Loading...
  • Home
  • Search Results
591-592 of 4327 Papers

IDENTIFYING SOLAR SUITABILITY OF A REGION USING FUZZY LOGIC

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): DHANYA SUNIL , SHIPRA JAIN

Abstract: Identification of solar potential of a region is important so as to reduce the return period of investment and to identify untapped regions like Himalayas, Tibet, Southern Andes etc. which were not considered to be good enough to tap the energy economically. This paper encompasses the use of fuzzy with weighted functions in identifying the same. The proposed method used various environmental constraints like solar irradiance, solar hour, latitude etc. for identifying the potential. For the sake of simplicity we have used only three of the above mentioned parameters but these parameters can be scaled up to any level, as desired by the experts, and also weights assigned to every parameter can be varied as per requirements and application area.

  • Publication Date: 24-Feb-2013
  • DOI: 10.15224/978-981-07-5461-7-14
  • Views: 0
  • Downloads: 0

A COMPARATIVE STUDY ON ORACLE AND IBM-DB2 DATABASES

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): LAVANYA PAMULAPARTY , P.VIJAYA BABU VARMA , T.PRAVEEN KUMAR

Abstract: As storage of data plays a key role in databases, security and maintenance issues becomes major concerns. Relational databases hold a significant portion of data stored in software, therefore today’s database purchase decisions revolve around how secure the product is. This paper provides a categorical head to head feature comparison between Oracle Database (Oracle) and IBM DB2 Universal Database (DB2), in terms of performance, scalability, manageability and consistency features provided in the Secure Way with emerging trends in technology. It explores the impact of IBM’s and Oracle’s transaction security models on users seeking to protect their critical information systems and contrasts IBM’s strategy of building security outside of the DB2 database against Oracle’s strategy of securing information in the database server[6].

  • Publication Date: 24-Feb-2013
  • DOI: 10.15224/978-981-07-5461-7-15
  • Views: 0
  • Downloads: 0