The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional database information and IoT real time data are now evolving to unified paradigms in whose accessing diverse data endpoints can be challenging due to interoperability problems that emerge when instant data are monitored and collected in typical database scenarios. In this paper, a new model is proposed to link persistent data with instantaneous information using publish-subscribe networks...
This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is proposed to be used where in the user, after inserting...
The Mobile-Edge Computing standard promises co-locating edge servers with mobile phone base stations. Web services running on this new ecosystem will have to address the challenges of this new model in order to see its benefits. In this work, we briefly discuss design guidelines for scaling strongly consistent geo-distributed databases to the MEC environment. Following these guidelines, we present...
Deferred update replication (DUR) is an established approach to implementing highly efficient and available storage. While the throughput of read-only transactions scales linearly with the number of deployed replicas in DUR, the throughput of update transactions experiences limited improvements as replicas are added. This paper presents Parallel Deferred Update Replication (P-DUR), a variation of...
This paper describes architecture for mobile databases where data is distributed over mobile devices. We propose strategies for query execution during mobility. The underlying architecture is based on 3G telephone networks.
The massive increase in the size of the data provided by e-Science applications requires not only to increase the capabilities of resources, but also to design new strategies for efficient utilization of already available resources. In this paper we present a scalable approach to extend a file-oriented storage system, Chelonia, with geographically distributed databases defined by a generic database...
In distributed system, deadlock is a common phenomenon. If a transaction requires more than one resource for its task to be accomplished, such request is called an AND model request. In this paper we have proposed a method for elimination of AND model deadlocks in distributed system. A Multi Granular Locking (MGL) technique is proposed which locks the database at various granules. This technique is...
In this paper, we address reliability issues in three-tier systems with stateless application servers. For these systems, a framework called e-Transaction has been recently proposed, which specifies a set of desirable end-to-end reliability guarantees. In this article, we propose an innovative distributed protocol providing e-Transaction guarantees in the general case of multiple, autonomous back-end...
The design scheme and key technologies of remote tax declaration system (RTDS) is proposed in this paper. Especially, it is presented that how to apply XML to deal with heterogeneous data source, how to make use of the PKI and DES algorithms to improve the efficiency of encryption, and how to solve the concurrency of clients in RTDS by using Java threads. Finally, the experiment results are shown...
In this paper, we propose a profile management system to provide personalized service by managing adapted content for both user and device. To provide differentiated adapted content for each user, we identified the interaction between user and device. The content provides information for personalized service by managing original content and adapted content. In the future, the users who are using services...
Significant requirements for a large digital preservation system are the system scalability, its ability to store and service heterogeneous digital holdings, and the evolvability over time of both the technologies comprising the system and the data formats in its storage. The use of information technology by the government, business corporations, academic institutions, and the general public results...
SOA concept of service-oriented architecture and related technologies are described in this paper. With the current development of computer technology, a software and hardware architecture design of product data management system is given, and it bases on object-oriented technology and distributed database technology with service-oriented, furthermore it includes the security architecture and education...
At present, different technologies were used to handle heterogeneous database in system development. It's easy for the application developers to access single database, however, the technology and code complexity make a big challenge to handle data of systems which obtain multiple data sources, no matter what the application patterns base on C/S B/S or the mixture of both. This paper offers a perspective...
With the development of information technology, the government become increasingly demanding of information technology. Therefore, it also brings some problems, due to heterogeneous databases and heterogeneous application systems, lead to each application system to become an “information isolated island”. An effective solution is using the method of information integration and data exchange as well...
A standards-based, open-source middleware system was designed and implemented to facilitate the analysis of large and disparate datasets. This system makes it possible to access several different types of database servers simultaneously, browse remote data, combine datasets, and join tables from remote databases independent of vendor. The system uses an algorithm known as Dynamic Merge Cache to handle...
The development of computer development, unfortunately, and abuse of computers, or abuse of data and information that are processed modern information technologies. The mass use of computers in different circumstances, with the increasing use of telecommunication equipment by increasing the number of users, enables a growing number of thieves, and unauthorized persons (hacker) to break through the...
It is well known that the primary objective of a world wide business organization is to find a way to improve the delivery of services and facilities for business interactions. Advancements in information and communication technologies especially in the field of networking can be utilized to enhance the co-ordination and enforcement policies of such organizations. The information needed by an organization...
In this work, we make utilization of users' computers involved in this distributed storage system easily, and share their powerful resources with this P2P environment. Users can download the files from this P2P distributed storage system. To transfer more efficiently, this paper also proposes a parallel transfer algorithm for every node and replication mechanism. The experiment results have shown...
Common solutions to database replication use a single replication protocol. This approach lacks flexibility for changing scenarios or when dealing with heterogeneous client application requirements. Our proposal is a metaprotocol that supports several replication protocols which may follow different replication techniques or provide different isolation levels. With our metaprotocol, replication protocols...
The existing synchronization solutions of mobile database are not independent from the database server because they use database dependent information such as metadata or use specific functions of database server such as trigger and time stamp. These constraints are critical weak point in ubiquitous environment because various applications are running in various devices and servers in ubiquitous environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.