1. Why are distributed systems desirable? To be able to say why a distributed system is desirable we first need to distinguish what a distributed system is. A distributed system is a system which has a set of processors; these processes do not share the main memory or a clock. A distributed system may either be a client-server or peer to peer systems. There are four reasons to why a distributed system is desirable these being resource sharing, this allows the system to share file at a remote ...
Want to call and chat with your friends for free, right from the comfort of your house at your own convenience? Then download Google Talk now. Google Talk or GTalk as it is more popularly known as is a free, online Windows software application, specially designed for VoIP and instant messaging. This web-based chat application developed by Google Inc. not only enables you to text chat but also voice chat with family and friends from across the world. Check out what all you can do with GTalk: T...
The Olympic and Paralympic Games are the world's largest peace-time event. The modern Olympic Games were first held in Greece in 1896 and since 1960, the Paralympic Games have provided athletes with disabilities with the opportunity to compete at the highest level. All athletes are encouraged to live by a set of shared principles -the Olympic and Paralympic Values of friendship, equality, respect, courage, determination, excellence and inspiration. The Games are held every four years in a dif...
This paper deals with the design of distributed power systems and optimal capacitor placements based on the ANFIS (Adaptive Network Fuzzy Inference Systems) using Mamdani-type fuzzy inference model. Traditionally, this problem of optimal capacitor placement has been solved through various optimization techniques, but it is more time consuming than various non-traditional techniques. These non-traditional techniques can provide a better solution with lesser computational time but still there i...
I. INTRODUCTION MANY countermeasures are needed to protect data. Cryptography is one of the most important techniques used to protect data while the data is being transmitted or even stored in storage devices. Cryptography is the science of creating encryption and decryption algorithms, while Cryptanalysis is the art of attacking the encryption system. The aim of such attack is to recover the secret key using two methods: brute-force attack and cryptanalytic attack. Nowadays both methods are ...
Extracting knowledge from the universe and identifying the association between attributes values is a challenging task today. Granular computing proposed by Pawlak [1], Louis [2] and Zadeh [3] is a tool to identify the associations between the attributes values that are indiscernible. However, in much information system the attribute values are almost indiscernible rather than discernible. Therefore, it is essential to identify the associations between the attribute values where the attribute...
Executive Summary This assignment is based upon an Art Gallery. Being the system analyst and designer the art gallery is hopeful I demonstrate professionalism and propose a computerized cataloging system which they require. Currently the Art Gallery has 8 exhibition rooms where they display art items from around the word. These items don't only belong to the Art Gallery but by other owners, be it other galleries or private collectors. These items are borrowed to enhance the exhibition rooms w...
SCADA (Supervisory Control and Data Acquisition): SCADA is a collection of equipment that provides monitoring and control of process and parameters of a central site. As a consequence of huge industries and plants an operator has to monitor and control thousands of sensors. As the definition itself says this system supervises and controls real time data gathered remote site. SCADA system is used to monitor and control a plant or equipment in industries. Supervisory control and data acquisitio...
PART1 Q1: Why do we use indexing? Give a suitable example in support of your answer. Ans1: While indexing, we are concerned with finding the data we are actually concerned with frequently and efficiently without having to request and read more disk blocks than absolutely necessary. There are several approaches to do indexing. Ø Indexing mechanism is used to speed up accessing data. Ø An index file consists of records usually referred to as index-entries. Q2: under what circumstances, we will ...
The electronics industry has experienced a number of innovations in the recent past. An implementation of such an innovation is the iPhone. IPhone is a recently developed smart phone by Apple Inc. with zeal to develop a mobile phone with a variety of features. The fact that cell phones are becoming important devices for portable information access and the need to have excellent synchronization has led to such an innovation. Key features that make iPhone unique are its top-notch design; intuit...