SHORT SURVEY ON GRAPHICAL DATABASE
Journal Title: Indian Journal of Computer Science and Engineering - Year 2015, Vol 6, Issue 4
Abstract
This paper explores the features of graph databases and data models. The popularity towards work with graph models and datasets has been increased in the recent decades .Graph database has a number of advantage over the relational database. This paper take a short review on the graph and hyper graph concepts from mathematics so that graph so that we can understand the existing difficulties in the implantation of graph model. From the Past few decades saw hundreds of research contributions their vast research in the DBS field with graph database. However, the research on the existence of general purpose DBS managements and mining that suits for variety of applications is still very much active. The review is done based on the Application of graph model techniques in the database within the framework of graph based approaches with the aim of implementation of different graphical database and tabular database
Authors and Affiliations
Harsha R Vyavahare , Dr. P. P. Karde
Performance Evaluation of Internet Routing Protocols in Wireless Mesh Networks
Wireless Mesh Networks are considered as a feasible solution for transformation into next generation wireless network to offer Internet services for large variety of applications. These types of networks are used for pro...
Data link system via Financial Information Exchange protocol using Simple Binary Encoding
The main goal of this project is to make transactions faster between stock exchange and traders. Financial Information Exchange (FIX) is a dominant standard for data link between the participants of exchange trades in re...
DESIGN AND ANALYSIS OF AN ADAPTIVE SELFISH SCHEDULING ALGORITHM USING AODV PROTOCOL IN MANET
Due to dynamic nature of mobile ad-hoc network (MANETs) which results in link breaks and repeatedly changing topology the aim of scheduling algorithm becomes more complex. In this paper we present an adaptive selfish awa...
A Review of Malicious Attack in Mobile Ad-Hoc Network Based On Power Constraints
The minimization of power in wireless sensor network is big issue. If the process of energy constraints is optimized increase the reliability and security of mobile ADHOC network. The management of ADHOC network is great...
A NOVEL APPROACH FOR SELECTION OF BEST SET OF OPTIMIZATION FUNCTIONS FOR A BENCHMARK APPLICATION USING AN EFFECTIVE STRATEGY
Finding right set of optimization techniques for a given application involves lot of complications. The compiler optimization technique for a given platform depends upon the various factors such as hardware settings and...