S.No. |
Title |
Page |
Downloads |
1. |
A Hybrid Reliable Data Transmission based on Ant-agent Resource Allocation Technique in EEMCC Protocol for MANETS
A Hybrid Reliable Data Transmission based on Ant-agent Resource Allocation Technique in EEMCC Protocol for MANETS
Abstract: Real time multicast applications in mobile adhoc network brings forward added advantages in wireless network. The fragile and mobile environment of adhoc network produces the need of bandwidth allocation for real time applications. Reliability is also an important factor in multicasting in mobile adhoc networks (MANETs), as it confirms eventual delivery of all the data to all the group members, without enforcing any particular delivery order in EEMCCP. In the first phase of this paper, we design an "ant agent-resource allocation‟ technique for reserving bandwidth for real-time multicast applications. In the forward phase, the source sends a forward ant agent which collects the bandwidth information of intermediate nodes and reserves a bandwidth for real-time flow for each multicast receiver. In the backward phase, the backward ant confirms the allocation and feeds the bandwidth information to the source. Normal traffic flows can utilize this bandwidth temporarily until the real-time traffic starts. When the real-time traffic flow has to be transmitted, the temporary resource which is utilized by other traffic flows gets dropped and the real-time flow starts In the second phase of this paper, we provide a hybrid reliable data transmission technique for multicasting in MANET. It uses the advantages of both Automatic Retransmission Request (ARQ) and Forward Error Correction (FEC) approaches in a controlled manner to provide a lossless non real time data to the receiver. Our technique has two stages, where in the initial stage we differentiate the data traffic as real time traffic and non-real time traffic. For both type of traffics, data is transmitted using the ARQ technique initially. In the second stage, if the traffic is non-real time, it estimates the total data loss occurred at the receivers for a given time period. If the loss is greater than a threshold value, it transmits data using FEC technique until the loss becomes less than the threshold. In addition to this, the ant agents can be used to detect the QoS change, congestion and route breakage and also controls the reliability in a network.
Reference
[1] Saida Ziane and Abdelhamid Mellouk, "A Swarm Intelligent Multi-path Routing for Multimedia Traffic over Mobile Ad hoc Networks", In proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 55--62., NY, USA: ACM Press, 2005.
[2] Ya-Ju Yu, Ai-Chun Pang, Yan-Chi Fang and Pang-Feng Liu, "Utility-Based Resource Allocation for Layer-Encoded Multimedia Multicasting over Wireless Relay Networks", IEEE Global Communication Confreence, (GLOBECOM), December, 2009
[3] De-Nian Yang and Ming-Syan Chen, "Efficient Resource Allocation for Wireless Multicast", IEEE TRANSACTIONS ON MOBILE COMPUTING, Vol. 7, No. 4, April 2008
[4] A. Sabari and K. Duraiswamy, "Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks", Journal of Computer Science 5(12): 1020-1027, 2009
[5] J. Liu, W. Chen, Z. Cao, Ying Jun Zhang and S. C. Liew, "Utility-based user grouping and bandwidth allocation for wireless multicast systems," IEEE ICC 2009, Dresden, Germany, 2009.
Dr. M. Rajanbabu, N. S. A. Krishnakanth, Sampath Kumar .B, P. Divya Sri |
01-10 |
 |
2. |
The impact of aging and mechanical destruction on the performance of the flat plate solar collector in Tafila city climate in Jordan
The impact of aging and mechanical destruction on the performance of the flat plate solar collector in Tafila city climate in Jordan
Abstract: This paper investigates the effect of aging and mechanical destruction on the performance of the flat plate solar collector. Two identical flat plate solar collectors (FPSC) are tested simultaneously under same working conditions to compare the performance of heat energy absorbed. One solar plate is painted black color and the second one is painted light grey color. The black one represents the new collector after working for short time of period while the second one (light grey collector) represents the collector after years of working. The two FPSC are used to heat water of mass flow rate 0.015 kg/s. The Maximum temperature of water was achieved using the black collector. The temperature of water output from the collectors for black and light grey absorber was 900C and 440C respectively with absorbing 470 W/m2, whereas the output temperature for broken glazing black and light grey painted was achieved 650C and 340C respectively by absorbing 410 W/m2. Average efficiency of FPSC for black and light grey absorber are found 55% and 12% respectively, while for broken glazing black and light grey absorber about 35% and 8% respectively.
Key words: Renewable energy; solar heater; colored absorbers collector.
Reference
[1] Strukmann F.: Analysis of a Flat-plate Solar Collector; Project Report, 2008 MVK160 Heat and Mass Transport, May 08, 2008, Lund, Sweden. [2] Naoa K. M. A., Karim M. R., Mahmood S. L., Akhanda M. A. R.: Effect of colored absorbers on the performance of a built-in-storage type solar water heater. International Journal of Renewable Energy Research, IJRER, vol. 1, no. 4, pp. 232-239, 2011. [3] Tripanagnostopoulos Y., Souliotis M., Nousia Th.: Solar collectors with colored absorbers. Solar Energy 68, pp. 343–356, 2000.
[4] Sakhrieh A., Al-Ghandoor A.: Experimental investigation of the performance of five types of solar collectors. Energy Conversion and Management, Vol. 65, pp. 715–720, 2013.
[5] Kalogirou S., Tripanagnostopoulos Y., Souliotis M.: Performance of solar systems employing collectors with colored absorber. Energy and Buildings, Vol. 37, pp. 824-835, 2005.
Sameh AlSaqoor |
11-17 |
 |
3. |
Web-Based Enterprise Resource Planning System: An Alternative for Small and Medium Size Business Companies
Web-Based Enterprise Resource Planning System: An Alternative for Small and Medium Size Business Companies
Abstract: Implementing an enterprise system is ―corporate equivalent of a root canal,‖ a meaningful analogy given that an ES with its single database replaces special-purpose legacy systems that once operated in isolation. An Enterprise Resource Planning System has the herculean task of supporting and integrating a full range of business processes, uniting functional islands and making their data visible across the organization in real time. Not surprisingly, the software that vendors such as People-Soft, SAP, and Oracle provide is unwieldy, expensive, hard to implement and creates organizational change that can be as painful as, well. If organizations can endure the implementation cost and pain, they are rewarded with large increases in both efficiency and effectiveness. When organizations build their information systems in house, they design the systems to fit functional requirements, often with a different system for each function. With this mind-set, systems proliferate at an alarming rate. An integrated system built on one database eliminates these problems. With a single unified database, everyone can instantly see data entered anywhere in the system, and no one has to enter the same data again—a common inefficiency of isolated systems. With fewer processing delays and increased data quality, organizations can more easily plan their operations, and managers can uncover, analyze, and address problems as they arise.
Key words: Enterprise Resource Planning, Integrated System, Cost Effective, Small and Medium Sized Business
Reference
[1] Prof. Balasaheb Ningappa Bhamangol, Dr. Vilas Dattu Nandavadekar, Prof. Sunil Hanmant Khilari, "Enterprise Resource Planning system in Higher Education: A Literature Review", International Journal of Management Research and Development (IJMRD), ISSN 2248 – 938X(Print) ISSN 2248–9398(Online),Volume 1, Number 1, January - April (2011).
[2] Bret Wagner, Stefan Wiedner, Stephen Tracy, ―Introduction to SAP ERP‖, SAP University Alliances, 2009.
[3] Elisabeth Umble, Ronald R. Haft, Micheal Umble, ―Enterprise resource planning: Implementation procedures and critical success factors‖, European Journal of Operational Research, 2011.
[4] Moutaz Haddara, Ondrej Zach ― ERP System in SMEs: An Extended Literature Review‖, International Journal of Information Science, 2012.
[5] Syed M. Ahmed, Irtishad Ahmad, Salman Azhar, ―Implentation of Enterprise Resource Planning (ERP) Systems in the Construction industry‖, 2012
Shivprasad Ashok Mohite, Vikas Kumar Lodha, Shantanu Mahajan, Mohit A. Singh, Prof. Amit Ghumare |
18-23 |
 |
4. |
Earthquake Performance Analysis of Steel Truss-Concrete Continuous Rigid Frame Bridge
Earthquake Performance Analysis of Steel Truss-Concrete Continuous Rigid Frame Bridge
Abstract: The steel truss-concrete Combination continuous rigid frame bridge is that we use steel truss for Principal stress structure.The seismic performance of a steel truss-concrete Combination continuous rigid frame bridge was studied in this paper. A dynamic spatial finite element model of Qingqiyong Bridge, which is a long span bridge, was created using MIDAS. Its natural frequency and vibration mode can be calculated,the seismic performance and structure stiffness were discussed and analyzed on the basis of calculated results. Design response spectrum and time-history method are used to calculate this bridge, seismic performance is discussed in this paper . Results show that natural frequency of the bridge is small, its period is long, and this kind of bridge is a new kind of earthquake resistant and energy-saving structure. Seismic effect has some effect on the bridge, especially the bending moment Along the bridge. The results of this paper can also provide some references for the design, construction, health monitoring and maintenance of bridges of like.
Key words: Qingqiyong Bridge; natural frequency; seismic analysis;earthquake;vibration mode
Reference
[1] General Code for Design of Highway Bridges and Culverts. (2004). Beijing: Ministry of communications of the People's Republic of China.
[2] Cui W L, Liu J, Vehicles Analysis of
Wanzhou Yangze Bridge. [J] . Journal of HUST,2004,(3)1-4.
[3] Wang Y, Li T, Dong R G, Property Analysis of steel truss-concrete Combination structure. [J] . Journal of Architecture Technology,2013, 33(4)216-218.
[4] Fan L C, Anti-seismic Design of Bridge [M].Shanghai:Tongji University Press,1997.
[5] Mabsout, M. E., Tarhini, K., Frederick, G. R., & Tayar, C. (1997). Finite-element analysis of steel girder highway bridges. Bridge Eng., 2(3), 83-87. http://dx.doi.org/10.1061/(ASCE)1084-0702(1997)2:3(83)
Li Yuanming,Zhou Zhixiang |
24-30 |
 |
5. |
Energy–Efficient Sleep Scheduling For Critical Event Monitoring To Improve Performanceof Wireless Sensor Network
Energy–Efficient Sleep Scheduling For Critical Event Monitoring To Improve Performanceof Wireless Sensor Network
Abstract: A sensor networked applications can be formed for critical applications where it could send the detected information to the user or to the other sink node. This message is often called as alarm message where it is indicating the current operational state of the system. An alarm needs to be broadcast to the other nodes as soon as possible,when a critical event (e.g., gas leak or fire) occurs in the monitoring area and is detected by a sensor node, then, sensor nodes can inform users nearby to take some response to the event. The life of sensor nodes for event monitoring are expected to work for a long time without recharging their batteries, sleep scheduling method is always preferred during the monitoring process. Sleep scheduling could cause transmission delay because sender nodes should wait until receiver nodes are active and ready to receive the message. The delay could be important as the network scale increases. Hence, a delay-efficient sleep scheduling method needs to be designed to ensure low broadcasting delay from any node in the WSN.Only a small number of packets need to be transmitted during most of the time in the critical event monitoring,. When a critical event is detected, the alarm packet should broadcast to the entire network as soon as possible. Hence, broadcasting delay is an important issue for the application of the critical event monitoring. It is needed to minimize the time wasted for waiting during the broadcasting to minimize the broadcasting delay. The ideal scenario is the destination nodes wake up immediately when the source nodes obtain the broadcasting packets. Hence, the broadcasting delay is definitely reduced. The objective of the project is to reduce the delay of the packet transmitted from the source to destination by a scheduling mechanism. This method is also increasing the lifetime of a node in the network.
Index Terms—: Broadcasting Delay, Critical event monitoring, Lifetime of nodes, sleep scheduling, Wireless Sensor Network (WSN),
Reference
[1] Wei Ye, John Heidemann, Deborah Estrin, ―An energy efficient MAC protocol for wireless sensor network,‖ IEEE INFOCOM, pp. 1567-1576,2002
[2] Gang Lu, NrayananSadagopan, BhaskarKrishnamachari, AshishGoel, ― Delay efficient sleep scheduling in wireless sensor networks‖ IEEEpp.2470-2481, Mar.2005
[3] J.Heidemann, Y .D. ―An energy efficient MAC protocol for wireless sensor networks‖ INFOCOMM.2005
[4] K. Langendoen, ―energy efficient MAC:An adaptive energy efficient MAC protocol for wireless sensor networks.‖ ACM SENSYS.2004
[5] J.Polstre, J. D. ―Versatile low power media access for wireless sensor networks.‖ ACM SENSYS 2004
Yogesh Y. Shinde, Dr. Santosh S. Sonavane |
31-36 |
 |
6. |
Efficient Hybrid Method for Binary Floating Point Multiplication
Efficient Hybrid Method for Binary Floating Point Multiplication
Abstract: This paper presents a high speed binary floating point multiplier based on Hybrid Method. To improve speed
multiplication of mantissa is done using Hybrid method replacing existing multipliers like Carry Save
Multiplier, Dadda Multiplier and Modified Booth Multiplier. Hybrid method is a combination of Dadda
Multiplier and Modified Radix-8 Booth Multiplier. The design achieves high speed with maximum frequency of
555 MHz compared to existing floating point multipliers. The multiplier implemented in Verilog HDL and
analyzed in Quartus II 10.0 version. Hybrid Multiplier is compared with existing multipliers.
Key words: Hybrid method, Dadda Multiplier, Booth Multiplier, Floating point multiplication, Verilog HDL;
Reference
[1] IEEE 754-2008, IEEE Standard for Floating-Point Arithmetic, 2008. [2] Jeevan. B, Narender. S, Reddy. C. V. K & Sivani K. "A high speed binary floating point multiplier using Dadda algorithm" IEEE Conference on computing, 2013 IEEE. [3] Mohamed Al-Ashrfy, Ashraf Salem and Wagdy Anis "An Efficient implementation of Floating Point Multiplier" IEEE Transaction on VLSI, 2011 IEEE, Mentor Graphics. [4] Deepali Chandel, Gagan Kumawat, Pranay Lahoty, Vidhi Vart Chandrodaya, Shailendra Sharma, "Modified Booth Multiplier: Ease of multiplication", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, March 2013. [5] Whytney J. Townsend, Earl E. Swartz, "A Comparison of Dadda and Wallace multiplier delays". Computer science Engineering Research Center, The University of Texas.
S. Praveenkumar Reddy, S. Parvathi Nair |
37-42 |
 |
7. |
Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2
Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2
Abstract: One of the fundamental services provided by a Wireless Sensor Network (WSN) is the monitoring of a specified Region of Interest (RoI). Considering the fact that emergence of holes in the RoI is unavoidable due to the inner nature of WSNs that includes random deployment, environmental factors, and external attacks. Assuring that the RoI is completely and continuously covered is very important. This paper seeks to address the problem of these holes in the RoI and healing them. We identify four key elements that are critical for ensuring effective coverage in mobile WSNs: (i) determining the boundary of the RoI, (ii) detecting coverage holes, (iii) determining the best target locations to relocate mobile nodes to repair holes, and (iv) dispatches mobile nodes to the target locations while minimizing the moving cost. We propose a lightweight and comprehensive solution, called Modified Hole Detection, which addresses all of the aforementioned aspects. MHD is an evenly distributed and localized algorithm that operates to (i) identify the boundary nodes and discovers holes within the RoI and (ii) identify the holes with respect to the RoI boundaries. Finally a distributed virtual forces-based local healing approach where only the nodes located at an appropriate distance from the hole will be involved in the healing process.
Reference
[1] Mustapha Reda SENOUCI, Abdelhamid MELLOUK, Senior Member, IEEE and Khalid ASSNOUNE, Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing, in Mobile Computer Science from USTHB in 2009 [2] Ahmed, N., Kanhere, S. S., Jha, S. The holes problem in wireless sensor networks: a survey. SIGMOBILE Mob.Comput. Commun. Rev 2005; 9(2), pp. 4-18. [3] Wang, B. Coverage Control in Sensor Networks. Springer, NY, 2010.
[4] Guiling Wang, Guohong Cao, and Tom La Porta, The Pennsylvania State universityMovement-Assisted Sensor Deployment, Department of computer Science & Engineering, 2004 [5] Kun, B., Kun T., Naijie G., Wan L. D. and Xiaohu L. Topological Hole Detection in Sensor Networks with Cooperative Neighbors. ICSNC'06, Los Alamitos, CA, USA, 2006, pp. 31.
