Dissertations / Theses on the topic 'Databases and database Networking'

To see the other types of publications on this topic, follow the link: Databases and database Networking.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Databases and database Networking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ulibarri, Desirea Duarte. "Volunteer system project Regis University Networking Lab Practicum /." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/DUlibarriPartI2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reblitz-Richardson, Orion Aubrey 1976. "Architecture for biological model and database networking." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86495.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.
Includes bibliographical references (leaves 73-75).
by Orion Aubrey Reblitz-Richardson.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
3

Sundaram, Prashanthi. "Student database access from the web." CSUSB ScholarWorks, 1998. https://scholarworks.lib.csusb.edu/etd-project/1785.

Full text
Abstract:
This project, Database Access through the Web (DAW), implements a database to store academic and general information of graduate students in the Department of Computer Science, CSUSB and provides access to the database from the web. The motivation of the project comes from needs of the Graduate Coordinator, professors and department staff to access through the Internet student information concurrently.
APA, Harvard, Vancouver, ISO, and other styles
4

Mukviboonchai, Suvimol. "The mediated data integration (MeDInt) : An approach to the integration of database and legacy systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1308.

Full text
Abstract:
The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data Model Heterogeneities, Schematic Heterogeneities and Semantic Heterogeneities. The problems of existing integration approaches are reviewed and solved by introducing and designing a new integration approach to logically interoperate heterogeneous data sources and to resolve three previously classified heterogeneities. The research attempts to reduce the complexity of the integration process by maximising the degree of automation. Mediation and wrapping techniques are employed in this research. The Mediated Data Integration (MeDint) architecture has been introduced to integrate heterogeneous data sources. Three major elements, the MeDint Mediator, wrappers, and the Mediated Data Model (MDM) play important roles in the integration of heterogeneous data sources. The MeDint Mediator acts as an intermediate layer transforming queries to sub-queries, resolving conflicts, and consolidating conflict-resolved results. Wrappers serve as translators between the MeDint Mediator and data sources. Both the mediator and wrappers arc well-supported by MDM, a semantically-rich data model which can describe or represent heterogeneous data schematically and semantically. Some organisational information systems have been tested and evaluated using the MeDint architecture. The results have addressed all the research questions regarding the interoperability of heterogeneous data sources. In addition, the results also confirm that the Me Dint architecture is able to provide integration that is transparent to users and that the schema evolution does not affect the integration.
APA, Harvard, Vancouver, ISO, and other styles
5

Manjarrez, Sanchez Jorge. "Efficient Content-based Retrieval in Parallel Databases of Images." Phd thesis, Université de Nantes, 2009. http://tel.archives-ouvertes.fr/tel-00465943.

Full text
Abstract:
Cette thèse porte sur le traitement des requêtes par similarité sur les données de haute dimensionnalité, notamment multimédias, et, parmi elles, les images plus particulièrement. Ces requêtes, notamment celles des k plus proches voisins (kNN), posent des problèmes de calcul de par la nature des données elles-mêmes et de la taille de la base des données. Nous avons étudié leurs performances quand une méthode de partitionnement est appliquée sur la base de données pour obtenir et exploiter des classes. Nous avons proposé une taille et un nombre optimaux de ces classes pour que la requête puisse être traitée en temps optimal et avec une haute précision. Nous avons utilisé la recherche séquentielle comme base de référence. Ensuite nous avons proposé des méthodes de traitement de requêtes parallèles sur une grappe de machines. Pour cela, nous avons proposé des méthodes d'allocation des données pour la recherche efficace des kNN en parallèle. Nous proposons de même, un nombre réduit de noeuds sur la grappe de machines permettant néanmoins des temps de recherche sous-linéaires et optimaux vis-à-vis des classes déterminées précédemment. Nous avons utilisé des donnés synthétiques et réelles pour les validations pratiques. Dans les deux cas, nous avons pu constater des temps de réponse et une qualité des résultats supérieurs aux méthodes existantes, lesquelles, au-delà d'un faible nombre des dimensions, deviennent inefficaces.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Junhua. "Large-Sample Logistic Regression with Latent Covariates in a Bayesian Networking Context." TopSCHOLAR®, 2009. http://digitalcommons.wku.edu/theses/103.

