Version-2 (March-April 2017)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Load Balancing in Oracle Database Real Application Cluster |
Country | : | India |
Authors | : | Ms. Manju Sharma |
: | 10.9790/0661-1902020106 |
Abstract: Clustering is architecture of joining set independent, interconnected computers to act as a single unit or on a single server. Presently the high availability, scalability, flexibility and ability combine the easy management of the successful infrastructure and cloud deployments. From more than a decade the Oracle Database with Real Application Clusters (RAC) has been the solution of choice for thousands of Oracle customers. Oracle Real Application Cluster 12c is a foundation of data centers, provides the significant enhancements in all of the areas of the business success. In this paper we will take an overview of load balancing, automatic failover and load balancing for Oracle real Application Clusters, Network Configuration , performance monitoring.
Keyword: Real Application Clusters, Advantages of RAC , Network Configuration, Oracle Cluster Registry File, Oracle Local Registry, Load Balancing , Voting Disk file.
[1]. International Journal of Computer Applications (0975 – 8887) Volume 100– No.1, August 2014 -Load Balance Monitoring in Oracle RAC Neha Chandrima, Sunil Phulre, Vineet Richhariya.
[2]. International Journal of Scientific & Engineering Research Volume 2, Issue 6, June-2011 1 ISSN 2229-5518 IJSER © 2011Oracle Real Application Clusters Deepali Kadam, Nandan Bhalwarkar, Rahul Neware, Rajesh Sapkale, Raunika Lamge.
[3]. docs.oracle.com/cd/E11882_01/rac.112/e41960/admcon.htm
[4]. R. Bianchini, L. I. Kontothanassis, R. Pinto, M. De Maria, M. Abud, C.L. Amorim. Hiding Communication Latency and Coherence Overhead in Software DSMs. Proc. 7th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), October 1996
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This study compared two groups of four technical college classes studying automobile engine. One group learned using interactive computer simulation; the other group learned using computer simulation video. The study adopted a posttest, retention test, control group, quasi-experimental research design. There were three weeks (of 45 minutes each) of treatment for the study. Cognitive achievement and psychomotor performance tests were used to obtain data. The area of the study is Enugu State of Nigeria.........
[1]. Aina, O. (2008). Report study panel on technical teachers production in Nigeria (1) Lagos: Federal Ministry of Education. Retrieved from http://www.iosrjournals.org/iosr-jmce/papers/vol1-issue4/B0140713.pdf on January 14, 2013
[2]. Bhat, K. S., Twigg, C. D., Hodgins, J. K., Khosla, P. K., Popovi Z. & Seitz, S.M. (2003). Estimating cloth simulation parameters from video. Retrieve from http://repository.cmu.edu/cgi/viewcontent.cgi?article=1514&context=isr
[3]. Ibrahim, Y. U., & Abdullahi, S. M. (2014). Repositioning the facilities in technical college workshops for efficiency: A case study of North Central Nigeria. Retrieved from http://scholar.lib.vt.edu/ejournals/JSTE/v47n3/umar.html on January 14, 2015
[4]. Martínez, G., Pérez, A. L., Suero, M. I., & Pardo, P. J. (2012). ICTs and their applications in education. Retrieved from: http://www.intechopen.com/ books/methodologies-toolsand-new developments-for-e-learning/icts-and-their-applications-in-education on August 16, 2015
[5]. Mayer, R. E. (2009). Multimedia learning, 2nd ed. New York: Cambridge University Press. Retrieved from http://hilt.harvard.edu/blog/principles-multimedia-learning-richard-e-mayer on August 16, 2015
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The study aimed at determining the use of on-board diagnostic (OBD) actuators for effective teaching of Petrol Engine Maintenance (PEM) in technical colleges in Nigeria. Two research questions and a hypothesis guided the study. 5 OBD technicians and 58 teachers of Motor Vehicle Mechanics' Work (MVMW) responded to 14 item questionnaire to answer the research questions. The study was carried out in South Eastern States of Nigeria. The design for the study was the descriptive survey, using Borich's needs assessment model. Three experts face validated the contents of the instrument. Cronbach Alpha method was used to determine the reliability of the instrument which yielded a reliability of 0.93...........
[1]. Borich, G. D. (1980). A needs assessment model for conducting follow-up studies. Journal of Teacher Education, 31 (3). Retrieved from www.joe.org/joe/2011april/tt8.php
[2]. Daily Trust (Oct. 5, 2009). Fear of retirement
[3]. Don, D. (2008). Actron pocketscan obd ii code reader. Retrieved from www.obd-onboarddiagnostics.com/clinic.htm.
