This document proposes a new hybrid timestamp ordering algorithm to optimize read-write and write-write operations in distributed database systems. It develops an intelligent query optimizer using the C4.5 machine learning algorithm to provide a timestamp ordering scheduler with transaction information to more efficiently handle concurrency issues. The hybrid algorithm aims to minimize transaction time and enable faster data access in large datasets while maintaining data integrity. It analyzes how timestamps are currently used in databases and other systems to identify processes and coordinate concurrent transactions.
Real-time systems include applications like digital control, command and control, and signal processing. These systems monitor physical processes using sensors and control them using actuators. A real-time controller estimates the current state of the physical process from sensor readings and computes control outputs to activate actuators and keep the process in a desired state. Many real-time systems have hard deadlines that must be met to avoid dangerous consequences. Examples include flight controllers and medical systems. Soft real-time systems have deadlines that are undesirable but not fatal to miss.
The document provides information about transaction processing systems (TPS). It defines a transaction as a sequence of information exchange treated as a unit. A TPS captures, enters, stores, retrieves, and processes business event details and generates necessary documents. Key aspects of a TPS include capturing data close to the source, efficiently entering and storing data in the database, and transforming raw data into useful information. Transactions in a TPS must have the properties of atomicity, consistency, isolation, and durability. The TPS processing cycle includes input, validation, processing, output, and storage. The document also discusses network infrastructure, bandwidth throttling, and troubleshooting tools.
Survey of Real Time Scheduling AlgorithmsIOSR Journals
This document summarizes and reviews real-time scheduling algorithms. It discusses both static and dynamic scheduling algorithms for real-time tasks on uniprocessors and multiprocessors. The document reviews algorithms such as Earliest Deadline First, Least Laxity First, and Modified Instantaneous Utilization Factor Scheduling. It concludes that Modified Instantaneous Utilization Factor Scheduling provides better results than previous algorithms in terms of context switching, response time, and CPU utilization for uniprocessor scheduling.
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOLijasuc
The transaction processing on the mobile network may lead to disconnection due to poor bandwidth. To
deploy traditional database applications into the mobile networks the transactions are to be executed
consistently without hindrance of blocking. In this paper, the proposal is made to handle the transactions
efficiently despite the frequent disconnections of the wireless network. With the use of log at MH & also
at FH, it is possible to process transactions locally during disconnection & reflect updates after getting
reconnected. This may lead to non-blocking situations, reducing the message costs, & enhancing the
throughput. The simulation results specify the performance analysis metrics
Partitioning involves dividing a program into tasks that can be assigned to individual processors. Scheduling involves determining the order tasks are executed to minimize completion time. Communication and synchronization ensure data is available when needed across tasks. Overhead from partitioning and scheduling can reduce potential speedup from parallel execution if it outweighs time savings from parallelism.
Communication And Synchronization In Distributed Systemsguest61205606
This document discusses various topics related to communication and synchronization in distributed systems. It covers concepts like communication protocols, remote procedure calls, client-server and peer-to-peer models, blocking vs non-blocking communication, reliability, group communication, message ordering, and synchronization techniques including clock synchronization algorithms, mutual exclusion algorithms, and atomic transactions.
This document outlines and summarizes key aspects of real-time operating systems (RTOS), including their requirements, scheduling approaches, and examples of existing RTOS like eCos and Windows CE. It discusses static and dynamic scheduling, priority inversion issues and solutions, and interrupt handling challenges. The goal of an RTOS is to support time-critical processes through multi-tasking and prioritized, predictable execution within predefined latency constraints.
This document discusses main memory management techniques used in operating systems. It covers topics like address binding, logical versus physical address spaces, dynamic loading, swapping, contiguous memory allocation, segmentation, paging, and page tables. The key points are:
1) Main memory management aims to efficiently allocate memory for processes while allowing processes to be swapped in and out of memory. It maps logical addresses to physical addresses through techniques like segmentation and paging.
2) Early techniques allocated processes to contiguous blocks of memory, but this led to fragmentation issues. Segmentation and paging allow non-contiguous allocation to avoid fragmentation.
