MY BLOG

A m a t e u r B l o g Y a n g d i K e m b a n g k a n S e c a r a K e t i d a k S e n g a j a a n radiradintan@yahoo.com

Minggu, 22 Juni 2014

PARALLEL COMPUTATION

Parallel computation is one of the computer programming that allows to execute commands simultaneously and concurrently in a single or multiple processors inside a CPU. Parallel computation itself is useful to improve the performance of the computer as more and more processes that can be done at the same time it will be faster.

Parallel  concept
The concept of parallel  is a processors abilityDescription: http://cdncache-a.akamaihd.net/items/it/img/arrow-10x10.png to perform a task or multiple tasks simultaneously or concurrently, in other words, the processor is able to perform one or many tasks at one time.

 Distributed Processing 
Distributed processing is the process of parallel processing in distributed parallel processing using multiple machines. So, it could be said the abilityDescription: http://cdncache-a.akamaihd.net/items/it/img/arrow-10x10.png of the computers that run simultaneously to solve a problem with the process quickly.

Architectural Parallel Computer
According to a Processor Designer, taxonomy Flynn, Computer Architecture is divided into four sections. 

1.     SISD (Single Instruction Single Data Stream) 
The type of computer that only has one processor and one instruction is executed serially.

2.     SIMD (Single Instruction Multiple Data Stream) 
            This type of computer that has more than one processor, but this computer only executes one instruction in parallel on different data in lock-step level.

3.     MISD (Multiple Instruction Single Data Stream) 
            This type of computer that has one processor and execute multiple instructions in parallel but in practice there is no computer that is built with this architectureDescription: http://cdncache-a.akamaihd.net/items/it/img/arrow-10x10.png because the system is not easily understood, until now there has been no computers that use this type of architecture

4.     MIMD (Multiple Instruction Multiple Data Stream) 
Ads by OnlineBrowserAdvertisingAd Options
   This type of computer that has more than one processor and execute more than one instruction in parallel. This type of computer that is most widely used to build a parallel computer, even many supercomputer that implement this architecture, because the models and concepts that are not too complicated to understand.

Introduction to Programming Thread 
A thread in computer programming is a relevant information about the use of a single program that can handle multiple users simultaneously.Thread This allows the program to determine how the user entered into the program in turn and the user will go back to using a different user. Multiple threads can run concurrently with other processes divides the resources into memoryDescription: http://cdncache-a.akamaihd.net/items/it/img/arrow-10x10.png, while the other processes do not share it.

Introduction to Programming CUDA GPU
GPU Refers to a specific processor GPU to accelerate and change the memory to speed up image processing. The GPU itself is usually located on the graphics card or laptop computer 
CUDA (Compute Unified Device Architecture) is a scheme created by NVIDIA as the GPU (Graphic Processing Unit) capable of computing not only to graphics processing, but also for generalDescription: http://cdncache-a.akamaihd.net/items/it/img/arrow-10x10.png purposes. So with the CUDA we can take advantage of multiple processors from NVIDIA to do the calculation process much or computing.

REFFERENCE
·         http://uchaaii.blogspot.com/2013/07/parallel-computation.html

Senin, 12 Mei 2014

QUANTUM COMPUTING

A quantum computer is a computer design which uses the principles of quantum physics to increase the computational power beyond what is attainable by a traditional computer. Quantum computers have been built on the small scale and work continues to upgrade them to more practical models.

Entanglement
Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.
Particles, such as photons, electrons, or qubits that have interacted with each other retain a type of connection and can be entangled with each other in pairs, in the process known as correlation. Knowing the spin state of one entangled particle - whether the direction of the spin is up or down - allows one to know that the spin of its mate is in the opposite direction. Even more amazing is the knowledge that, due to the phenomenon of superposition, the measured particle has no single spin direction before being measured, but is simultaneously in both a spin-up and spin-down state. The spin state of the particle being measured is decided at the time of measurement and communicated to the correlated particle, which simultaneously assumes the opposite spin direction to that of the measured particle. Quantum entanglement allows qubits that are separated by incredible distances to interact with each other immediately, in a communication that is not limited to the speed of light. No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated.
Entanglement is a real phenomenon (Einstein called it "spooky action at a distance"), which has been demonstrated repeatedly through experimentation. The mechanism behind it cannot, as yet, be fully explained by any theory. One proposed theory suggests that all particles on earth were once compacted tightly together and, as a consequence, maintain a connectedness. Much current research is focusing on how to harness the potential of entanglement in developing systems for quantum cryptography and quantum computing.

