SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN
0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
22
COPYRIGHT OF THE REVISED ARCHITECTURE FOR
IMPROVEMENT IN THE DESIGN OF DATA STRUCTURE OF THE
TREE TO ENHANCE THE APPLICABILITY
Dr. Suryakant B Patil1
, Ms. Ketaki G Katre2
, Ms. PriyankaGhegade3
, Dr. Preeti Patil4
1
Professor, JSPM’s Imperial College of Engineering & Research, Wagholi, Pune
2, 3
PG Research Scholar, JSPM’s ICOER, Wagholi, Pune
4
Dean (SA), HOD & Professor, KIT’s COE, Kolhapur
ABSTRACT
Intellectual Property Rights (IPR) is the emerging concept in the developing country
like India, but the developed countries already taken major note of it. The major share of the
asset values of the organizations from the developed countries is occupied by the IPR. In
India the awareness has been increasing rapidly since last few years and so the scope is.
When consider the data set we first need to distinguish between the structures designed and
the elements in the data set (when we use the term ‘data’ we shall mean the content of the
data set itself). Structural elements include things like the field names and a model for the
data – the organization of these fields and their inter-relation.In data structures trees play
major role from applicability point of view like Multicast Routing, Turing Machine, Graph
Theory, CFG, Traversals, Enhancement of Network Life Time, Internal Network
Characterization etc. Here we have proposed the revised architecture for the improvement in
the design of the data structure of the tree. This improved design will turn up into the
enhancement in the traversals, operations, time complexity along with the accessibility during
executions.This will be the universal solution for the Binary tree as well as the general tree in
the various applications by revising the structural design. The copyright of the same is in the
pipeline through Associate Lawyer Ms. PriyaSomaiyya ofKatariya& Associates, a Patents &
Trademarks Attorneys.As there are no general rules and the situation varies by Indian
jurisdiction. Thus we proceed country by country detailing for (if any) this approach is used
in a particular jurisdiction.
INTERNATIONAL JOURNAL OF INTELLECTUAL PROPERTY
RIGHTS (IJIPR)
ISSN 0976-6529 (Print)
ISSN 0976-6537 (Online)
Volume 5, Issue 1, January - June (2014), pp. 22-29
© IAEME: http://www.iaeme.com/IJIPR.asp
IJIPR
© I A E M E
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976
0976-6537 (Online), Volume 5, Issue
Categories and Subject Descript
K.5.0[Legal Aspects of Computing]
E.1 [Data]: Data Structures
GENERAL TERMS: Legal Aspects
Keywords: IPR, Copyright, Data Structure, Tree, Binary Tree.
1. INTRODUCTION
A tree is a non-linear data structure that consists of a root node and potentially many
levels of additional nodes that form a hierarchy. A tree can be empty with no nodes called the
null or empty tree or a tree is a structure consisting of one node called
more subtrees as shown in the Figure 1.
Figure 1:
Terminologies used in tree:
• Root - the top most node in a tree.
• Parent - node that has a child.
• Siblings - nodes with the same parent.
• Leaves - nodes with no children.
• Internal nodes - nodes with at least one child.
• Degree - number of sub trees of a node.
• Edge - connection between one node to another.
• Height - The level of a node is defined by initially letting the root be at level 1
• Forest - A forest is a set of n
Types of tree
1) Simple tree
A simple unordered tree; in this diagram, the node labeled 7 has two children, labeled
2 and 6, and one parent, labeled 2. The root node, at the top, has no parent.
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print),
6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
23
Categories and Subject Descriptors
f Computing]: General
Legal Aspects, Algorithms, Design, Experimentation, Performance
IPR, Copyright, Data Structure, Tree, Binary Tree.
linear data structure that consists of a root node and potentially many
levels of additional nodes that form a hierarchy. A tree can be empty with no nodes called the
null or empty tree or a tree is a structure consisting of one node called the root and one or
as shown in the Figure 1.
: Data Structure of the Binary Tree
the top most node in a tree.
node that has a child.
nodes with the same parent.
nodes with no children.
nodes with at least one child.
number of sub trees of a node.
connection between one node to another.
The level of a node is defined by initially letting the root be at level 1
A forest is a set of n ≥ 0 disjoint trees.
A simple unordered tree; in this diagram, the node labeled 7 has two children, labeled
2 and 6, and one parent, labeled 2. The root node, at the top, has no parent.
6529 (Print), ISSN
, © IAEME
Performance.
linear data structure that consists of a root node and potentially many
levels of additional nodes that form a hierarchy. A tree can be empty with no nodes called the
the root and one or
The level of a node is defined by initially letting the root be at level 1.
A simple unordered tree; in this diagram, the node labeled 7 has two children, labeled
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN
0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
24
2) Binary tree
Binary tree is a tree data structure in which each node has at most two children
(referred to as the left child and the right child). In a binary tree, the degree of each node can
be at most two. Binary trees are used to implement binary search trees and binary heaps, and
are used for efficient searching and sorting. A binary tree is a special case of a K-ary tree,
where k is 2.
3) Binary search tree
A binary search tree (BST), sometimes also called anordered or sorted binary tree, is a
node-based binary tree data structure where each node has a comparable key (and an
associated value) and satisfies the restriction that the key in any node is larger than the keys
in all nodes in that node's left subtree and smaller than the keys in all nodes in that node's
right sub-tree. Each node has no more than two child nodes. Each child must either be a leaf
node or the root of another binary search tree. The left sub-tree contains only nodes with keys
