Steps to System Reconfiguration in a Distributed DatabaseSystem: A Fault-tolerant Approach
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: In this paper, we examine steps to system reconfiguration in a Distributed Database using some faulttolerance scheme for a distributed database system that is compatible with respect to system failure i.e. Normaltransaction processing is carried out assuming that no failure will occur, but if failure is suspected at somestage or site then a system reconfiguration is undertaken. The reconfiguration and system transaction areguaranteed as long as there exist a majority of working sites belonging to the same database
Authors and Affiliations
Silas Abasiama Ita , Asagba Prince O , Igiri Chinwe Peace
A Comparative Study between Time Series and Neural Networkfor Exchange Rate Forecasting
Abstract: Exchange rate forecasting has become a new research topic in present time for best market strategy,planning of investment for investor in foreign project and also for business profit. The methods or proce...
Drowsy Driver Detection System: A Novel Approach Using Haar Like Features
There are many instances of road accidents round the world due to driver’s lack of attention in driving. One of the prime reasons can be drowsiness. In this paper, a drowsiness detection system using Haar like fe...
Detection and Prevention of Selfish Attack in MANET using Dynamic Learning
Abstract: In this paper we deal with misbehaving nodes in mobile ad hoc networks (MANETs) that drop packets supposed to be relayed, whose purpose may be either saving their resources or launching a DoS attack. We propose...
Designing the Workflow of a Language Interpretation Device Using Artificial Intelligence
Among all the obstacles there existed and currently existing between mankind from very early age of human civilization to the age of modern globalization, language difference between humans has always been  ...
Comprehensive Review: Intrusion Detection System and Techniques
Abstract: Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there i...