3) Segmentation divides memory into variable-sized segments, while paging divides it into fixed
Real-time systems include applications like digital control, command and control, and signal processing. These systems monitor physical processes using sensors and control them using actuators. A real-time controller estimates the current state of the physical process from sensor readings and computes control outputs to activate actuators and keep the process in a desired state. Many real-time systems have hard deadlines that must be met to avoid dangerous consequences. Examples include flight controllers and medical systems. Soft real-time systems have deadlines that are undesirable but not fatal to miss.
The document provides information about transaction processing systems (TPS). It defines a transaction as a sequence of information exchange treated as a unit. A TPS captures, enters, stores, retrieves, and processes business event details and generates necessary documents. Key aspects of a TPS include capturing data close to the source, efficiently entering and storing data in the database, and transforming raw data into useful information. Transactions in a TPS must have the properties of atomicity, consistency, isolation, and durability. The TPS processing cycle includes input, validation, processing, output, and storage. The document also discusses network infrastructure, bandwidth throttling, and troubleshooting tools.
Survey of Real Time Scheduling AlgorithmsIOSR Journals
This document summarizes and reviews real-time scheduling algorithms. It discusses both static and dynamic scheduling algorithms for real-time tasks on uniprocessors and multiprocessors. The document reviews algorithms such as Earliest Deadline First, Least Laxity First, and Modified Instantaneous Utilization Factor Scheduling. It concludes that Modified Instantaneous Utilization Factor Scheduling provides better results than previous algorithms in terms of context switching, response time, and CPU utilization for uniprocessor scheduling.
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOLijasuc
The transaction processing on the mobile network may lead to disconnection due to poor bandwidth. To
deploy traditional database applications into the mobile networks the transactions are to be executed
consistently without hindrance of blocking. In this paper, the proposal is made to handle the transactions
efficiently despite the frequent disconnections of the wireless network. With the use of log at MH & also
at FH, it is possible to process transactions locally during disconnection & reflect updates after getting
reconnected. This may lead to non-blocking situations, reducing the message costs, & enhancing the
throughput. The simulation results specify the performance analysis metrics
Partitioning involves dividing a program into tasks that can be assigned to individual processors. Scheduling involves determining the order tasks are executed to minimize completion time. Communication and synchronization ensure data is available when needed across tasks. Overhead from partitioning and scheduling can reduce potential speedup from parallel execution if it outweighs time savings from parallelism.
Communication And Synchronization In Distributed Systemsguest61205606
This document discusses various topics related to communication and synchronization in distributed systems. It covers concepts like communication protocols, remote procedure calls, client-server and peer-to-peer models, blocking vs non-blocking communication, reliability, group communication, message ordering, and synchronization techniques including clock synchronization algorithms, mutual exclusion algorithms, and atomic transactions.
This document outlines and summarizes key aspects of real-time operating systems (RTOS), including their requirements, scheduling approaches, and examples of existing RTOS like eCos and Windows CE. It discusses static and dynamic scheduling, priority inversion issues and solutions, and interrupt handling challenges. The goal of an RTOS is to support time-critical processes through multi-tasking and prioritized, predictable execution within predefined latency constraints.
This document discusses main memory management techniques used in operating systems. It covers topics like address binding, logical versus physical address spaces, dynamic loading, swapping, contiguous memory allocation, segmentation, paging, and page tables. The key points are:
1) Main memory management aims to efficiently allocate memory for processes while allowing processes to be swapped in and out of memory. It maps logical addresses to physical addresses through techniques like segmentation and paging.
2) Early techniques allocated processes to contiguous blocks of memory, but this led to fragmentation issues. Segmentation and paging allow non-contiguous allocation to avoid fragmentation.
3) Segmentation divides memory into variable-sized segments, while paging divides it into fixed
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
This document discusses the design and implementation of an encrypted file communication system within an intranet. It aims to securely share files between users of an organization in a controlled manner without using external file sharing services.
The key aspects of the system design covered are the database schema, file storage method, and encryption algorithm. To allow for fast querying, the database schema refreshes old records periodically instead of having one large table. Files are stored on the server rather than in the database to avoid file format changes. AES encryption with 256-bit keys is used due to its fast speeds and strong security compared to alternatives like DES and RSA.