Vaishnavi Sukumaran, T.P. Saravanabava |
43-50 |
 |
8. |
Stress Analysis of Rectangular Boxes Using Fem
Stress Analysis of Rectangular Boxes Using Fem
Abstract: Extensive experimental & theoretical contributions have been made to the study of open box structures, but few references dealing with closed boxes have been found. When a rectangular box structure is subjected to certain pressure, stress analysis of rectangular box is necessary to avoid the failure during working condition. In this work, it is proposed to evaluate the stresses in rectangular box by changing L/B ratios 1, 1.5, 2 for different thicknes of 2.5, 5, 7.5 mm & varying fillet radius, using finite element method.To validate finite element stresses, it is necessary to compare these stresses with analytical approach. From the FE analysis of rectangular box, it is seen that cubical box having the lesser stresses & better for stress distribution due to symmetry.The stiffners further reduces the stresses in boxes.
Reference
[1] Durellia J Pavlin, Buhler-Vidal "Elastostatics of a Cubic Boxes Subjected to pressure" [2] H.D Conway, "Stresses in a pressurized box", Journal of the structural division proceedings of the A.S.C.E. [3] Durellia J Pavlin, Buhler-Vidal, "Elastostatics of Cubic ….Boxes Subjected to Concentrated Loads" O.N.R. reports no 37, School of Architecture Strain, vol 13, No1, jan.1977, p7. [4] Mohamad A Rezvani, Hassan H Ziada, "Structural Design analysis & code evaluation of an odd-shaped…pressure vessel" [5] Mohamad A Rezvani, Hassan H Ziada, ……….."Stress Analysis & Evaluation of a ………..Rectangular Pressure Vessel"
D.G. Lokhande, Dr. D. V. Bhope |
51-59 |
 |
9. |
Duty-Cycle-Aware Minimum Energy Multicasting of Passive RFID Wake-up Radios for Wireless Sensor Networks
Duty-Cycle-Aware Minimum Energy Multicasting of Passive RFID Wake-up Radios for Wireless Sensor Networks
Abstract: In duty-cycled wireless sensor networks, the nodes switch between active and dormant states, and each node determine its active/dormant schedule independently. This complicates the Minimum Energy Multicasting (MEM) problem in wireless sensor networks both for one-to-many multicasting and for all-to-all multicasting. In the case of one-to-many multicasting, we present a formalization of the Minimum-Energy Multicasting Tree Construction and Scheduling (MEMTCS) problem. We prove that MEMTCS problem is NP-hard and propose a polynomial-time approximation algorithm for the MEMTCS problem. In the case of all-to-all multicasting, we prove that the Minimum-Energy Multicast Backbone Construction and Scheduling (MEMBCS) problem is also NP-hard and present an approximation algorithm for it. Compared to duty cycling, wake-up radios save more energy by reducing unnecessary wake-ups and collisions. In this paper, we investigate the feasibility and potential benefits of using passive RFID as a wake-up radio. We first introduce a physical implementation of sensor nodes with passive RFID wake-up radios and measure their energy cost and wake-up probability. Then, we compare the performance of our RFID wake-up sensor nodes with duty cycling in a Data MULE scenario through simulations with realistic application parameters. Finally, we perform extensive simulations, and the results show that using a passive RFID wake-up radio offers significant energy efficiency benefits at the expense of delay and the additional low-cost RFID hardware, making RFID wake-up radios beneficial for many delay-tolerant sensor network applications.
Index Terms: Approximation algorithm, duty-cycle-aware,
Minimum-energy, multicasting, wireless sensor networks (WSNs), wake-up receiver, passive RFID wake-up, data MULE.
Reference
[1] G. Anastasi, M. Conti, M. D. Francesco, and A. Passarella, "Energy conservation in wireless sensor networks: A survey," Ad Hoc Netw., vol. 7, no. 3, pp. 537–568, 2009. [2] Y. Gu and T. He, "Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links," in Proc. ACM SenSys, 2007, pp. 321–334. [3] J. Hong, J. Cao, W. Li, S. Lu, and D. Chen, "Minimum-transmission broadcast in uncoordinated duty-cycled wireless ad hoc networks," IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 307–318, Jan. 2010. [4] S. Guo, Y. Gu, B. Jiang, and T. He, "Opportunistic flooding in lowduty- cycle wireless sensor networks with unreliable links," in Proc. ACM MobiCom, 2009, pp. 133–144. [5] L. Su, B. Ding, Y. Yang, T. F. Abdelzaher, G. Cao, and J. C. Hou, "oCast: Optimal multicast routing protocol for wireless sensor networks," in Proc. IEEE ICNP, 2009, pp. 151–160.
