Approach to Solving K-Sat Problem Based on Reduction Thereof to the Covering Problem
S. V. Listrovoy1 and А. V. Sidorenko2
We propose an exact polynomial-time algorithm for solving SAT the problem.
S. V. Listrovoy1 and А. V. Sidorenko2
We propose an exact polynomial-time algorithm for solving SAT the problem.
Fadi Al kalani
This research paper presents an overview of the main concepts of the semantic web, and is aiming to present some ideas of developing the concept of semantic web using XML and RDF. In particular, the research reveals the positive impact of using RDF instead of XML through the concept of “Semantic Web”, with the knowledge that many of the researches demonstrated the preference of RDF for the many reasons including simplicity, abstract syntax, and providing a data model. In particular, our main goal is to define the appropriate elements to develop a semantic web using both XML and RDF. Our approach is achieved by developing a simulated web search engine to describe and emphasize the positive role of using RDF rather than XML in web search.
Vineet Richhariya, Ratnesh Dubey and Rozina Siddiqui
Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good efficient strategy to several inquiries residing inside cloud computing environment set. complete balancing must acquire straight into accounts two tasks, one will be the resource provisioning as well as resource allocation along with will be task scheduling throughout distributed System. Round robin algorithm can be via far the Easiest algorithm shown to help distribute populate among nodes. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing by introducing a concept of assigning different time slices to individual processes depending on their are priorities.
S Rashmi1 and Anirban Basu2
Hadoop-MapReduce is one of the dominant parallel data processing tool designed for large scale data-intensive cloud computing platforms. Hadoop Mapreduce framework requires a proficient mechanism to allocate and schedule computing resources which makes it liable to accomplishthe desired preferences for the specific business application. In this paper, an analysis of a few scheduler improvement methods that improves the completion time of the job or the task has been carried out in order to facilitate a judicious choice of the scheduler based on the requirement and application expectations .
Rajkumar M. Chauhan
E-Agriculture focuse on the enhancement of agricultural and rural development through improved information and communication processes. More specifically, e-Agriculture involves the conceptualization, design, development, evaluation and application of innovative ways to use information and communication technologies (IT) in the rural domain, with a primary focus on agriculture. E-Agriculture is a relatively new term and we fully expect its scope to change and evolve as our understanding of the area grows. Indian Agriculture contributes to 18.6 per cent of India’s GDP, and approximately 59 per cent Indians derive their livelihood from the agricultural sector. Private sector initiatives like contract farming have commercialized the Indian agricultural sector. To enable Community members to exchange opinions, experiences, good practices and resources related to e-Agriculture, and to ensure that the knowledge created is effectively shared and used worldwide.But There is some advantages and drawback which reside in every technology.This paper gives some glims What the technologies give and take in area of agriculture.
R. Vinoth*, B. Guruprasath and B. N. Karthik
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is significant. So a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP) is used. Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud architectures equipped with alternative cloud security controls and to show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs
Hema Suresh Yaragunti1, and T. Bhaskara Reddy2
Easy and less-time-consuming transmission of high quality digital images requires the compression-decompression technique to be as simple as possible and to be completely lossless. Keeping this demand into mind, we proposed the lossless image compression technique i.e Text Based Image Compression using Hexadecimal Conversion (TBICH). The key idea is to increase redundancy of data presented in an image to get the better compression. We are concerned with lossless image compression in this paper .Our proposed technique is Text Based Image compression using Hexadecimal conversion (TBICH). Our approach works as follows: firstly an image is encoded and converts it into text file by using hexadecimal numbers and LZ77 text compression is applied on this encoded file to reduce size. While decompressing, decompress the encoded file and convert into image which is same as original image. The main objective of this proposed technique is to reduce the size of the image without loss and also to provide security.
Osman Khalifa1, Siddig Balal Ibrahim2 and Abdel Hafiez Ali2
The purpose of this study is to analyze the potential effect of knowledge stocks in the relationship of Business Process Reengineering and the organizational performance. Business Process Reengineering constructs are change management systems and culture, organizational change, top management commitment, information technology infrastructure, and management competence. To analyze this objective, this study reviews various literatures and developed a research model. To examine the research model, Data was collected through a hand-delivery method by sending questionnaires to 221 firms (Financial, Communication and Education). This study used purposive sampling proportionate to the numbers of the firms for sample selection. The findings showed that knowledge stocks moderated the relationship between Business Process Reengineering factors such as change management system and culture, organizational change, top management commitment and overall organizational performance of the firms. Furthermore, the result revealed that knowledge stocks moderated the relationship between management system and culture, organizational change, top management commitment and organizational performance. The outcome of this study provides interest insight to researchers for understanding on the effects of Business Process Reengineering and knowledge stocks on organizational performance
Abedalhakeem T. E. Issa
Safe people transportation and Commitment to the specific speed limits is a big challenge facing the individuals and governments any time anywhere. Roads and Traffic control lie at the heart of the modern civilization, the integration of Geographic Information System (GIS) and Global Positioning System (GPS) technologies together can be achieved by a variety of ways and their applications are numerous [1].
Supervision and Management transportation systems are too many, which can efficiently observe and control the vehicles location, speed, traffic congestion and delay and so. GIS and GPS technology attached with wireless communication that are essential to the system for determining the vehicle location and speed and from the data collected by GPS receiver and that stored in Databases we can derived a lot of useful information in observing and managing transport [4].
In this paper, we determining the vehicle Context Driving Speed Limit Alert (CDSLA), one of the possibilities of the system are to provide a warning alarm to the driver when exceeding the speed limit somewhere En routecontravention in that place, Record and save the average speed En route of its primary functions. The proposed system entirely based on the integration of GPS and GIS.
Techniques to handle the huge amount of data associated to digital road maps and data that received from the GPS belongs to the coordinates and speed, in order to trace the accurate position within a reasonable time is Became possible Techniques progression.
To reduce the size of the collected data and processed information by the system has been relying on a client/server technology, the idea is to use two integrated databases the first one for the spatial data processing and the second is for textual as an alternative database to store text coordinates and related information of the spatial data to eliminate the processing time of GIS data, and a cache method to improve the system performance [4].