Operations on pure qubit states
There are various kinds of physical operations that can be performed on pure qubit states
1.            A quantum logic gate can operate on a qubit: mathematically speaking, the qubit undergoes a unitary transformation. Unitary transformations correspond to rotations of the qubit vector in the Bloch sphere.
2.            Standard basis measurement is an operation in which information is gained about the state of the qubit. The result of the measurement will be either ,Description: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixekwJBMfeL9Wsc5kWsPWNC-TxouUttwZ2NCgEnrRofGQd76ZDrsvJA6xCylyHhyphenhyphenGf4-9UwZFSX4QJC_qQfRkuN93yiD2PgNCQQzAbVStPHXvmNag0pvmn1pe2GmnEysnKNBt4eKUJb-kg/s1600/0.pngwith probability Description: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaNW8IE5yob5DwNH5FGkYTJY6ATq9Tz_MC_ghXVmSnXAmmyIixumBXDkXxfmnkUk_QmZHSrTKMQkFmuaX2AH1pxtc4xq5Oxb6zkLavMsmfPwB32YSN7Chg5qfvqHhyphenhyphendn0EOIn6QYYv5aew/s1600/1.png, or Description: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWuXu_J6g0FMMMcxuOzh34mUCmv5GR42LiH-l3ohMRKyRCVle_3Ctp2JpeZEPh6sPFHgEKbgMLFiMFUmSBPMtGujUhKCfWcMEpApCnJIwmJd18Jbaj8brkt69ivYqv9ewJyjZAm_w6QG5z/s1600/2.png, with probability Description: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEl0tI2CLnP2sEBeKhY-fFJI5_rPws_Y-h2Tjqrfmjus0MDFPGjTAEt-9XIU6vjk2dpWFbmyQJ49gN06TYBiMPvuJggNuuT3sbhZVTcSBMYC8Biyc4ed2OoV6jGV5ay2db7cQHnWBQfQV3/s1600/3.png. Measurement of the state of the qubit alters the values of Î± and Î². For instance, if the result of the measurement is Description: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixekwJBMfeL9Wsc5kWsPWNC-TxouUttwZ2NCgEnrRofGQd76ZDrsvJA6xCylyHhyphenhyphenGf4-9UwZFSX4QJC_qQfRkuN93yiD2PgNCQQzAbVStPHXvmNag0pvmn1pe2GmnEysnKNBt4eKUJb-kg/s1600/0.png, Î± is changed to 1 (up to phase) and Î² is changed to 0. Note that a measurement of a qubit state entangled with another quantum system transforms a pure state into a mixed state.


Quantum Gate
Quantum computing and specifically the quantum circuit model of computation, a quantum gate (or quantum logic gate) is a basic quantum circuit operating on a small number of qubits. They are the building blocks of quantum circuits, like classical logic gates are for conventional digital circuits.


Shor's algorithm
Named after mathematician Peter Shor, is a quantum algorithm (an algorithm that runs on a quantum computer) for integer factorization formulated in 1994. Informally it solves the following problem: Given an integer N, find its prime factors.
On a quantum computer, to factor an integer 
N, Shor's algorithm runs in polynomial time (the time taken is polynomial in log N, which is the size of the input). Specifically it takes time O((log N)3), demonstrating that the integer factorization problem can be efficiently solved on a quantum computer and is thus in the complexity class BQP. This is substantially faster than the most efficient known classical factoring algorithm, the general number field sieve, which works in sub-exponential time — aboutO(e1.9 (log N)1/3 (log log N)2/3). The efficiency of Shor's algorithm is due to the efficiency of the quantum Fourier transform, and modular exponentiation by repeated squaring