Full text
Abstract:
We considered the problem of predicting student retention using logistic regression when the most important covariates such as the college variables are latent, but the network structure is known. This network structure specifies the relationship between pre-college to college variables and then from college to student retention variables. Based on this structure, we developed three estimators, examined their large-sample properties, and evaluated their empirical efficiencies using WKU student retention database. Results show that while the hat estimator is expected to be most efficient, the tilde estimator was shown to be more efficient than the check method. This increased efficiency suggests that utilizing the network information can improve our predictions.
APA, Harvard, Vancouver, ISO, and other styles
7

Miller, Nathan D. "Adapting the Skyline Operator in the NetFPGA Platform." Youngstown State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1369586333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alsulami, Khalil Ibrahim D. "Application-Based Network Traffic Generator for Networking AI Model Development." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1619387614152354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Junshu. "Why Consumers Disclose Their Tourism Experiences on Tourism Social Networking Sites: Multiple Theoretical Perspectives." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6607.

Full text
Abstract:
Tourism social networking sites (SNSs) are websites that provide users with templates for describing their travel experiences and an infrastructure to share such travel posts with a network of like-minded individuals. Tourism SNSs represent an important advertising channel for the tourism industry, as they may assist travelers in selecting destinations and planning vacations on the basis of other travelers’ experiences, which may further stimulate travel and generate income for the tourism industry (Yazdanifard & Yee, 2014). User-generated content (UGC) in the form of travel posts is the core offering and key success factor of tourism SNSs. Travel posts constitute a valuable resource that attracts users to these websites, and they serve as a key data feed into the data mining process that is used to develop travel products on tourism SNSs. However, one problem with tourism SNSs is that their users, especially the new ones, do not publish their travel experiences on these SNSs as often as they do on traditional SNSs, such as Facebook. This may result in a lack of content and, therefore, a loss of potential consumers and, consequently, revenue. Therefore, a study on self-disclosure behavior in writing travel posts may contribute to understanding the reasons why this problem exists and help tourism SNSs improve their service accordingly. The author used multiple theoretical perspectives (social exchange theory and social cognition theory) to develop a comprehensive self-disclosure framework. The framework was tested by using a partial least squares based structural equation modelling (PLS-SEM) approach with data from 443 participants recruited from the two most popular Chinese tourism SNSs: Qyer.com and mafengwo.cn. The findings show that self-disclosure behavior on tourism SNSs was significantly affected by self-benefit, positive feedback from other users, social benefits, rewards, tourism SNSs’ security mechanism, and ease of use. However, habit and motive did not have a statistically significant effect on self-disclosure behavior. Moreover, self-disclosure behavior positively affected electronic word of mouth (EWOM) relating to the tourism SNSs. Finally, the findings have theoretical and practical implications, and the thesis ends with a discussion of the limitations of this study and suggestions for future research.
APA, Harvard, Vancouver, ISO, and other styles
10

Collins, Helen Loretta. "An Exploration of Wireless Networking and the Management of Associated Security Risk." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1843.

Full text
Abstract:
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded the minimally accepted practices and standards for wireless networking. The security risk assessment and management model established the theoretical framework. The sample was 114 participants from small to medium IT organizations comprised of security engineers, managers, and end users. Data collection was via an online survey. Data analysis included both descriptive and inferential statistical methods. The results revealed that greater than 80% of participants conducted appropriate risk management and review assessments. This study underscored the need for a more comprehensive approach to managing IT security risks. IT managers can use the outcome of this study as a benchmark for evaluating their current risk assessment procedures. Experiencing security breaches in organizations may be inevitable. However, when organizations and industry leaders can greatly reduce the cost of a data breach by developing effective risk management plans that lead to better security outcomes, positive social change can be realized.
APA, Harvard, Vancouver, ISO, and other styles
11

Gajdůšek, František. "Aplikace pro řízení a vzdálenou správu platebních terminálů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412905.

Full text
Abstract:
The goal of this thesis is to create control software for stand-alone payment machines. The purpose of this software is minimize maintenance cost and usability as much as possible. Description of technologies and protocols used in implementation are in the text. Next, there is process of work beginning with analysis, continues with design, construction, testing and installation manual. Projekt status and product utilization at the end of project is in chapter about evaluation.
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Yin-Wei. "Online multimedia communication system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2661.

Full text
Abstract:
Online Multimedia Communication System is a project aimed at providing people the ability to store and share their multimedia files. The users and administrator can modify and view the files and database information from a normal web browser. Furthermore, this site offers a secure environment to keep all the users' information private.
APA, Harvard, Vancouver, ISO, and other styles
13

Chung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Fox, ramos Alexander. "Exploration de la diversité chimique des Apocynaceae par la technique des réseaux moléculaires : de la création d’une base de données vers l’annotation in silico." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS543/document.

