Transaction processing means dividing information processing up into individual, indivisible operations, called transactions, that complete or fail as a whole; a transaction can't remain in an intermediate, incomplete, state (so other processes can't access the transaction's data until either the transaction has
In DBMS (DataBase Management System), the relation algebra is important term to further understand the queries in SQL (Structured Query Language) database system. In it just give up the overview of operators in DBMS two of one method relational algebra used and another name is relational calculus.
This slide contain the description about the various technique related to parallel Processing(vector Processing and array processor), Arithmetic pipeline, Instruction Pipeline, SIMD processor, Attached array processor
In DBMS (DataBase Management System), the relation algebra is important term to further understand the queries in SQL (Structured Query Language) database system. In it just give up the overview of operators in DBMS two of one method relational algebra used and another name is relational calculus.
This slide contain the description about the various technique related to parallel Processing(vector Processing and array processor), Arithmetic pipeline, Instruction Pipeline, SIMD processor, Attached array processor
In this presentation, I am explaining about Threads, types of threads, its advantages and disadvantages, difference between Process and Threads, multithreading and its type.
"Like the ppt if you liked the ppt"
LinkedIn - https://in.linkedin.com/in/prakharmaurya
Procedures in pl/sql,CREATE PROCEDURE Syntax, Compiling and Showing Errors, Parameters, Defining the IN, OUT, and IN OUT Parameter Modes, Parameter Constraint Restrictions, Example – Procedure with No Parameters,Example – Passing IN and OUT Parameters, Dropping a Procedure
Transaction management and concurrency is an action or series of actions. It is performed by a single user to perform operations for accessing the contents of the database.
In this presentation, I am explaining about Threads, types of threads, its advantages and disadvantages, difference between Process and Threads, multithreading and its type.
"Like the ppt if you liked the ppt"
LinkedIn - https://in.linkedin.com/in/prakharmaurya
Procedures in pl/sql,CREATE PROCEDURE Syntax, Compiling and Showing Errors, Parameters, Defining the IN, OUT, and IN OUT Parameter Modes, Parameter Constraint Restrictions, Example – Procedure with No Parameters,Example – Passing IN and OUT Parameters, Dropping a Procedure
Transaction management and concurrency is an action or series of actions. It is performed by a single user to perform operations for accessing the contents of the database.
Concurrency Control Techniques: Concurrency Control, Locking Techniques for Concurrency
Control, Time Stamping Protocols for Concurrency Control, Validation Based Protocol, Multiple
Granularity, Multi Version Schemes, Recovery with Concurrent Transaction,
Transaction Processing; Concurrency control; ACID properties; Schedule and Discoverability; Serialization; Concurrency control and Recovery; Two Phase locking; Deadlock Shadow Paging
Our CPM guide includes everything you need to get started in the Critical Path Method - with step-by-step examples, solutions, as well as schedules to help get your next project done faster and easier. The Critical Path Method (CPM) is a simple but powerful technique for analyzing, planning, and scheduling large, complex projects. It is used to determine a project’s critical path—the longest sequence of tasks that must be finished for the entire project to be complete.
CPM, also known as Critical Path Analysis (CPA), identifies dependencies between tasks, and shows which tasks are critical to a project. The Critical Path Method (CPM) is one of the most important concepts in project management, and certainly among the most enduring. But what is the Critical Path Method, exactly? This beginner-friendly guide will help you understand the Critical Path Method and apply it in your projects.
Early iterations of the Critical Path Method can be traced all the way back to the Manhattan Project in the early 1940s. Given the ambition, scale, and importance of this world-altering project, scientists - and the managers behind them - developed a number of techniques to make sure that the project delivered results on time. For a project management technique, the Critical Path Method has quite an illustrious history. One of these techniques was to map out the most important tasks in any project and use that to estimate the project completion date.
The Critical Path Method in project management is a cornerstone of project planning even to this day. How long a project takes often depends on the most important tasks that constitute it.
Effort estimation is a process in which project managers evaluate how much time and money they need for completing a project. This technique is common in software development, where technology professionals define the resources and schedule for developing a new application or releasing an update. These forecasts help create accurate estimates that often require approval before work on a project begins. Effort estimation is a common tool as part of the Agile methodology, which is a framework that divides a project into smaller phases. In this framework, you can estimate the effort for several components of development, including:
Epics: Epics are large projects that several teams manage throughout development. These usually contain several smaller releases and tasks.
Features: A feature is a piece of functionality or design that addresses a user's need. A feature often includes specific acceptance criteria that detail how that part of the product works.
Sprints: A sprint is a short period containing a fraction of work. Often, a few team members complete development tasks in sprints that build toward epics and releases.
Releases: Releases are software packages development teams can deploy. These often contain several epics and features that teams deploy in iterations.
Development teams might estimate the effort for each of these components of the Agile framework or select components depending on the needs of the project.
A software process model is an abstraction of the software development process. The models specify the stages and order of a process. So, think of this as a representation of the order of activities of the process and the sequence in which they are performed. A model will define the following:
1. The tasks to be performed
2. The input and output of each task
3. The pre and post-conditions for each task
4. The flow and sequence of each task
The goal of a software process model is to provide guidance for controlling and coordinating the tasks to achieve the end product and objectives as effectively as possible.
Managing projects and entire programmes is an important part of OSCE activities in the field and by its Institutions and Secretariat. Good programme and project management requires effective planning, proper implementation, monitoring, and evaluation. The Conflict Prevention Centre defines and implements the Organization’s management methodology and tools, and builds the capacity of staff in this area via specialized coaching and training.
Organize your projects with project plans to keep things on track—before you even start. A project plan houses all the necessary details of your project, such as goals, tasks, scope, deadlines, and deliverables. This shows stakeholders a clear roadmap of your project, ensures you have the resources for it, and holds everyone accountable from the start. In this article, we teach you the seven steps to create your own project plan.
What is project? Software Project Vs. Other Types. Activities by
Software Project Mgt. Plans, Methods and Methodologies. Problems with Software Projects.
The HyperText Markup Language or HTML is the standard markup language for documents designed to be displayed in a web browser. It defines the content and structure of web content. It is often assisted by technologies such as Cascading Style Sheets and scripting languages such as JavaScript.
nodemon is a tool that helps develop Node. js based applications by automatically restarting the node application when file changes in the directory are detected. nodemon does not require any additional changes to your code or method of development. nodemon is a replacement wrapper for node.
Node handles these tasks by running asynchronously, which means that reading user input from a terminal isn't as simple as calling a getInput() function.
The Node.js file system module allows you to work with the file system on your computer. To include the File System module, use the require() method: var fs = require('fs'); Common use for the File System module: Read files.
A web server is software and hardware that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. The main job of a web server is to display website content through storing, processing and delivering webpages to users. Besides HTTP, web servers also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol), used for email, file transfer and storage.
Web server hardware is connected to the internet and allows data to be exchanged with other connected devices, while web server software controls how a user accesses hosted files. The web server process is an example of the client/server model. All computers that host websites must have web server software.
Web servers are used in web hosting, or the hosting of data for websites and web-based applications -- or web applications.
How do web servers work?
Web server software is accessed through the domain names of websites and ensures the delivery of the site's content to the requesting user. The software side is also comprised of several components, with at least an HTTP server. The HTTP server is able to understand HTTP and URLs. As hardware, a web server is a computer that stores web server software and other files related to a website, such as HTML documents, images and JavaScript files.
When a web browser, like Google Chrome or Firefox, needs a file that's hosted on a web server, the browser will request the file by HTTP. When the request is received by the web server, the HTTP server will accept the request, find the content and send it back to the browser through HTTP.
More specifically, when a browser requests a page from a web server, the process will follow a series of steps. First, a person will specify a URL in a web browser's address bar. The web browser will then obtain the IP address of the domain name -- either translating the URL through DNS (Domain Name System) or by searching in its cache. This will bring the browser to a web server. The browser will then request the specific file from the web server by an HTTP request. The web server will respond, sending the browser the requested page, again, through HTTP. If the requested page does not exist or if something goes wrong, the web server will respond with an error message. The browser will then be able to display the webpage.
Multiple domains also can be hosted on one web server.
Examples of web server uses
Web servers often come as part of a larger package of internet- and intranet-related programs that are used for:
sending and receiving emails;
downloading requests for File Transfer Protocol (FTP) files; and
building and publishing webpages.
Many basic web servers will also support server-side scripting, which is used to employ scripts on a web server that can customize the response to the client. Server-side scripting runs on the server machine and typically has a broad feature set, which includes database access. The server-side scripting
What is as web server?
A web server is a computer that runs websites. It's a computer program that distributes web pages as they are requisitioned. The basic objective of the web server is to store, process and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP).
How do web servers work?
Web server software is accessed through the domain names of websites and ensures the delivery of the site's content to the requesting user. The software side is also comprised of several components, with at least an HTTP server. The HTTP server is able to understand HTTP and URLs. As hardware, a web server is a computer that stores web server software and other files related to a website, such as HTML documents, images and JavaScript files.
When a web browser, like Google Chrome or Firefox, needs a file that's hosted on a web server, the browser will request the file by HTTP. When the request is received by the web server, the HTTP server will accept the request, find the content and send it back to the browser through HTTP.
More specifically, when a browser requests a page from a web server, the process will follow a series of steps. First, a person will specify a URL in a web browser's address bar. The web browser will then obtain the IP address of the domain name -- either translating the URL through DNS (Domain Name System) or by searching in its cache. This will bring the browser to a web server. The browser will then request the specific file from the web server by an HTTP request. The web server will respond, sending the browser the requested page, again, through HTTP. If the requested page does not exist or if something goes wrong, the web server will respond with an error message. The browser will then be able to display the webpage.
Multiple domains also can be hosted on one web server.
Examples of web server uses
Web servers often come as part of a larger package of internet- and intranet-related programs that are used for:
sending and receiving emails;
downloading requests for File Transfer Protocol (FTP) files; and
building and publishing webpages.
Many basic web servers will also support server-side scripting, which is used to employ scripts on a web server that can customize the response to the client. Server-side scripting runs on the server machine and typically has a broad feature set, which includes database access. The server-side scripting process will also use Active Server Pages (ASP), Hypertext Preprocessor (PHP) and other scripting languages. This process also allows HTML documents to be created dynamically.
Number System is a method of representing Numbers on the Number Line with the help of a set of Symbols and rules. These symbols range from 0-9 and are termed as digits. Number System is used to perform mathematical computations ranging from great scientific calculations to calculations like counting the number of Toys for a Kid or Number chocolates remaining in the box. Number Systems comprise of multiple types based on the base value for its digits.
What is the Number Line?
A Number line is a representation of Numbers with a fixed interval in between on a straight line. A Number line contains all the types of numbers like natural numbers, rationals, Integers, etc. Numbers on the number line increase while moving Left to Right and decrease while moving from right to left. Ends of a number line are not defined i.e., numbers on a number line range from infinity on the left side of the zero to infinity on the right side of the zero.
Positive Numbers: Numbers that are represented on the right side of the zero are termed as Positive Numbers. The value of these numbers increases on moving towards the right. Positive numbers are used for Addition between numbers. Example: 1, 2, 3, 4, …
Negative Numbers: Numbers that are represented on the left side of the zero are termed as Negative Numbers. The value of these numbers decreases on moving towards the left. Negative numbers are used for Subtraction between numbers. Example: -1, -2, -3, -4, …
Number and Its Types
A number is a value created by the combination of digits with the help of certain rules. These numbers are used to represent arithmetical quantities. A digit is a symbol from a set 10 symbols ranging from 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. Any combination of digits represents a Number. The size of a Number depends on the count of digits that are used for its creation.
For Example: 123, 124, 0.345, -16, 73, 9, etc.
Types of Numbers
Numbers are of various types depending upon the patterns of digits that are used for their creation. Various symbols and rules are also applied on Numbers which classifies them into a variety of different types:
Number and Its Types
1. Natural Numbers: Natural Numbers are the most basic type of Numbers that range from 1 to infinity. These numbers are also called Positive Numbers or Counting Numbers. Natural Numbers are represented by the symbol N.
Example: 1, 2, 3, 4, 5, 6, 7, and so on.
2. Whole Numbers: Whole Numbers are basically the Natural Numbers, but they also include ‘zero’. Whole numbers are represented by the symbol W.
Example: 0, 1, 2, 3, 4, and so on.
3. Integers: Integers are the collection of Whole Numbers plus the negative values of the Natural Numbers. Integers do not include fraction numbers i.e. they can’t be written in a/b form. The range of Integers is from the Infinity at the Negative end and Infinity at the Positive end, including zero. Integers are represented by the symbol Z.
Example: ...,-4, -3, -2, -1, 0, 1, 2, 3, 4,...
Programming Language
As we know, to communicate with a person, we need a specific language, similarly to communicate with computers, programmers also need a language is called Programming language.
Before learning the programming language, let's understand what is language?
What is Language?
Language is a mode of communication that is used to share ideas, opinions with each other. For example, if we want to teach someone, we need a language that is understandable by both communicators.
What is a Programming Language?
A programming language is a computer language that is used by programmers (developers) to communicate with computers. It is a set of instructions written in any specific language ( C, C++, Java, Python) to perform a specific task.
A programming language is mainly used to develop desktop applications, websites, and mobile applications.
Types of programming language
1. Low-level programming language
Low-level language is machine-dependent (0s and 1s) programming language. The processor runs low- level programs directly without the need of a compiler or interpreter, so the programs written in low-level language can be run very fast.
Low-level language is further divided into two parts -
i. Machine Language
Machine language is a type of low-level programming language. It is also called as machine code or object code. Machine language is easier to read because it is normally displayed in binary or hexadecimal form (base 16) form. It does not require a translator to convert the programs because computers directly understand the machine language programs.
The advantage of machine language is that it helps the programmer to execute the programs faster than the high-level programming language.
ii. Assembly Language
Assembly language (ASM) is also a type of low-level programming language that is designed for specific processors. It represents the set of instructions in a symbolic and human-understandable form. It uses an assembler to convert the assembly language to machine language.
information system, an integrated set of components for collecting, storing, and processing data and for providing information, knowledge, and digital products. Business firms and other organizations rely on information systems to carry out and manage their operations, interact with their customers and suppliers, and compete in the marketplace. Information systems are used to run inter-organizational supply chains and electronic markets. For instance, corporations use information systems to process financial accounts, manage their human resources, and to reach their potential customers with online promotions. Many major companies are built entirely around information systems. These include eBay, a large auction marketplace; Amazon, an expanding electronic mall and provider of cloud computing services; Alibaba, a business-to-business e-marketplace; and Google, a search engine company that derives most of its revenue from keyword advertising on Internet searches. Governments deploy information systems to provide services cost-effectively to citizens. Digital goods—such as electronic books, video products, and software—and online services, such as gaming and social networking, are delivered with information systems. Individuals rely on information systems, generally Internet-based, for conducting much of their personal lives: for socializing, study, shopping, banking, and entertainment.
As major new technologies for recording and processing information were invented over the millennia, new capabilities appeared, and people became empowered. The invention of the printing press by Johannes Gutenberg in the mid-15th century and the invention of a mechanical calculator by Blaise Pascal in the 17th century are but two examples. These inventions led to a profound revolution in the ability to record, process, disseminate, and reach for information and knowledge. This led, in turn, to even deeper changes in individual lives, business organization, and human governance.
The first large-scale mechanical information system was Herman Hollerith’s census tabulator. Invented in time to process the 1890 U.S. census, Hollerith’s machine represented a major step in automation, as well as an inspiration to develop computerized information systems.
One of the first computers used for such information processing was the UNIVAC I, installed at the U.S. Bureau of the Census in 1951 for administrative use and at General Electric in 1954 for commercial use. Beginning in the late 1970s, personal computers brought some of the advantages of information systems to small businesses and to individuals. Early in the same decade, the Internet began its expansion as a global network of networks. In 1991 the World Wide Web, invented by Tim Berners-Lee as a means to access the interlinked information stored in the globally dispersed computers connected by the Internet, began operation and became the principal service delivered on the network. The global penetration of the...
Applications of Computer Science in Pharmacy
Computer is mandatory in this advanced era and pharmacy and related subjects are not exception to it. This review mainly focuses on the various applications, software’s and use of computers in pharmacy. Computer science and technology is deeply utilized in pharmacy field everywhere like in pharmacy colleges, pharmaceutical industries, research centers, hospital pharmacy and many more. Computer significantly reduces the time, expenditure, and manpower required for any kind of work. Development of various softwares makes it trouble-free to handle huge data. In short, computers are playing critical role in pharmacy field, without computers pharmacy research will be long-lasting andexpensive.
Pharmacy field plays a crucial role in patient health care. It is a huge field which is present worldwide. To run pharmacy field professionally and efficiently, it requires huge management and manpower. But nowadays use of computers in pharmacy field reduced the manpower and time. Computers are almost related to every corner of pharmacy field. These are utilized in the drug design technique, retail pharmacy shop, clinical research centers, crude drug identification,drug storage and business management, hospital and clinical pharmacy, in pharmacy colleges for computer-assisted learning.
The Internet is a huge collection of data. It is available with just one click. Various search engines like Google, Yahoo, Rediff, and Bing help in searching online data related to the pharmacy field just one has to enter his or her area of interest in the search engine.
In the Pharmacy field, effective use of computers started in 1980. Since then there is a great demand for computers in the pharmacy field. Computers are having their own advantages like reduction in time, accuracy, and reduction in manpower, speed, multitasking, non-fatigued, high memory, data storage and many more.
Computers in pharmacy are used for the information of drug data, records and files, drug management (creating, modifying, adding and deleting data in patient files to generate reports), business details.
Applications of Computer Science in Pharmacy
Computer is mandatory in this advanced era and pharmacy and related subjects are not exception to it. This review mainly focuses on the various applications, software’s and use of computers in pharmacy. Computer science and technology is deeply utilized in pharmacy field everywhere like in pharmacy colleges, pharmaceutical industries, research centers, hospital pharmacy and many more. Computer significantly reduces the time, expenditure, and manpower required for any kind of work. Development of various softwares makes it trouble-free to handle huge data. In short, computers are playing critical role in pharmacy field, without computers pharmacy research will be long-lasting andexpensive.
Pharmacy field plays a crucial role in patient health care. It is a huge field which is present worldwide. To run pharmacy field professionally and efficiently, it requires huge management and manpower. But nowadays use of computers in pharmacy field reduced the manpower and time. Computers are almost related to every corner of pharmacy field. These are utilized in the drug design technique, retail pharmacy shop, clinical research centers, crude drug identification,drug storage and business management, hospital and clinical pharmacy, in pharmacy colleges for computer assistedlearning.
Internet is huge collection of data. It is available in just one click. Various search engines like Google, Yahoo, Rediff, Bing help in searching online data related to pharmacy field just one have to enter his or her area of interest in search engine.
In Pharmacy field, effective use of computers started from 1980. Since then there is great demand of computers in pharmacy field. Computers are having their own advantages like reduction in time, accuracy, and reduction in man power, speed, multitasking, non-fatiguness, high memory, data storage and many more.
USE OF INTERNET IN PHARMACY
Internet is collection of huge data. And this data is available for us in just a one click. Internet is useful tool in literature survey. Books are also available on the internet. Various research journals can be easily accessed via internet. There are number of web-sites which are related to pharmacy field. Some of these web sites are as follows;
www.phrma.org
Organization representing America's pharmaceutical research companies provides details of drug development, industry news, and health guides.
www.healthcareforums.com
Created to facilitate interaction among healthcare professionals on specific topics which include discussion of cases, research and other relevant issues.
www.astra.com
This is the official web-site of ASTRA pharmaceuticals which produces medications for respiratory tract, cardiovascular and gastrointestinal diseases, and for pain
Log in to github.com.
Click + and then select New repository.
In the Repository name field, enter myJavaApp, select Public, and then click Create repository.
Extract the contents of the hello-world-app.zip file.
Open a Git Bash window and go to the hello-world-app directory.
Create your repository.
git init
git add .
git commit -m "Starting Node project"
git remote add origin https://github.com/YourGitProject/myJavaApp.git
git push -u origin master
Deploy an Application to Oracle Application Container Cloud Service
In the command-line window, deploy the MyJavaApp application. Make a note of the job ID. You'll use it in the next step.
psm accs push -n MyJavaApp -r java -s hourly \
-g https://github.com/YourGitProject/myJavaApp.git \
-m /local-path-to-manifest.json
Check the deployment job status and replace the job-ID placeholder with your job ID.
psm accs operation-status -j job-ID -of json
Get the application information. Make a note of the URL, you'll use it in the next step.
psm accs check-health -n myJavaApp
Open the application in the CLI, replacing the url-app placeholder with your URL.
curl url-app
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
2. Transaction
• The transaction is a set of logically related operation. It contains
a group of tasks.
• A transaction is an action or series of actions. It is performed by
a single user to perform operations for accessing the contents
of the database.
• Example: Suppose an employee of bank transfers Rs 800 from
X's account to Y's account. This small transaction contains
several low-level tasks:
5. Operations of Transaction:
• Read(X): Read operation is used to read the value of X from the
database and stores it in a buffer in main memory.
• Write(X): Write operation is used to write the value back to the
database from the buffer.
• Let's take an example to debit transaction from an account which
consists of following operations:
1.1. R(X); X = 4000
2.2. X = X - 500; 4000 – 500 = 3500
3.3. W(X); = 3500
6. • Let's assume the value of X before starting of the transaction is
4000.
• The first operation reads X's value from database and stores it
in a buffer.
• The second operation will decrease the value of X by 500. So
buffer will contain 3500.
• The third operation will write the buffer's value to the database.
So X's final value will be 3500.
• But it may be possible that because of the failure of hardware,
software or power, etc. that transaction may fail before finished
all the operations in the set.
7. • For example: If in the above transaction, the debit transaction
fails after executing operation 2 then X's value will remain 4000
in the database which is not acceptable by the bank.
To solve this problem, we have two important operations:
• Commit: It is used to save the work done permanently.
• Rollback: It is used to undo the work done.
8. Transaction property
The transaction has four properties. These are used to
maintain consistency in a database, before and after the
transaction.
Property of Transaction: ACID Properties
1. Atomicity
2. Consistency
3. Isolation
4. Durability
9.
10. Atomicity
• It states that all operations of the transaction take place at once
if not, the transaction is aborted.
• There is no midway, i.e., the transaction cannot occur partially.
Each transaction is treated as one unit and either run to
completion or is not executed at all.
• Atomicity involves the following two operations:
• Abort: If a transaction aborts then all the changes made are not
visible.
• Commit: If a transaction commits then all the changes made
are visible.
11. • Example: Let's assume that following transaction T consisting
of T1 and T2. A consists of Rs 600 and B consists of Rs 300.
Transfer Rs 100 from account A to account B.
After completion of the transaction, A consists of Rs 500 and B
consists of Rs 400.
• If the transaction T fails after the completion of transaction T1
but before completion of transaction T2, then the amount will be
deducted from A but not added to B. This shows the
inconsistent database state. In order to ensure correctness of
database state, the transaction must be executed in entirety.
13. Consistency
• The integrity constraints are maintained so that the database is
consistent before and after the transaction.
