{"title":"PROVISIONING LARGE-SCALED DATA WITH PARAMETERIZED QUERY PLANS: A CASE STUDY","authors":"Z. Pólkowski, S. Mishra","doi":"10.32010/26166127.2021.4.1.3.14","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.3.14","url":null,"abstract":"In a general scenario, the approaches linked to the innovation of large-scaled data seem ordinary; the informational measures of such aspects can differ based on the applications as these are associated with different attributes that may support high data volumes high data quality. Accordingly, the challenges can be identified with an assurance of high-level protection and data transformation with enhanced operation quality. Based on large-scale data applications in different virtual servers, it is clear that the information can be measured by enlisting the sources linked to sensors networked and provisioned by the analysts. Therefore, it is very much essential to track the relevance and issues with enormous information. While aiming towards knowledge extraction, applying large-scaled data may involve the analytical aspects to predict future events. Accordingly, the soft computing approach can be implemented in such cases to carry out the analysis. During the analysis of large-scale data, it is essential to abide by the rules associated with security measures because preserving sensitive information is the biggest challenge while dealing with large-scale data. As high risk is observed in such data analysis, security measures can be enhanced by having provisioned with authentication and authorization. Indeed, the major obstacles linked to the techniques while analyzing the data are prohibited during security and scalability. The integral methods towards application on data possess a better impact on scalability. It is observed that the faster scaling factor of data on the processor embeds some processing elements to the system. Therefore, it is required to address the challenges linked to processors correlating with process visualization and scalability.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QUANTUM ALGORITHM BASED ON ENTANGLEMENT MEASURE FOR CLASSIFYING BOOLEAN MULTIVARIATE FUNCTION INTO NOVEL HIDDEN CLASSES REVISITED","authors":"M. Zidan, M. Abdel-Aty","doi":"10.32010/26166127.2021.4.1.48.52","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.48.52","url":null,"abstract":"The algorithm that solves a generalized form of the Deutsch- Jozsa problem was proposed. This algorithm uses the degree of entanglement computing model to classify an arbitrary Oracle Uf to one of the 2n classes. In this paper, we will analyze this algorithm based on the degree of entanglement.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124662021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdel-Rahman Alzoubaidi, Mutasem Alzoubaidi, I. Mahfouz, Taha Alkhamis, Fida Al-Asali, Mohammad Alzoubaidi
{"title":"VIRTUAL DESKTOP INFRASTRUCTURE IN HIGHER EDUCATION INSTITUTION: AN APPLICATION OF HOME AND MOBILE COMPUTING ENVIRONMENT","authors":"Abdel-Rahman Alzoubaidi, Mutasem Alzoubaidi, I. Mahfouz, Taha Alkhamis, Fida Al-Asali, Mohammad Alzoubaidi","doi":"10.32010/26166127.2021.4.1.29.38","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.29.38","url":null,"abstract":"Currently, universities have rising demands to apply the incredible recent developments in computer technology that support students to achieve skills necessary for developing applied critical thinking in the contexts of online society. Medical and engineering subjects’ practical learning and education scenarios are crucial to attain a set of competencies and applied skills. These recent developments allow sharing and resource allocation, which brings savings and maximize use, and therefore offer centralized management, increased security, and scalability. This paper describes the implantation of Virtual Desktop Infrastructure (VDI) to access the virtual laboratories that bring efficient use of resources as one of Al Balqa Applied University’s (BAU) Private Cloud services. The concept of desktop virtualization implements the sharing of capabilities utilizing legacy machines, which reduces the cost of infrastructure and introduces increased security, mobility, scalability, agility, and high availability. Al Balqa Applied University uses the service extensively to facilitate in/off-campus learning, teaching, and administrative activities and continue performing their work and education functions remotely to cope with the COVID-19 pandemic.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127668019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEFINING PARAMETERS FOR THE OSCILLATION MODEL OF LOAD FLOW OF GLOBAL ACTIVITIES IN A FULLY DISTRIBUTED EXASCALE SYSTEM","authors":"Ulphat Bakhishov, Azerbaijan State Oil","doi":"10.32010/26166127.2021.4.1.126.131","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.126.131","url":null,"abstract":"Distributed exascale computing systems are the idea of the HPC systems, that capable to perform one exaflop operations per second in dynamic and interactive nature without central managers. In such environment, each node should manage its own load itself and it should be found the basic rules of load distribution for all nodes because of being able to optimize the load distribution without central managers. In this paper proposed oscillation model for load distribution in fully distributed exascale systems and defined some parameters for this model and mentioned about feature works.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128369121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hafiz Gulfam Ahmad, Iqra Tahir, Naveed Naeem Abbas