[4]. NBTE (2009). National technical certificate and advanced national technical certificate curriculum and module specification for Motor Vehicle Mechanics Work. Kaduna, NBTE
[5]. Nice, K. (2001). How car computers work. Retrieved from http://www.Howstuffworks.com.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Localization of Facial Features Using Viola- Jones and Canny Method |
Country | : | India |
Authors | : | Ranjana Sikarwar || Priyanka Nema |
: | 10.9790/0661-1902021621 |
Abstract: Face detection plays a vital role in the field of image processing. The primary aim of the proposed face detection system is to find out if there is any face in an image and then localize the facial features in a human face. A hybrid approach is used for face detection in this paper which is a combination of neural networks used to detect faces using Multilayer feed forward networks and other using viola-Jones face detection method followed by canny edge detection method. Simulation results are taken in parameters of Hit Rate, Miss Rate, Accuracy, Run time..
Keyword: Canny, FAR, Hit Rate
[1]. R. S. Feris, J. Gemmell, K. Toyama, and V.Kr¨uger. Hierarchical wavelet networks for facial feature localization. In 5th International Conference on Auto-matic Face and Gesture Recognition 2002, Washington, USA, Washington D.C., USA, May 2002.
[2]. Jesorsky, K. J. Kirchberg, and R. W. Frischholz. Robust face detection using the hausdorff distance. In 3rd International Conference on Audio- and Video-Based Biometric Person Authentication 2001, 2001
[3]. M. Reinders, R. Koch, and J. Gerbrands. Locating facial features in image sequences using neural networks. In 2nd International Conference on Automatic Face and Gesture Recognition 1996, pages 230–236, 1996.
[4]. T. Shakunaga, K. Ogawa, and S. Oki. Integration of eigentemplate and structured matching for autonomous facial feature detection. In 3rd International Conference on Automatic Face and Gesture Recognition 1998, 1998.
[5]. William, K. Pratt, "Digital Image Processing", Fourth Edition, A John Wiley & Sons Inc. Publication, pp.465-529, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Background and Objective: An open-source software called VisualGDML which is dedicated for geometrical and material specifications using the GDML markup language has been developed for Monte Carlo Geant4 code. Methods: The software has been written using QT4 API and uses Qscintilla library. Results: The Visual GDML open-source software offers the following features: a) a syntax highlighting for the GDML code, that makes the code more flexible and readable. b) a periodic table for facilitating the specification of the relevant materials, this by auto-generating of the adequate GDML.............
Keyword: GDML; Geant4; Qscintilla; Xerces-C++; QT programming; VisualGDML.
[1]. S. Agostinelli, J. Allison , K. Amako , J. Apostolakis, H. Araujo, P. Arce et al., Geant4 - A Simulation Toolkit, Nuclear Instruments and Methods A 506 (2003) 250-303.
[2]. N. Tyagi, J.M. Moran, D.W Litzenberg, A.F Bielajew, B.A Fraass, I.J Chetty, Experimental verification of a Monte Carlo-based MLC simulation model for IMRT dose calculation, Journal of Medical Physics 34 (2007) 651-63.
[3]. Chibani and M.A CM, The discrepancies between Monte Carlo dose calculations and measurements for the 18 MV Varian photon beam. Journal of Medical Physics 34 (2007) 1206-16.
[4]. P. Arce, J.I. Lagares, L. Harkness, D. Perez-Astudillo, M. Canadas, P. Rato and al., Gamos: A framework to do Geant4 simulations in different physics fields with an user-friendly interface, Journal of Nuclear Instruments and Methods in Physics Research Section A 735 (2014) 304–313.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In today's innovative technology, area, power and delay are the major parameters to design any kind of the algorithm on Field Programmable Gate Array (FPGA). In communication and Biomedical fields, Fast Fourier Transform (FFT) has the major role in obtaining the signal characteristics with minimum use of resources. Some of the algorithms have been proposed on FFT, such kind of algorithms were less effective in the performance parameters. To enhance this algorithm, in this paper, we have proposed a new algorithm with the area as well power efficient Low Area Carry Select Adder (CSLA). With this total area and power required for the algorithm has been minimized.
Keyword: FFT algorithm, FPGA, CSLA adder
[1]. Wyche, M. K., "An efficient, microprocessor-based FFT implementation for FDM demultiplexing", Military Communications Conference, MILCOM'91, Conference Record, Military Communications in a Changing World, pp. 995-1000, IEEE, 1991.
[2]. Nadehara, Kouhei, Takashi Miyazaki, and Ichiro Kuroda., "Radix-4 FFT implementation using SIMD multimedia instructions", Acoustics, Speech, and Signal Processing, IEEE International Conference on. Vol. 4, pp. 2131-2134, IEEE, 1999.