less than the parent node; the right sub-tree contains only nodes with keys greater than the
parent node.
II. PROPOSED DESIGN STRUCTURE
There are three fundamental types of IPv4 addresses: unicast, broadcast, and
multicast. A unicast address is designed to transmit a packet to a single destination. A
broadcast address is used to send a datagram to an entire subnetwork. A multicast address is
designed to enable the delivery of datagrams to a set of hosts that have been configured as
members of a multicast group in various scattered subnetworks.
Multicasting is not connection oriented. A multicast datagram is delivered to
destination group members with the same "best-effort" reliability as a standard unicast IP
datagram. This means that a multicast datagram is not guaranteed to reach all members of the
group, or arrive in the same order relative to the transmission of other packets.
The only difference between a multicast IP packet and a unicast IP packet is the
presence of a "group address" in the Destination Address field of the IP header. Instead of a
Class A, B, or C IP address, multicasting employs a Class D destination address format
(224.0.0.0- 239.255.255.255).
In the tree data structure we propose two extra fields as H (height of the tree) and C
(count of the nodes). In the binary tree there will be left and right child. Initially H=0 and
C=0, when we add root node then both will be H=1, C=1. If the next node of the child node
will be NULL then only the addition of the new node is possible and for deletion there should
be minimum one node available in the tree.
Initial Declaration:
int H=0, C=0;
Node -> Ref1 = H;
Node -> Ref2 = C;
ADD (Root) || ADD (New Node)
C+=1;
if (Node ->Next == NULL)
then H+=1;
else repeat;
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN
0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
25
Traversal:
Display ( &Node -> Ref1, &Node -> Ref2 )
Value = Node -> Value;
Node = Node -> Next;
(*Node -> Ref2) - = 1;
While (*Node -> Ref2 == 0)
Repeat;
*(Node -> Ref2) = 2X(*(Node -> Ref1)) + 1;
Repeat;
Existing IPRs and Background:
1. Binary trees for multicast traffic
A network device may include an input device and a packet forwarding engine. The
input device receives a data packet. The packet forwarding engine includes logic configured
to determine that the data packet is to be multicast. The logic is also configured to identify
one of multiple forwarding schemes, where each of the forwarding schemes is configured
such that the packet forwarding engine generates and forwards no more than two copies of
the data packet.
Publication number US7710963 B1
Publication type Grant
Application number US 11/696,929
Publication date 4 May 2010
Also published as US7983263, US20100165989
Inventors Amit Jain, Yong Luo
Figure 2: CLAIM - Swotted Design Augmentation Contemplated
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976
0976-6537 (Online), Volume 5, Issue
2. Communications network
A method of operating a datagram network is disclosed. The method involves placing
a group address in the source address field of the datagram. Notes within the datagram
network forward the datagram in dependence on the contents of the source address field. This
provides many of the scalability advantages offered by Multiprotocol Label Switched
(MPLS) networks without introducing the overheads caused by connection set
networks. The method can also easily provide different quality of service levels to different
types of packets and is especially useful in providing Virtual Private Networks acr
shared internet work such as the public Internet.
Publication number WO2001052482 A1
Publication type Application
Application number PCT/GB2001/000092
Publication date Jul 19, 2001
Inventors Parminder Singh Mudhar, Alan William O'neill
Applicant British Telecomm, Parminder Singh Mudhar, Neill Alan William O
Reducing Network Load
Multicast routes are set up in a similar manner. A node wishing to join a multicast
group broadcasts a RREQ with the destination IP address s
and with the 'J'(join) flag set to indicate that it would like to join the group. Any node
receiving this RREQ that is a member of the multicast tree that has a fresh enough sequence
number for the multicast group may send
source, the nodes forwarding the message set up pointers in their multicast route tables. As
the source node receives the RREPs, it keeps track of the route with the freshest sequence
number, and beyond that the smallest hop count to the next multicast group member. After
the specified discovery period, the source
message to its selected next hop.
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print),
6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
26
Communications network
A method of operating a datagram network is disclosed. The method involves placing
in the source address field of the datagram. Notes within the datagram
network forward the datagram in dependence on the contents of the source address field. This
provides many of the scalability advantages offered by Multiprotocol Label Switched
networks without introducing the overheads caused by connection set
networks. The method can also easily provide different quality of service levels to different
types of packets and is especially useful in providing Virtual Private Networks acr
shared internet work such as the public Internet.
Publication number WO2001052482 A1
Application number PCT/GB2001/000092
Inventors Parminder Singh Mudhar, Alan William O'neill
British Telecomm, Parminder Singh Mudhar, Neill Alan William O
Figure 2: Multi-Cast Tree
Multicast routes are set up in a similar manner. A node wishing to join a multicast
group broadcasts a RREQ with the destination IP address set to that of the multicast group
and with the 'J'(join) flag set to indicate that it would like to join the group. Any node
receiving this RREQ that is a member of the multicast tree that has a fresh enough sequence
number for the multicast group may send a RREP. As the RREPs propagate back to the
source, the nodes forwarding the message set up pointers in their multicast route tables. As
