A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ghosh, Saikat
- Proposed formula Based on Study of Correlation between Hub and Spoke Architecture and Bus Architecture in Data Warehouse Architecture, Based on Distinct Parameters
Authors
1 Department of Computer Application, JIS College of Engineering, Block ‘A’, Phase III, Kalyani, Nadia-741235, West Bengal, IN
Source
Research Journal of Science and Technology, Vol 3, No 3 (2011), Pagination: 154-157Abstract
Data warehousing has evolved with every passing decade and it has come a long way from its inception and the modern era has made it an adequate part of pre-existing analytical methodologies. In the present status, data warehousing has evolved into a system which is capable of furnishing key performance metrics to high-level management, ensuring capability of analytical strength to middle-level management and aligning to the ability of providing corrective data to-and-fro back to low-level based on the basis of information derived from the analytical system.
The data warehouse market is currently triggered by business-driven solutions focussing on domain specific challenges and its allied histrionics that have conjured up the very basic nuances of data warehousing. The present business idologies of the global village have cropped up innovative and tougher challenges for the data warehouse designers and architects to ensemble a bigger and much better innovation.
Although, there are numerous methods available in the global market to cope up to this stiff challenges, but the evolutions have not made much of an impact in the global arena and the competitive market has prompted to venture into the unseen horizons over and over again.
Data warehouses are designed to facilitate reporting and analysis. The said characteristic of the data warehouse mainly focuses on the data storage and acts much like a buffer to absorb continuous stock of data which gets processed via numerous iterative steps to evolve into information, awaited by all tiers of an organization for various decision-making processes.
For over a decade, discussions and even controversies have lingered about which of the existing architectures is the best data warehouse architecture. The two "giants" of the data warehousing field, Bill Inmon and Ralph Kimball, are at the heart of disagreement. Inmon advocates the Hub&Spoke architecture (for example, the Corporate Information Factory), while Kimball promotes the data mart Bus architecture with conformed dimensions.
There are other architecture alternatives, but these two options are fundamentally different approaches, and each has strong advocates via implementation.
Keywords
Data Warehouse, Hub and Spoke Architecture, Bus Architecture, Business Intelligence, Federated and Data Mart, Repetition Constant, Propagation Constant.- Study of Cryptology Based on Proposed Concept of Cyclic Cryptography Using Cyclograph
Authors
1 Department of Computer Application, JIS College of Engineering, Block ‘A’, Phase III, Kalyani, Nadia-741235, West Bengal, IN
Source
Research Journal of Engineering and Technology, Vol 2, No 1 (2011), Pagination: 17-20Abstract
Until modern times, Cryptography exclusively referred to encryption, which is coined as the process of converting ordinary information (Plain Text) into unintelligible gibberish (Cipher Text). Decryption has been coined as the reverse process of moving from the unintelligible Cipher Text back to the original Plain Text. A Cipher is an algorithm couplet that creates both the encryption and the decryption pseudo codes. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a Key. This is a secret parameter (known ideally to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purpose.
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.
In colloquial use, the term Code is often used to mean any method of encryption or concealment of meaning. However, in Cryptography, Code has a more specific and significant meaning. Code means the replacement of unit of Plain Text with a Code word. Codes are no longer used in serious cryptography except for such things as unit designations (Bronco Flight or Operation Overlord) as properly chosen ciphers are both practical and secure than even the best codes, along with being better adapted for computers too.
It is a normal practice for most of the individuals to use the terms Cryptography and Cryptology interchangeably, while for others (including US military) Cryptography is termed to refer specifically to the use and practice of cryptographic techniques and Cryptology to refer to the combined study of Cryptography and Cryptanalysis. The study of characteristics of languages which have some application in Cryptography/Cryptology are frequency data, letter combinations, universal patterns, etc., and are stated as Crypto linguistics, in the most formal way.
Earlier forms of secret writing required little more than local pen and paper analogs, as most people could not read. Increased literacy and adequate literate opponents required actual Cryptography. The classical cipher types can be significantly classified into transposition cipher and substitution cipher. Simple versions of either offered little confidentiality from enterprising opponents, and still continues to do so. The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and their allied applications. Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are block cipher designs which have been designated as Cryptography standards by the US government. Many other block ciphers have been designed and released with considerable variation in quality.
