The Design and Implementation of Multi-Protocol Database Audit System

2014 ◽  
Vol 610 ◽  
pp. 658-666
Author(s):  
Hao Li ◽  
Jun Feng Qiao ◽  
Cheng Ying Liu ◽  
Zhao Wang

the security of database system as the core component of data storage has been increasingly important. Effective audit of the database system can reduce the potential security risk. Practical database audit system should not affect the operation of the existing system which uses audited database. This paper presents and implements a multi-protocol database audit system based on bypass mode, and has a detailed description of the function of each module and the interface between them. This paper designs a detailed database audit policy to achieve effective audit. In the second half of this paper, we focus on the implementation of the key technologies which contain Zero-copy and flow table. Keywords-database;zero-copy;flow-table;policy;audit

2014 ◽  
Vol 686 ◽  
pp. 316-320
Author(s):  
Ye Zhao ◽  
Guo Ying Lu ◽  
Li Ying Wang

The architecture of the system is divided into some modules according to the operating level: interface layer, the database engine layer, and data access layer, database maintenance module and data storage module. This paper discusses in detail the data definition design and the important function of EDB and realizes the EDB management implementation details. The paper introduce in details the EDB system architecture, the design of physical storage structure and basic table structure. Through the actual use, the database system is suitable for embedded systems with limited resources, has good portability.


2010 ◽  
Vol 40-41 ◽  
pp. 985-989
Author(s):  
Jing Xiong ◽  
Han Yun Wen ◽  
Kai Bai

At present, the existing embedded database products have high degree of specialization and dependencies of platform, not fully reflect the characteristics of embedded system. This paper provides a requirement analysis and gives a completely different from the traditional design of the database, the paper has done a lot of research in some key technologies on the design and implementation of SOC technology, this design is always used in cross platform embedded database. The SOC technology embedded in a database system in the special chip to solve problems of platform portability.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Gregory P. Strauss ◽  
Lisa A. Bartolomeo ◽  
Philip D. Harvey

AbstractNegative symptoms have long been considered a core component of schizophrenia. Modern conceptualizations of the structure of negative symptoms posit that there are at least two broad dimensions (motivation and pleasure and diminished expression) or perhaps five separable domains (avolition, anhedonia, asociality, blunted affect, alogia). The current review synthesizes a body of emerging research indicating that avolition may have a special place among these dimensions, as it is generally associated with poorer outcomes and may have distinct neurobiological mechanisms. Network analytic findings also indicate that avolition is highly central and interconnected with the other negative symptom domains in schizophrenia, and successfully remediating avolition results in global improvement in the entire constellation of negative symptoms. Avolition may therefore reflect the most critical treatment target within the negative symptom construct. Implications for targeted treatment development and clinical trial design are discussed.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Anastasiia Samsonova ◽  
Krystel El Hage ◽  
Bénédicte Desforges ◽  
Vandana Joshi ◽  
Marie-Jeanne Clément ◽  
...  

AbstractThe RNA-binding protein Lin28 (Lin28a) is an important pluripotency factor that reprograms translation and promotes cancer progression. Although Lin28 blocks let-7 microRNA maturation, Lin28 also binds to a large set of cytoplasmic mRNAs directly. However, how Lin28 regulates the processing of many mRNAs to reprogram global translation remains unknown. We show here, using a structural and cellular approach, a mixing of Lin28 with YB-1 (YBX1) in the presence of mRNA owing to their cold-shock domain, a conserved β-barrel structure that binds to ssRNA cooperatively. In contrast, the other RNA binding-proteins without cold-shock domains tested, HuR, G3BP-1, FUS and LARP-6, did not mix with YB-1. Given that YB-1 is the core component of dormant mRNPs, a model in which Lin28 gains access to mRNPs through its co-association with YB-1 to mRNA may provide a means for Lin28 to reprogram translation. We anticipate that the translational plasticity provided by mRNPs may contribute to Lin28 functions in development and adaptation of cancer cells to an adverse environment.


2012 ◽  
Vol 622-623 ◽  
pp. 1378-1383
Author(s):  
Peng Han ◽  
Yang Li

The ship electric field has become a new physical field which is widely concerned at home and abroad in recent years. For the research of ship electric field, one of the most effective methods is to measure it underwater. According to the analysis of ship electric field signal’s characteristics, the ship electric field measurement system based on MSP430F149 was designed and the key technologies of software and hardware were also presented in this paper. The results of experiment demonstrated that the system could effectively measure the ship electric field signal in a low SNR. Meanwhile, it has the advantages of low power consumption, high accuracy and credible.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Pietro Celi ◽  
Gianfranco Gabai ◽  
Massimo Morgante ◽  
Luigi Gallo

Dairy science is a multidisciplinary area of scientific investigation and Ph.D. students aiming to do research in the field of animal and/or veterinary sciences must be aware of this. Ph.D. students often have vast spectra of research interests, and it is quite challenging to satisfy the expectation of all of them. The aim of this study was to establish an international Ph.D. training program based on research collaboration between the University of Sydney and the University of Padova. The core component of this program was a two-week Postgraduate Summer School in Dairy Science, which was held at the University of Padova, for Ph.D. students of both universities. Therefore, we designed a program that encompassed seminars, workshops, laboratory practical sessions, and farm visits. Participants were surveyed using a written questionnaire. Overall, participants have uniformly praised the Summer School calling it a rewarding and valuable learning experience. The Ph.D. Summer School in Dairy Science provided its participants a positive learning experience, provided them the opportunity to establish an international network, and facilitated the development of transferable skills.


2021 ◽  
Vol 75 (Supplement_2) ◽  
pp. 7512515314p1-7512515314p1
Author(s):  
Pamela Hess ◽  
Penelope Moyers Cleveland

Abstract Date Presented 04/22/21 The Comprehensive Operating Room Ergonomics (CORE) program was developed to address the physical and environmental demands among surgeons. This feasibility study examined the design and implementation process of an evidence-based OT ergonomics intervention using a mixed-methods research design. The CORE program supports the American Occupational Therapy Association’s Vision 2025 of promoting population health and wellness, especially among surgeons who are essential to our health care system. Primary Author and Speaker: Pamela Hess Additional Authors and Speakers: Elena Donoso Brown


2018 ◽  
Vol 8 (2) ◽  
pp. 47-65 ◽  
Author(s):  
Ubaidullah Alias Kashif ◽  
Zulfiqar Ali Memon ◽  
Shafaq Siddiqui ◽  
Abdul Rasheed Balouch ◽  
Rakhi Batra

This article describes how the enormous potential benefits provided by the cloud services, made enterprises to show huge interest in adopting cloud computing. As the service provider has control over the entire data of an organization stored onto the cloud, a malicious activity, whether internal or external can tamper with the data and computation. This causes enterprises to lack trust in adopting services due to privacy, security and trust issues. Despite of having such issues, the consumer has no root level access right to secure and check the integrity of procured resources. To establish a trust between the consumer and the provider, it is desirable to let the consumer to check the procured platform hosted at provider side for safety and security. This article proposes an architectural design of a trusted platform for the IaaS cloud computing by the means of which the consumer can check the integrity of a guest platform. TCG's TPM is deployed and used on the consumer side as the core component of the proposed architecture and it is distributed between the service provider and the consumer.


Sign in / Sign up

Export Citation Format

Share Document