Data Security Monitoring of SQL Server Database

2013 ◽  
Vol 679 ◽  
pp. 143-146
Author(s):  
Zhang Hui ◽  
Li Qiang An ◽  
Peng Yue

Database system is information aggregation. So the security of database is very important. This paper describes the research process of tracking SQL server database data tampered. Now we can monitor the important data in daily work. And providing a guarantee for the safety, accuracy of database.

2018 ◽  
Vol 8 ◽  
pp. 263-269
Author(s):  
Grzegorz Dziewit ◽  
Jakub Korczyński ◽  
Maria Skublewska-Paszkowska

Comparison of efficiency is not a trivial phenomenon because of disparities between different database systems. This paper presents a methodology of comparing relational database systems in respect of mean time of execution individual DML queries containing subqueries and conjunction of tables. The presented methodology can be additionally accommodated to studies of efficiency in a range of database system itself (study of queries executed directly in database engine). The described methodology allows to receive statement telling which database system is better in comparison to another in dependency of functionalities fulfilled by external application. In the article the analysis of mean time of execution individual DML queries was performed.Two research hypotheses have been put forward: "Microsoft SQL Server database system needs less time to execute INSERT and UPDATE queries than Oracle database" and "Oracle database system needs less time to execute DML queries with binary data than SQL Server"


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2020 ◽  
Author(s):  
Andrew P. Tarko ◽  
Jose Thomaz ◽  
Mario Romero

A systemic approach to identifying road locations that exhibit safety problems was provided by the Safety Needs Identification Program (SNIP and SNIP2) developed by the Purdue University Center for Road Safety (CRS). The new version SNIP Light has been developed to provide other uses with planning level traffic safety analysis capability for a wider range of uses including Metropolitan Planning Agencies (MPOs) who want the tool for planning cost-effective safety programs in their metropolitan areas. The SNIP Light reduces the demand of computing and data storage resources and replaces the SQL server database system an integrated module coded in-house which is considerably faster than the original component. Furthermore, certain proficiency required to install and use the old version is no longer needed thanks to the intuitive single-window interface and executing file operations in the background without the user’s involvement. Some operations, such as optimizing funding of safety projects, are removed to simplify the tool.


2014 ◽  
Vol 1039 ◽  
pp. 197-202
Author(s):  
Chuan Hong Zhou ◽  
Jin Jie Xiao ◽  
Wei Ren

Currently,some problems exist in the process of using standby generators, such as low efficiency,high cost and late service of artificial overhaul and maintenance.In order to overcome these problems, PC remote monitoring system is designed.This paper mainly introduces the structure composition,function,interface design and SQL Server database design of the system.In addition, the function of communication between the PC remote server and signal monitoring device was tested and the effect was desired


2018 ◽  
Vol 25 (4) ◽  
pp. 470-483 ◽  
Author(s):  
Lena Sohl

Intimacy, shared experiences and evening out the power relations between researcher and the participants play an important role in feminist methodology. However, as highlighted in previous research on studying ‘up’, such methods might not be appropriate when studying privileged groups. Therefore, studying privileged women challenges fundamental assumptions in feminist methodology. When researching privileged women, the assumption that the researcher is almost always in a superior position within the research process becomes more complicated. The article seeks to contribute to the feminist methodological literature on how to study privileged groups by exploring how class, gender and whiteness are produced in three fieldwork situations with women who hold privileges in a postcolonial and capitalist landscape. Drawing on interviews and participant observations with white Swedish migrant women, the article argues that researchers need to turn the problems, fears and feelings of being uncomfortable into important data, in order to study privileged groups of women.


2011 ◽  
Vol 403-408 ◽  
pp. 1692-1695
Author(s):  
Zhi Qiu ◽  
Shou Miao Yu ◽  
Zheng Wang

An direction expert system for aircraft maintain with expert knowledge graphical building, three layers distributed web service, distance fault diagnosis and gather experience ability is introduced here. It is developed based on Delphi 6.0 utilizing multilayer web service, CLIPS expert system and SQL SERVER database technology.


Author(s):  
Qiang Zhang ◽  
Peng Wang ◽  
Shanshan Li ◽  
Yonghao Jing

Since electroencephalogram (EEG) signals contain a variety of physiological and pathological information, they are widely used in medical diagnosis, brain machine interface and other fields. The existing EEG apparatus are not perfect due to big size, high power consumption and using cables to transmit data. In this paper, a portable real-time EEG signal acquisition and tele-medicine system is developed in order to improve performance of EEG apparatus. The weak EEG signals are induced to the pre-processing circuits via a noninvasive method with bipolar leads. After multi-level amplifying and filtering, these signals are transmitted to DSP (TMS320C5509) to conduct digital filtering. Then, the EEG signals are displayed on the LCD screen and stored in the SD card so that they can be uploaded to the server through the internet. The server employs SQL Server database to manage patients’ information and to store data in disk. Doctors can download, look up and analyze patients’ EEG data using the doctor client. Experimental results demonstrate that the system can acquire weak EEG signals in real time, display the processed results, save data and carry out tele-medicine. The system can meet the requirement of the EEG signals’ quality, and are easy to use and carry.


Sign in / Sign up

Export Citation Format

Share Document