Distributed OPAC System Using Z39.50 Protocol
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 10, Issue 5
Abstract
Online Public Access Catalogue is playing a vital role in Central Libraries and University/College Libraries. Most of the College libraries are using OPAC for easy search and retrieval of the books and it's Status in a Particular Library. The main limitation in the OPAC we are using in current system is; that we are able to search and retrieve the information about the books of that particular library, but not outside of it. When we have a scenario like if we have multiple libraries in a campus, if we need to search a book in all the libraries, we have only two possibilities to build OPAC, once to make the single database for all the Libraries or you need to ask the user to search in all OPAC Systems of respective Library manually. But both above solutions are not feasible in real time environment. So in order to have the above scenario a feasible solution we need to build a distributed environment for the OPAC, which will have all the individual databases connected remotely.
Authors and Affiliations
Chandramohan Reddy Y, Madhuri K
Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs
In this paper, we perform rigorous analysis of MANET routing protocols selected from different categories over various scenarios using a large set of performance evaluation metrics. The traffic that we model on source-de...
Enablers In Implementing Micro Sourcing For The Low Income Group In Malaysia
Improved access to ICTs and related services through micro sourcing initiatives has created new opportunities for enterprises with direct involvement of the poor to access information and other input. Micro sourcing prov...
Analysis of Load Balancing Techniques in Cloud Computing
Cloud Computing is an emerging computing paradigm. It aims to share data, calculations, and service transparently over a scalable network of nodes. Since Cloud computing stores the data and disseminated resources in the...
Peer to Peer Video on Demand Architecture using V-Chaining
In the Internet, video streaming requires greater amount of network bandwidth and other resources as the number of user requests increases. In case of traditional centralized directory server approach all the users reque...
NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks...