0% found this document useful (0 votes)
27 views

Cloud Computing and Natural Language Processing

Uploaded by

amenabera469
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Cloud Computing and Natural Language Processing

Uploaded by

amenabera469
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

Topic-1

-------------------------------

[Cloud Computing]
Definition

• Cloud computing is the delivery of computing as


a service rather than a product.
• Shared resources, software, and information are
provided to computers and other devices as a
utility (like the electricity grid) over a network
(typically the Internet).
• Cloud computing entrusts, typically centralized,
services with your data, software, and
computation on a published application
programming interface (API) over a network.
• It has a lot of overlap with software as a service
(SaaS).
Cont.

• Cloud computing is a general term for


anything that involves delivering hosted
services over the Internet.
• Cloud computing is simply a set of pooled
computing resources and services
delivered over the web.
• Cloud computing really is accessing
resources and services needed to perform
functions with dynamically changing
needs.
Cont.
• Cloud computing enables ubiquitous
access to shared pools of resources and
higher-level
• It simply put, cloud computing is the delivery
of computing services – servers, storage,
databases, networking, software, analytics
and more – over the Internet (cloud).
Cont.
• Cloud computing allows consumers and
businesses to use applications without
installation and access their personal files at any
computer with internet access.
• Cloud computing relies on sharing computing
resources rather than having local servers or
personal device to handle applications.
• Cloud computing is an example of computing in
which dynamically scalable and often virtualized
resources are provided as a service over the
Internet.
Early Models of Cloud Computing
▪ Basic reasoning: information and data processing can be
done more efficiently on large farms of computing and
storage systems accessible via the Internet.
▪ Two early models:
1. Grid computing
▪ Grid computing is the collection of computer resources from
multiple locations to reach a common goal.
▪ The grid can be thought of as a distributed system with non-
interactive workloads that involve a large number of files.
2. Utility computing
▪ Utility computing is a service provisioning model in which a service
provider makes computing resources and infrastructure
management available to the customer as needed, and charges
them for specific usage rather than a flat rate.

6
Cloud Computing Models, Resources, Attributes
Delivery models
Software as a Service (SaaS) Deployment models
Platform as a Service (PaaS) Public cloud

Infrastructure as a Service (IaaS) Private cloud


Community cloud
Hybrid cloud

Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Utility computing. Pay-per-usage
Resources
Accessible via the Internet
Compute & storage servers
Networks Services Elasticity

Applications

27-Nov-23 CoSc-4181
7
Cloud computing - Characteristics
Shared Resources and Resource Management:
• Offers on-demand, scalable and elastic computing services
• Cloud uses a shared pool of resources
• Uses Internet technology to offer scalable and elastic
services.
• The term “elastic computing” refers to the ability of
dynamically and on-demand acquiring computing
resources and supporting a variable workload.
• Resources are metered and users are charged accordingly.
• It is more cost-effective due to resource-multiplexing.
Lower costs for the cloud service provider are past to the
cloud users.

8
Cloud computing (cont’d)
Data Storage:
• Data is stored:
• in the “cloud”, in certain cases closer to the site where it is used.
• appears to the users as if stored in a location-independent manner.
• The data storage strategy can increase reliability, as well as
security, and can lower communication costs.
Management:
• The maintenance and security are operated by service
providers.
• The service providers can operate more efficiently due to
specialization and centralization.

9
Core Cloud Characteristics

• Empowerment of end-users of computing resources by putting the


provisioning of those resources in their own control, as opposed
to the control of a centralized IT service (
• Low Latency: The cloud network must deliver microsecond
latency across the entire network fabric because low latency
improves application performance and server utilization.
• Self-Healing Resilience: Cloud networks operate 24x7, so
downtime is not an option. This requires a network
architecture that offers self-healing and the ability for
transparent in-service software updates.
Contd..
• Reliability is improved if multiple redundant sites are used,
which makes well-designed cloud computing suitable for business
continuity and disaster recovery.
• Scalability and Elasticity via dynamic ("on-demand") provisioning
of resources on a fine-grained, self-service basis near real-time,
without users having to engineer for peak loads. The cloud
network must scale to the overall level of throughput
required to ensure that it does not become a bottleneck.
• Performance is monitored and consistent and loosely coupled
architectures are constructed using web services as the system
interface.
– The cloud network must provide predictable performance to service
many simultaneous applications in the network, including video,
voice, and web traffic.
Cont.

