An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce System Performance

2004 ◽  
Vol 18 (2) ◽  
pp. 29-47 ◽  
Author(s):  
Uday S. Murthy

This research investigates the effects on e-commerce system performance of alternative types of application controls that continually monitor transaction-processing activity. The three categories of controls examined were relatively simple controls involving calculations, more complicated controls requiring database lookups, and the most intensive controls involving the use of aggregate statistical functions. A test e-commerce platform comprising a sales order entry application was programmed using Active Server Pages (ASP) technology. The system, running on a Windows 2000 Server platform with the data in a SQL Server 2000 database, was stress-tested using Microsoft's web Application Stress tool. To gauge the performance of the system under low, medium, and high load conditions, various statistics were gathered including processor utilization, ASP requests per second, SQL Server transactions per second, ASP requests queued, and time to last byte of the main order processing script. Results revealed that calculation controls could easily be accommodated by the e-commerce system, regardless of system load. Lookup controls had a detrimental effect on system performance only when they were heavily used. Aggregate function controls had a dramatic negative impact on system performance. The results of this study are useful for both capacity planning and capacity management and provide support for both internal and external auditors requesting the inclusion of continuous monitoring controls in modern e-commerce systems.

2013 ◽  
Vol 433-435 ◽  
pp. 1635-1638
Author(s):  
Zhi Gang Feng ◽  
Fang Yuan Dai

In order to improve the efficiency of the traditional building materials information management, a construction materials quality detection management system is designed and developed. It includes three subsystems, they are quality testing system, information management system and process monitoring and control system. In the system, SQL Server 2000 is used as background database, Visual C++ 6.0 is used as the development platform, ADO is used as the connection between Visual C++ and SQL Server 2000. By using this system, the original paper records are stored in the database, the testing process is standardizes. The modernization of building materials information management is improved. This system has been successfully used in certain Building Materials Quality Supervision Station, which proved that the development process is suitable for Building Materials Supervision Station to quickly establish construction materials quality detection management system.


2016 ◽  
Vol 7 (1) ◽  
pp. 1557-1573
Author(s):  
Hendra Kasman

Sistem Informasi Persediaan ini dirancang untuk memaksimalkan proses pengolahan data barang di bagian perlengkapan rumah sakit Prof. Dr. Tabrani Pekanbaru, sistem yang tergolong masih menggunakan cara konvensional kurang memadai untuk mengolah informasi secara cepat dan akurat. Sehingga dibutuhkan sistem yang mampu mengolah data dan menyampaikan informasi secara lebih cepat yakni sistem yang berbasis komputer. Dengan membangun sistem persediaan berbasis komputer diharapkan kesalahan – kesalahan didalam pengolahan dan penyampaian informasi pada saat menggunakan sistem konvensional tidak terjadi lagi, seperti didalam pengolahan informasi stok barang dan pengolahan segala transaksi yang terjadi di bagian perlengkapan. Pengembangan sistem ini dilakukan dengan menganalisa sistem yang berjalan, merancang sistem, dan mengimplementasikan ke dalam sistem komputer dalam hal ini membangun aplikasi menggunakan bahasa pemrograman Visual Basic 6.0 dan database SQL Server 2000 sebagai media penyimpanan data. Dengan menerapkan sistem informasi persediaan barang menggunakan sistem komputer yakni membuat sebuah aplikasi maka pengolahan data persediaan barang seperti pengolahan data transaksi permintaan barang, transaksi barang masuk dan barang keluar dari bagian perlengkapan akan lebih terorganisir dengan baik sehingga akan menghasilkan informasi yang lebih tepat berupa laporan – laporan yang dibutuhkan komponen sistem yang berhubungan dengan informasi persediaan barang bagian perlengkapan di rumah sakit tersebut.


2021 ◽  
Author(s):  
Vijayakumar R ◽  
Vijay K ◽  
Sivaranjani P ◽  
Priya V

The way of thinking of traffic observing for discovery of system assaults is predicated on a “gained information” viewpoint: current methods recognize either the notable assaults which they’re customized to alarm on, or those strange occasions that veer off from a known typical activity profile. These philosophies depend on an expert structure which gives the ideal data, either with respect to “marks” of the striking attacks or as anomaly free traffic datasets, adequately rich to make delegate profiles for commonplace movement traffic. The theory talks about the limitations of current information-based system to recognize organize assaults in an inexorably unpredictable and advancing Web, Described by ever-rising applications and an ever-expanding number of most recent system assaults. In an oppositely inverse viewpoint, we place the weight on the occasion of solo recognition strategies, fit for distinguishing obscure system assaults during a unique situation with none past information, neither on the attributes of the assault nor on the gauge traffic conduct. In view of the perception that an outsized portion of system assaults are contained during a little division of traffic flows, the proposition exhibits an approach to join basic bunching strategies to precisely distinguish and portray malignant flows. to bring up the practicality of such an information autonomous methodology, a solid multi-bunching-based location technique is created and assess its capacity to recognize and portray arrange assaults with none past information, utilizing bundle follows from two genuine operational systems. The methodology is acclimated identify and describe obscure vindictive flows, and spotlights on the identification and portrayal of ordinary and notable assaults, which encourages the translation of results. When contrasted with the predominant DDoS traceback techniques, the proposed system has assortment of favorable circumstances—it is memory no concentrated, proficiently adaptable, vigorous against parcel contamination, and free of assault traffic designs. The consequences of inside and out test and reenactment considers are introduced to exhibit the adequacy and effectiveness of the proposed strategy. It’s an uncommon test to traceback the wellspring of Circulated Disavowal of-Administration (DDoS) assaults inside the Web. In DDoS assaults, aggressors create a lot of solicitations to casualties through undermined PCs (zombies), with the point of keeping ordinary help or debasing from getting the norm of administrations. Because of this fundamental change, the proposed system conquers the acquired downsides of parcel stamping strategies, similar to weakness to bundle contaminations. The execution of the proposed strategy welcomes no changes on current steering programming. Moreover, this work builds up a hypothetical structure for assessing the insurance of IDS against mimicry assaults. It shows an approach to break the wellbeing of 1 distributed IDS with these strategies, and it tentatively affirms the capacity of various assaults by giving a worked model. The Project is intended by using Java 1.6 as face and MS SQL Server 2000 as backside. The IDE used is Net Beans 6.8.


Author(s):  
Amey Thakur

The project's main goal is to build an online book store where users can search for and buy books based on title, author, and subject. The chosen books are shown in a tabular style and the customer may buy them online using a credit card. Using this Website, the user may buy a book online rather than going to a bookshop and spending time. Many online bookstores, such as Powell's and Amazon, were created using HTML. We suggest creating a comparable website with .NET and SQL Server. An online book store is a web application that allows customers to purchase ebooks. Through a web browser the customers can search for a book by its title or author, later can add it to the shopping cart and finally purchase using a credit card transaction. The client may sign in using his login credentials, or new clients can simply open an account. Customers must submit their full name, contact details, and shipping address. The user may also provide a review of a book by rating it on a scale of one to five. The books are classified into different types depending on their subject matter, such as software, databases, English, and architecture. Customers can shop online at the Online Book Store Website using a web browser. A client may create an account, sign in, add things to his shopping basket, and buy the product using his credit card information. As opposed to a frequent user, the Administrator has more abilities. He has the ability to add, delete, and edit book details, book categories, and member information, as well as confirm a placed order. This application was created with PHP and web programming languages. The Online Book Store is built using the Master page, data sets, data grids, and user controls.


Author(s):  
Tony Bain ◽  
Louis Davidson ◽  
Robin Dewson ◽  
Chuck Hawkins
Keyword(s):  

2007 ◽  
Vol 10-12 ◽  
pp. 336-340
Author(s):  
Xian Li Liu ◽  
X.H. Zhao ◽  
Yi Zhi Liu ◽  
Yi Wen Wang ◽  
S.H. Jiang

In order to realize general management of PCBN tool multimedia information, this paper set up multimedia cutting database of PCBN tool on the platform of Visual Basic, mainly applied database interface technology of Visual Basic and database management system of Microsoft SQL Server 2000. Aimed at the characteristic of large video data, handling relative path was brought forward as a method. Practice proved that handling relative path could realize all functions the database needed, and increase system running speed, general management of PCBN tool information under different machining conditions was realized.


Sign in / Sign up

Export Citation Format

Share Document