The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of computer technology, computer networks have become an important part of human society, to the social development of a huge role. It used a variety of database technology, which is giving hackers to provide a means of attack damage. To this, aiming at the computer network database security threats and prevention of related problems are analyzed.
In Software-as-a-Service, multiple tenants are typically consolidated into the same database instance to reduce costs. For analytics-as-a-service, in-memory column databases are especially suitable because they offer very short response times. This paper studies the automation of operational tasks in multi-tenant in-memory column database clusters. As a prerequisite, we develop a model for predicting...
The data management is very important and complex in the trade management system. The large data storage and management can be effectively solved by the database. In this paper, a trade management system is developed, design and implementation of the SQL Server database is studied, including storage and management of customer information, order information, product information, supplier information,...
For the need of leak detection of thermal plastic seal bottles in beverage production enterprise, this article describes the research and development of a data acquisition, storage and analysis software system with the use of VC++ and SQL software tools, based on the previously constructed control system of beverage bottle leak detection machine. The software is for the leak bottle detection machine...
Database-as-a-service (DAAS) is a new model for data management, where a service provider offers customers software management functionalities as well as the use of expensive hardware. This service enables data integration and access on a large scale in cloud computing infrastructures. Addressing data privacy in DAAS is considered a significant issue for any organizational database. Due to the fact...
In this paper, we discuss information model of IEC 61850 protocol. We give the prototype design of information model of IEC 61850 and study record accessing times. We suggest use of real time main memory database model for IEC 61850. We also use TLSF memory allocator for assigning memory to records in IEC 61850 prototype. We suggest a back up scheme for database for fast crash recovery. Finally we...
Web mining consists of three aspects: Web content mining, Web structure mining, and web usage mining. The most important application of web mining is targeted advertising. Sequential mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. An important application of sequential...
Safety is a very critical domain in an industrial organization. This is especially true for organizations having multiplicity of scientific and engineering disciplines. This requires a broad based safety management system which has to take into account various aspects consisting of planning, management, preventive measures, compliance to safety standards and response to emergencies. In order to make...
Database outsourcing is emerging as an important trend in which the data owners ship their data to external service provider. Since a service provider is not fully trusted, security and privacy are significant issues. They can be referred to as data confidentiality, user and data privacy, query assurance and secure auditing. Among them, secure auditing takes an important role to have a secure database...
Security issues are quite important in applications of Database As a Service (DAS) where data are published to the untrusted service providers by data owners. This paper is to address the problem of verifying the completeness of query results generated from the untrusted service providers in DAS applications. Existing studies on completeness verification of query results are focused on one dimensional...
Multi-tenancy supporting becomes a basic characteristic of Software-as-a-Service (SaaS) operation. In multi-tenancy environment, tenant placement problem is critical for balance the database server workload. In this paper, we discuss how the cross-tenant data access affects the workload and how to optimize resource utilization in tenant placement process. This paper comes up with a SaaS tenant data...
The paper introduced the structure of power monitor system, and discussed the realization of communication between monitor center and monitoring data acquisition device and designed the interface and database of monitor center.
Associating business information with information about IT resources is important. Organizations need to understand the business relevance of resources to answer questions such as which business applications are affected in case of a server outage, and to understand the resource footprint of business applications. Maintaining this relationship over the life cycles of resources and business applications...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
This paper conducts an investigation in the domestic vehicle management standards and proposes an improved design of vehicle management system based on RFID technology. The system improves vehicle management systems in the domain of system security, data acquisition, statistical analysis, remote computer monitoring and hand-held card reader applications by integrating RFID technology with network...
Wi-Fi fingerprinting is a technique which can provide location in GPS-denied environments, relying exclusively on Wi-Fi signals. It first requires the construction of a database of “fingerprints”, i.e. signal strengths from different access points (APs) at different reference points in the desired coverage area. The location of the device is then obtained by measuring the signal strengths at its location,...
Apply the Active Data Objects to LabVIEW, coordinating the LabSQL tool kit in several ways to carry on the connection separately to three kinds of commonly used databases (Access, MySQL, MS SQL), which has expanded the applications of LabSQL tool kit, enriched testing software's database connection mode, and a guide to improving the data-handling capacity of the testing software. Then with the efficiency...
The present paper focuses on means of creating a framework for e-learning services by integrating learning and dedicated information systems facilities within a web portal. The information system facilities are provided into the web portal by retrieving the dedicated software services from the specific systems and synchronizing databases based on various technologies (php / postgresql, asp / MS sql)...
In recent years, many accounting scandals have been reported in companies not only in the United States, but also in Japan. The need for Internal Control is growing steadily. In particular, auditing logs are important for Internal Control. Any Internal Control without audits is incomplete. Furthermore, logs are necessary not only for defensive implications, but also as they contain much information...
Computer-based testing will be no doubt proved to be a positive development in assessment practice. A computerized item bank is the basis for computer-based testing system and distance learning. This paper briefly introduces characteristics of web-based test item bank, analyzes related issues in the developing of the system, and describes the architecture of a web-based system, database structure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.