• The execution of a transaction will leave a database in either its
prior stable state or a new stable state.
• The consistent property of database states that every
transaction sees a consistent database instance.
• The transaction is used to transform the database from one
consistent state to another consistent state.
14. For example: The total amount must be maintained before or
after the transaction.
1.Total before T occurs = 600+300=900
2.Total after T occurs= 500+400=900
Therefore, the database is consistent. In the case when T1 is
completed but T2 fails, then inconsistency will occur.
15. Isolation
• It shows that the data which is used at the time of execution of a
transaction cannot be used by the second transaction until the
first one is completed.
• In isolation, if the transaction T1 is being executed and using
the data item X, then that data item can't be accessed by any
other transaction T2 until the transaction T1 ends.
• The concurrency control subsystem of the DBMS enforced the
isolation property.
16. Durability
• The durability property is used to indicate the performance of
the database's consistent state. It states that the transaction
made the permanent changes.
• They cannot be lost by the erroneous operation of a faulty
transaction or by the system failure. When a transaction is
completed, then the database reaches a state known as the
consistent state. That consistent state cannot be lost, even in
the event of a system's failure.
• The recovery subsystem of the DBMS has the responsibility of
Durability property.
17. States of Transaction
• In a database, the transaction can be in one of the following
states -
18.
19. Active state
•The active state is the first state of every
transaction. In this state, the transaction is
being executed.
•For example: Insertion or deletion or
updating a record is done here. But all the
records are still not saved to the database.
20. Partially committed
• In the partially committed state, a transaction executes its final
operation, but the data is still not saved to the database.
• In the total mark calculation example, a final display of the total
marks step is executed in this state.
21. Committed
• A transaction is said to be in a committed state if it executes all
its operations successfully. In this state, all the effects are now
permanently saved on the database system.
22. Failed state
• If any of the checks made by the database recovery system
fails, then the transaction is said to be in the failed state.
• In the example of total mark calculation, if the database is not
able to fire a query to fetch the marks, then the transaction will
fail to execute.
23. Aborted
• If any of the checks fail and the transaction has reached a failed
state then the database recovery system will make sure that the
database is in its previous consistent state. If not then it will
abort or roll back the transaction to bring the database into a
consistent state.
• If the transaction fails in the middle of the transaction then
before executing the transaction, all the executed transactions
are rolled back to its consistent state.
• After aborting the transaction, the database recovery module
will select one of the two operations:
1.Re-start the transaction
2.Kill the transaction
24. Schedule
• A series of operation from one transaction to another
transaction is known as schedule. It is used to preserve the
order of the operation in each of the individual transaction.
25.
26. Serial Schedule
• The serial schedule is a type of schedule where one transaction is
executed completely before starting another transaction. In the serial
schedule, when the first transaction completes its cycle, then the
next transaction is executed.
• For example: Suppose there are two transactions T1 and T2 which
have some operations. If it has no interleaving of operations, then
there are the following two possible outcomes:
1.Execute all the operations of T1 which was followed by all the
operations of T2.
2.Execute all the operations of T1 which was followed by all the
operations of T2.
• In the given (a) figure, Schedule A shows the serial schedule where
T1 followed by T2.
• In the given (b) figure, Schedule B shows the serial schedule where
T2 followed by T1.
27. In the given (a) figure, Schedule A shows the
serial schedule where T1 followed by T2.
28.
29. Non-serial Schedule
• If interleaving of operations is allowed, then there will be non-
serial schedule.
• It contains many possible orders in which the system can
execute the individual operations of the transactions.
• In the given figure (c) and (d), Schedule C and Schedule D are
the non-serial schedules. It has interleaving of operations.
30. Serializable schedule
• The serializability of schedules is used to find non-serial
schedules that allow the transaction to execute concurrently
without interfering with one another.
• It identifies which schedules are correct when executions of the
transaction have interleaving of their operations.
• A non-serial schedule will be serializable if its result is equal to
the result of its transactions executed serially.