• Device and location independence enable users to access


systems using a web browser regardless of their location or what
device they are using.
• Virtualization technology allows servers and storage devices to
be shared and utilization be increased.
• Multi-tenancy enables sharing of resources and costs across a
large pool of users thus allowing for:
– Centralization of infrastructure in locations with lower costs
(such as real estate, electricity, etc.)
– Peak-load capacity increases (users need not engineer for
highest possible load-levels)
– Utilization and efficiency improvements for systems that are
often only 10–20% utilized.
Contd…
• Security could improve due to centralization of data, increased
security-focused resources, etc., but concerns can persist about
loss of control over certain sensitive data, and the lack of security
for stored kernels.
• Maintenance of cloud computing applications is easier, because
they do not need to be installed on each user's computer and can
be accessed from different places.
Cloud Computing Essential Characteristics
• On-demand self service
– Users automatically access computing resources (e.g. servers, storage etc.) as needed.

• Broad network access


– Services available over the network can be accessed using mobile/smart phones, tablets,
laptops and desktops.

• Resource pooling
– Computing resources (including memory and bandwidth) can be pooled to serve multiple
customers at the same time.
– Location independence

• Rapid elasticity
– Ability to quickly scale in/out service with demand, at any time.

• Measured service
– Control, optimise services based on metering (i.e. pay-per-use pricing model)
– Type of service include storage, processing, bandwidth etc.
Cloud activities
▪ Service management and provisioning including:
▪ Call center and Operations management.
▪ Systems management.
▪ Billing and accounting, asset management.
▪ Technical support and backups.
▪ Security management including:
▪ ID and authentication.
▪ Certification and accreditation.
▪ Intrusion prevention and detection.
▪ Virus protection and Cryptography.
▪ Physical security, incident response.
▪ Access control, audit and trails, and firewalls.
15
Cloud activities (cont’d)

▪ Customer services such as:


▪ Customer assistance and on-line help.
▪ Subscriptions.
▪ Business intelligence.
▪ Reporting.
▪ Customer preferences.
▪ Personalization.
▪ Integration services including:
▪ Data management.
▪ Development.

16
Cloud Computing Advantages
1. Resources, such as CPU cycles, storage, network bandwidth, are
shared.
2. When multiple applications share a system, their peak demands
for resources are not synchronized thus, multiplexing leads to a
higher resource utilization.
3. Resources can be aggregated to support data-intensive
applications.
4. Data sharing facilitates collaborative activities. Many
applications require multiple types of analysis of shared data
sets and multiple decisions carried out by groups scattered
around the globe.

17
Cloud Computing Advantages

5. Eliminates the initial investment costs for a private


computing infrastructure and the maintenance and
operation costs.
6. Cost reduction: concentration of resources creates the
opportunity to pay as you go for computing.
7. Elasticity: the ability to accommodate workloads with very
large peak-to-average ratios.
8. User convenience: virtualization allows users to operate in
familiar environments rather than in idiosyncratic ones.

18
Cloud Computing Deployment Model(Types)

19
Public cloud

• The infrastructure is made available to the general public or a


large industry group and is owned by the organization selling
cloud services.
• Applications, storage, and other resources are made available to
the general public by a service provider.
• Public cloud services may be free or offered on a pay-per-usage
model.
• There are limited service providers like Microsoft, Google etc
owns all Infrastructures at their Data Center and the access will
be through Internet mode only.
• No direct connectivity proposed in Public Cloud Architecture.
Community Cloud

• Community cloud shares infrastructure between several


organizations from a specific community with common
concerns (security, compliance, jurisdiction, etc.), whether
managed internally or by a third-party and hosted internally or
externally.
• The costs are spread over fewer users than a public cloud (but
more than a private cloud), so only some of the cost savings
potential of cloud computing are realized.
Hybrid cloud

• Composition of two or more Clouds (public, private, or


community) as unique entities but bound by a standardized
technology that enables data and application portability.
• Hybrid cloud is a composition of two or more clouds (private,
community or public) that remain unique entities but are
bound together, offering the benefits of multiple deployment
models.
Private cloud

• The infrastructure is operated solely for an organization.