The system architecture has three layers - a user interface layer for login/registration and a
Transaction processing systems carry out the processes related to organizational transactions. They have properties like atomicity, consistency, isolation, and durability. There are two types - batch processing, which collects and stores data for later updating, and real-time processing, which immediately updates data. Data validation ensures the correct type and value of input data. Transaction processing systems were initially driven by business needs to computerize manual processes and have since developed with technology.
Transaction processing systems handle transactions by carrying out seven key processes. There are two main types: batch processing, which collects and stores data for later updating of databases; and real-time processing, which immediately updates databases as transactions occur. Ensuring accurate data through validation is important for transaction processing systems.
Transaction processing systems carry out seven processes related to organizational transactions. There are two types: batch processing, which collects and stores data for later updating of databases; and real-time processing, which immediately updates databases as transactions occur. Ensuring accurate data through validation is important for transaction processing. Historical significance includes computerizing manual business processes like payrolls, driven initially by punch cards and later technology.
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
This document proposes a new Multi-Server Authentication Key Exchange approach for secure communication in big data environments. It aims to address issues with the existing Kerberos approach used in Parallel Network File Systems (pNFS), which has scalability limits and does not provide forward secrecy or prevent key escrow. The proposed approach uses authenticated key exchange protocols between clients and storage devices to reduce the workload on the metadata server by up to 54% while providing forward secrecy and preventing key escrow with only minor client-side computation overhead. It is designed specifically for the needs of pNFS but could benefit other similar distributed file systems.
A Transaction Processing System (TPS) collects, stores, modifies, and retrieves data transactions of an enterprise. It processes transactions in databases and monitors transaction programs. There are two main types - batch TPS and online transaction processing (OLTP). Batch TPS accumulates transactions over time periods like days or weeks and processes them in batches to update databases and generate reports. OLTP facilitates and manages transaction-oriented applications for data entry and retrieval in real-time, providing immediate responses to user requests like ATM machines. Both systems aim to increase efficiency but OLTP reduces paper trails while batch may experience delays.
Enterprise applications in the cloud: a roadmap to workload characterization ...Leonid Grinshpan, Ph.D.
This article provides a road map to enterprise application workload characterization and prediction by:
- Identifying the constituents of EA transactional workload and specifying the metrics to quantify it.
- Reviewing the technologies generating raw transactional data.
- Examining Big Data Analytic ability to extract workload characterization from raw transactional data.
- Assessing the methods that discover the workload variability patterns.
This document discusses real-time operating systems for embedded systems. It begins by defining embedded systems as specialized computer systems designed to perform dedicated functions with real-time constraints. It then explains that real-time embedded systems must manage time-critical processes. Common real-time operating system (RTOS) functions include task management, inter-task communication, dynamic memory allocation, timers, and device I/O. RTOSs allow embedded systems to schedule tasks, communicate between processes, and interface with hardware in a timely manner. Examples of widely-used RTOSes are given.
IRJET-Concurrency Control Model for Distributed DatabaseIRJET Journal
Ranjana Jhala, Kamaljit I. Lakhtaria and Sanjay Gaur. "Concurrency Control Model for Distributed Database", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
Nowadays, distributed Databases have taken concentration in the database research. Data distribution and replication offer opportunities for improving performance through parallel query execution and load balancing as well as increasing the availability of data. These opportunities have played a major role in motivating the design of the current generation of database machines. The purpose of this study is to propose an approach that absolutely increases the performance of real-time distributed data service. The centralized real time database is based on critical closed loop control system. To overcome this problem we proposed a model/ system called user control distributed database model which try to stimulate the overload transaction during run time. Therefore the present system will be a step towards fulfill the needs of critical conditions like overload or run-time errors in context of distributed database system.
A Survey on Distributed Transactional Memory System with a Proposed Design fo...IRJET Journal
This document summarizes a survey on distributed transactional memory systems and proposes two new designs for parallel processors. It first reviews several existing transactional memory schemes and their limitations. It then proposes two new hardware transactional memory designs - one using a centralized directory-based cache coherence protocol and the other using a decentralized directory-based protocol. The goals of the proposed designs are to address issues like concurrency, performance, scalability, exception handling, paging and context switching in transactional memory systems. The document also discusses using simulation tools to test the proposed designs by capturing memory requests from programs and feeding them as inputs to simulated processors.
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
This article covers the importance of utilizing a cross-platform log management approach rather than a siloed approach to aggregating and reviewing logs for easier security and compliance initiatives.
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
This article covers the importance of utilizing a cross-platform log management approach rather than a siloed approach to aggregating and reviewing logs for easier security and compliance initiatives.
Transaction processing systems (TPS) are crucial for finance, banking, and e-commerce organizations. TPS collect, store, modify, and retrieve transaction data. Transactions must pass the ACID test, ensuring atomicity, consistency, isolation, and durability. Examples of TPS include point-of-sale systems, credit card processing, and hotel reservations. TPS must process transactions rapidly and reliably while maintaining standardized and controlled processing.
This document summarizes research on scheduling algorithms for loading streaming data into real-time data warehouses. The goal is to minimize data staleness over time. It describes how streaming warehouses continuously ingest incoming data streams to support time-critical analyses, unlike traditional warehouses which are periodically refreshed. It presents a model for temporal consistency and defines data staleness. It formulates the streaming warehouse update problem as a scheduling problem to minimize staleness and proves that any online, non-preemptive scheduling algorithm can achieve staleness within a constant factor of optimal if processors are sufficiently fast and no processor is idly waiting.
This technical report summarizes three automation projects completed by the author during their co-op term at Powerex Corp:
1) ITSM/TFS Database Reporting automated the generation of weekly reports by querying two separate databases.
2) Prince & TxMS Latency Alert automated monitoring and alerting of latency between two applications by calculating time differences between database entries.
3) The automation process design follows a linear state transition through draft, development, testing, and production stages, with expected regressions forming a feedback loop to improve stability.
Online transaction processing (OLTP) systems facilitate transaction-oriented data entry and retrieval applications in real-time. OLTP provides simplicity and efficiency for businesses by reducing paper trails and enabling faster financial forecasting. Effective OLTP requires support for distributed transactions across networks and platforms using client/server architectures and transaction management software. It involves gathering input, processing it, and updating existing information. Concurrency control protocols like locking and timestamps are used to manage concurrent transactions and avoid problems such as lost updates, dirty reads, and phantoms.
Online transaction processing (OLTP) systems facilitate transaction-oriented applications like data entry and retrieval. An example is an automated teller machine (ATM). OLTP systems aim to provide immediate responses to user requests through simplicity, efficiency, and reduced paperwork. New OLTP software uses client/server processing and transaction brokering to support transactions spanning networks and companies. Maintaining high performance for large numbers of concurrent updates requires sophisticated transaction management and database optimization.
This document summarizes various techniques for transaction reordering that have been proposed in previous research. It discusses approaches that reorder transactions based on reducing resource conflicts as well as those that aim to increase resource sharing. Specific techniques covered include steal-on-abort, reordering in replicated databases, reordering for continuous data loading, and reordering to enable synchronized scans. The document provides comparisons of these different reordering strategies based on factors such as overhead, throughput, response time and whether they perform lock conflict analysis or enable resource sharing.
This document summarizes research on transaction reordering techniques. It discusses transaction reordering approaches based on reducing resource conflicts and increasing resource sharing. Specifically, it covers:
1) A "steal-on-abort" technique that reorders an aborted transaction behind the transaction that caused the abort to avoid repeated conflicts.
2) A replication protocol that attempts to reorder transactions during certification to avoid aborts rather than restarting immediately.
3) Transaction reordering and grouping during continuous data loading to prevent deadlocks when loading data for materialized join views.