{"title":"IMPLEMENTATION OF NOVEL APPROACHES IN BIDIRECTIONAL MODEL TRANSFORMATION: A SYSTEMATIC LITERATURE REVIEW","authors":"Hafiz Gulfam Ahmad, Iqra Tahir, Naveed Naeem Abbas","doi":"10.32010/26166127.2021.4.1.91.112","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.91.112","url":null,"abstract":"In the past few years, software development has seen rapid growth, and developers have adopted different methods to provide efficient procedures in software development, thus reducing the overall bug counts and time delay. Bidirectional model transformation is one such technique that encompasses the development of the object code in both directions enabling an abstract view of the software to the developer; over the year’s researchers, have been able to produce many approaches in bidirectional model transformations (bx), but the cost and best fir for effective model transformation, in particular, a quantities survey will be designed which will discuss the best possible apron in the bx. The methodology for this survey shall be made through SLR to identify around 20 different approaches proposed for bidirectional model transformation; these studies range from the year 2010 till date and are thus, rendered latest in the respective fields of our survey. The gathered results have been calculated on the specific set of parameters that are cost and time of usage time are the main aspects of these approaches, and that is the predicament that has made us produce a systematic literature review (SLR) on this very topic. Thus, this paper investigates different approaches based on their implementation cost and time delay and discusses their limitations, and the approach is implemented. Those approaches have been selected, which culminate in both of these respective parameters. The main objective of this SLR is to provide an insight into the different approaches and establish a well-balanced approach that can be used in bidirectional model transformation in software development.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PEDESTRIAN GENDER RECOGNITION WITH HANDCRAFTED FEATURE ENSEMBLES","authors":"M. Ahad, Muhammad Fayyaz","doi":"10.32010/26166127.2021.4.1.60.90","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.60.90","url":null,"abstract":"Human gender recognition is one the most challenging task in computer vision, especially in pedestrians, due to so much variation in human poses, video acquisition, illumination, occlusion, and human clothes, etc. In this article, we have considered gender recognition which is very important to be considered in video surveillance. To make the system automated to recognize the gender, we have provided a novel technique based on the extraction of features through different methodologies. Our technique consists of 4 steps a) preprocessing, b) feature extraction, c) feature fusion, d) classification. The exciting area is separated in the first step, which is the full body from the images. After that, images are divided into two halves on the ratio of 2:3 to acquire sets of upper body and lower body. In the second step, three handcrafted feature extractors, HOG, Gabor, and granulometry, extract the feature vectors using different score values. These feature vectors are fused to create one strong feature vector on which results are evaluated. Experiments are performed on full-body datasets to make the best configuration of features. The features are extracted through different feature extractors in different numbers to generate their feature vectors. Those features are fused to create a strong feature vector. This feature vector is then utilized for classification. For classification, SVM and KNN classifiers are used. Results are evaluated on five performance measures: Accuracy, Precision, Sensitivity, Specificity, and Area under the curve. The best results that have been acquired are on the upper body, which is 88.7% accuracy and 0.96 AUC. The results are compared with the existing methodologies, and hence it is concluded that the proposed method has significantly achieved higher results.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QUANTUM COMPUTING AND COMMUNICATIONS","authors":"A. Manzalini","doi":"10.32010/26166127.2021.4.1.53.59","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.53.59","url":null,"abstract":"Today, like never before, we are witnessing a pervasive diffusion of ultra-broadband fixed-mobile connectivity, the deployment of Cloud-native 5G network and service platforms, and the wide adoption of Artificial Intelligence. It has the so-called Digital Transformation of our Society: as a matter of fact, the transformative role of Telecommunications and Information Communication Technologies (ICT) has long been witnessed as a precursor of scientific progress and economic growth in the modern world. Nevertheless, this transformation is still laying its foundations on Electronics and the impending end of Moore’s Law: therefore, a rethinking of the long-term ways of doing computation and communications has been already started. Among these different ways, quantum technologies might trigger the next innovation breakthrough in the medium long-term. In this direction, the paper provides an overview of the state of the art, challenges, and opportunities posed by an expected second wave of quantum technologies and services.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vladislav Li, Georgios Amponis, Jean-Christophe Nebel, V. Argyriou, T. Lagkas, P. Sarigiannidis
{"title":"OBJECT RECOGNITION FOR AUGMENTED REALITY APPLICATIONS","authors":"Vladislav Li, Georgios Amponis, Jean-Christophe Nebel, V. Argyriou, T. Lagkas, P. Sarigiannidis","doi":"10.32010/26166127.2021.4.1.15.28","DOIUrl":"https://doi.org/10.32010/26166127.2021.4.1.15.28","url":null,"abstract":"Developments in the field of neural networks, deep learning, and increases in computing systems’ capacity have allowed for a significant performance boost in scene semantic information extraction algorithms and their respective mechanisms. The work presented in this paper investigates the performance of various object classification- recognition frameworks and proposes a novel framework, which incorporates Super-Resolution as a preprocessing method, along with YOLO/Retina as the deep neural network component. The resulting scene analysis framework was fine-tuned and benchmarked using the COCO dataset, with the results being encouraging. The presented framework can potentially be utilized, not only in still image recognition scenarios but also in video processing.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CHALLENGES OF USING DIFFERENT MATHEMATICAL MODELS FOR LOAD BALANCING OPTIMIZATION IN MULTI-CORE COMPUTING SYSTEMS","authors":"N. Ismayilova, Azerbaijan State Oil","doi":"10.32010/26166127.2020.3.2.190.195","DOIUrl":"https://doi.org/10.32010/26166127.2020.3.2.190.195","url":null,"abstract":"This paper examines the role of applying different artificial intelligence techniques for the implementation of load balancing in the dynamic environment of distributed multi-core computing systems. Were investigated several methods to optimize the assignment process between computing nodes and executing tasks after the occurrence of a dynamic and interactive event, when traditional discrete load balancing techniques are ineffective.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131260610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANOMALY DETECTION USING MACHINE LEARNING APPROACHES","authors":"Mausumi Das Nath, T. Bhattasali","doi":"10.32010/26166127.2020.3.2.196.206","DOIUrl":"https://doi.org/10.32010/26166127.2020.3.2.196.206","url":null,"abstract":"Due to the enormous usage of the Internet, users share resources and exchange voluminous amounts of data. This increases the high risk of data theft and other types of attacks. Network security plays a vital role in protecting the electronic exchange of data and attempts to avoid disruption concerning finances or disrupted services due to the unknown proliferations in the network. Many Intrusion Detection Systems (IDS) are commonly used to detect such unknown attacks and unauthorized access in a network. Many approaches have been put forward by the researchers which showed satisfactory results in intrusion detection systems significantly which ranged from various traditional approaches to Artificial Intelligence (AI) based approaches.AI based techniques have gained an edge over other statistical techniques in the research community due to its enormous benefits. Procedures can be designed to display behavior learned from previous experiences. Machine learning algorithms are used to analyze the abnormal instances in a particular network. Supervised learning is essential in terms of training and analyzing the abnormal behavior in a network. In this paper, we propose a model of Naïve Bayes and SVM (Support Vector Machine) to detect anomalies and an ensemble approach to solve the weaknesses and to remove the poor detection results","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"17 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113933355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}