An Algorithm to Simulate the Temporal Database Using Exponential Distribution
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 1, Issue 3
Abstract
Since the early eighties, an active temporal database research community has sought new insight into the management of time-referenced, or temporal, data and has developed concepts, tools and techniques that better support the management of such data. Much of this activity has been motivated by the observations that most databases contain substantial amounts of temporal data and that conventional database technology offers precious little support for temporal data management.Temporal data stored in a temporal database is different from the data stored in non-temporal database in that a time period attached to the data expresses when it was valid or stored in the database. In this paper we are going to design an algorithm for simulating temporal database using Exponential Distribution
Authors and Affiliations
Shweta Sharma
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks
Abstract : EEPB (Energy-Efficient PEGASIS-Based protocol) is a chain-based protocol. It has certain deficiencies such as it ignores the nodes energy and distance between nodes to BS when selecting the leader. It causes o...
A Survey and Study of Image Compression Methods
Abstract: This paper focuses on the area of Image Compression which is used in various Image Processing Applications. This paper presents a survey and study of various image compression techniques primarily, The Pr...
Review on Green Networking Solutions
Abstract : Empirical studies have revealed that a significant amount of energy is lost unnecessarily in the network architectures, protocols, routers and various other network devices. Thus there is a need for techniques...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlapped Modulo Arithmetic Technique (MFBOMAT)
In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Modified Forward Backward Overlapped Modulo Arithmetic Technique (MFBOMAT). The original messag...
Key Policy Attribute Based Encryption in Cloud Storage
Abstract: Cloud Computing is the rapid growing technology and enables highly scalable services to be easily consumed over the Internet on an as-needed basis. It is a kind of Internet-based computing that provides shared...