the source node receives the RREPs, it keeps track of the route with the freshest sequence
smallest hop count to the next multicast group member. After
the specified discovery period, the source nodes will unicast a Multicast Activation (MACT)
6529 (Print), ISSN
, © IAEME
A method of operating a datagram network is disclosed. The method involves placing
in the source address field of the datagram. Notes within the datagram
network forward the datagram in dependence on the contents of the source address field. This
provides many of the scalability advantages offered by Multiprotocol Label Switched
networks without introducing the overheads caused by connection set-up in MPLS
networks. The method can also easily provide different quality of service levels to different
types of packets and is especially useful in providing Virtual Private Networks across a
Multicast routes are set up in a similar manner. A node wishing to join a multicast
et to that of the multicast group
and with the 'J'(join) flag set to indicate that it would like to join the group. Any node
receiving this RREQ that is a member of the multicast tree that has a fresh enough sequence
a RREP. As the RREPs propagate back to the
source, the nodes forwarding the message set up pointers in their multicast route tables. As
the source node receives the RREPs, it keeps track of the route with the freshest sequence
smallest hop count to the next multicast group member. After
unicast a Multicast Activation (MACT)
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN
0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
27
Figure 3: N/W Load Vs CPU % ( PT 2.24 Mbps)
This message serves the purpose of activating the route. A node that does not receive
this message had set up a multicast route pointer will timeout and deletes the pointer. If the
node receiving the MACT was not already a part of the multicast tree, it will also have been
keeping track of the best route from the RREPs it received. Hence it must also unicast a
MACT to its next hop, and so on until a node that was previously a member of the multicast
tree is reached.
Figure 4: N/W Load Vs CPU % (ST 7.29 Mbps)
Assume that a stock ticker application is required to transmit packets to 100 stations
within an organization's network. Unicast transmission to the group of stations will require
the periodic transmission of 100 packets where many packets may be required to traverse the
same link(s). Multicast transmission is the ideal solution for this type of application since it
requires only a single packet transmission by the source which is then replicated at forks in
the multicast delivery tree.
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
0 100 200 300 400 500 600
CPU%
Network Load (Mbps)
Reduced N/W Load (Pick Time)
CPU % (2.24 Mbps)
Peak Time
CPU % Reduced
0
0.5
1
1.5
2
2.5
3
3.5
4
0 100 200 300 400 500 600
CPU%
Network Load (Mbps)
Reduced N/W Load (Slack Time)
CPU % (7.29 Mbps)
Slack Time
CPU % Reduced
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN
0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
28
III. CLAIMS
The additional soft links provided for the root node as a Ref1 and Ref2 will be useful
during the executions and traversals throughout respective applications.
1. The Ref1 will have the height of the tree which is creates along with the creation of
the root node. The same is persistent throughout till the existence of the last node.
This link Ref1 can be used directly rather than calculating the height of the tree or
binary tree with the help of the some algorithms or calculations. The direct
availability of this value throughout the all operations and traversal will be an added
advantage to calculate the Prefix/ Infix/ Postfix etc as well as during the Preorder,
Inorder and Post order Traversals. The additional toll will be negligible compared
with the reduced time complexity for faster processing during relative applications.
2. The Ref2 will be the zero before create the root node and will have continuous
updations as per the addition/ deletions operations on the tree or binary tree. The
addition will have the simultaneously update this pointer value and will available
throughout for further use rather than to calculate the height and followed by the
count. Either traversals or Grammar operations or multicast routing table the
repetitive calculations for the same will be minimized which results in the
improvement in the latency time with faster results during the execution. As this value
is readily available, no need to traverse till the NULL pointer to check and it can have
predefined loop with this count value as a limit.
Both the pointers will be deleted whenever the root gets deleted and its memory location will
get free.
IV. REFERENCES
PATENT CITATIONS
Cited Patent Filing date Date Applicant Title
US7983263 * 12 Mar 2010 19 Jul 2011
Juniper
Networks,
Inc.
Binary trees for multicast
traffic
WO199800
2821A1 *
Jul 15, 1997 Jan 22, 1998 3Com Corp
Virtual network architecture
for connectionless LAN
backbone
US5910955 * Aug 25, 1997 Jun 8, 1999
Fujitsu
Limited
Switching hub capable of
controlling communication
quality in LAN
US5402415 * 22 Apr 1993 28 Mar 1995
Washington
University
Multicast virtual circuit
switch using cell recycling
International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN
0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME
29
Cited Patent Filing date Date Applicant Title
US7263099 * 14 Aug 2002 28 Aug 2007 Juniper
Networks
Multicast packet replication
US7266120 * 18 Nov 2002 4 Sep 2007
Fortinet,
Inc.
System and method for
hardware accelerated packet
multicast in a virtual routing
system
US7289503 * 30 Jul 2002 30 Oct 2007
Juniper
Networks,
Inc.
Systems and methods for
efficient multicast handling
US7420972 * 3 Aug 2007 2 Sep 2008
Juniper
Networks,
Inc.
Multicast packet replication
US7519054 * 27 Jan 2005 14 Apr 2009
Intel
Corporation
Replication of multicast data
packets in a multi-stage
switching system
US20060114903 * 29 Nov 2004 1 Jun 2006
Egenera,
Inc.
Distributed multicast system
and method in a network
US20060215698 * 17 Nov 2004 28 Sep 2006
Amen
Hamdan
Communication subsystem
controlled information
dissemination

More Related Content

Viewers also liked (20)

10120130406012
1012013040601210120130406012
10120130406012
 
20320140501005 2
20320140501005 220320140501005 2
20320140501005 2
 
10120140502002
1012014050200210120140502002
10120140502002
 
20320140501006
2032014050100620320140501006
20320140501006
 
40120140501014
4012014050101440120140501014
40120140501014
 
40120140501011 2
40120140501011 240120140501011 2
40120140501011 2
 
30120140501009
3012014050100930120140501009
30120140501009
 
30120140501007
3012014050100730120140501007
30120140501007
 
30120140501014
3012014050101430120140501014
30120140501014
 
40120140502002
4012014050200240120140502002
40120140502002
 
50120140502013
5012014050201350120140502013
50120140502013
 
Linux
LinuxLinux
Linux
 
Diapositivas finales aprendizaje
Diapositivas finales aprendizajeDiapositivas finales aprendizaje
Diapositivas finales aprendizaje
 
Papa francisco
Papa franciscoPapa francisco
Papa francisco
 
Geografia sergio marucci_12a2_carrasco
Geografia sergio marucci_12a2_carrascoGeografia sergio marucci_12a2_carrasco
Geografia sergio marucci_12a2_carrasco
 
Presentacion para compartir.
Presentacion para compartir.Presentacion para compartir.
Presentacion para compartir.
 
Windows phone 7.5
Windows phone 7.5 Windows phone 7.5
Windows phone 7.5
 
Syllabus control de medicamentos
Syllabus  control de medicamentos Syllabus  control de medicamentos
Syllabus control de medicamentos
 
1absolutismo monárquico
1absolutismo monárquico1absolutismo monárquico
1absolutismo monárquico
 
Joao costa lopes
Joao costa lopesJoao costa lopes
Joao costa lopes
 

Similar to 10420140501003

Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big datajournalBEEI
 
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...IOSR Journals
 
Privacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transfPrivacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transfIAEME Publication
 
Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2IAEME Publication
 
SPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSING
SPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSINGSPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSING
SPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSINGijdms
 
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization MethodsIRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization MethodsIRJET Journal
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
Iciic2010 114
Iciic2010 114Iciic2010 114
Iciic2010 114hanums1
 
Nimble@itcecnogrid novel toolkit for computing weather
Nimble@itcecnogrid novel toolkit for computing weatherNimble@itcecnogrid novel toolkit for computing weather
Nimble@itcecnogrid novel toolkit for computing weatheriaemedu
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESSCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESijwscjournal
 
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESSCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESijwscjournal
 
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESSCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESijwscjournal
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...IAEME Publication
 
Iciic 2010 114
Iciic 2010 114Iciic 2010 114
Iciic 2010 114hanums1
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithmijtsrd
 
DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...
DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...
DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...CSEIJJournal
 

Similar to 10420140501003 (20)

Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
 
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
 
Privacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transfPrivacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transf
 
50120140506013 2
50120140506013 250120140506013 2
50120140506013 2
 
Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2
 
SPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSING
SPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSINGSPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSING
SPATIAL R-TREE INDEX BASED ON GRID DIVISION FOR QUERY PROCESSING
 
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization MethodsIRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
 
50120140503019
5012014050301950120140503019
50120140503019
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
Iciic2010 114
Iciic2010 114Iciic2010 114
Iciic2010 114
 
Nimble@itcecnogrid novel toolkit for computing weather
Nimble@itcecnogrid novel toolkit for computing weatherNimble@itcecnogrid novel toolkit for computing weather
Nimble@itcecnogrid novel toolkit for computing weather
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESSCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
 
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESSCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
 
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASESSCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
SCHEMA BASED STORAGE OF XML DOCUMENTS IN RELATIONAL DATABASES
 
Airline Data Analysis
Airline Data AnalysisAirline Data Analysis
Airline Data Analysis
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
 
Iciic 2010 114
Iciic 2010 114Iciic 2010 114
Iciic 2010 114
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
 
DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...
DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...
DATA MANAGEMENT ISSUES AND STUDY ON HETEROGENEOUS DATA STORAGE IN THE INTERNE...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

10420140501003

  • 1. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN 0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 22 COPYRIGHT OF THE REVISED ARCHITECTURE FOR IMPROVEMENT IN THE DESIGN OF DATA STRUCTURE OF THE TREE TO ENHANCE THE APPLICABILITY Dr. Suryakant B Patil1 , Ms. Ketaki G Katre2 , Ms. PriyankaGhegade3 , Dr. Preeti Patil4 1 Professor, JSPM’s Imperial College of Engineering & Research, Wagholi, Pune 2, 3 PG Research Scholar, JSPM’s ICOER, Wagholi, Pune 4 Dean (SA), HOD & Professor, KIT’s COE, Kolhapur ABSTRACT Intellectual Property Rights (IPR) is the emerging concept in the developing country like India, but the developed countries already taken major note of it. The major share of the asset values of the organizations from the developed countries is occupied by the IPR. In India the awareness has been increasing rapidly since last few years and so the scope is. When consider the data set we first need to distinguish between the structures designed and the elements in the data set (when we use the term ‘data’ we shall mean the content of the data set itself). Structural elements include things like the field names and a model for the data – the organization of these fields and their inter-relation.In data structures trees play major role from applicability point of view like Multicast Routing, Turing Machine, Graph Theory, CFG, Traversals, Enhancement of Network Life Time, Internal Network Characterization etc. Here we have proposed the revised architecture for the improvement in the design of the data structure of the tree. This improved design will turn up into the enhancement in the traversals, operations, time complexity along with the accessibility during executions.This will be the universal solution for the Binary tree as well as the general tree in the various applications by revising the structural design. The copyright of the same is in the pipeline through Associate Lawyer Ms. PriyaSomaiyya ofKatariya& Associates, a Patents & Trademarks Attorneys.As there are no general rules and the situation varies by Indian jurisdiction. Thus we proceed country by country detailing for (if any) this approach is used in a particular jurisdiction. INTERNATIONAL JOURNAL OF INTELLECTUAL PROPERTY RIGHTS (IJIPR) ISSN 0976-6529 (Print) ISSN 0976-6537 (Online) Volume 5, Issue 1, January - June (2014), pp. 22-29 © IAEME: http://www.iaeme.com/IJIPR.asp IJIPR © I A E M E
  • 2. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976 0976-6537 (Online), Volume 5, Issue Categories and Subject Descript K.5.0[Legal Aspects of Computing] E.1 [Data]: Data Structures GENERAL TERMS: Legal Aspects Keywords: IPR, Copyright, Data Structure, Tree, Binary Tree. 1. INTRODUCTION A tree is a non-linear data structure that consists of a root node and potentially many levels of additional nodes that form a hierarchy. A tree can be empty with no nodes called the null or empty tree or a tree is a structure consisting of one node called more subtrees as shown in the Figure 1. Figure 1: Terminologies used in tree: • Root - the top most node in a tree. • Parent - node that has a child. • Siblings - nodes with the same parent. • Leaves - nodes with no children. • Internal nodes - nodes with at least one child. • Degree - number of sub trees of a node. • Edge - connection between one node to another. • Height - The level of a node is defined by initially letting the root be at level 1 • Forest - A forest is a set of n Types of tree 1) Simple tree A simple unordered tree; in this diagram, the node labeled 7 has two children, labeled 2 and 6, and one parent, labeled 2. The root node, at the top, has no parent. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), 6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 23 Categories and Subject Descriptors f Computing]: General Legal Aspects, Algorithms, Design, Experimentation, Performance IPR, Copyright, Data Structure, Tree, Binary Tree. linear data structure that consists of a root node and potentially many levels of additional nodes that form a hierarchy. A tree can be empty with no nodes called the null or empty tree or a tree is a structure consisting of one node called the root and one or as shown in the Figure 1. : Data Structure of the Binary Tree the top most node in a tree. node that has a child. nodes with the same parent. nodes with no children. nodes with at least one child. number of sub trees of a node. connection between one node to another. The level of a node is defined by initially letting the root be at level 1 A forest is a set of n ≥ 0 disjoint trees. A simple unordered tree; in this diagram, the node labeled 7 has two children, labeled 2 and 6, and one parent, labeled 2. The root node, at the top, has no parent. 6529 (Print), ISSN , © IAEME Performance. linear data structure that consists of a root node and potentially many levels of additional nodes that form a hierarchy. A tree can be empty with no nodes called the the root and one or The level of a node is defined by initially letting the root be at level 1. A simple unordered tree; in this diagram, the node labeled 7 has two children, labeled
  • 3. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN 0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 24 2) Binary tree Binary tree is a tree data structure in which each node has at most two children (referred to as the left child and the right child). In a binary tree, the degree of each node can be at most two. Binary trees are used to implement binary search trees and binary heaps, and are used for efficient searching and sorting. A binary tree is a special case of a K-ary tree, where k is 2. 3) Binary search tree A binary search tree (BST), sometimes also called anordered or sorted binary tree, is a node-based binary tree data structure where each node has a comparable key (and an associated value) and satisfies the restriction that the key in any node is larger than the keys in all nodes in that node's left subtree and smaller than the keys in all nodes in that node's right sub-tree. Each node has no more than two child nodes. Each child must either be a leaf node or the root of another binary search tree. The left sub-tree contains only nodes with keys less than the parent node; the right sub-tree contains only nodes with keys greater than the parent node. II. PROPOSED DESIGN STRUCTURE There are three fundamental types of IPv4 addresses: unicast, broadcast, and multicast. A unicast address is designed to transmit a packet to a single destination. A broadcast address is used to send a datagram to an entire subnetwork. A multicast address is designed to enable the delivery of datagrams to a set of hosts that have been configured as members of a multicast group in various scattered subnetworks. Multicasting is not connection oriented. A multicast datagram is delivered to destination group members with the same "best-effort" reliability as a standard unicast IP datagram. This means that a multicast datagram is not guaranteed to reach all members of the group, or arrive in the same order relative to the transmission of other packets. The only difference between a multicast IP packet and a unicast IP packet is the presence of a "group address" in the Destination Address field of the IP header. Instead of a Class A, B, or C IP address, multicasting employs a Class D destination address format (224.0.0.0- 239.255.255.255). In the tree data structure we propose two extra fields as H (height of the tree) and C (count of the nodes). In the binary tree there will be left and right child. Initially H=0 and C=0, when we add root node then both will be H=1, C=1. If the next node of the child node will be NULL then only the addition of the new node is possible and for deletion there should be minimum one node available in the tree. Initial Declaration: int H=0, C=0; Node -> Ref1 = H; Node -> Ref2 = C; ADD (Root) || ADD (New Node) C+=1; if (Node ->Next == NULL) then H+=1; else repeat;
  • 4. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN 0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 25 Traversal: Display ( &Node -> Ref1, &Node -> Ref2 ) Value = Node -> Value; Node = Node -> Next; (*Node -> Ref2) - = 1; While (*Node -> Ref2 == 0) Repeat; *(Node -> Ref2) = 2X(*(Node -> Ref1)) + 1; Repeat; Existing IPRs and Background: 1. Binary trees for multicast traffic A network device may include an input device and a packet forwarding engine. The input device receives a data packet. The packet forwarding engine includes logic configured to determine that the data packet is to be multicast. The logic is also configured to identify one of multiple forwarding schemes, where each of the forwarding schemes is configured such that the packet forwarding engine generates and forwards no more than two copies of the data packet. Publication number US7710963 B1 Publication type Grant Application number US 11/696,929 Publication date 4 May 2010 Also published as US7983263, US20100165989 Inventors Amit Jain, Yong Luo Figure 2: CLAIM - Swotted Design Augmentation Contemplated
  • 5. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976 0976-6537 (Online), Volume 5, Issue 2. Communications network A method of operating a datagram network is disclosed. The method involves placing a group address in the source address field of the datagram. Notes within the datagram network forward the datagram in dependence on the contents of the source address field. This provides many of the scalability advantages offered by Multiprotocol Label Switched (MPLS) networks without introducing the overheads caused by connection set networks. The method can also easily provide different quality of service levels to different types of packets and is especially useful in providing Virtual Private Networks acr shared internet work such as the public Internet. Publication number WO2001052482 A1 Publication type Application Application number PCT/GB2001/000092 Publication date Jul 19, 2001 Inventors Parminder Singh Mudhar, Alan William O'neill Applicant British Telecomm, Parminder Singh Mudhar, Neill Alan William O Reducing Network Load Multicast routes are set up in a similar manner. A node wishing to join a multicast group broadcasts a RREQ with the destination IP address s and with the 'J'(join) flag set to indicate that it would like to join the group. Any node receiving this RREQ that is a member of the multicast tree that has a fresh enough sequence number for the multicast group may send source, the nodes forwarding the message set up pointers in their multicast route tables. As the source node receives the RREPs, it keeps track of the route with the freshest sequence number, and beyond that the smallest hop count to the next multicast group member. After the specified discovery period, the source message to its selected next hop. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), 6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 26 Communications network A method of operating a datagram network is disclosed. The method involves placing in the source address field of the datagram. Notes within the datagram network forward the datagram in dependence on the contents of the source address field. This provides many of the scalability advantages offered by Multiprotocol Label Switched networks without introducing the overheads caused by connection set networks. The method can also easily provide different quality of service levels to different types of packets and is especially useful in providing Virtual Private Networks acr shared internet work such as the public Internet. Publication number WO2001052482 A1 Application number PCT/GB2001/000092 Inventors Parminder Singh Mudhar, Alan William O'neill British Telecomm, Parminder Singh Mudhar, Neill Alan William O Figure 2: Multi-Cast Tree Multicast routes are set up in a similar manner. A node wishing to join a multicast group broadcasts a RREQ with the destination IP address set to that of the multicast group and with the 'J'(join) flag set to indicate that it would like to join the group. Any node receiving this RREQ that is a member of the multicast tree that has a fresh enough sequence number for the multicast group may send a RREP. As the RREPs propagate back to the source, the nodes forwarding the message set up pointers in their multicast route tables. As the source node receives the RREPs, it keeps track of the route