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
Frequent itemset mining and association rule generation is
a challenging task in data stream. Even though, various algorithms
have been proposed to solve the issue, it has been found
out that only frequency does not decides the significance
interestingness of the mined itemset and hence the association
rules. This accelerates the algorithms to mine the association
rules based on utility i.e. proficiency of the mined rules. However,
fewer algorithms exist in the literature to deal with the utility
as most of them deals with reducing the complexity in frequent
itemset/association rules mining algorithm. Also, those few
algorithms consider only the overall utility of the association
rules and not the consistency of the rules throughout a defined
number of periods. To solve this issue, in this paper, an enhanced
association rule mining algorithm is proposed. The algorithm
introduces new weightage validation in the conventional
association rule mining algorithms to validate the utility and
its consistency in the mined association rules. The utility is
validated by the integrated calculation of the cost/price efficiency
of the itemsets and its frequency. The consistency validation
is performed at every defined number of windows using the
probability distribution function, assuming that the weights are
normally distributed. Hence, validated and the obtained rules
are frequent and utility efficient and their interestingness are
distributed throughout the entire time period. The algorithm is
implemented and the resultant rules are compared against the
rules that can be obtained from conventional mining algorithms
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Write-Write Operations
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
This document discusses the design and implementation of an encrypted file communication system within an intranet. It aims to securely share files between users of an organization in a controlled manner without using external file sharing services.
The key aspects of the system design covered are the database schema, file storage method, and encryption algorithm. To allow for fast querying, the database schema refreshes old records periodically instead of having one large table. Files are stored on the server rather than in the database to avoid file format changes. AES encryption with 256-bit keys is used due to its fast speeds and strong security compared to alternatives like DES and RSA.
The system architecture has three layers - a user interface layer for login/registration and a
Transaction processing systems carry out the processes related to organizational transactions. They have properties like atomicity, consistency, isolation, and durability. There are two types - batch processing, which collects and stores data for later updating, and real-time processing, which immediately updates data. Data validation ensures the correct type and value of input data. Transaction processing systems were initially driven by business needs to computerize manual processes and have since developed with technology.
Transaction processing systems handle transactions by carrying out seven key processes. There are two main types: batch processing, which collects and stores data for later updating of databases; and real-time processing, which immediately updates databases as transactions occur. Ensuring accurate data through validation is important for transaction processing systems.
Transaction processing systems carry out seven processes related to organizational transactions. There are two types: batch processing, which collects and stores data for later updating of databases; and real-time processing, which immediately updates databases as transactions occur. Ensuring accurate data through validation is important for transaction processing. Historical significance includes computerizing manual business processes like payrolls, driven initially by punch cards and later technology.
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
This document proposes a new Multi-Server Authentication Key Exchange approach for secure communication in big data environments. It aims to address issues with the existing Kerberos approach used in Parallel Network File Systems (pNFS), which has scalability limits and does not provide forward secrecy or prevent key escrow. The proposed approach uses authenticated key exchange protocols between clients and storage devices to reduce the workload on the metadata server by up to 54% while providing forward secrecy and preventing key escrow with only minor client-side computation overhead. It is designed specifically for the needs of pNFS but could benefit other similar distributed file systems.
A Transaction Processing System (TPS) collects, stores, modifies, and retrieves data transactions of an enterprise. It processes transactions in databases and monitors transaction programs. There are two main types - batch TPS and online transaction processing (OLTP). Batch TPS accumulates transactions over time periods like days or weeks and processes them in batches to update databases and generate reports. OLTP facilitates and manages transaction-oriented applications for data entry and retrieval in real-time, providing immediate responses to user requests like ATM machines. Both systems aim to increase efficiency but OLTP reduces paper trails while batch may experience delays.
Enterprise applications in the cloud: a roadmap to workload characterization ...Leonid Grinshpan, Ph.D.
This article provides a road map to enterprise application workload characterization and prediction by:
- Identifying the constituents of EA transactional workload and specifying the metrics to quantify it.
- Reviewing the technologies generating raw transactional data.
- Examining Big Data Analytic ability to extract workload characterization from raw transactional data.
- Assessing the methods that discover the workload variability patterns.
This document discusses real-time operating systems for embedded systems. It begins by defining embedded systems as specialized computer systems designed to perform dedicated functions with real-time constraints. It then explains that real-time embedded systems must manage time-critical processes. Common real-time operating system (RTOS) functions include task management, inter-task communication, dynamic memory allocation, timers, and device I/O. RTOSs allow embedded systems to schedule tasks, communicate between processes, and interface with hardware in a timely manner. Examples of widely-used RTOSes are given.
