14 research outputs found

    An Asynchronous Replication Model to Improve Data Available into a Heterogeneous System

    Get PDF
    Data replication is an important technique for high level data availability, especially applied for distributed systems. To enhance the data access and data reliability, data replication is one of the most important aspects. This paper is proposed a asynchronous replication model. This model also supports heterogeneous system which is currently a very promising system. In our proposed model the main server and replication servers are loosely coupled. Since the structure is loosely coupled and asynchronous model thus there is less dependency on each server. Moreover the proposed model is supporting heterogeneous system, so it will be highly cost minimizing solution for efficient data replication. Keywords: Data replication, Data Persistency, Asynchronous, Heterogeneous Replication

    Distributed Hash Tables in P2P Network: Detection and Prevention of Threats and Vulnerability

    Get PDF
    Currently the peer-to-peer search focuses on efficient hash lookup systems which can be use in building more complex distributed systems. These system works well when their algorithms are executed in right direction but generally they don’t consider how to handle misbehaving nodes. In our paper we considers different sorts of security problems which are inherent in peer-to peer systems based on distributed hash lookup systems. We examine different types of problems that this kind of systems might face, taking examples from existing systems. Here we propose some design principles for detecting as well preventing those problems. Keywords- Distributed hash lookup systems, verifiable system invariants, verifiable key assignment, Server selection in routing

    Fractal dimension of fractal functions on the real projective plane

    Get PDF
    In this article, we consider an iterated functions system on the non-Euclidean real projective plane which has a linear structure. Then, we study the fractal dimension of the associated curve as a subset of the projective space and like a set of the Euclidean space. At the end, we initiate a dual real projective iterated function system and pose an open problem

    Local a -fractal interpolation function

    Get PDF
    Constructions of the (global) fractal interpolation functions on standard function spaces got a lot of attention in the last centuries. Motivated by the newly introduced local fractal functions corresponding to a local iterated functions system which is the generalization of the traditional iterated functions system we construct the local non-affine α - fractal functions in this article. A few examples of the graphs of these functions are provided. A fractal operator which takes the classical function to its local fractal counterpart is defined and some of its properties are also studied

    Fractal frames of functions on the rectangle

    Get PDF
    In this paper, we define fractal bases and fractal frames of L2(I   J), where I and J are real compact intervals, in order to approximate two-dimensional square-integrable maps whose domain is a rectangle, using the identification of L2(I   J) with the tensor product space L2(I) NL2(J). First, we recall the procedure of constructing a fractal perturbation of a continuous or integrable function. Then, we define fractal frames and bases of L2(I   J) composed of product of such fractal functions. We also obtain weaker families as Bessel, Riesz and Schauder sequences for the same space. Additionally, we study some properties of the tensor product of the fractal operators associated with the maps corresponding to each variable

    Разработка и заполнение хранилища данных параметров качества воды в речной системе мегаполиса Дакка на основе многомерной модели

    Get PDF
    Developing and populating of data warehouse for water quality parameters based on multidimensional data model allows to collect, store and process ecological information of Dhaka river system and provides information support for decision making, such as selecting of water treatment technology, constructing of sewage treatment plant etc.Создание на основе многомерной модели данных хранилища данных параметров качества воды позволит создать единую информационную основу для сбора, накопления и обработки информации о качестве воды во всей речной системе мегаполиса Дакка, а также обеспечит информационную поддержку для принятия решений по выбору технологий очистки воды, сооружению станций очистки сточных вод и разработке других водоохранных мероприятий

    Distributed Control of Cyber Physical System on Various Domains: A Critical Review

    Get PDF
    Cyber-Physical System (CPS) is a symbol of the fourth industrial revolution (4IR) by integrating physical and computational processes which can associate with humans in various ways. In short, the relationship between Cyber networks and the physical component is known as CPS, which is assisting to incorporate the world and influencing our ordinary life significantly. In terms of practical utilization of CPS interacting abundant difficulties. Currently, CPS is involved in modern society very vastly with many uptrend perspectives. All the new technologies by using CPS are accelerating our journey of innovation. In this paper, we have explained the research areas of 14 important domains of Cyber-Physical Systems (CPS) including aircraft transportation systems, battlefield surveillance, chemical production, energy, agriculture (food supply), healthcare, education, industrial automation, manufacturing, mobile devices, robotics, transportation, and vehicular. We also demonstrated the challenges and future direction of each paper of all domains. Almost all articles have limitations on security, data privacy, and safety. Several projects and new dimensions are mentioned where CPS is the key integration. Consequently, the researchers and academicians will be benefited to update the CPS workspace and it will help them with more research on a specific topic of CPS. 158 papers are studied in this survey as well as among these, 98 papers are directly studied with the 14 domains with challenges and future instruction which is the first survey paper as per the knowledge of authors

    Developing and populating data warehouse for water quality parameters of Dhaka river system based on multidimensional data model

    No full text
    Developing and populating of data warehouse for water quality parameters based on multidimensional data model allows to collect, store and process ecological information of Dhaka river system and provides information support for decision making, such as selecting of water treatment technology, constructing of sewage treatment plant etc

    Analysis and Design Peer-to-Peer Gnutella Network and Threat Solutions

    No full text
    Gnutella is a file sharing network that allows users to send and receive files over the Internet. The Gnutella network is a peer-to-peer (P2P) network, which allows users on different networks to share files. Peer-to-peer (P2P) networks have emerged over the past several years as new and effective ways for distributed resources to communicate and co-operate. Peer-to-peer computing is the sharing of computer resources and services by direct exchange between systems. These resources and services include the exchange of information, processing cycles, cache storage, and disk storage for files. P2P networking has the potential to greatly expand the usefulness of the network be it for sharing music and video, privately contracting for services or for coordinating the use of expensive scientific instruments and computers. Some of the networks, such as Napster and Gnutella are created in an ad hoc manner with little or no centralized control. Other P2P networks such as computational and data grids are being designed and implemented in a very structured manner. P2P networks are presenting new challenges to computer security and privacy in a number of ways. This project will explore Analysis and Design Peer-to-Peer Gnutella Network and Threat Solutions. Our primary focus will be analysis the Gnutella network, threat creation and solutions of threats
    corecore