with the freshest sequence smallest hop count to the next multicast group member. After the specified discovery period, the source nodes will unicast a Multicast Activation (MACT) 6529 (Print), ISSN , © IAEME A method of operating a datagram network is disclosed. The method involves placing in the source address field of the datagram. Notes within the datagram network forward the datagram in dependence on the contents of the source address field. This provides many of the scalability advantages offered by Multiprotocol Label Switched networks without introducing the overheads caused by connection set-up in MPLS networks. The method can also easily provide different quality of service levels to different types of packets and is especially useful in providing Virtual Private Networks across a Multicast routes are set up in a similar manner. A node wishing to join a multicast et to that of the multicast group and with the 'J'(join) flag set to indicate that it would like to join the group. Any node receiving this RREQ that is a member of the multicast tree that has a fresh enough sequence a RREP. As the RREPs propagate back to the source, the nodes forwarding the message set up pointers in their multicast route tables. As the source node receives the RREPs, it keeps track of the route with the freshest sequence smallest hop count to the next multicast group member. After unicast a Multicast Activation (MACT)
  • 6. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN 0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 27 Figure 3: N/W Load Vs CPU % ( PT 2.24 Mbps) This message serves the purpose of activating the route. A node that does not receive this message had set up a multicast route pointer will timeout and deletes the pointer. If the node receiving the MACT was not already a part of the multicast tree, it will also have been keeping track of the best route from the RREPs it received. Hence it must also unicast a MACT to its next hop, and so on until a node that was previously a member of the multicast tree is reached. Figure 4: N/W Load Vs CPU % (ST 7.29 Mbps) Assume that a stock ticker application is required to transmit packets to 100 stations within an organization's network. Unicast transmission to the group of stations will require the periodic transmission of 100 packets where many packets may be required to traverse the same link(s). Multicast transmission is the ideal solution for this type of application since it requires only a single packet transmission by the source which is then replicated at forks in the multicast delivery tree. 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 0 100 200 300 400 500 600 CPU% Network Load (Mbps) Reduced N/W Load (Pick Time) CPU % (2.24 Mbps) Peak Time CPU % Reduced 0 0.5 1 1.5 2 2.5 3 3.5 4 0 100 200 300 400 500 600 CPU% Network Load (Mbps) Reduced N/W Load (Slack Time) CPU % (7.29 Mbps) Slack Time CPU % Reduced
  • 7. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN 0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 28 III. CLAIMS The additional soft links provided for the root node as a Ref1 and Ref2 will be useful during the executions and traversals throughout respective applications. 1. The Ref1 will have the height of the tree which is creates along with the creation of the root node. The same is persistent throughout till the existence of the last node. This link Ref1 can be used directly rather than calculating the height of the tree or binary tree with the help of the some algorithms or calculations. The direct availability of this value throughout the all operations and traversal will be an added advantage to calculate the Prefix/ Infix/ Postfix etc as well as during the Preorder, Inorder and Post order Traversals. The additional toll will be negligible compared with the reduced time complexity for faster processing during relative applications. 2. The Ref2 will be the zero before create the root node and will have continuous updations as per the addition/ deletions operations on the tree or binary tree. The addition will have the simultaneously update this pointer value and will available throughout for further use rather than to calculate the height and followed by the count. Either traversals or Grammar operations or multicast routing table the repetitive calculations for the same will be minimized which results in the improvement in the latency time with faster results during the execution. As this value is readily available, no need to traverse till the NULL pointer to check and it can have predefined loop with this count value as a limit. Both the pointers will be deleted whenever the root gets deleted and its memory location will get free. IV. REFERENCES PATENT CITATIONS Cited Patent Filing date Date Applicant Title US7983263 * 12 Mar 2010 19 Jul 2011 Juniper Networks, Inc. Binary trees for multicast traffic WO199800 2821A1 * Jul 15, 1997 Jan 22, 1998 3Com Corp Virtual network architecture for connectionless LAN backbone US5910955 * Aug 25, 1997 Jun 8, 1999 Fujitsu Limited Switching hub capable of controlling communication quality in LAN US5402415 * 22 Apr 1993 28 Mar 1995 Washington University Multicast virtual circuit switch using cell recycling
  • 8. International Journal of Intellectual Property Rights (IJIPR), ISSN 0976-6529 (Print), ISSN 0976-6537 (Online), Volume 5, Issue 1, January - June (2014), pp. 22-29, © IAEME 29 Cited Patent Filing date Date Applicant Title US7263099 * 14 Aug 2002 28 Aug 2007 Juniper Networks Multicast packet replication US7266120 * 18 Nov 2002 4 Sep 2007 Fortinet, Inc. System and method for hardware accelerated packet multicast in a virtual routing system US7289503 * 30 Jul 2002 30 Oct 2007 Juniper Networks, Inc. Systems and methods for efficient multicast handling US7420972 * 3 Aug 2007 2 Sep 2008 Juniper Networks, Inc. Multicast packet replication US7519054 * 27 Jan 2005 14 Apr 2009 Intel Corporation Replication of multicast data packets in a multi-stage switching system US20060114903 * 29 Nov 2004 1 Jun 2006 Egenera, Inc. Distributed multicast system and method in a network US20060215698 * 17 Nov 2004 28 Sep 2006 Amen Hamdan Communication subsystem controlled information dissemination