The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) in all its essentiality is a collection of sensors bridged together tightly. The present day development in the technology industry has thus elevated the emphasis of large amounts of data. IoT is expected to generate and collect an enormous amount of data from varied locations very quickly. The concerns for features like storage and performance factors are coercing the...
With the advent of big data phenomenon in the world of data and its related technologies, the developments on the NoSQL databases are highly regarded. It has been claimed that these databases outperform their SQL counterparts. The aim of this study is to investigate the claim by evaluating the document-oriented MongoDB database with SQL in terms of the performance of common aggregated and non-aggregate...
Cloud SQL Server is a relational database system designed to scale-out to cloud computing workloads. It uses Microsoft SQL Server as its core. To scale out, it uses a partitioned database on a shared-nothing system architecture. Transactions are constrained to execute on one partition, to avoid the need for two-phase commit. The database is replicated for high availability using a custom primary-copy...
We present here a data-base firewall to prevent from attacks against MySQL back-end data-base of web applications. It works as a data-base connection proxy, which means that the web applications connect to the DB-FW rather than the original MySQL server directly. The firewall listens SQL query requests from the client as well as analyzes them, and then if they are safe, will call the original MySQL...
Spatial analysis is a spatial data analysis technique based on the location and the shape of the geographical object. In this paper, we introduce two spatial data types provided by SQL Server 2008 which refers to Geometry and Geography. As with Shapefile data structure supported by ESRI, Geometry and Geography are object oriented data structures which make it more easily to store semantic information...
A wide range of database applications manage time-varying information. Existing database technology currently provides little support for managing such data. In this paper, based on principles and ideas of a temporal processing component called TempDB, we deeply insight into extensions to non-temporal RDBMS, and then use RMI technology to develop a distributed temporal data management platform, the...
In order to realize the modernization of mine enterprises, enforcing “Digital Mine” construction is necessary. And the key of enforcing “Digital Mine” construction is to solve the effective storage and management of mine spatial data. The paper firstly shows the characteristic features of mine spatial data. Then it discusses the method of the storage and management of mine spatial data on the basis...
This paper presents the design and implementation of meteorological data display system based on SQL Server meteorological data warehouse. The purpose is to apply data warehouse to the field of meteorological research. The system uses SQL Server Reporting Services platform to generate meteorological data report and shows the reports based on two-dimensional maps. Moreover, the system is published...
The seismic precursor database is based on Microsoft SQL Server 2000, its management software is developed with Visual Basic language, the software functions and key technologies adopted are introduced, and monthly report of subsurface fluid can be printed with the software. The software plays an important role in the daily work of the seismic precursor network.
It is described the basic knowledge of data mining, SQL Server 2005 data mining platform and its function, and presented advanced structured scheme of data mining based on SQL Server 2005. On this basis, using decision tree algorithm provided by SQL Server implements data mining for an example, and results are forecast to achieve the desired purpose.
Business intelligence platform is used by an enterprise is an effective tool to help and guide your decision making to keep your products and services competitive. This paper systematically introduces the relate components of a business intelligence system and gives a complete Business intelligence solution with Microsoft SQL Server 2005.
Predicting application is used by an enterprise is a power tool to inform and guide our decision making to keep our products and services competitive. This paper briefly introduces the related knowledge and terminology for data mining and analyzes how to build data mining application for predicting. This paper provides examples to answer business problem by data mining, and broadly outlines the approach...
This paper provides an introduction to data mining, and defines related terminology. The article gives examples from the daily news of questions that potentially can be answered by data mining, and broadly outlines the approach to creating and deploying data mining solutions in a business. Finally, the author explains the advantages of using Microsoft data mining technologies, and provides some helpful...
At present, as a new trend of the telecommunication industry, mobile application requires refine the technique of data management continuously, therefore, mobile database has been come into being. The thesis mainly focused on the introduction of mobile database and the characteristics of data management, especially analyzed the architecture and functions of the SQL Server CE. On this basis, according...
After analyzing the insufficiency which existed in current most of long-distance education Websites, this paper introduces Data Mining technology, which is widely used in the field of the electronic commerce and so on, into the long-distance education system. Considering the difference between the long-distance education system and electronic commerce, this paper proposes a kind of system model based...
In recent years, web applications have become tremendously popular. However, vulnerabilities are pervasive resulting in exposure of organizations and firms to a wide array of risks. In spite of many tools and techniques, attacks on web application especially through SQL Injection Attacks are at a rise. Threat modeling is an important risk assessment and mitigation practice that provides the capability...
This with the development of sports and modern computer technologies, a great deal of data were recorded, including training data of athletes, test data of students in sports course, and test data of physical health standard (PHS). However, usage of these records is limited. Patterns and relationships among data may still retain hidden. Data mining, usually applied in business fields, is a helpful...
Along with the deepening development of e-commerce, it becomes important to know the user access mode. Through Web usage mining, the server log, registration information and other relative information left by user access can be mined with the user access mode which will provide foundation for decision-making of organizations. This paper proposes a SQL Server2000 based Web usage mining solution and...
In this paper, Anomaly Detection by Resource Monitoring (Ayaka), a novel lightweight anomaly and fault detection infrastructure, is presented for Information Appliances. Ayaka provides a general monitoring method for detecting anomalies using only resource usage information on systems independent of its domain, target application and programming languages. Ayaka modifies the kernel to detect faults...
Developing, maintaining and accessing complex information repositories are some of the main concerns of todaypsilas information society. In huge distributed systems, guaranteeing good performances and data integrity is a real challenge when using standard relational databases. This paper presents a database concept methodology that addresses these concerns under the form of an ldquoRDBMS independentrdquo...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.