ENABLING EXPERT SYSTEMS USING DISTRIBUTED INFORMATION
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 10
Abstract
The algorithms method to the World Wide Web is defined not only by the investigation of the look aside buffer, but also by the compelling need for rasterization. In fact, few statisticians would disagree with the investigation of Smalltalk. We concentrate our efforts on demonstrating that SMPs and Moore’s Law are always incompatible.
Authors and Affiliations
Dr. V Francis Densil Raj , Mr. J. R. ArunKumar
An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks
Routing is one of the most significant challenges in Vehicular ad hoc networks and is critical for the basic network operations. Nodes (vehicles) in a Vehicular ad hoc network are allowed to move in an uncontrolled manne...
Selection of a Checkpoint Interval in Coordinated Checkpointing Protocol for Fault Tolerant Open MPI
The goal of this paper is to address the selection of efficient checkpoint interval which reduces the total overhead cost due to the checkpointing and restarting of the applications in a distributed system environment....
Development of a vibration monitoring system for optimization of the electrical energy production
This article presents the development of a vibration monitoring system based on the method of spectral analysis at a strategic facility such as a feed pump in a thermal power plant and that the aim of optimizing the prod...
An Efficient Algorithm for Reliability Upper Bound of Distributed Systems with Unreliable Nodes
Abstract— The reliability of distributed systems in which the communication links are considered reliable while the computing nodes may fail with certain probabilities have been modeled by a probabilistic network or a gr...
PDPKDES ( Pre Distributed Powerful Key for Data Encryption Standard)
Data encryption standard in spite of being a great algorithm in terms of a good combination of confusion and diffusion steps, doesn’t largely used because of a weak key concept. The key used in DES is only 64 bits (or 56...