Full text
Abstract:
Les alcaloïdes indolo-monoterpéniques (AIMs) constituent une classe de molécules naturelles très étudiée en raison d’un fort potentiel pharmacologique et thérapeutique et d’une grande diversité structurale. D’autre part, les techniques de déréplication par chromatographie liquide couplée à la spectrométrie de masse tandem ont évolué récemment, avec l’émergence de l’approche par réseaux moléculaires (molecular networking). Dans ce contexte, nous avons créé une base de données de spectres de masse tandem moyennés de 172 AIMs témoins, en collaboration avec plusieurs équipes de pharmacognosie dans le monde. Cette base de données, nommée MIADB (Monoterpene Indole Alkaloids DataBase), rendue publique, peut être utilisée comme référence dans des stratégies de déréplication fondées sur l’utilisation des réseaux moléculaires. Nous avons ensuite exploité la MIADB pour l’étude phytochimique de deux Apocynaceae : Geissospermum laeve (Vell.) Miers et Alstonia balansae Guillaumin. Dans un premier temps, l’annotation par la MIADB d’un extrait alcaloïdique des écorces de G. laeve a permis l’isolement et l’élucidation structurale de 3 nouveaux AIMs, dont deux à motif butyrolactone. Par la suite, notre approche a été améliorée par l’emploi du nouvel outil d’annotation in silico MetWork, fondé sur une prédiction métabolique et la modélisation de spectres de masse tandem. C’est ainsi que l’exploration de l’espace chimique d’un extrait alcaloïdique des feuilles d’A. balansae a permis l’identification, puis l’isolement, de 5 nouveaux AIMs du type N-oxyde-sarpagane. La stéréochimie des nouveaux composés a pu être déterminée par l’exploitation de spectres prédits et expérimentaux de dichroïsme circulaire éléctronique.Ce manuscrit décrit, après une introduction consacrée notamment aux emplois du molecular networking pour le ciblage et la découverte de petites molécules naturelles puis aux interconnections biosynthétiques en série AIM, la création puis l’évolution de la MIADB, puis son utilisation dans un workflow de déréplication efficace et de ciblage de nouveaux composés dans des mélanges complexes issus d’Apocynaceae
Monoterpene indole alkaloids (MIAs) constitute a class of natural products that has been extensively studied due to its important pharmacological and therapeutic potentials, and to its large structural diversity. Dereplication techniques based on liquid chromatography coupled to tandem mass spectrometry have recently evolved, with the implementation of molecular networking-based approaches.In this context, we have created a spectral database that encompasses the averaged tandem mass spectra of 172 reference MIAs, in collaboration with several pharmacognosy research teams around the world. This database, named MIADB (standing for Monoterpene Indole Alkaloids DataBase), was made publicly available and can be used as a reference in the application of molecular networking as a dereplication strategy. Thereafter, we used the MIADB to carry out the phytochemical investigation of two Apocynaceae species: Geissospermum laeve (Vell.) Miers and Alstonia balansae Guillaumin. As a first application, the MIADB-based annotation of an alkaloid extract of the barks of G. laeve led to the isolation and the structural elucidation of three new MIAs, two having a butyrolactone moiety. Afterwards, this approach was improved by the application of a new tool for in silico annotation called MetWork, which is based on metabolic prediction and on the generation of predicted tandem mass spectra. Following this approach, the exploration of the chemical space of an alkaloid extract of the leaves of A. balansae allowed the anticipation and further isolation of five novel MIAs of the N-oxide-sarpagine type. The stereochemistry of all the new molecules could be determined on the basis of experimental and predicted electronic circular dichroism spectra.In the introduction of this manuscript the multiple uses of molecular networking for the identification of small natural molecules are described, as well as the biosynthetic interconnections in the MIAs group. The creation and evolution of the MIADB are then presented, followed by its utilization in efficient dereplication workflows for the targeting of new natural products within complex mixtures from Apocynaceae species
APA, Harvard, Vancouver, ISO, and other styles
15

Nagy, Victor. "Performance Analysis of Relational Databases, Object-Oriented Databases and ORM Frameworks." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9528.