Selasa, 29 April 2014

Cloud Computing

Cloud computing in general can be portrayed as a synonym for distributed computing over a network, with the ability to run a program or application on many connected computers at the same time. It specifically refers to a computing hardware machine or group of computing hardware machines commonly referred as a server connected through a communication network such as the Internet, an intranet, a local area network (LAN) or wide area network (WAN) and individual users or user who have permission to access the server can use the server's processing power for their individual computing needs like to run an application, store data or any other computing need. Therefore, instead of using a personal computer every-time to run the application, the individual can now run the application from anywhere in the world, as the server provides the processing power to the application and the server is also connected to a network via internet or other connection platforms to be accessed from anywhere
Cloud computing offers your business many benefits. It allows you to set up what is essentially a virtual office to give you the flexibility of connecting to your business anywhere, any time. With the growing number of web-enabled devices used in today's business environment (e.g. smartphones, tablets), access to your data is even easier. There are many benefits to moving your business to the cloud:
·         Reduced IT costs
Moving to cloud computing may reduce the cost of managing and maintaining your IT systems. Rather than purchasing expensive systems and equipment for your business, you can reduce your costs by using the resources of your cloud computing service provider. You may be able to reduce your operating costs because:
1.       the cost of system upgrades, new hardware and software may be included in your contract
2.       you no longer need to pay wages for expert staff
3.       your energy consumption costs may be reduced
4.       there are fewer time delays.
·         Scalability
Your business can scale up or scale down your operation and storage needs quickly to suit your situation, allowing flexibility as your needs change. Rather than purchasing and installing expensive upgrades yourself, your cloud computer service provider can handle this for you. Using the cloud frees up your time so you can get on with running your business.
·         Business continuity
Protecting your data and systems is an important part of business continuity planning. Whether you experience a natural disaster, power failure or other crisis, having your data stored in the cloud ensures it is backed up and protected in a secure and safe location. Being able to access your data again quickly allows you to conduct business as usual, minimising any downtime and loss of productivity.
·         Collaboration efficiency
Collaboration in a cloud environment gives your business the ability to communicate and share more easily outside of the traditional methods. If you are working on a project across different locations, you could use cloud computing to give employees, contractors and third parties access to the same files. You could also choose a cloud computing model that makes it easy for you to share your records with your advisers (e.g. a quick and secure way to share accounting records with your accountant or financial adviser).
·         Flexibility of work practices
Cloud computing allows employees to be more flexible in their work practices. For example, you have the ability to access data from home, on holiday, or via the commute to and from work (providing you have an internet connection). If you need access to your data while you are off-site, you can connect to your virtual office, quickly and easily.
·         Access to automatic updates
Access to automatic updates for your IT requirements may be included in your service fee. Depending on your cloud computing service provider, your system will regularly be updated with the latest technology. This could include up-to-date versions of software, as well as upgrades to servers and computer processing power.

Cloud computing exhibits the following key characteristics:
intensive computing tasks. Pricing on a utility computing basis is fine-grained, with usage-based options and fewer IT skills are required for implementation (in-house).[40] The e-FISCAL project's state-of-the-art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available in-house.
Device and location independence. enable users to access systems using a web browser regardless of their location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.
Virtualization technology allows sharing of servers and storage devices and increased utilization. Applications can be easily migrated from one physical server to another.
Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for:
·         centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
·         peak-load capacity increases (users need not engineer for highest possible load-levels)
·         utilisation and efficiency improvements for systems that are often only 10–20% utilised.
Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing suitable for business continuity and disaster recovery. Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis in near real-time (Note, the VM startup time varies by VM type, location, os and cloud providers), without users having to engineer for peak loads.
Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.
Security can improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford to tackle.
Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.
Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management. The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories:
Deterrent controls
These controls are set in place to prevent any purposeful attack on a cloud system. Much like a warning sign on a fence or a property, these controls do not reduce the actual vulnerability of a system.
Preventative controls
These controls upgrade the strength of the system by managing the vulnerabilities. The preventative control will safeguard vulnerabilities of the system. If an attack were to occur, the preventative controls are in place to cover the attack and reduce the damage and violation to the system's security.
Corrective controls
Corrective controls are used to reduce the effect of an attack. Unlike the preventative controls, the corrective controls take action as an attack is occurring.
Detective controls
Detective controls are used to detect any attacks that may be occurring to the system. In the event of an attack, the detective control will signal the preventative or corrective controls to address the issue.


Related Link :
Related Link :
http://www.business.qld.gov.au/business/running/technology-for-business/cloud-computing-business/cloud-computing-benefits
http://en.wikipedia.org/wiki/Cloud_computing
http://royanafwani.wordpress.com/2011/12/22/keamanan-pada-cloud-computing/
http://en.wikipedia.org/wiki/Cloud_computing_security