One or more Cryptographic primitives are often used to develop a more complex algorithm, called a Cryptosystem, which are designed to provide particular functionality while guaranteeing certain security properties. Cryptosystems use the properties of the underlying Cryptographic primitives to support the system's security properties. In many cases, the Cryptosystem's structure involves back and forth communication among two or more parties in space (Viz., between the sender of a secure message and its intended receiver) or across time. Such Cryptosystems are sometimes referred as Cryptographic Protocols.
Keeping all these nuances and facets under consideration, Cyclic Cryptography ensures a whole new dimension to Cryptology with optimum security measures, privacy maintenance and proper decryption mechanism using generated key text.
The paper establishes via implementation the study of data encryption as well as data decryption, based on the proposed innovative concept of Cyclic Cryptography using the freshly devised Cyclograph, conjured up from the triplet [SF, RF, NF].
The algorithm has been devised keeping in mind all the three factors, namely; Shift Factor (SF), Rotation Factor (RF) and Navigation Factor (NF), thereby ensuring the righteous implementation of the Cyclograph and its allied characteristics.
The Cyclograph consists of a two-tier Dial mechanism, with the Inner Dial comprising of the alphabets A - M and the Outer Dial comprising of the alphabets N - Z, along with the two Navigation Factors [&,@] incorporated and allied with the Outer Dial.
Keywords
Plain Text, Cipher Text, Cyclograph, Inner Dial, Outer Dial, Shift Factor (SF), Rotation Factor (RF) and Navigation Factor (NF).- Implementation of Rain Water Harvesting Through the Effectual Working of Proposed RS Model
Authors
1 Department of Computer Science and Engineering, Abacus Institute of Engineering and Management, Natungram, Magra-712148, West Bengal, MO
2 Department of Computer Application, Sastra University, Tirumalaisamudram, Thanjavur-613401, Tamil Nadu, IN
Source
International Journal of Technology, Vol 4, No 2 (2014), Pagination: 291-295Abstract
Rainwater harvesting is the accumulation and storage of rainwater for reuse, before it reaches the aquifer. It has been used to furnish drinking water, water for livestock, water for irrigation, as well as other typical uses given to water. Rainwater collected from the roofs of houses, tents and local institutions can make an important contribution to the availability of drinking water. It can supplement the sub soil water level and increase urban greenery.
Water collected from the ground, sometimes from areas which are especially prepared for this purpose, is called Storm water harvesting. In some cases, rainwater may be the only available or economical water source. Rainwater harvesting systems can be simple to construct from inexpensive local materials, which are potentially successful in most habitable locations. Roof rainwater can't be of good quality and may require treatment before consumption. As rainwater rushes from roof(s), it may carry pollutants in it, such as the tiniest bit of mercury from coal burning buildings to bird feces. Although some rooftop materials may produce rainwater that is harmful to human health, it can be useful in flushing toilets, washing clothes, watering the garden and washing cars. These uses invariably halve the amount of water used by a typical home. Overflow from rainwater harvesting tank systems can be used to refill aquifers in a process called groundwater recharge, though this is a related process, it must not be confused with Rainwater harvesting.
The proposed RS Model establishes the merits of rain water harvesting and conjures up all the nuances that lead up in furnishing an optimum solution and justifying the motto of the proposed model; "Go Green and Earn Green." There are a number of types of systems to harvest rainwater ranging from very simple to complex industrial systems. The rate at which water can be collected from either system is dependent on the plan area of the system, its efficiency, and the intensity of rainfall
(that is, annual precipitation (mm per annum) x square meter of catchment area = litres per annum yield).
Rainwater harvesting can assure an independent water supply during water restrictions, that is, somewhat dependent on end use and maintenance. Usually, it is of acceptable quality for household needs and renewable at acceptable volumes despite forecast of climate changes (CSIRO, 2003). It produces beneficial externalities by reducing peak storm water runoff and processing costs. In municipalities with combined sewer systems, reducing storm runoff is especially important, because excess runoff during heavy storms leads to the discharge of raw sewage from outfalls, when treatment plant capacity cannot handle the combined flow. Running costs are negligible, and they provide water at the point of consumption.