[3]. Haofan Yang, Kedong Chen, Shengqiong Xie, Ming-e Jing, Zhiyi Yu, Xiaoyang Zeng., "Efficient implementation of 3780-point FFT on a 16-core processor", ASIC (ASICON), 10th International Conference on, pp. 1-4, IEEE, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud computing is a classification of web computing and with respect to request computing where shared assets and data are given to the client's on-request. Profit is the most critical variable from the cloud service provider and it is essentially dictated by the setup of a cloud profit stage under given market request. A solitary long haul leasing plan is generally used to design a cloud stage, which can't ensure the quality of administration however prompts to genuine asset squander. To beat the disadvantages of single leasing plan, Double asset RR Renting plan is composed which is the blend of both here and now and long haul leasing. Twofold asset leasing plan ensures the quality of administration as well as lessen the asset squander. In which queuing model is utilized for occupation booking...........
Keyword: Cloud Service Providers, Cloud computing, multi-server system, service-level agreement, waiting time, Double Renting Scheme, Profit Maximization.
[1]. Jing Mei, Kenli Li, Member, Aijia Ouyang and Keqin Li, Fellow, 2015 , A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
[2]. G. P. Cachon and P. Feldman, 2010. Dynamic versus static pricing in the presence of strategic consumers.
[3]. J. Cao, K. Hwang, K. Li, and A. Y. Zomaya, , 2013. Optimal multi-server configuration for profit maximization in cloud computing.
[4]. A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, and I. Stoica, 2009. Above the clouds: A berkeley view of cloud computing.
[5]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I.Brandic, 2009. Cloud computing and emerging it platforms:Vision, hype, and reality for delivering computing as the5th utility.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Impact of Cloud Based Information Systems on Organization's Performance |
Country | : | Iraq |
Authors | : | Dr. Ahmed Yass Algrari |
: | 10.9790/0661-1902024246 |
Abstract: Cloud computing and mobile applications today are still buzzwords, and important resources in the business strategies of companies. More and more organizations have adopted and currently are using cloud computing and mobile technologies. Big companies developed their own big data centers, private cloud or hybrid cloud as a support for their processes within the shared services architecture. Since Information Systems (IS) process and store a series of sensitive and confidential data. Technological evolution becomes more and more a daily reality for organizations and individuals who use information systems, for supporting their operational activities...........
Keyword: Cloud computing, information systems, Information systems value, organization performance
[1]. Staten, J. (2008). Is Cloud Computing Ready For The Enterprise? Forrester.
[2]. Miller, M. (2008).Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online, Indianapolis: Que Publishing, 2008.
[3]. Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal. "Market- oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities." High Performance Computing and Communications, 2008.
[4]. V. Rajaraman, "Cloud Computing," RESONANCE, March 2014, pp. 242-258.
[5]. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing —The business perspective. Decision Support Systems, 51(1), 176–189.doi:10.1016/j.dss.2010.12.006.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: An improvement to the processing efficiency of Intrusion data sequence for automated detection and diagnosis is presented in this paper. For the automation of Intrusion processing, the problem of representation, extraction and retrieval is proposed. In the current form of automated Intrusion processing system, the retrieval of the intrusion information depends on the representation of the intrusion sequence. The retrieval accuracy also depends on the training data sets used..........
Keyword: Data mining, processing, spectral sequencing, region prediction, grid computing
[1]. Gir Won Lee, Sangsoo Kim, "Genome data mining for everyone", BMB Reports, Minireview, 2008.
[2]. Doug Szajda, Michael Pohl, Jason Owen, Barry Lawson, "Toward A Practical Data Privacy Scheme for A Distributed
Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm", NSF 2000.
[3]. Georgios A Pavlopoulos, AnastasisOulas, Ernesto Iacucci, Alejandro Sifrim, Yves Moreau, Reinhard Schneider, Jan Aerts and
IoannisIliopoulos, "Unraveling Intrusion variation from next intrusionration sequencing data", Bio Data Mining 2013.
[4]. Anton James Enright, "Computational Analysis of Protein Function within Complete Genomes", thesis, 2002.
[5]. Peter Schattner, "Intrusions made easier: An introductory tutorial to genome data mining", Intrusions 93, Elsvier, 2009..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The key objective of Disturbed Denial of Service (DdoS) attack is to compile multiple systems across the internet with the infected zombies/agents and form the botnets of network. The infected systems are remotely controlled by an attacker that is programmed to launch packet flood. Within this context the purpose of this paper is to detect known and unknown DdoS attack. It can also detect DdoS attack from genuine traffic and also the encrypted packets are detected..
