PERFORMANCE OF CONCURRENCY CONTROL MECHANISMS IN CENTRALISED DATABASE SYSTEMS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 3
Abstract
The objective of this study is to propose user control system that definitely increases the performance of realtime data service. However the most existing work on this RTDB was based on very critical closed loop control system. To overcome this problem we design a system called user control database model which stimulate the overload transaction during run time. We also design quality of service scheme and it allows to setting requirements for QOS transaction. The performance of proposed algorithm evaluated in different experiments. So the proposed system will definitely satisfies our needs even critical conditions like overload or run-time errors.
Authors and Affiliations
Manohar Srinivasan , Revathi Manohar
STUDY OF SDN USING MININET
The traditional architecture of networks has long supported the needs of the data centers. However, with the today’s heavy data usage by users, the need for a shift to virtualizing functions and applying a more modern ap...
7TH CENTURY ANCIENT TAMIL CHARACTER RECOGNITION FROM TEMPLE WALL INSCRIPTIONS
Recognition of any ancient Tamil characters with respect to any language is complicated, since the ancient Tamil characters differ in written format, intensity, scale, style, and orientation, from person to person. Resea...
Performance Evaluation of Internet Routing Protocols in Wireless Mesh Networks
Wireless Mesh Networks are considered as a feasible solution for transformation into next generation wireless network to offer Internet services for large variety of applications. These types of networks are used for pro...
Video Indexing Based On Time Frames
The Indexing of video based on time frame helps to navigate to the particular time frame in any video, The indexing helps to reduce the time of watching the complete video.
NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts...