Sonal Kanungo - Academia.edu (original) (raw)
Papers by Sonal Kanungo
International Journal of Advanced Research in Computer Science, 2017
OODBMS is a collection of objects. The objects are classified into classes and instances. The obj... more OODBMS is a collection of objects. The objects are classified into classes and instances. The objects encapsulate the attributes and associated methods or member functions. The support of complex objects forces a few necessities. They ought to support basic structural modeling and interrelationship normally. The evolution of objects must have elements with the end goal that a transaction can reach out in time and requires the complex recovery and concurrency control systems. Because of the evolutionary nature way of uses, expansion of domain change operations ought to be supported without block or shutdown system alongside the execution of data request and with security systems. The support of complex objects imposes several requirements. As changes are constant for object as well as schema, that means change in classes, their relationship and even class lattice. This will affect not only stored objects as well as creation of new objects in database too. Previous research has some s...
International Journal of Security and Privacy in Pervasive Computing
The novel corona or COVID-19 disease spread from Wuhan city of China. The virus spread rapidly ar... more The novel corona or COVID-19 disease spread from Wuhan city of China. The virus spread rapidly around the different countries, and now there are 6,040,609 confirmed cases across the globe. People inflected with virus are suffering from respiratory problems, blood clotting, etc. It is evident to be more dangerous for older persons and those who are already facing other serious illnesses. The virus spreads mainly through droplets of saliva or discharge from the nose of infected person when he coughs or sneezes. The purpose of this review is to focus on social and economic impact of COVID-19 in India and how the world will change because of this pandemic and what will be the ‘new normal' with and after this pandemic. This deadly virus has put the globe on alert because of its the high mortality rate and expansion of new number of cases rapidly. Until now, four lockdown phases had helped India to prevent the spike in the curve of new cases, but currently the authors are witnessing s...
When the shared data of database is accessed and updated concurrently by a number of transactions... more When the shared data of database is accessed and updated concurrently by a number of transactions; consistency of the stored and retrieved data is an important issue. Each transaction which is executed alone (mutual exclusion) transforms a consistent state into a new consistent state. This consistency can be achieved through isolation that means only one transaction is executing at any time. A system that ensures this property is said to be serializable. Our primary goal here is to analyze the fundamental limitation of concurrency with various scheduling policies independently of any given transaction processing system.
Regular Issue, Oct 10, 2019
The Two-Phase Locking of Multi-Version Concurrency Control (MV2PL) avoids conflicts of concurrent... more The Two-Phase Locking of Multi-Version Concurrency Control (MV2PL) avoids conflicts of concurrent transactions by make them wait until conflicts get resolved. These conflicts of transactions may generate starvations and deadlocks in the system. The Transactions suffering from deadlocks are usually aborted and restarted from scratch. In multiuser systems, this "abort and restart" approach degrades the system"s performance where higher conflicts for data or long running transactions occur. Restarting from scratch also generates a negative response loop in the system, because the system suffers additional overheads which may result into even more conflicts. In this paper, we are proposing a novel approach for conflict resolution in Multi-Version Concurrency Control for shared databases. Our mechanism quickly detects the conflicts using correctness criteria for serializability and resolves the conflicts between transactions and increases throughput.
International Journal of Engineering Research and, 2016
Object oriented databases are being widely used in variety applications of industries including t... more Object oriented databases are being widely used in variety applications of industries including telecommunications, banking, manufacturing, insurance, shipping, etc. These applications are characterized by having complex data model. Object databases are very good at storing the complex data model. Many applications can runs efficiently with many concurrent users. Transactions involving complex objects can continue for several hours, or even several days. Longer-duration transactions need to use different set of protocols from those that are used in traditional database applications where duration of transactions is very short. The purpose of this paper is to explore various techniques that can be used in object oriented databases to achieve high concurrency.
IJARCCE, 2015
In todays era, information security is an important aspect in which data is secure from unauthent... more In todays era, information security is an important aspect in which data is secure from unauthenticated user. Unsuspected victim attacks the information for economic gain, individual gain and for other illegal activities. Phishing is one of them in which unauthenticated person tries to thieve personal confidential information. To avoid these illegal activities we have projected a new paper "An Anti-Phishing Framework Using Visual Cryptography". In this, image is generated which after exploit, decomposed into two shares. One share is kept with user and other with server. And when it requires that is at the time of login at particular site two shares are combined together to form original image. The image form by combining two shares will state that current site is not a Phishing site and also identify that user is authenticated one. So data can be secured from unsuspected person.
International Journal of Advanced Research in Computer Science, 2017
OODBMS is a collection of objects. The objects are classified into classes and instances. The obj... more OODBMS is a collection of objects. The objects are classified into classes and instances. The objects encapsulate the attributes and associated methods or member functions. The support of complex objects forces a few necessities. They ought to support basic structural modeling and interrelationship normally. The evolution of objects must have elements with the end goal that a transaction can reach out in time and requires the complex recovery and concurrency control systems. Because of the evolutionary nature way of uses, expansion of domain change operations ought to be supported without block or shutdown system alongside the execution of data request and with security systems. The support of complex objects imposes several requirements. As changes are constant for object as well as schema, that means change in classes, their relationship and even class lattice. This will affect not only stored objects as well as creation of new objects in database too. Previous research has some s...
International Journal of Security and Privacy in Pervasive Computing
The novel corona or COVID-19 disease spread from Wuhan city of China. The virus spread rapidly ar... more The novel corona or COVID-19 disease spread from Wuhan city of China. The virus spread rapidly around the different countries, and now there are 6,040,609 confirmed cases across the globe. People inflected with virus are suffering from respiratory problems, blood clotting, etc. It is evident to be more dangerous for older persons and those who are already facing other serious illnesses. The virus spreads mainly through droplets of saliva or discharge from the nose of infected person when he coughs or sneezes. The purpose of this review is to focus on social and economic impact of COVID-19 in India and how the world will change because of this pandemic and what will be the ‘new normal' with and after this pandemic. This deadly virus has put the globe on alert because of its the high mortality rate and expansion of new number of cases rapidly. Until now, four lockdown phases had helped India to prevent the spike in the curve of new cases, but currently the authors are witnessing s...
When the shared data of database is accessed and updated concurrently by a number of transactions... more When the shared data of database is accessed and updated concurrently by a number of transactions; consistency of the stored and retrieved data is an important issue. Each transaction which is executed alone (mutual exclusion) transforms a consistent state into a new consistent state. This consistency can be achieved through isolation that means only one transaction is executing at any time. A system that ensures this property is said to be serializable. Our primary goal here is to analyze the fundamental limitation of concurrency with various scheduling policies independently of any given transaction processing system.
Regular Issue, Oct 10, 2019
The Two-Phase Locking of Multi-Version Concurrency Control (MV2PL) avoids conflicts of concurrent... more The Two-Phase Locking of Multi-Version Concurrency Control (MV2PL) avoids conflicts of concurrent transactions by make them wait until conflicts get resolved. These conflicts of transactions may generate starvations and deadlocks in the system. The Transactions suffering from deadlocks are usually aborted and restarted from scratch. In multiuser systems, this "abort and restart" approach degrades the system"s performance where higher conflicts for data or long running transactions occur. Restarting from scratch also generates a negative response loop in the system, because the system suffers additional overheads which may result into even more conflicts. In this paper, we are proposing a novel approach for conflict resolution in Multi-Version Concurrency Control for shared databases. Our mechanism quickly detects the conflicts using correctness criteria for serializability and resolves the conflicts between transactions and increases throughput.
International Journal of Engineering Research and, 2016
Object oriented databases are being widely used in variety applications of industries including t... more Object oriented databases are being widely used in variety applications of industries including telecommunications, banking, manufacturing, insurance, shipping, etc. These applications are characterized by having complex data model. Object databases are very good at storing the complex data model. Many applications can runs efficiently with many concurrent users. Transactions involving complex objects can continue for several hours, or even several days. Longer-duration transactions need to use different set of protocols from those that are used in traditional database applications where duration of transactions is very short. The purpose of this paper is to explore various techniques that can be used in object oriented databases to achieve high concurrency.
IJARCCE, 2015
In todays era, information security is an important aspect in which data is secure from unauthent... more In todays era, information security is an important aspect in which data is secure from unauthenticated user. Unsuspected victim attacks the information for economic gain, individual gain and for other illegal activities. Phishing is one of them in which unauthenticated person tries to thieve personal confidential information. To avoid these illegal activities we have projected a new paper "An Anti-Phishing Framework Using Visual Cryptography". In this, image is generated which after exploit, decomposed into two shares. One share is kept with user and other with server. And when it requires that is at the time of login at particular site two shares are combined together to form original image. The image form by combining two shares will state that current site is not a Phishing site and also identify that user is authenticated one. So data can be secured from unsuspected person.