Object Query Optimization through Detecting Independent Sub queries
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
ABSTRACT: Database Switching includes execution of queries on same or different machines connected in LAN with different backend without rewriting any queries. Switching between the databases reduces the work of rewriting the queries for each of the database thus saving time. User just has to select the Source DBMS and Table from that DBMS and a switch file is created on a click of a button. Now this switch file can be used in any machine (can be a remote machine) to switch data in any of the DBMS. Database GUI helps a user to do all database operations through a GUI provided with minimal knowledge of the database. Here user can do all database activities like Creating Table, Inserting Data, Joining two tables etc with minimal knowledge of queries without having the knowledge of whole database can access through GUI.
Authors and Affiliations
Mohammad Farhan, , Yatin Chauhan, , Mohammad Akhtar, , Fayeem Khan , Poonam Pangarkar
Opinion Search and Retrieval from WWW
Opinion retrieval has established itself as an important part of search engines ratings, opinion trends and representative opinions enrich the search experience ofusers when combined with traditional document ret...
P2P-BDS: Peer-2-Peer Botnet Detection System
Abstract: Internet has become an inevitable part of our lives. While internet offers a mass of useful services which makes communication easier and faster than ever, it presents some threats too along the way. Over...
Two simples proofs of Fermat 's last theorem and Beal conjecture
If after 374 years the famous theorem of Fermat-Wiles was demonstrated in 150 pages by A. Wiles [4], the puspose of this article is to give a simple demonstration and deduce a proof of the Beal conjecture. Résumé : Si ap...
Resource Allocation in Cloud computing: A Comparative study
Abstract: Cloud computing is summed up as a different model for allowing favorable, network as per demand to use shared devices of computational resources which are collected and then released with marginal management ef...
A Novel Irreversible Transformation Scheme for Biometric Template Protection
Abstract: Modern biometric technologies claim to provide alternative solution to traditional authentication processes. Even though there are various advantages of biometric process, it is vulnerable to attacks which can...