Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.20170101.pre
Volume 7
Brojo Kishore Mishra, Sanjaya Kumar Panda, Devashree Tripathy, Deepak Puthal, Siba Mishra, Sushruta Mishra
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mishra, Brojo Kishore, et al. "Special Issue on Scalable Computing for Knowledge Discovery." IJKDB vol.7, no.1 2017: pp.5-6. http://doi.org/10.4018/IJKDB.20170101.pre
APA
Mishra, B. K., Panda, S. K., Tripathy, D., Puthal, D., Mishra, S., & Mishra, S. (2017). Special Issue on Scalable Computing for Knowledge Discovery. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 5-6. http://doi.org/10.4018/IJKDB.20170101.pre
Chicago
Mishra, Brojo Kishore, et al. "Special Issue on Scalable Computing for Knowledge Discovery," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 5-6. http://doi.org/10.4018/IJKDB.20170101.pre
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.2017010101
Volume 7
Sushanta Meher, Sohan Kumar Pande, Sanjaya Kumar Panda
Cloud computing provides access to various services such as servers, storage and applications to the customers' as and when required. The services on the cloud can be accessed with minimum efforts...
Show More
Cloud computing provides access to various services such as servers, storage and applications to the customers' as and when required. The services on the cloud can be accessed with minimum efforts through any handheld devices that are connected to the Internet. In IaaS cloud, the services to the customers are provided in the form of two leases, AR and BE. Here, a running BE lease can be preempted upon arrival of an AR lease as BE has lower priority. However, frequent preemption of the BE lease causes an overhead to the system and leads to customer dissatisfaction. In this paper, we propose a fairness algorithm called TATA to provide fairness among the leases. We evaluate the proposed algorithm on various synthetic datasets and compare the results with an existing fairness algorithm. The results of simulation show that TATA produces better response time for both the leases than the existing algorithm.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Meher, Sushanta, et al. "Time-Aware Task Allocation for Cloud Computing Environment." IJKDB vol.7, no.1 2017: pp.1-13. http://doi.org/10.4018/IJKDB.2017010101
APA
Meher, S., Pande, S. K., & Panda, S. K. (2017). Time-Aware Task Allocation for Cloud Computing Environment. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 1-13. http://doi.org/10.4018/IJKDB.2017010101
Chicago
Meher, Sushanta, Sohan Kumar Pande, and Sanjaya Kumar Panda. "Time-Aware Task Allocation for Cloud Computing Environment," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 1-13. http://doi.org/10.4018/IJKDB.2017010101
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.2017010102
Volume 7
Sangharatna Godboley, Arpita Dutta, Durga Prasad Mohapatra
Being a good software testing engineer, one should have the responsibility towards environment sustainability. By using green principles and regulations, we can perform Green Software Testing. In...
Show More
Being a good software testing engineer, one should have the responsibility towards environment sustainability. By using green principles and regulations, we can perform Green Software Testing. In this paper, we present a new approach to enhance Branch Coverage and Modified Condition/Decision Coverage uses concolic testing. We have proposed a novel transformation technique to improve these code coverage metrics. We have named this new transformation method Double Refined Code Transformer (DRCT). Then, using JoulMeter, we compute the power consumption and energy consumption in this testing process. We have developed a tool named Green-DRCT to measure energy consumption while performing the testing process.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Godboley, Sangharatna, et al. "Green DRCT: Measuring Energy Consumption of an Enhanced Branch Coverage and Modified Condition/Decision Coverage Technique." IJKDB vol.7, no.1 2017: pp.14-29. http://doi.org/10.4018/IJKDB.2017010102
APA
Godboley, S., Dutta, A., & Mohapatra, D. P. (2017). Green DRCT: Measuring Energy Consumption of an Enhanced Branch Coverage and Modified Condition/Decision Coverage Technique. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 14-29. http://doi.org/10.4018/IJKDB.2017010102
Chicago
Godboley, Sangharatna, Arpita Dutta, and Durga Prasad Mohapatra. "Green DRCT: Measuring Energy Consumption of an Enhanced Branch Coverage and Modified Condition/Decision Coverage Technique," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 14-29. http://doi.org/10.4018/IJKDB.2017010102
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.2017010103
Volume 7
Prayag Tiwari, Brojo Kishore Mishra, Sachin Kumar, Vivek Kumar
Sentiment Analysis intends to get the basic perspective of the content, which may be anything that holds a subjective supposition, for example, an online audit, Comments on Blog posts, film rating...
Show More
Sentiment Analysis intends to get the basic perspective of the content, which may be anything that holds a subjective supposition, for example, an online audit, Comments on Blog posts, film rating and so forth. These surveys and websites might be characterized into various extremity gatherings, for example, negative, positive, and unbiased keeping in mind the end goal to concentrate data from the info dataset. Supervised machine learning strategies group these reviews. In this paper, three distinctive machine learning calculations, for example, Support Vector Machine (SVM), Maximum Entropy (ME) and Naive Bayes (NB), have been considered for the arrangement of human conclusions. The exactness of various strategies is basically inspected keeping in mind the end goal to get to their execution on the premise of parameters, e.g. accuracy, review, f-measure, and precision.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Tiwari, Prayag, et al. "Implementation of n-gram Methodology for Rotten Tomatoes Review Dataset Sentiment Analysis." IJKDB vol.7, no.1 2017: pp.30-41. http://doi.org/10.4018/IJKDB.2017010103
APA
Tiwari, P., Mishra, B. K., Kumar, S., & Kumar, V. (2017). Implementation of n-gram Methodology for Rotten Tomatoes Review Dataset Sentiment Analysis. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 30-41. http://doi.org/10.4018/IJKDB.2017010103
Chicago
Tiwari, Prayag, et al. "Implementation of n-gram Methodology for Rotten Tomatoes Review Dataset Sentiment Analysis," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 30-41. http://doi.org/10.4018/IJKDB.2017010103
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.2017010104
Volume 7
Kshira Sagar Sahoo, Bibhudatta Sahoo, Ratnakar Dash, Brojo Kishore Mishra
The ability to recover the control logic after a failure is detected in specific time window is called resiliency. The Software Defined Network (SDN) is an emerged and powerful architecture which...
Show More
The ability to recover the control logic after a failure is detected in specific time window is called resiliency. The Software Defined Network (SDN) is an emerged and powerful architecture which allow to separate the control plane from forwarding. This decoupling architecture brings new difficulties to the network resiliency because link failure between switch and controller could defunct the forwarding plane. It has been identified that the resiliency of the network can be improved by choosing the correct place for the controller and by choosing proper routing tree once the controller location is known. In this work, we have analysed the performance of various Routing Tree algorithms on different network topology generated by Bernoulli Random Graph model and found that Greedy Routing Tree (GRT) provides the maximum resiliency. The Closeness Centrality Theorem has proposed to find the best controller position and later analysed the performance of various single controller placement algorithms on GRT for finding the overall improvement of the resiliency of the network.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Sahoo, Kshira Sagar, et al. "Improving Resiliency in SDN using Routing Tree Algorithms." IJKDB vol.7, no.1 2017: pp.42-57. http://doi.org/10.4018/IJKDB.2017010104
APA
Sahoo, K. S., Sahoo, B., Dash, R., & Mishra, B. K. (2017). Improving Resiliency in SDN using Routing Tree Algorithms. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 42-57. http://doi.org/10.4018/IJKDB.2017010104
Chicago
Sahoo, Kshira Sagar, et al. "Improving Resiliency in SDN using Routing Tree Algorithms," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 42-57. http://doi.org/10.4018/IJKDB.2017010104
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.2017010105
Volume 7
Santosh Kumar Sahu, Sanjay Kumar Jena, Manish Verma
Outliers in the database are the objects that deviate from the rest of the dataset by some measure. The Nearest Neighbor Outlier Factor is considering to measure the degree of outlier-ness of the...
Show More
Outliers in the database are the objects that deviate from the rest of the dataset by some measure. The Nearest Neighbor Outlier Factor is considering to measure the degree of outlier-ness of the object in the dataset. Unlike the other methods like Local Outlier Factor, this approach shows the interest of a point from both neighbors and reverse neighbors, and after that, an object comes into consideration. We have observed that in GBBK algorithm that based on K-NN, used quick sort to find k nearest neighbors that take O (N log N) time. However, in proposed method, the time required for searching on K times which complete in O (KN) time to find k nearest neighbors (k < < log N). As a result, the proposed method improves the time complexity. The NSL-KDD and Fisher iris dataset is used, and experimental results compared with the GBBK method. The result is same in both the methods, but the proposed method takes less time for computation.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Sahu, Santosh Kumar, et al. "K-NN Based Outlier Detection Technique on Intrusion Dataset." IJKDB vol.7, no.1 2017: pp.58-70. http://doi.org/10.4018/IJKDB.2017010105
APA
Sahu, S. K., Jena, S. K., & Verma, M. (2017). K-NN Based Outlier Detection Technique on Intrusion Dataset. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 58-70. http://doi.org/10.4018/IJKDB.2017010105
Chicago
Sahu, Santosh Kumar, Sanjay Kumar Jena, and Manish Verma. "K-NN Based Outlier Detection Technique on Intrusion Dataset," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 58-70. http://doi.org/10.4018/IJKDB.2017010105
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.2017010106
Volume 7
Swati Mishra, Sanjaya Kumar Panda
In the current era, Internet is the fastest growing technology. It is a global network of distributed systems that interconnects with each other to share various resources and computation. The...
Show More
In the current era, Internet is the fastest growing technology. It is a global network of distributed systems that interconnects with each other to share various resources and computation. The complexity of the distributed systems is rapidly increasing, which leads to an increased susceptibility of failure to the participating computers such as clients and servers and their interconnections. Therefore, the main challenge is to address such failures and develop efficient algorithms to tolerate such failures. In this paper, four fault tolerant algorithms, namely server-based fault tolerant (SFT), client-based fault tolerant (CFT), client-server fault tolerant (CSFT) and connection fault tolerant (CoFT) are proposed to deal with the above challenge. The proposed algorithms are evaluated in terms of number of failures (NOF), load factor (LF) and load standard deviation (LSD) and compared with an existing algorithm. The comparison results show the superior performance of the proposed algorithms.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mishra, Swati, and Sanjaya Kumar Panda. "Efficient Fault Tolerant Algorithms for Internet Distributed Systems." IJKDB vol.7, no.1 2017: pp.71-90. http://doi.org/10.4018/IJKDB.2017010106
APA
Mishra, S. & Panda, S. K. (2017). Efficient Fault Tolerant Algorithms for Internet Distributed Systems. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 71-90. http://doi.org/10.4018/IJKDB.2017010106
Chicago
Mishra, Swati, and Sanjaya Kumar Panda. "Efficient Fault Tolerant Algorithms for Internet Distributed Systems," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 71-90. http://doi.org/10.4018/IJKDB.2017010106
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJKDB.2017010107
Volume 7
Sushree Bibhuprada B. Priyadarshini, Suvasini Panigrahi
This research presents a novel distributed strategy for actuation of reduced number of cameras motivated by scalar controller selection for eliminating the amount of redundant data transmission...
Show More
This research presents a novel distributed strategy for actuation of reduced number of cameras motivated by scalar controller selection for eliminating the amount of redundant data transmission taking place in any geographic zone under speculation. The proposed framework is based on dividing the monitored region into a number of virtual compartments. A scalar controller is selected in each of the compartments, which is chosen in such a manner that its distance is the minimum among all the scalars from the central point of the concerned compartment. Further, all the cameras are arranged in a predetermined circular fashion. Whenever, an event takes place, the scalar controllers inform their respective cameras regarding its occurrence. The cameras collaboratively exchange information among themselves for deciding which among them are to be actuated. The least camera activation, enhanced coverage ratio, minimized redundancy ratio, reduced energy and power expenditure obtained from the experimental outcomes affirm the effectiveness of our proposed method over other approaches.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Priyadarshini, Sushree Bibhuprada B., and Suvasini Panigrahi. "A Distributed Scalar Controller Selection Scheme for Redundant Data Elimination in Sensor Networks." IJKDB vol.7, no.1 2017: pp.91-104. http://doi.org/10.4018/IJKDB.2017010107
APA
Priyadarshini, S. B. & Panigrahi, S. (2017). A Distributed Scalar Controller Selection Scheme for Redundant Data Elimination in Sensor Networks. International Journal of Knowledge Discovery in Bioinformatics (IJKDB), 7(1), 91-104. http://doi.org/10.4018/IJKDB.2017010107
Chicago
Priyadarshini, Sushree Bibhuprada B., and Suvasini Panigrahi. "A Distributed Scalar Controller Selection Scheme for Redundant Data Elimination in Sensor Networks," International Journal of Knowledge Discovery in Bioinformatics (IJKDB) 7, no.1: 91-104. http://doi.org/10.4018/IJKDB.2017010107
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100