Journal of Computer & Information Technology

Papers

Voulume: 8
Issue: 1
Journal Paper Splitter
Article No. 1
Query Optimization by Using Checkpoints with Plan Reduction Algorithm having Hybrid Architecture
SANA SHAFIQUE
Azad Institute of Research & Technology, Idgah Hills, Bhopal-462001 (M.P), India
ATIF AZIZ
Azad Institute of Research & Technology, Idgah Hills, Bhopal-462001 (M.P), India
Abstract :

In any database system query Optimization is an important component. Optimizer designing that takes less time for searching and provides the most optimal query execution plan has been a challenge for DBMS research community in the last decade. The cost of executing a plan depends heavily on selectivity which keeps changing frequently and thusstatic compilation provides an inconsistent performance. Adaptive query optimization is an excellent method of generating optimal plans quite consistently. This paper proposes new hybrid architecture for query optimization which combine features of adaptive query processing and also reduces the search space for re optimization using reduced plan diagrams and cost diagrams. This hybrid architecture is bound to give more efficient performance as compared to any other optimization technique along with increased robustness and a substantial increase in consistency the selection of the most optimal execution plan

Keyword : Query Optimization, Selectivity, Plan Cardinality, Checkpoints, Plan Diagrams
Download Count : 527
View Count : 643
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 2
Critical Analysis of Various Cryptographic Algorithms
1PARIVESH KASTURIA
1NITTTR Bhopal (India
2KAMINI MAHESWAR
2UIT, Barkatullah University, Bhopal (India)
Abstract :

Now a day mostly people are doing their daily routine digitally, because current era is based on information and communication technology. But security is one of the most important and challenging issues in this technological world. As per the literature analysis there is a demand for a encryption which should be strong and efficient. Cryptography is a private secure communication in the public world. Cryptography is a technique of protecting secure information from hacking and cracking by unauthorized individuals and converting it into unintelligible form. It provides authentication, identification to user data, confidentiality and also provides security and privacy to the data stored. It is an emerging technology in the area of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. The main objective of this paper is to study the basic terms used in
cryptography, its purpose and to compare the encryption techniques used in cryptography.

Keyword : Cryptography, Encryption, Decryption, Symmetric key, Asymmetric key
Download Count : 653
View Count : 564
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 3
Software Defined Networks (SDN): Approaches Needed for Up-gradation of SDN’s
DEEPAK KUMAR1
1Department of Computer Science, Himachal Pradesh University, Summer Hill, Shimla (India)
MANU SOOD2
2Department of Computer Science, Himachal Pradesh University, Summer Hill, Shimla (India)
Abstract :

SDN has changed the way of thinking about networks. SDN networks are flexible, scalable and easily manageable. Application that runs on the management plane actually utilize the network efficiency, So application developed should be capable of handling the controllers functionality. Each of the application that runs should be free from viruses, so that it does not affect the controller. Also we need to increase the level of security in all layers of the SDN architecture. SDN is growing faster and faster and it has reached the platform where we can also apply other fields concepts. Now SDN researcher are looking for the overcome the existing drawback. So that it can even support heterogeneous networks in a very smooth and flexible way.

Keyword : SDN, OpenFlow, Resilience, Security
Download Count : 723
View Count : 574
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Ansari Education And Research Society
Facebook Google Plus Twitter
Website developed by
main-banner