• Private cloud is cloud infrastructure operated solely for a
single organization, whether managed internally or by a
third-party and hosted internally or externally.
• They have attracted criticism because users "still have to buy,
build, and manage them" and thus do not benefit from less
hands-on management, essentially "[lacking] the economic
model that makes cloud computing such an intriguing
concept".
Cloud Computing Delivery Models
1. Software as a Service (SaaS) (high level)
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS) (low level)

24
Cloud Layer Architecture

www.bournemouth.ac.uk Monday 13th February 2017


Kimmeridge Lecture Theatre (KG01)
Cloud Service Models
IaaS
Infrastructure as a service
•Provision servers
•Storage
•Networking resources

PaaS
Platform as a service
•Middleware platform
•Solution stack
•Both accessible over a network

SaaS
Software as a service

•Software
•Applications
•Or services that are delivered over a
network
Software as a Service (SaaS)

• In this model, cloud providers install and operate application


software in the cloud and cloud users access the software
from cloud clients.
• The cloud users do not manage the cloud infrastructure and
platform on which the application is running.
• No need to install and run the application on the cloud user's
own computers which simplify maintenance and support.

• What makes a cloud application different from other applications


is its elasticity. This can be achieved by cloning tasks onto
multiple virtual machines at run-time to meet the changing
work demand.

• Load balancers (middlewares) distribute the work over the set


of virtual machines. This process is transparent to the cloud
user who sees only a single access point.
Contd..
• To accommodate a large number of cloud users,
cloud applications can be multitenant, that is, any
machine serves more than one cloud user
organization.

• It is common to refer to special types of cloud based


application software with a similar naming
convention: desktop as a service, business
process as a service, Test Environment as a
Service, communication as a service.

• The pricing model for SaaS applications is typically


a monthly or yearly flat fee per user.
Software-as-a-Service (SaaS)
▪ Applications are supplied by the service provider.
▪ The user does not manage or control the underlying Cloud
infrastructure or individual application capabilities.
▪ Services offered include:
▪ Enterprise services such as: workflow management,
communications, digital signature, customer relationship
management (CRM), desktop software, financial management, geo-
spatial, and search.
▪ Not suitable for real-time applications or for those where
data is not allowed to be hosted externally.

▪ Examples: Gmail, Salesforce


29
Software as a service (SaaS)
Architecture
• Service provider (SP) is responsible for
the creation, updating, and maintenance of
software and application

• Service user accesses the service through


Internet-based interfaces
Infrastructure as a Service (IaaS)

• In this most basic cloud service model, cloud providers


offer computers – as physical or more often as virtual
machines –, raw (block) storage, firewalls, load
balancers, and networks.
• IaaS providers supply these resources on demand from
their large pools installed in data centers.
• LAN (Local area networks) including IP addresses are part
of the offer.
• For the wide area connectivity, the Internet can be used.
• In carrier clouds - dedicated virtual private networks
(VPN) can be configured.
• Cloud providers typically bill IaaS services on a utility
computing basis, that is, cost will reflect the amount of
resources allocated and consumed.
Infrastructure-as-a-Service (IaaS)
▪ Infrastructure is compute resources, CPU, VMs, storage, etc
▪ The user is able to deploy and run arbitrary software, which
can include operating systems and applications.
▪ The user does not manage or control the underlying Cloud
infrastructure but has control over operating systems,
storage, deployed applications, and possibly limited control
of some networking components, e.g., host firewalls.

▪ Services offered by this delivery model include: server


hosting, storage, computing hardware, operating systems,
virtual instances, load balancing, Internet access, and
bandwidth provisioning.

32
▪ Example: Amazon EC2
Infrastructure as a service (IaaS)
Architecture
• An infrastructure provider (IP) makes an entire computing
infrastructure available “as a service”

• Manages a large pool of computing resources and uses


virtualization to assign and dynamically resize customer
resources
• Customers rent processing capacity, memory, data storage,
and networking resources that are provisioned over a
network
Platform-as-a-Service (PaaS)
▪ Allows a cloud user to deploy consumer-created or acquired
applications using programming languages and tools
supported by the service provider.
▪ The user:
▪ Has control over the deployed applications and, possibly, application
hosting environment configurations.
▪ Does not manage or control the underlying Cloud infrastructure
including network, servers, operating systems, or storage.
▪ Not particularly useful when:
▪ The application must be portable.
▪ Proprietary programming languages are used.
▪ The hardware and software must be customised to improve the
performance of the application.
▪ Examples: Google App Engine, Windows Azure 34
Platform as a Service (PaaS)

• In the PaaS model, cloud providers deliver a computing


platform and/or solution stack typically including
operating system, programming language execution
environment, database, and web server.

• Application developers can develop and run their


software solutions on a cloud platform without the cost
and complexity of buying and managing the underlying
hardware and software layers.

• With some PaaS offers, the underlying compute and


storage resources scale automatically to match
application demand such that the cloud user does not
have to allocate resources manually.
Platform as a service (PaaS) Architecture

• Service provider (SP) supplies the software


platform or middleware where the applications
run
• Service user is responsible for the creation,
updating, and maintenance of the application

• The sizing of the hardware that is required for


the execution of the software is made in an
understandable manner
ISSUES In Cloud Computing
Privacy Issues
▪ Instances such as the secret NSA program, working with
AT&T, and Verizon, which recorded over 10 million phone
calls between American citizens, causes uncertainty among
privacy advocates, and the greater powers it gives to
telecommunication companies to monitor user activity.
▪ Cloud service providers have already collected petabytes of
sensitive personal information stored in data centers around
the world. The acceptance of Cloud Computing therefore
will be determined by privacy issues addressed by these
companies and the countries where the data centers are
located.
▪ Privacy is affected by cultural differences; some cultures
favour privacy, others emphasise community. This leads to
37
an ambivalent attitude towards privacy in the Internet
ISSUES In Cloud Computing
Ethical Issues
▪ Paradigm shift with implications on computing ethics:
▪ The control is relinquished to third party services.
▪ Data is stored on multiple sites administered by several organizations.
▪ Multiple services interoperate across the network.
▪ Implications:
▪ Unauthorised access.
▪ Data corruption.
▪ Infrastructure failure, and service unavailability.

38
ISSUES In Cloud Computing

Legal Issues
• As can be expected with any revolutionary change in the
landscape of global computing, certain legal issues arise;
everything from trademark infringement, security concerns to
the sharing of propriety data resources.

• Open source
1. Open-source software has provided the foundation for many
cloud computing implementations, one prominent example
being the Hadoop framework.

2. In November 2007, the Free Software Foundation released the


Affero General Public License, a version of GPLv3 intended to
close a perceived legal loophole associated with free software
designed to be run over a network.
ISSUES In Cloud Computing
Security Issues
• Physical control of the Private Cloud equipment is more secure than
having the equipment off site and under someone else’s control.
• Security issues have been categorized into
1. sensitive data access,
2. data segregation,
3. privacy,
4. bug exploitation,
5. recovery,
6. accountability,
7. malicious insiders,
8. management console security,
9. account control, and
10. multi-tenancy issues.
Challenges for cloud computing
1. Availability of service: what happens when the service
provider cannot deliver?

2. Data confidentiality and auditability, a serious problem.

3. Diversity of services, data organization, user interfaces


available at different service providers limit user mobility;
once a customer is hooked to one provider it is hard to
move to another.

4. Data transfer bottleneck; many applications are data-


intensive.

41
Challenges
5. Performance unpredictability, one of the consequences of
resource sharing.
▪ How to use resource virtualization and performance isolation for
QoS guarantees?
▪ How to support elasticity, the ability to scale up and down quickly?

6. Resource management: It is a big challenge to manage


different workloads running on large data centers. Are self-
organization and self-management the solution?

7. Security and confidentiality: major concern for sensitive


applications, e.g., healthcare applications.

Addressing these challenges is on-going work! 42


Topic-2
-------------------------------

[Natural Language Processing]


Introduction
To
Natural Language Processing

27-Nov-23 Natural Language Processing -44-


Natural Language Processing
• NLP is the branch of computer science
focused on developing systems that allow
computers to communicate with people
using everyday language.
• Also called Computational Linguistics
– Also concerns how computational methods can
aid the understanding of human language

27-Nov-23 •Natural Language Processing 45


Related Areas
• Artificial Intelligence
• Formal Language (Automata) Theory
• Machine Learning
• Linguistics
• Psycholinguistics
• Cognitive Science
• Philosophy of Language

27-Nov-23 •Natural Language Processing 46


Communication
• The goal in the production and comprehension of
natural language is communication.
• Communication for the speaker:
– Intention: Decide when and what information should
be transmitted (a.k.a. strategic generation). May
require planning and reasoning about agents’ goals and
beliefs.
– Generation: Translate the information to be
communicated (in internal logical representation or
“language of thought”) into string of words in desired
natural language (a.k.a. tactical generation).
– Synthesis: Output the string in desired modality, text or
speech.

