A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sasikala, R.
- Transaction Processing System for Efficient Maintenance of Databases in Cloud
Authors
1 Department of Information Technology, K.S.R. College of Technology, Tiruchengode, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 2, No 6 (2010), Pagination:Abstract
Over the last couple of years, “Cloud Computing” has emerged as a compelling and successful paradigm for internet scale computing. It depends primarily on IaaS layer to provide cheap and pay-as-you-go processing power, data storage, and other shared resources. Scalable database management systems - both for update intensive application workloads as well as decision support systems for descriptive and deep analytics are a critical part of the cloud infrastructure and play an important role in ensuring the smooth transition of applications from the traditional enterprise infrastructures to next generation cloud infrastructures. Cloud computing platforms provide scalability and high availability properties for web applications but they sacrifice data consistency at the same time. The proposed work, a Transaction Processing System, guarantees full ACID properties for multi-item transactions issued by Web applications, even in the presence of server failures and network partitions by the use of Local Transaction Manager. The TPS provides both strong consistency guarantees and high availability. For each type of databases stored in the cloud separate LTMs are created for handling it. The particular LTMs will take care of the requests generated for the database linked with it and in turn it will increase the efficiency and consistency of the system.
Keywords
Scalability, Web Applications, Cloud Computing.- A Dynamic Approach to Select a Proxy Using Link Properties for Scalable and Reliable Multicast Transport Layer Protocol
Authors
1 K. S. Rangasamy College of Technology, Tiruchengode–637 215, IN
2 K.S.Rangasamy College of Technology, Tiruchengode–637 215, IN
Source
Networking and Communication Engineering, Vol 1, No 2 (2009), Pagination: 72-80Abstract
Group communications require a reliable multicast protocol that guarantees safe data delivery in a reasonably short time. As these applications grow in use, scalability becomes an important issue. To support these applications, several multicast transport layer protocols have been proposed and implemented. These protocols may suffer from the length of the retransmission paths between source and receivers which yields very high cost for retransmissions. An approach to reduce latency of multicast transport layer protocol is to recover the lost packet locally by requesting local replier. This paper gives the solution that local replier can be selected dynamically based on the link properties such as Bandwidth Delay Product and reliability of link. We measured recovery latency for all loss cases, namely, source, receivers, and links. Results show that the recovery latency is decreased by 17.73% to 40.59%. This percentage of improvement increases linearly, when tree size increases. Also number of duplicate replies received by the receiver is zero when loss is at the receiver and link. This approach also reduces the routing overhead significantly.Keywords
Proxy, Bandwidth Delay Product, Recovery Latency, Exposure.- A Novel Implementation of Watermarking Techniques for IP Core Identification
Authors
Source
Digital Image Processing, Vol 3, No 9 (2011), Pagination: 490-495Abstract
In order to reduce the time to market and increase productivity in SOC design, reuse of previously designed modules is becoming a common practice. Design reuse leads to the development of IP identification circuits. This paper presents the identification of the intellectual-property (IP) in SOC (System-On-Chip) design using watermarking algorithm. IP identification procedures depend on current IP-based design flow. A watermark-generating circuit (WGC) and test patterns are embedded into the IP core at the behavior design level. Therefore, this scheme can also successfully survive synthesis, placement, and routing. It can identify the IP at various design levels. Five methods are used to combine WGC and test patterns. Depending upon these methods, the watermark sequence and test patterns are combined and produces the output. From this, identification of the IP can be done. The identity of the IP is proven during the general test process without implementing any extra extraction flow. After the chip has been manufactured and packaged, it is easy to detect the identification of the IP provider. There is no need of microphotograph. This scheme has the advantages of low hardware overhead, low tracking costs, and low processing-time costs.Keywords
System-on-Chip, Intellectual Property, Watermark Generating Circuit.- A Novel Implementation of Watermarking Techniques for IP Core Identification
Authors
1 Anna University, Tirunelveli, IN
2 ECE Department, Anna University, Tirunelveli, IN
Source
Digital Image Processing, Vol 2, No 7 (2010), Pagination: 207-214Abstract
In order to reduce the time to market and increase productivity in SOC design, reuse of previously designed modules is becoming a common practice. Design reuse leads to the development of IP identification circuits. This paper presents the identification of the intellectual-property (IP) in SOC (System-On-Chip) design using watermarking algorithm. IP identification procedures depend on current IP-based design flow. A watermark-generating circuit (WGC) and test patterns are embedded into the IP core at the behavior design level. Therefore, this scheme can also successfully survive synthesis, placement, and routing. It can identify the IP at various design levels. Five methods are used to combine WGC and test patterns. Depending upon these methods, the watermark sequence and test patterns are combined and produces the output. From this, identification of the IP can be done. The identity of the IP is proven during the general test process without implementing any extra extraction flow. After the chip has been manufactured and packaged, it is easy to detect the identification of the IP provider. There is no need of microphotograph. This scheme has the advantages of low hardware overhead, low tracking costs, and low processing-time costs.Keywords
System-On-Chip, Intellectual Property, Watermark Generating Circuit.- Review on Image Mining Techniques and Models
Authors
1 Department of Computer Science, Sankara College of Science and Commerce, Bharathiar University, IN
Source
Digital Image Processing, Vol 9, No 2 (2017), Pagination: 31-34Abstract
Image mining is one of the models which searching and discovering valuable information and knowledge in large amount of valid data. Image mining draws basic principles from concepts in databases and soft computing techniques. Image data is the one of the advanced features in this present computational world since image data plays important in every aspect of the system such as business, surgery, construction, publication and so on. This Paper is an overview of Image Mining and the techniques used by them are studied.