M. Pavan Kumar Reddy, Mrs. S. Kolangiammal |
60-69 |
 |
10. |
Pass transistor Based Negative Edge Trigged D Flip Flop
(PTDFF)
Pass transistor Based Negative Edge Trigged D Flip Flop
(PTDFF)
Abstract: In this paper a new technique is proposed based on the comparison between Conventional Transistorized Flipflopand
Data transition Look ahead D flip flop here we are checking the working of DLDFF and the
conventional D Flip-flop after that we are analyzing the characteristic comparison using power & area
constraints after that we are proposing a Negative Edge triggered flip-flop named as Passtransistor based
negative edge trigged D Flip Flop(PTDFF) with reduced number of transistors which will reduce the overall
power area as well as delay. The simulations are done using Microwind& DSCH analysis software tools and the
result between all those types are listed below. Our proposed system simulations are done under 50nm
technology and the results are tabulated below. In that our proposed system is showing better output than the
other flip-flops compared here.
Reference
[1] M. Nogawa and Y.Ohtomo, "A Data-Transition Look-Ahead DFF circuit for Statistical Reduction in power consumption," IEEE J. Solid State Circuits, Vol. 33, pp.702–706, May, 1998.
[2] H. Jacobson, P. Bose, Z. Hu, A. Buyuktosunoglu, V. Zyuban, R. Eickemeyer, L. Eisen, J. Griswell, D. Logan, B. Sinharoy, and J. Tendler, "Stretching the limits of clock-gating efficiency in server lass processors," in Proc. Int. Symp. High-Perform Compute. Archit., pp. 238–242, Feb. 2005.
[3] M.R.Stan, A.F.Tenca , and M.D. Ercegovac , "Long and fast up/down Counter ," IEEE Trans Comput., vol.47, no.7, pp.722–735, Jul.1998
S. P. Nagamani Bai, P. Padmavathi, P. Surendra Babu |
70-73 |
 |
11. |
Relevant Technologies of Cloud Computing System
Relevant Technologies of Cloud Computing System
Abstract: Information is created through several sources like service procedures, purchases, social networking websites, web servers, and so on as well as continues to be in structured as well as unstructured kind. Today's organisation applications are having venture attributes like large range, data-intensive, web-oriented and also accessed from varied gadgets including smart phones. Processing or evaluating the significant quantity of information or removing meaningful details is a challenging job. The term "Big data" is used for big information collections whose dimension is past the capacity of frequently used software application devices to capture, handle, as well as process the data within a tolerable elapsed time. Big data sizes are a regularly moving target currently varying from a couple of loads terabytes to several peta bytes of information in a solitary data collection. Difficulties include capture, storage space, search, sharing, analytics and imagining.
Reference
[1]. A. Machanavajjhala as well as J.P. Reiter, "Large Privacy: Safeguarding Privacy in Big Data," ACM Crossroads, vol. 19, no. 1, pp. 20-23, 2012.
[2]. S. Banerjee and also N. Agarwal, "Studying Collective Behavior from Blogs Utilizing Throng Knowledge," Expertise and Info Systems, vol. 33, no. 3, pp. 523-547, Dec. 2012.
[3]. E. Birney, "The Making from ENCODE: Lessons for Big-Data Projects," Nature, vol. 489, pp. 49-51, 2012.
[4]. J. Bollen, H. Mao, as well as X. Zeng, "Twitter Mood Predicts the Securities Market," J. Computational Scientific research, vol. 2, no. 1, pp. 1-8, 2011.
[5]. S. Borgatti, A. Mehra, D. Brass, and also G. Labianca, "Network Analysis in the Social Sciences," Science, vol. 323, pp. 892-895, 2009.
Cloud computing, data mining, big data |
74-78 |
 |