scholarly journals Self-Optimizing Database Architecture

Author(s):  
Janvi Desai

Abstract: Over the most recent decades, analysts and database service providers have fabricated devices to help DBAs (Database Administrators) in various parts of framework tuning and the actual design of the database. Most of this past work, regardless, is fragmented on the grounds that it expects people to come up with an official agreement or judgement about any modifications to the data in the database and fix issues after they happen rather than preventing such cases from taking place or adjusting to these changes automatically. What is required for a really "self-driving" database management system (DBMS) is another way of approaching this that is intended for independent activity and automatic decision making. This is different from prior endeavors since all angles of this framework are constrained by a coordinated arranging part that not just enhance the framework for the current responsibility, but in addition to this, it also predicts future responsibility that might take place and prepares itself for such not-so-common occurrences and adjusts to them as required while keeping the efficiency of the operations as close to normal as possible. With this, the DBMS can uphold all the past tuning procedures without requiring a human to decide the right way and proper opportunity to use them. It likewise empowers new advancements that are significant for current DBMSs (Database Management System), which are impractical today because of the fact that the intricacy of overseeing these frameworks has outperformed the abilities of human specialists who are supposed to tune them and make changes when required. Keywords: Database Management System, Database Administrator, Forecasting, Long Short-Term Memory, Recurrent Neural Networks

Author(s):  
Theodoros Tzouramanis

Anomaly Detection; Cookie Poisoning; CRLF Injection Attack; Cross-Site Scripting (or CSS) Attack Database Administrator (DBA); Database Management System (DBMS); Database Structured Query Language (SQL); Directory Traversal Attack; Google Hacking Attack; Secrecy; Integrity; and Availability; SQL Code Poisoning (or SQL Injection) Attack


Author(s):  
Gede Anantaswarya Abhisena ◽  
I Made Sukarsa ◽  
Dwi Putra Githa

Database auditing dapat menjadi komponen penting dalam keamanan basis data dan kepatuhan terhadap peraturan pemerintah. Database Administrator perlu lebih waspada dalam teknik yang digunakan untuk melindungi data perusahaan, serta memantau dan memastikan bahwa perlindungan yang memadai terhadap data tersedia. Pada tingkat tinggi, database auditing merupakan fasilitas untuk melacak otoritas dan penggunaan sumber daya database. Ketika fungsi auditing diaktifkan, setiap operasi database yang diaudit menghasilkan jejak audit dari perubahan informasi yang dilakukan. Sinkronisasi database adalah bentuk dari replikasi, yang merupakan proses untuk memastikan setiap salinan data pada database berisi objek dan data yang serupa. Sinkronisasi database dapat dimanfaatkan dalam berbagai keperluan, salah satunya membangun auditing untuk mencatat setiap aktivitas yang terjadi pada database. Jejak audit dari operasi database yang dihasilkan, memungkinkan DBA (Database Administrator) memelihara audit trails dari waktu ke waktu, untuk melakukan analisis tentang pola akses dan modifikasi terhadap data pada DBMS (Database Management System).


Author(s):  
Chet Wood

Abstract An Object Database Management System (ODMS) can be a very useful component when developing applications for use in engineering and manufacturing. Choosing the right product requires a thorough analysis of the data requirements of one’s application, and an equally thorough study of the characteristics of the vendor products. Over a period of about two years, data was gathered on the products of object oriented database manufacturers and researchers. As an example of how to analyze database requirements, an overview of the requirements of our application is presented, followed by a tutorial on the elements and features provided by an ODMS. A brief description is given of each of about a dozen products. Finally, there are tables comparing specific features of a number of these systems.


2017 ◽  
Vol 1 (4-2) ◽  
pp. 192 ◽  
Author(s):  
Mohd Amin Mohd Yunus ◽  
Sonniaa K.V. Gopala Krishnan ◽  
Nazri Mohd Nawi ◽  
Ely Salwana Mat Surin

The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their information from malicious attack or stealing information. There are few types of technique applied to enhance the database security level.  


Author(s):  
Patrick Martin ◽  
Wendy Powley ◽  
Min Zheng

This chapter introduces autonomic computing as a means to automate the complex tuning, configuration, and optimization tasks that are currently the responsibility of the database administrator. We describe an algorithm called the dynamic reconfiguration algorithm (DRF) that can be implemented as part of an autonomic database management system (DBMS) to manage the DBMS buffer pools, which are a key resource in a DBMS. DRF is an iterative algorithm that uses greedy heuristics to find a reallocation that benefits a target transaction class. DRF uses the principle of goal-oriented resource management. We define and motivate the cost- estimate equations used in the algorithm and present the results of a set of experiments to investigate the performance of the algorithm.


1996 ◽  
Vol 35 (01) ◽  
pp. 52-58 ◽  
Author(s):  
A. Mavromatis ◽  
N. Maglaveras ◽  
A. Tsikotis ◽  
G. Pangalos ◽  
V. Ambrosiadou ◽  
...  

AbstractAn object-oriented medical database management system is presented for a typical cardiologic center, facilitating epidemiological trials. Object-oriented analysis and design were used for the system design, offering advantages for the integrity and extendibility of medical information systems. The system was developed using object-oriented design and programming methodology, the C++ language and the Borland Paradox Relational Data Base Management System on an MS-Windows NT environment. Particular attention was paid to system compatibility, portability, the ease of use, and the suitable design of the patient record so as to support the decisions of medical personnel in cardiovascular centers. The system was designed to accept complex, heterogeneous, distributed data in various formats and from different kinds of examinations such as Holter, Doppler and electrocardiography.


1999 ◽  
Author(s):  
V.G. Ivensky ◽  
A. Olesen ◽  
T. May ◽  
L. Sroka ◽  
A. Pellegrino

1995 ◽  
Vol 32 (4) ◽  
pp. 677
Author(s):  
M J Shin ◽  
G W Kim ◽  
T J Chun ◽  
W H Ahn ◽  
S K Balk ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document