computing in Trust Building Knowledge Discovery" discusses cloud computing in trust-building knowledge discovery for informational retrieval. It contains some proposed models, algorithms, and experimental results. The statistical analysis was collected…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful

Extract of sample "Cloud Computing in Trust Building Knowledge Discovery"

Cloud Computing In Trust Building Knowledge Discovery for Information Retrieval Name: Course Name: Course Instructor: Date of submission: Outline Thesis statement………………………………………………………………………3 Introduction…………………………………………………………………………..3 Informational retrieval………………………………………………………………..3 Retrieval operations…………………………………………………………………..4 Retrieval application………………………………………………………………….5 Algorithm…………………………………………………………………………….5 Quality judgments of algorithms……………………………………………………..6 Dynamic programming………………………………………………………………7 Conclusion …………………………………………………………………………..8 References……………………………………………………………………………9 Thesis statement These paper discuses more about cloud computing in trust building knowledge discovery for informational retrieval. The paper also contains some proposed model, algorithm, and experimental results. To arrive at the conclusion of this paper statistical analysis was collected. Introduction Cloud computing is a term used to refer to anything which involves offering hosted services using the internet. It can be public or private.Cloud computing is becoming popular in the IT industry. Over the past few years, the supply-and-demand of this new area has been seeing a huge increase of investment in infrastructure and has been drawing broader uses in the United States. Informational retrieval Informational retrieval (IR) is concerned with the structure, analysis, organization, storage, searching, and dissemination of information. An IR system is designed to make available a given stored collection of information items to a user population desiring to obtain access. The stored information is normally assumed to consist of bibliographic items such as the books in a library or documents of many kind; by extension, an IR system may be used to access collections of drawings, films, museum artifacts, patents and so on. In each case, the IR system is designed to extract from files those items that most nearly correspond to existing user as needs as reflected in requests submitted by the user population (Christauskas, &Miseviciene, 2012). Most operational retrieval services are implemented online using console terminal devices to introduce search queries and to obtain retrieval output. In that case, the information searches may take place interactively in such a technique that datadelivered by the users during the search operation is used to obtain improved search output (Han, 2011). Furthermore, networks of information centers may be created by supplying suitable connections between individual centers, thereby affording the user population a chance to access the resource of the whole network. When there is a large store of data like a set of customer records, it becomes expensive to search the entire store sequentially to find a particular piece of data. One would like, instead to be able to go directly to the point where the relevant data is to be found and extract it without search. A memory that allows one to do this is termed as random access. A better description for it is addressable, direct access, for there is nothing random about the way in which one approaches it. The store is to be addressable so that each record in it can be designated, or pointed to, by a symbolized address (name). It is to have direct access so that the information processer can be switched to read the desired record directly, once its name is known, without requiring a search (Rouse, 2010). Retrieval operations In many conventional retrieval situations, a search request is constructed by choosing appropriate keywords and content terms and appropriately interconnecting them by Boolean connections ( and, or, not) to express the intent of the requestor. For example, a request covering “tissue culture studies of human breast cancer” may then be transformed into the statement shown below; {Breast neoplasm or carcinoma, ductal} and {human or not (any term indicating animal or disease)} and {tissue culture or culture media or chick embryo} and English Retrieval application The most common type of retrieval situations is exemplified by a reference retrieval systemperforming ‘on demand’ searches submitted by a given user population. Normally, only the bibliographic information is stored for each item, including authors’ names, titles, journals or places of publication, dates, and applicable keywords are usable for search purposes. Sometimes, the words of the documents titles can also be searched. Less commonly, more extended text portions such as abstracts, summaries, or even full texts may be stored, in which case a text search (as opposed to a simple keyword search) becomes possible. In any case, the responses provided by the system consist of references to the bibliographic items that match the user queries. In most conventional situations, the retrieved information is submitted to the users in no particular order of importance. An ordering indecreasing query-document similarity can however be obtained in the more advanced systems, which can then be used advantageously for search negotiation and feedback purposes. Algorithm An algorithm is the precise characterization of a method of solving the problem, presented in a language understandable to the device. In certain, an algorithm has the following properties. 1. Application of the algorithm to a specific input set or problem description outcomes in a finite order of actions. 2. The order of actions has anexceptional initial action. 3. Every action in the system has anexceptional initial action. 4. The systemends with either ananswer to the problem, or a report that the problem is unresolved for that set of data. This concept can be illustrated with an example. Find the square root of the real number x. As it is stated, this problem is algorithmically either trivial or unsolvable, owing to the irrationality of most square roots. If one accepts  as the square root of 2, for example, the solution is trivial. The answer is the square root sign (√) concatenated with the input. In Snobol, the entire algorithm is OUTPUT END =  INPUT However, if we want a decimal expression, then the square root of 2 can never be calculated exactly. Hence, the requirement of a finite number of actions is violated. Quality judgments of algorithms Whichever computer program is a semi-algorithm, and any problem that always halts is an algorithm (of course, it may not solve the problem for which the programmer intended it). Given a solvable problem, there are many algorithms (programs) to solve it, not all of equal equality. The primary practical criteria by which the quality of an algorithm is judged are time and memory requirements, accuracy of solutions, and generality. To cite an extreme example, since a properly defined game of chess comprises of a finite number of possible moves, there exists an algorithm to determine the “perfect” chess game. Simply examine all possible move sequences, in some specified order. Unfortunately, the time required to execute any algorithm based on the idea is measured in billions of years, even at today’s computer speeds. The memory requirements for such an algorithm are similarly overbearing (Kumar, & Gupta, 2011). The accuracy of algorithm is a characteristic often more closely related to time than to memory requirements. For instance, the square root algorithm presented is not very accurate. Changing the test constant from 0.00005 to 0.00000000005 will produce 0.00000381 as the square root of zero at the cost of more iteration through the circlet of the algorithm. No further memory is needed, and the further iterations require only a small fraction of a second. Further improvement may be obtained from the corresponding algorithm in double-precision at a cost of both run time and additional memory space. In each case the basic algorithmic concept is unchanged (Lizheng, Shuguang, Shigen, &Changyuan, 2012). Dynamic programming Dynamic programming arises when the only algorithm one thinks of is enumerating all possible configurations of the given data and analyzingevery one of them to see if it is a solution. An essential idea is to keep a table that contains all previously computed configurations and their outcomes. If the total number of the configurations is large, the dynamic programming algorithm will necessitate substantial time and space. However, if there are merelya small amount of distinct configurations, dynamic programming avoidsrecomputing the solution to these problems over and over (Jia, Xue, Zhang, & Li, 2010). To determine if there are only a small number of distinct configurations, one needs to detect when the so-called principle of optimality holds. This principle asserts that every decision that contributes to the final solution must be optimal with respect to the initial state. When this principle holds, dynamic programming drastically reduces the amount of computation by avoiding or evading the listing of some decision systems that cannotperhaps be optimal. As simple consider computing the n-th Fibonacci number,  where =  +  and ==1. The first few elements of this famous sequence are 1, 2, 3, 5, 8, 13, 21, 34,…The obvious recursive algorithm for computing  suffers from the fact that many values of  are computed over and over again. However, if one follows the dynamic programming strategy and create a table that contains all values of  as they are computed, a linear time algorithm results (Lizheng, Shuguang, Shigen, &Changyuan, 2012). Conclusion In conclusion, the most exact answer to this topic is based on the model theory for FOPC, (First Order Predicate Calculus). This defines the structure of a possible world and conditions under which an expression would be true in it, and takes the meaning of a logical expression to be the constraint on this structure imposed by insisting on its truth. It is used as a tool in the analysis of more complex phenomena (Kumar, & Gupta, 2011). References Christauskas, C., &Miseviciene, R. (2012). Cloud -- Computing Based Accounting for Small to Medium Sized Business. Engineering Economics, 23(1), 14-21. Han, Y. (2011). Cloud Computing: Case Studies and Total Costs of Ownership.Information Technology & Libraries, 30(4), 198-206. Jia, Z., Xue, S., Zhang, D., & Li, Q. (2010). Study of Improvement on Programming Method from Cloud Computing to Grid Computing.Proceedings Of The International Symposium On Electronic Commerce & Security Workshops, 244-248. Kumar, P., & Gupta, S. (2011). Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks.International Journal On Computer Science & Engineering, 3(9), 3283-3290. Lizheng, G., Shuguang, Z., Shigen, S., &Changyuan, J. (2012). Task Schedule Optimization in Cloud Computing Basing on Heuristic Algorithm.Journal Of Networks, 7(3), 547. Rouse, M. (2010). Cloud computing.retrieved from,http://searchcloudcomputing.techtarget.com Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us