IRJET-Concurrency Control Model for Distributed DatabaseIRJET Journal
Ranjana Jhala, Kamaljit I. Lakhtaria and Sanjay Gaur. "Concurrency Control Model for Distributed Database", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
Nowadays, distributed Databases have taken concentration in the database research. Data distribution and replication offer opportunities for improving performance through parallel query execution and load balancing as well as increasing the availability of data. These opportunities have played a major role in motivating the design of the current generation of database machines. The purpose of this study is to propose an approach that absolutely increases the performance of real-time distributed data service. The centralized real time database is based on critical closed loop control system. To overcome this problem we proposed a model/ system called user control distributed database model which try to stimulate the overload transaction during run time. Therefore the present system will be a step towards fulfill the needs of critical conditions like overload or run-time errors in context of distributed database system.
A Survey on Distributed Transactional Memory System with a Proposed Design fo...IRJET Journal
This document summarizes a survey on distributed transactional memory systems and proposes two new designs for parallel processors. It first reviews several existing transactional memory schemes and their limitations. It then proposes two new hardware transactional memory designs - one using a centralized directory-based cache coherence protocol and the other using a decentralized directory-based protocol. The goals of the proposed designs are to address issues like concurrency, performance, scalability, exception handling, paging and context switching in transactional memory systems. The document also discusses using simulation tools to test the proposed designs by capturing memory requests from programs and feeding them as inputs to simulated processors.
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
This article covers the importance of utilizing a cross-platform log management approach rather than a siloed approach to aggregating and reviewing logs for easier security and compliance initiatives.
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
This article covers the importance of utilizing a cross-platform log management approach rather than a siloed approach to aggregating and reviewing logs for easier security and compliance initiatives.
Transaction processing systems (TPS) are crucial for finance, banking, and e-commerce organizations. TPS collect, store, modify, and retrieve transaction data. Transactions must pass the ACID test, ensuring atomicity, consistency, isolation, and durability. Examples of TPS include point-of-sale systems, credit card processing, and hotel reservations. TPS must process transactions rapidly and reliably while maintaining standardized and controlled processing.
This document summarizes research on scheduling algorithms for loading streaming data into real-time data warehouses. The goal is to minimize data staleness over time. It describes how streaming warehouses continuously ingest incoming data streams to support time-critical analyses, unlike traditional warehouses which are periodically refreshed. It presents a model for temporal consistency and defines data staleness. It formulates the streaming warehouse update problem as a scheduling problem to minimize staleness and proves that any online, non-preemptive scheduling algorithm can achieve staleness within a constant factor of optimal if processors are sufficiently fast and no processor is idly waiting.
This technical report summarizes three automation projects completed by the author during their co-op term at Powerex Corp:
1) ITSM/TFS Database Reporting automated the generation of weekly reports by querying two separate databases.
2) Prince & TxMS Latency Alert automated monitoring and alerting of latency between two applications by calculating time differences between database entries.
3) The automation process design follows a linear state transition through draft, development, testing, and production stages, with expected regressions forming a feedback loop to improve stability.
Online transaction processing (OLTP) systems facilitate transaction-oriented data entry and retrieval applications in real-time. OLTP provides simplicity and efficiency for businesses by reducing paper trails and enabling faster financial forecasting. Effective OLTP requires support for distributed transactions across networks and platforms using client/server architectures and transaction management software. It involves gathering input, processing it, and updating existing information. Concurrency control protocols like locking and timestamps are used to manage concurrent transactions and avoid problems such as lost updates, dirty reads, and phantoms.
Online transaction processing (OLTP) systems facilitate transaction-oriented applications like data entry and retrieval. An example is an automated teller machine (ATM). OLTP systems aim to provide immediate responses to user requests through simplicity, efficiency, and reduced paperwork. New OLTP software uses client/server processing and transaction brokering to support transactions spanning networks and companies. Maintaining high performance for large numbers of concurrent updates requires sophisticated transaction management and database optimization.
This document summarizes various techniques for transaction reordering that have been proposed in previous research. It discusses approaches that reorder transactions based on reducing resource conflicts as well as those that aim to increase resource sharing. Specific techniques covered include steal-on-abort, reordering in replicated databases, reordering for continuous data loading, and reordering to enable synchronized scans. The document provides comparisons of these different reordering strategies based on factors such as overhead, throughput, response time and whether they perform lock conflict analysis or enable resource sharing.
This document summarizes research on transaction reordering techniques. It discusses transaction reordering approaches based on reducing resource conflicts and increasing resource sharing. Specifically, it covers:
1) A "steal-on-abort" technique that reorders an aborted transaction behind the transaction that caused the abort to avoid repeated conflicts.
2) A replication protocol that attempts to reorder transactions during certification to avoid aborts rather than restarting immediately.
3) Transaction reordering and grouping during continuous data loading to prevent deadlocks when loading data for materialized join views.
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
Frequent itemset mining and association rule generation is
a challenging task in data stream. Even though, various algorithms
have been proposed to solve the issue, it has been found
out that only frequency does not decides the significance
interestingness of the mined itemset and hence the association
rules. This accelerates the algorithms to mine the association
rules based on utility i.e. proficiency of the mined rules. However,
fewer algorithms exist in the literature to deal with the utility
as most of them deals with reducing the complexity in frequent
itemset/association rules mining algorithm. Also, those few
algorithms consider only the overall utility of the association
rules and not the consistency of the rules throughout a defined
number of periods. To solve this issue, in this paper, an enhanced
association rule mining algorithm is proposed. The algorithm
introduces new weightage validation in the conventional
association rule mining algorithms to validate the utility and
its consistency in the mined association rules. The utility is
validated by the integrated calculation of the cost/price efficiency
of the itemsets and its frequency. The consistency validation
is performed at every defined number of windows using the
probability distribution function, assuming that the weights are
normally distributed. Hence, validated and the obtained rules
are frequent and utility efficient and their interestingness are
distributed throughout the entire time period. The algorithm is
implemented and the resultant rules are compared against the
rules that can be obtained from conventional mining algorithms
Similar to IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Write-Write Operations (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Dr.Costas Sachpazis
Consolidation Settlement Calculation Program-The Python Code
By Professor Dr. Costas Sachpazis, Civil Engineer & Geologist
This program calculates the consolidation settlement for a foundation based on soil layer properties and foundation data. It allows users to input multiple soil layers and foundation characteristics to determine the total settlement.
This is an overview of my current metallic design and engineering knowledge base built up over my professional career and two MSc degrees : - MSc in Advanced Manufacturing Technology University of Portsmouth graduated 1st May 1998, and MSc in Aircraft Engineering Cranfield University graduated 8th June 2007.
Data Communication and Computer Networks Management System Project Report.pdfKamal Acharya
Networking is a telecommunications network that allows computers to exchange data. In
computer networks, networked computing devices pass data to each other along data
connections. Data is transferred in the form of packets. The connections between nodes are
established using either cable media or wireless media.
Covid Management System Project Report.pdfKamal Acharya
CoVID-19 sprang up in Wuhan China in November 2019 and was declared a pandemic by the in January 2020 World Health Organization (WHO). Like the Spanish flu of 1918 that claimed millions of lives, the COVID-19 has caused the demise of thousands with China, Italy, Spain, USA and India having the highest statistics on infection and mortality rates. Regardless of existing sophisticated technologies and medical science, the spread has continued to surge high. With this COVID-19 Management System, organizations can respond virtually to the COVID-19 pandemic and protect, educate and care for citizens in the community in a quick and effective manner. This comprehensive solution not only helps in containing the virus but also proactively empowers both citizens and care providers to minimize the spread of the virus through targeted strategies and education.
Cricket management system ptoject report.pdfKamal Acharya
The aim of this project is to provide the complete information of the National and
International statistics. The information is available country wise and player wise. By
entering the data of eachmatch, we can get all type of reports instantly, which will be
useful to call back history of each player. Also the team performance in each match can
be obtained. We can get a report on number of matches, wins and lost.