27-Nov-23 •Natural Language Processing 47


Communication (cont)
• Communication for the hearer:
– Perception: Map input modality to a string of words,
e.g. optical character recognition (OCR) or speech
recognition.
– Analysis: Determine the information content of the
string.
• Syntactic interpretation (parsing): Find the correct parse tree
showing the phrase structure of the string.
• Semantic Interpretation: Extract the (literal) meaning of the
string (logical form).
• Pragmatic Interpretation: Consider effect of the overall
context on altering the literal meaning of a sentence.
– Incorporation: Decide whether or not to believe the
content of the string and add it to the KB.

27-Nov-23 •Natural Language Processing 48


Syntax, Semantic, Pragmatics

• Syntax concerns the proper ordering of words and its affect


on meaning.
– The dog bit the boy.
– The boy bit the dog.
– * Bit boy dog the the.
– Colorless green ideas sleep furiously.
• Semantics concerns the (literal) meaning of words,
phrases, and sentences.
– “plant” as a photosynthetic organism
– “plant” as a manufacturing facility
– “plant” as the act of sowing
• Pragmatics concerns the overall communicative and social
context and its effect on interpretation.
– The ham sandwich wants another beer. (co-reference, anaphora)
– John thinks vanilla. (ellipsis)

27-Nov-23 •Natural Language Processing 49


Textual Entailment
• Determine whether one natural language
sentence entails (implies) another under an
ordinary interpretation.

27-Nov-23 •Natural Language Processing 50


NLP Application Tasks

27-Nov-23 •Natural Language Processing 51


Information Extraction (IE)
• Identify phrases in language that refer to specific
types of entities and relations in text.
• Named entity recognition is task of identifying
names of people, places, organizations, etc. in text.
people organizations places
– Michael Dell is the CEO of Dell Computer
Corporation and lives in Austin Texas.
• Relation extraction identifies specific relations
between entities.
– Michael Dell is the CEO of Dell Computer
Corporation and lives in Austin Texas.

27-Nov-23 •Natural Language Processing 52


Question Answering

• Directly answer natural language questions


based on information presented in a corpora
of textual documents (e.g. the web).
– When was Barack Obama born?
• August 4, 1961
– Who was president when Barack Obama was
born?
• John F. Kennedy
– How many presidents have there been since
Barack Obama was born?
•9
27-Nov-23 •Natural Language Processing 53
Text Summarization
• Produce a short summary of a longer document or
article.
– Article: With a split decision in the final two primaries and a flurry of
superdelegate endorsements, Sen. Barack Obama sealed the Democratic
presidential nomination last night after a grueling and history-making
campaign against Sen. Hillary Rodham Clinton that will make him the first
African American to head a major-party ticket. Before a chanting and
cheering audience in St. Paul, Minn., the first-term senator from Illinois
savored what once seemed an unlikely outcome to the Democratic race with
a nod to the marathon that was ending and to what will be another hard-
fought battle, against Sen. John McCain, the presumptive Republican
nominee….
– Summary: Senator Barack Obama was declared the
presumptive Democratic presidential nominee.
27-Nov-23 •Natural Language Processing 54
Machine Translation (MT)
• Translate a sentence from one natural
language to another.
– Hasta la vista, bebé 
Until we see each other again, baby.

27-Nov-23 •Natural Language Processing 55


Automatic Learning Approach
• Use machine learning methods to
automatically acquire the required knowledge
from appropriately annotated text corpora.
• Variously referred to as the “corpus based,”
“statistical,” or “empirical” approach.
• Statistical learning methods were first applied
to speech recognition in the late 1970’s and
became the dominant approach in the 1980’s.
• During the 1990’s, the statistical training
approach expanded and came to dominate
almost all areas of NLP.
27-Nov-23 •Natural Language Processing 56
Learning Approach

Machine
Learning

Manually Annotated
Training Corpora Linguistic
Knowledge

NLP System
Raw Text Automatically
Annotated Text
27-Nov-23 •Natural Language Processing 57
Advantages of the Learning Approach
• Large amounts of electronic text are now
available.
• Annotating corpora is easier and requires less
expertise than manual knowledge engineering.
• Learning algorithms have progressed to be
able to handle large amounts of data and
produce accurate probabilistic knowledge.
• The probabilistic knowledge acquired allows
robust processing that handles linguistic
regularities as well as exceptions.
27-Nov-23 •Natural Language Processing 58

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy