Cloud Computing in Science and Engineering and the “SciShop.ru” Computer Simulation Center
Journal Title: Engineering, Technology & Applied Science Research - Year 2011, Vol 1, Issue 6
Abstract
Various aspects of cloud computing applications for scientific research, applied design, and remote education are described in this paper. An analysis of the different aspects is performed based on the experience from the “SciShop.ru” Computer Simulation Center. This analysis shows that cloud computing technology has wide prospects in scientific research applications, applied developments and also remote education of specialists, postgraduates, and students.
Authors and Affiliations
G. A. Tarnavsky, E. V. Vorozhtsov
Numerical Simulation of Tire Reinforced Sand behind Retaining Wall Under Earthquake Excitation
This paper studies the numerical simulations of retaining walls supporting tire reinforced sand subjected to El Centro earthquake excitation using finite element analysis. For this, four cases are studied: cantilever ret...
Numerical Study of the Thermal Behavior of a Composite Phase Change Material (PCM) Room
In this study, thermal performance of building walls integrated with phase change materials (PCM) was evaluated in terms of indoor temperature reduction and heat transfer time delay. PCM was incorporated as thin layer pl...
Performance Analysis of Transient Current Limiters in a Distribution System
This paper deals with the performance evaluation of a three-phase transient current limiter in distribution systems. A simulation model based on mathematical model of a three-phase, transient current limiter has been dev...
A Weight-based Query Forwarding Technique for Super-peer-based Grid Resource Discovery
Grid computing environments include heterogeneous resources shared by a large number of computers to handle data and process intensive applications. The required resources must be accessible for the grid applications on...
Using Combined One-Time Password for Prevention of Phishing Attacks
Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have...