Effective query processing techniques for heterogeneous application data
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
In the different application environment, in order to a chievea effective query processing result stechniques are required. This type of effective query processing result techniques are implementing in order to different applications at the time of developing, the respective applications of query processing results will be very effective and needful. This paper gives well suited techniques for effective equery processing frame work in different applications such as E-learning, Banking and health data
Authors and Affiliations
P. Hariharan, K. Arulanandham
A framework for an Operating System-based Mobile Agent Interoperability
Mobile agent technology has grown in acceptance over the years for distributed applications, but it is yet to be adopted as ubiquitous solution technique. This is due to its complexity and lack of interoperabilit...
Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator
Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extende...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Network
Wireless sensor networks are appealing to researchers due to their wide range of application in several fields such as military settings, critical infrastructure protection, target detection and tracking, envir...
A Study of Various Spoofing Attacks and Attackers in Wireless Networks.
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional se...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge Based Authentication Technique with Image Scrambling
Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s &nb...