A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chowdhury, Rajdeep
- Proposed Business Principles Governing Enterprise Data Warehouse Design:Conceptual Framework with Enhancement of Knowledge Infrastructure via Context Model
Authors
1 Department of Computer Application, JIS College of Engineering, Block ‘A’, Phase III, Kalyani, Nadia–741235, West Bengal, IN
2 Department of Engineering and Technological Studies, University of Kalyani, Kalyani, Nadia–741235, West Bengal, IN
Source
Research Journal of Science and Technology, Vol 3, No 4 (2011), Pagination: 212-216Abstract
A Data Warehouse can quite easily become a dilemma if it is not designed, implemented and maintained specifically and properly. Keeping this in mind, the discussion about the newly proposed business principles, which are believed to help a business start and keep the data warehouse design and implementation on the road to achieve desired results, have been compiled. Inclusion of issues from both the business perspective as well as the perspective of information technology scenario has made a major difference and a significant impact to the business intellectuals.
The conceptual framework has been devised with the notion of enhancing the knowledge infrastructure, thereby ensuring better results on the totality. The conceptual framework has been pictorially demonstrated in the Context Model section, with the view of establishing enhancement of knowledge infrastructure through the unfathomable podium of expressing the new and innovative seven proposed business principles formulated.
The proposed principles amalgamated with the existing principles will aid any designer with suitable referent points to come up with the goods for his/her enterprise.
All the proposed principles have been detailed in the Implementation via Proposed Principles section and can be mostly incorporated in the modern enterprises.
Keywords
Data Warehouse, Business Principles, Technological Versatility, Inter-Organizational Synchronization and Inter-Personal Rapport, Transitive Diversification, Intrinsic Cause Effect Analysis, Coherent Feedback and Survey Mechanism, EP, PP, Context Model.- Study, Analysis and Implementation for Enhancement and Improvement of Low Cost Solar Powered Lighting System Using CFL Technology from Indian Perspective
Authors
1 Department of Electronics & Communication Engineering, Greater Kolkata College of Engineering and Management, Baruipur, 24 Parganas (South)–743387, West Bengal, IN
2 Department of Electronics & Instrumentation Engineering, JIS College of Engineering, Kalyani, Nadia–741235, West Bengal, IN
3 Department of Computer Application, JIS College of Engineering, Kalyani, Nadia-741235, West Bengal, IN
4 Department of Electronics & Communication Engineering, JIS College of Engineering, Kalyani, Nadia–741235, West Bengal, IN
5 Department of Electrical Engineering, Greater Kolkata College of Engineering and Management, Baruipur, 24 Parganas (South)–743387, West Bengal, IN
Source
Research Journal of Science and Technology, Vol 5, No 4 (2013), Pagination: 454-461Abstract
Solar energy primarily refers to the proper employment of solar radiation for practical ends. It should also be kept in mind that all renewable energies barring geothermal energy and tidal energy obtain their energy from the sun. Solar energy is an alternative and an unconventional source of energy which is renewable and obtainable in massive amount to congregate the global need as well as ensure it to be environmentally secured. The formulation of the compiled paper emphasize on the manufacturing energy from solar radiation using photovoltaic cells. An assortment of storage systems for solar energy (converted into other forms, like, Sealed Lead Acid (SLA) Batteries, Phase Change Storage and Solar Pond, etc.) are also being discussed amid. The focal intention of the research work is to design and develop a low cost solar powered lighting system using Compact Fluorescent Lamp (CFL) technology for India, so that it could gratify the nation's emergent demand for electricity, sustaining the carbon credit. The sequential flow during the formulation of the compiled paper adhered initially to study, followed by analysis and concluded with implementation for enhancement and improvement of low cost solar powered lighting system using the modern technology of CFL.Keywords
Solar Energy, Renewable Energy, Photovoltaic System, Solar Cell, CFL, Greenhouse Effect.- Proposed formula Based on Study of Correlation between Hub and Spoke Architecture and Bus Architecture in Data Warehouse Architecture, Based on Distinct Parameters
Authors
1 Department of Computer Application, JIS College of Engineering, Block ‘A’, Phase III, Kalyani, Nadia-741235, West Bengal, IN
Source
Research Journal of Science and Technology, Vol 3, No 3 (2011), Pagination: 154-157Abstract
Data warehousing has evolved with every passing decade and it has come a long way from its inception and the modern era has made it an adequate part of pre-existing analytical methodologies. In the present status, data warehousing has evolved into a system which is capable of furnishing key performance metrics to high-level management, ensuring capability of analytical strength to middle-level management and aligning to the ability of providing corrective data to-and-fro back to low-level based on the basis of information derived from the analytical system.
The data warehouse market is currently triggered by business-driven solutions focussing on domain specific challenges and its allied histrionics that have conjured up the very basic nuances of data warehousing. The present business idologies of the global village have cropped up innovative and tougher challenges for the data warehouse designers and architects to ensemble a bigger and much better innovation.
Although, there are numerous methods available in the global market to cope up to this stiff challenges, but the evolutions have not made much of an impact in the global arena and the competitive market has prompted to venture into the unseen horizons over and over again.
Data warehouses are designed to facilitate reporting and analysis. The said characteristic of the data warehouse mainly focuses on the data storage and acts much like a buffer to absorb continuous stock of data which gets processed via numerous iterative steps to evolve into information, awaited by all tiers of an organization for various decision-making processes.
For over a decade, discussions and even controversies have lingered about which of the existing architectures is the best data warehouse architecture. The two "giants" of the data warehousing field, Bill Inmon and Ralph Kimball, are at the heart of disagreement. Inmon advocates the Hub&Spoke architecture (for example, the Corporate Information Factory), while Kimball promotes the data mart Bus architecture with conformed dimensions.
There are other architecture alternatives, but these two options are fundamentally different approaches, and each has strong advocates via implementation.
Keywords
Data Warehouse, Hub and Spoke Architecture, Bus Architecture, Business Intelligence, Federated and Data Mart, Repetition Constant, Propagation Constant.- Grey Scale Image Enhancement Using Proposed Modified Histogram Equalization Algorithm
Authors
1 Department of Computer Science and Engineering, Abacus Institute of Engineering and Management, Natungram, Mogra-712148, West Bengal, IN
Source
Research Journal of Engineering and Technology, Vol 5, No 4 (2014), Pagination: 217-222Abstract
Digital Image Processing is a locale distinctive by the requisite for extensive experimental effort to ascertain the viability of proposed elucidation to the given predicament. To preserve image eminence Histogram Equalization (HE) which falls diminutive due to quantum leap in Cumulative Distribution Function (CDF) in the Histogram Algorithm, the Proposed Algorithm has been devised. The Proposed Algorithm ensures enhancement by sub-dividing the image into eight dissections separately. The progression is ensured by using weighted function and then combining the whole of it. The algorithm confers perfect intensity range of picture, with lesser distortion and comprehensive improving quality. Experiments illustrate that the Proposed Algorithm performs well in comparison to the existing enhancement algorithms. The relevant appliance of the Proposed Algorithm might be in its employment in an assortment of organisations where Image Enhancement is of utmost significance.Keywords
Intensity Range, Image Enhancement (IE), Histogram Equalization (HE), Cumulative Distribution Function (CDF), Probability Density Function (PDF), Modified Histogram Equalization Algorithm (MHEA).- Study of Cryptology Based on Proposed Concept of Cyclic Cryptography Using Cyclograph
Authors
1 Department of Computer Application, JIS College of Engineering, Block ‘A’, Phase III, Kalyani, Nadia-741235, West Bengal, IN
Source
Research Journal of Engineering and Technology, Vol 2, No 1 (2011), Pagination: 17-20Abstract
Until modern times, Cryptography exclusively referred to encryption, which is coined as the process of converting ordinary information (Plain Text) into unintelligible gibberish (Cipher Text). Decryption has been coined as the reverse process of moving from the unintelligible Cipher Text back to the original Plain Text. A Cipher is an algorithm couplet that creates both the encryption and the decryption pseudo codes. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a Key. This is a secret parameter (known ideally to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purpose.
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.
In colloquial use, the term Code is often used to mean any method of encryption or concealment of meaning. However, in Cryptography, Code has a more specific and significant meaning. Code means the replacement of unit of Plain Text with a Code word. Codes are no longer used in serious cryptography except for such things as unit designations (Bronco Flight or Operation Overlord) as properly chosen ciphers are both practical and secure than even the best codes, along with being better adapted for computers too.
It is a normal practice for most of the individuals to use the terms Cryptography and Cryptology interchangeably, while for others (including US military) Cryptography is termed to refer specifically to the use and practice of cryptographic techniques and Cryptology to refer to the combined study of Cryptography and Cryptanalysis. The study of characteristics of languages which have some application in Cryptography/Cryptology are frequency data, letter combinations, universal patterns, etc., and are stated as Crypto linguistics, in the most formal way.
Earlier forms of secret writing required little more than local pen and paper analogs, as most people could not read. Increased literacy and adequate literate opponents required actual Cryptography. The classical cipher types can be significantly classified into transposition cipher and substitution cipher. Simple versions of either offered little confidentiality from enterprising opponents, and still continues to do so. The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and their allied applications. Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are block cipher designs which have been designated as Cryptography standards by the US government. Many other block ciphers have been designed and released with considerable variation in quality.
One or more Cryptographic primitives are often used to develop a more complex algorithm, called a Cryptosystem, which are designed to provide particular functionality while guaranteeing certain security properties. Cryptosystems use the properties of the underlying Cryptographic primitives to support the system's security properties. In many cases, the Cryptosystem's structure involves back and forth communication among two or more parties in space (Viz., between the sender of a secure message and its intended receiver) or across time. Such Cryptosystems are sometimes referred as Cryptographic Protocols.
Keeping all these nuances and facets under consideration, Cyclic Cryptography ensures a whole new dimension to Cryptology with optimum security measures, privacy maintenance and proper decryption mechanism using generated key text.
The paper establishes via implementation the study of data encryption as well as data decryption, based on the proposed innovative concept of Cyclic Cryptography using the freshly devised Cyclograph, conjured up from the triplet [SF, RF, NF].
The algorithm has been devised keeping in mind all the three factors, namely; Shift Factor (SF), Rotation Factor (RF) and Navigation Factor (NF), thereby ensuring the righteous implementation of the Cyclograph and its allied characteristics.
The Cyclograph consists of a two-tier Dial mechanism, with the Inner Dial comprising of the alphabets A - M and the Outer Dial comprising of the alphabets N - Z, along with the two Navigation Factors [&,@] incorporated and allied with the Outer Dial.
Keywords
Plain Text, Cipher Text, Cyclograph, Inner Dial, Outer Dial, Shift Factor (SF), Rotation Factor (RF) and Navigation Factor (NF).- Implementation of Rain Water Harvesting Through the Effectual Working of Proposed RS Model
Authors
1 Department of Computer Science and Engineering, Abacus Institute of Engineering and Management, Natungram, Magra-712148, West Bengal, MO
2 Department of Computer Application, Sastra University, Tirumalaisamudram, Thanjavur-613401, Tamil Nadu, IN
Source
International Journal of Technology, Vol 4, No 2 (2014), Pagination: 291-295Abstract
Rainwater harvesting is the accumulation and storage of rainwater for reuse, before it reaches the aquifer. It has been used to furnish drinking water, water for livestock, water for irrigation, as well as other typical uses given to water. Rainwater collected from the roofs of houses, tents and local institutions can make an important contribution to the availability of drinking water. It can supplement the sub soil water level and increase urban greenery.
Water collected from the ground, sometimes from areas which are especially prepared for this purpose, is called Storm water harvesting. In some cases, rainwater may be the only available or economical water source. Rainwater harvesting systems can be simple to construct from inexpensive local materials, which are potentially successful in most habitable locations. Roof rainwater can't be of good quality and may require treatment before consumption. As rainwater rushes from roof(s), it may carry pollutants in it, such as the tiniest bit of mercury from coal burning buildings to bird feces. Although some rooftop materials may produce rainwater that is harmful to human health, it can be useful in flushing toilets, washing clothes, watering the garden and washing cars. These uses invariably halve the amount of water used by a typical home. Overflow from rainwater harvesting tank systems can be used to refill aquifers in a process called groundwater recharge, though this is a related process, it must not be confused with Rainwater harvesting.
The proposed RS Model establishes the merits of rain water harvesting and conjures up all the nuances that lead up in furnishing an optimum solution and justifying the motto of the proposed model; "Go Green and Earn Green." There are a number of types of systems to harvest rainwater ranging from very simple to complex industrial systems. The rate at which water can be collected from either system is dependent on the plan area of the system, its efficiency, and the intensity of rainfall
(that is, annual precipitation (mm per annum) x square meter of catchment area = litres per annum yield).
Rainwater harvesting can assure an independent water supply during water restrictions, that is, somewhat dependent on end use and maintenance. Usually, it is of acceptable quality for household needs and renewable at acceptable volumes despite forecast of climate changes (CSIRO, 2003). It produces beneficial externalities by reducing peak storm water runoff and processing costs. In municipalities with combined sewer systems, reducing storm runoff is especially important, because excess runoff during heavy storms leads to the discharge of raw sewage from outfalls, when treatment plant capacity cannot handle the combined flow. Running costs are negligible, and they provide water at the point of consumption.