The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a novel dynamic scheme to estimate the execution time of stored procedures inside the Database Management Systems (DBMS). Our estimation model can provide users an accurate estimation of the execution time of stored procedures. The proposed estimation model adopts the basic idea of Radial Basis Function (RBF) network to accurately predict the execution time of the stored...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
Applications like stock markets, embedded systems and telecommunications are becoming more demanding real-time database management systems. Research in the area of real-time databases leads to the development of sophisticated control algorithms and for testing these in different configurations we need a simulator framework that allows us to see how they behave for different transaction workloads....
The campus electricity consumption in Taiwan increases steadily and causes problems to school finance. The need to save energy is urgent. This research presents a campus energy management system (CEMS), which is based on Web and database server (WebDB). With measurement and control interface, communication network, database management system, and Web portal server, a complete application platform...
The first Natural Language Interfaces to Databases were built and designed for specific domains, and their customization processes implied source code manipulation. Open systems and database inter-operability enabled these interfaces to be independent of the operating system and database management system, and the separation of the knowledge base from the translation process allowed for domain portability...
As the capacity of flash memory increases and price drops, flash memory will compete more successfully with disk drives. It is thus not inconceivable to consider running a full database system on the flash-only computing platforms or running an embedded database system on the lightweight computing devices. In this paper, the characteristics of flash memory and the key points of designing a flash-based...
Semantic properties that reflect quality requirements for stored data can be expressed by database integrity constraints. Violated instances of constraints serve as a basis for measuring quality. Such measures also serve for containing impaired quality across changes.
In order to solve the problems of the simulation data management in a company or institution, the Universal Simulation Data Management System (USDMS) is studied. The simulation data management task is analyzed for the data ownership management in the USDMS. The metamodel of the Basic Data Object (BDO) is proposed creatively for the related simulation data. The implementation of the USDMS in the database...
Database management systems (DBMS) have a long tradition in high security and several mechanisms needed to protect data have been proposed/consolidated in the database arena. However, the effectiveness of those mechanisms is very dependent on the actual configuration chosen by the database administrator. Tuning a large database is quite complex and achieving high security is a very difficult task...
This paper describes the virtual datapsilas conception and examples and proposes a scheme to integrate these data. Now the information systems grow so fast, this situation lets the communication among systems more complicate. So it will be very difficult to handle the logical business when the old way is used to define the different data and the complex, no- transplantable and humdrum way to handle...
It is one of the important measures for power plants running safely to take spot-checking management, know performance of equipments, discover potential hazard and abnormity of equipments in time, and avoid the faults of equipment in the early. The equipment management in some power plants is irregular and some advanced technologies is not be used adequately. The methods of spot-checking management...
The cumulative data by bridge management system (BMS) is helpful for decision making for bridge maintenance measure. According to the current state of municipal bridges, the design of system development of Sihui BMS (SH-BMS) is discussed in this paper. The network design based on browser/server (B/S) paradigm is presented and major operational functions integrated four modules with flowchart of operation...
In recent years, the advent of high throughput data generation techniques have increased not only the number of objects collected in databases, but also the number of attributes describing these objects. Clustering is the process of grouping the data into classes or clusters, so that objects within a cluster have high similarity in comparison to one another but are very dissimilar to objects in other...
With the informationization, networking and intelligent development of modern logistics, the enormous data together with very critical knowledge hidden therein are generated from the management process of logistics enterprises. The data mining methods such as clustering, association rules, sequential pattern, statistics analysis, characteristics rules and so on can be used to find out the useful knowledge,...
This research is concerned with plagiarism in software design. Specifically, the focus is on database design. Generally, producing plagiarized software may be done through illegal use of someone else's source code or database design. Since it is hard to steal source code from the original author(s), the database schema is usually easier to be viewed, studied and hence plagiarized. Efficient design...
Aiming at the deficiency of being difficult to investigating and analyzing the traffic data by the toll data of freeway, utilizing the information storage technology of PDF417 two-dimensional (PDF417-2D) bar code, this paper sets up an integrated system of freeway toll and traffic data investigation, makes the encoding rules and content of record information which on the PDF417-2D bar code, and presents...
This paper describes the database approach of inspection robot for power transmission lines, discusses the issues which should be considered in developing a database management system of an inspection robot. The practical use of the database management system, together with an expert system is contributed to the inspection task of power transmission lines.
One of the central problems in knowledge discovery in databases, more precisely in the field of association rule mining, relies on the very large number of rules that classic rule mining systems extract. This problem is usually solved by means of a post-processing step, that filters the entire volume of extracted rules, in order to output only a few potentially interesting ones. This article presents...
The type of the workload is one of the key factors on database management system (DBMS) tuning. Different types of workload (OLTP, online transaction processing and OLAP, online analytical processing) mean different resource allocation strategies. In this paper, we present an approach to automatically identify a DBMS workload as either OLTP or OLAP. We use C5.0 algorithm to construct a set of classifiers...
Flash memory is getting more popularity for its non-volatility, shock resistance, no mechanical delay and random access. Increasing size of flash memory as well as decrease in price has strengthened the possibility of replacing hard disk in near future. In this survey paper we discussed about the technological constraints of flash memory and how these problems has been solved so far. This survey paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.