Found 19 Articles for System

Which IoT Protocol Should I Use for My System?

Mr. Satyabrata
Updated on 29-Aug-2023 19:38:25


The Internet of Things (IoT) is a network of interconnected physical objects that can gather and share data over the internet. To enable communication between these devices, specific IoT protocols are utilized. Numerous IoT protocols exist, each with its own advantages and limitations. Selecting the most suitable protocol for your system depends on several factors, such as the device types employed, the volume of data to be collected, and the security needs of your application. By considering these factors, you can determine the optimal IoT protocol to support seamless and secure communication within your IoT ecosystem. In this ... Read More

Understanding Recommender Systems: Personalization in the Digital Age

Devang Delvadiya
Updated on 01-Aug-2023 17:33:14


We are surrounded by an incredible quantity of information in the modern digital world. The choices range from television shows and novels to goods and services. Given the abundance of options available, it can be quite challenging for users to pinpoint precisely what they are seeking. Recommender systems can help in this situation. In this post, we'll look at the concept of recommender systems and how they give users individualized recommendations to assist them in sorting through the dizzying array of internet possibilities. What are Recommender Systems? Algorithms used in recommender systems are used to identify and suggest products and ... Read More

Segmentation in Operating System

Updated on 18-Jul-2023 17:02:25

2K+ Views

In the Operating System, Segmentation is mainly useful to maintain the modular structure of a program. The purpose of using segmentation is to achieve the user's view of memory allocation similarly when paging does not bother where programs start and end and it simply divides the program into pages. The non-adjacent memory allocation technique can be divided into two types namely paging and segmentation. In segmentation, the program is not divided randomly or with a variable size but with a fixed page. Segmentation in OS The segmentation technology is used in operating systems and the process is divided into many ... Read More

Seek Time vs Transfer Time in Disk Scheduling

Updated on 18-Jul-2023 16:56:18


Within the domain of computer frameworks and capacity gadgets, the execution of disk planning plays an essential part in optimizing information get to and recovery. Two basic components that altogether affect disk execution are seek time and transfer time. Seek time speaks to the length it takes for the disk arm to move to the specified track, whereas transfer time signifies the time required to examined or type in information once the required track is situated. This article points to investigate and explain the elemental contrasts between seek time and transfer time, shedding light on their person importance in disk ... Read More

SCAN vs FCFS in Disk Scheduling Algorithm

Updated on 18-Jul-2023 16:54:46


Disk scheduling algorithms play a pivotal part in optimizing the execution of disk frameworks by proficiently getting to information. Among the different calculations, Scan (moreover known as the elevator algorithm) and FCFS (First-Come-First-Serve) are two commonly utilized approaches with particular procedures. Check moves the disk arm over the platter in a specific design, adjusting demands because it clears in one course, which minimizes the look for time and improves productivity. On the other hand, FCFS follows a straightforward guideline of servicing the demands within the arrangement they arrive at, without any thought for the area of information on the disk. ... Read More

Scheduling in Real time Systems

Updated on 18-Jul-2023 16:52:28

1K+ Views

A real-time system comprises real tasks or applications which need to get processed without any delay. In this system, a time-bound approach is followed for fixed time constraints and the tasks have to be processed within the time constraints. This timing constraint is termed the deadline for real-time tasks. The requirements specified for real-time systems are given by timelines and predictability, where timelines denote how near/close the task to the deadline given is and predictability defines the amount of deviation that occurs in the timelines that are delivered. Real-time Systems Traditional scheduling algorithms like priority-based ones, give priority to some ... Read More

Multiple Granularity Locking in DBMS

Mithlesh Upadhyay
Updated on 17-May-2023 15:54:25

1K+ Views

DBMS (Database Management System) is used for effective management of data. It enables multiple users to access the same data without compromising its consistency and integrity. A Challenge in DBMS is locking, which is used to prevent multiple users from accessing the same data simultaneously. In this article, we will discuss a detailed discussion on multiple granularity locking. Multiple Granularity Locking Multiple granularity locking is a locking mechanism that provides different levels of locks for different database objects. It allows for different locks at different levels of granularity. This mechanism allows multiple transactions to lock different levels of granularity, ensuring ... Read More

Difference Between DFD and ERD

Md. Sajid
Updated on 15-May-2023 15:38:00

2K+ Views

DFD (Data Flow Diagram) and ERD (Entity Relationship Diagram) are two types of diagrams that are used to describe the flow of data and information within a system. DFD is used to model data flow between processes, data stores, and external entities. ERD is a graphical representation of entities and their relationships. Read this article to find out more about DFD and ERD and how they are different from each other. What is DFD? DFD consists of four parts: entities, processes, data flows, and data stores. Customers, suppliers, and employees are examples of entities that are external data sources or ... Read More

Address Resolution in DNS (Domain Name System)

Updated on 05-May-2023 10:56:10


DNS (Domain Name System) is an essential component of the internet infrastructure that translates human-readable domain names into computer-readable numbers called IP addresses. When you type in a website address in your web browser, then DNS translates into an IP address such as (Assume) this IP address is used by computers for identification and then, they communicate with each other. The process of converting domain names into IP addresses is called address resolution. Address resolution plays a critical role in the functioning of the Internet as it enables users to access websites using easy-to-remember domain names instead of complex ... Read More

Soft Real-time Communication in LAN

Updated on 04-May-2023 18:40:21


The term Real- time means the live communication between the devices. It involves expressing the thoughts of one person to the other using the telecommunication system. The time taken for the message is instant and enables live meetings through Zoom or Google Meet calls. This quick delivery of messages is possible as there are no storage parts between the client and the server. It increases the transfer time in other message transfer protocols like email. Soft Real-Time Communication Soft real-time communication provides an efficient transfer of messages from the host to the client with a minimal loss is tolerable. The ... Read More