CRITICAL STUDY ON DATABASE AND PROMINENT PROGRAMMES
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
The people who work with computers, the programmers, analysts, and operators who seem to live by rules of their own and seldom leave their own environment, tend to be very cynical towards the stories of electronic brains. This attitude will appear hardly surprising when one eventually learns that the computer is a very simple device and is as far removed from an electronic brain as a bicycle from a spaceship. Programmers in particular are the people most aware that computers are no substitute for the human brain; in fact, the preparation of work to be run on a computer can be one of the most mind-bending exercises encountered in everyday life. Databases and database systems have become an essential component of everyday life in modern society. In the course of a day, most of us encounter several activities that involve some interaction with a database. So in this paper we will talk about how to manage the different type of data involved in any form in the database.
Authors and Affiliations
Dr. Vinod Kumar, Gagandeep Raheja, Sukhpreet Singh
Improvised Admissible Kernel Function for Support Vector Machines in Banach Space for Multiclass Data
Classification based on supervised learning theory is one of the most significant tasks frequently accomplished by so-called Intelligent Systems. Contrary to the traditional classification techniques that are used to val...
A Comprehensive review of Artificial Bee Colony Algorithm
The Artificial Bee Colony (ABC) algorithm is a stochastic, population-based evolutionary method proposed by Karaboga in the year 2005. ABC algorithm is simple and very flexible when compared to other swarm based algorit...
BER performance analysis of Subtractive interference cancellation (SIC) Using Rayleigh channel in DS-CDMA Receiver system
In this paper, we present and analyze the performance of a parallel interference cancellation (PIC) scheme for multicarrier (MC) direct-sequence code-division multiple-access (DS-CDMA) systems. In order to mitigate the m...
Development of An Examination Authentication Embedded System Based on Fingerprint Approach
Security is crucial all around. Access into institutions, examination centers, organizations or even estates ought to be controlled and closely monitored through a verification system. The method of authenticating a stud...
Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation
Data mining is a very active research area that deals with the extraction of  knowledge from very large databases. Data mining has made knowledge extraction and decision making easy. The extracted knowledge could reveal...