Keyword: AES-256 bit algorithm, IP traceback algorithm and Local Flow Monitoring algorithm
[1]. "Traceback Mechanism for DdoS Attacks Using Local Flow Monitoring in MANET" SandeepShinde et al | IJCSET(www.ijcset.net) | August 2015
[2]. "A novel entropy based detection of DdoS attack." (2012)
[3]. "Efficient Implementation of AES "(2013)
[4]. "Implementation of AES Algorithm Based on FPGA "(2014)
[5]. "AdaBoost-Based Algorithm for Network Intrusion Detection", 2008
[6]. "Parametric Methods for Anomaly Detection in Aggregate Traffic", 2011.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud applications are often subject to unexpected events like flash crowds and hardware failures. Scholars addressed this matter on two various fronts: first, they presented replicas – application copies with same functionality – for redundancy and scalability. The presence of multiple replicas requires a dedicated component to direct incoming traffic: a load-balancer Load balancing is one of the most interesting areas of research in cloud computing where lots of work done regarding in this field by using several techniques like optimization and evolutionary algorithms but all have same remedies to overcome this problem we propose a differential evolution based technique to enhance the performance of cloud, simulation result shows that execution time and response time of process will be reduce by using DE technique this work implemented on cloudsim tool and comparative results shows effectiveness of our work.
Keyword: clous computing; cloudsim;DE technique and load balancing, etc.
[1] Nikita Haryani and DhanammaJagli "Dynamic Method for Load Balancing in Cloud Computing" IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. IV (Jul – Aug. 2014), PP
[2] GunpriyaMakkar, Pankaj Deep Kaur "A Review of Load Balancing in Cloud Computing" International Journal of Advanced Research in Computer Science and Software Engineering
[3] Foram F Kherani, 2Prof.Jignesh Vania " Load Balancing in cloud computing" International Journal of Engineering Development and Research (www.ijedr.org)
[4] PavelKr¨omer, Jan Platoˇs, V´aclavSn´aˇsel, Ajith Abraham "A Comparison of Many-threaded Differential Evolution and Genetic Algorithms on CUDA" Third World Congress on Nature and Biologically Inspired Computing
[5] Nikita Haryani and DhanammaJagli "Dynamic Method for Load Balancing in Cloud Computing" IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. IV (Jul – Aug. 2014), PP.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Student campus placement attitudes have largely been assessed using college students are relatively small samples. In addition, no systematic framework has been used to investigate the origins or influencing social factors of such attitudes and how these interact with demographic characteristics. Using Google forms an online survey was conducted, to examine placement-related attitudes and behaviors among 3,340 adults. We examined the students' behavior in Technical and nontechnical interviews.......
Keyword: Analytics, Decision Tree, Data Mining, data Analysis, Placement Analytics, R Tool, R Data Miner.
[1] Kanno, H., Koeske, G.F.: MSW students' satisfaction with their field placements: The role of preparedness and supervision quality. J. Soc. Work Educ. 46, 23–38 (2010).
[2] Patrón, R.: Can more education be bad? Some simple analytics on financing better education for development. 1091–1100.
[3] Baker, R.S.J.D., Yacef, K., Slade, S., Prinsloo, P., Bültmann, M., Chatti, M.A., Schroeder, U., Prinsloo, P., Slade, S.: Learning analytics for online discussions: a pedagogical model for intervention with embedded and extracted analytics. Am. Behav. Sci. 15, 2–5 (2012).
[4] Lefebvre, A., Spruit, M., Ota, W.: Towards reusability of computational experiments capturing and sharing Research Objects from knowledge discovery processes. Proc. 7th Int. It. Conf. Knowl. Discov. Knowl. Eng. Knowl. Manag. (IC3K 2015). 1, 456–462 (2015).
[5] Riegler, M., Pogorelov, K., Lux, M., Halvorsen, P., Griwodz, C., De Lange, T., Eskeland, S.L.: an Explorative hyperbolic-tree-based clustering tool for unsupervised knowledge discovery. Proc. - Int. Work. Content-Based Multimedia. Index. 2016–June, (2016)..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In order to achieve their business goals, educational organizations and institutions all over the World have become more dependent on information and communication technology (ICT). Internet services contributed to the improvement of the teaching-learning process, researches and other related activities. The cloud computing technology has effective applications, which offers students, staff, and administrative personnel access to educational resources at any time and from anywhere. Students have the opportunity to quickly and economically access various application platforms by sharing the resource based on cloud computing technology. In this paper,...........
Keyword: Cloud Computing; Higher Education; Sudanese Universities; Private Cloud
[1]. Abdullah Alshwaier, A New Trend For E-Learning in KSA Using Educational Cloud, Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.1, January 2012.
[2]. Peter Mell and Timothy Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology Special Publication 800-145, 2011.
[3]. Rajan, S. and A. Jairath. Cloud Computing: The Fifth Generation of Computing. Communication Systems and Network Technologies (CSNT), 2011 International Conference on. 2011. IEEE.
[4]. Zhang, Q., L. Cheng, and R. Boutaba, Cloud Computing: State-of-the-Art and Research Challenges. Journal of internet services and applications, 2010. 1(1): p. 7-18.
[5]. Chunmei Chi, The Trend of Cloud Computing in China, 2011..