Full text
Abstract:
In the planning stage of web and software development, it is important to select the right tool for the job. When selecting the database to use, relational databases like MySQL is a popular choice. However, relational databases suffer by object-relational impedance mismatch. In this work we will explore the response time of relational and object-oriented databases and the overhead of ORM frameworks. This will be done by creating a web application that receives data about flights and airports from a client, which measures the response time of the databases and the entire request. It was found that MySQL has the lowest response time, while the ORM framework Hibernate adds an overhead on some of the tests while performing similar to MySQL. Db4o had the highest response time in a majority of the tests. In future works, this study could be extended by other tests or by other type of databases.
APA, Harvard, Vancouver, ISO, and other styles
16

Kitinya, Sylivano Chiluli Nonga. "Relational multimedia databases." Thesis, Durham University, 1987. http://etheses.dur.ac.uk/1242/.

Full text
Abstract:
This thesis is concerned with the design and im plementation of a Relational Multimedia Database System, in short RMDBS. RMDBS is designed to efficiently use storage space and manipulate various kinds of data; attribute data, bit-m apped pictures, and program s in binary code. RMDBS is an integrated system which enables the user to manage and control operations on the different forms of data in a user friendly manner. This means that even nonexperienced users can work with the system. The work described in this thesis is novel in that a true multimedia database has been implemented within the framework of a traditional relational DBMS. Previous work in this area has concentrated either in building data base management systems for storing picture-based data or multimedia databases which are not true data base management systems. RMDBS is implemented using the Revelation data base management system.
APA, Harvard, Vancouver, ISO, and other styles
17

Guo, Mingming. "User-Centric Privacy Preservation in Mobile and Location-Aware Applications." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3674.

Full text
Abstract:
The mobile and wireless community has brought a significant growth of location-aware devices including smart phones, connected vehicles and IoT devices. The combination of location-aware sensing, data processing and wireless communication in these devices leads to the rapid development of mobile and location-aware applications. Meanwhile, user privacy is becoming an indispensable concern. These mobile and location-aware applications, which collect data from mobile sensors carried by users or vehicles, return valuable data collection services (e.g., health condition monitoring, traffic monitoring, and natural disaster forecasting) in real time. The sequential spatial-temporal data queries sent by users provide their location trajectory information. The location trajectory information not only contains users’ movement patterns, but also reveals sensitive attributes such as users’ personal habits, preferences, as well as home and work addresses. By exploring this type of information, the attackers can extract and sell user profile data, decrease subscribed data services, and even jeopardize personal safety. This research spans from the realization that user privacy is lost along with the popular usage of emerging location-aware applications. The outcome seeks to relive user location and trajectory privacy problems. First, we develop a pseudonym-based anonymity zone generation scheme against a strong adversary model in continuous location-based services. Based on a geometric transformation algorithm, this scheme generates distributed anonymity zones with personalized privacy parameters to conceal users’ real location trajectories. Second, based on the historical query data analysis, we introduce a query-feature-based probabilistic inference attack, and propose query-aware randomized algorithms to preserve user privacy by distorting the probabilistic inference conducted by attackers. Finally, we develop a privacy-aware mobile sensing mechanism to help vehicular users reduce the number of queries to be sent to the adversarial servers. In this mechanism, mobile vehicular users can selectively query nearby nodes in a peer-to-peer way for privacy protection in vehicular networks.
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Kevin Tzu-Jung. "Javaserver page, Java servlet and JavaBean technology: Online real estate company." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Frank, Martin Robert. "Adaptive and automated index selection in relational database systems." Thesis, Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/8170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Hao. "Querying databases a tale of two C# approaches /." Click here for download, 2010. http://proquest.umi.com.ps2.villanova.edu/pqdweb?did=2019786971&sid=1&Fmt=2&clientId=3260&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Unnava, Vasundhara. "Query processing in distributed database systems." Connect to resource, 1992. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1261314105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Von, Dollen Andrew C. "Data-Driven Database Education: A Quantitative Study of SQL Learning in an Introductory Database Course." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2068.

Full text
Abstract:
The Structured Query Language (SQL) is widely used and challenging to master. Within the context of lab exercises in an introductory database course, this thesis analyzes the student learning process and seeks to answer the question: ``Which SQL concepts, or concept combinations, trouble students the most?'' We provide comprehensive taxonomies of SQL concepts and errors, identify common areas of student misunderstanding, and investigate the student problem-solving process. We present an interactive web application used by students to complete SQL lab exercises. In addition, we analyze data collected by this application and we offer suggestions for improvement to database lab activities.
APA, Harvard, Vancouver, ISO, and other styles
23

Alkahtani, Mufleh M. "Modeling relational database management systems." Virtual Press, 1993. http://liblink.bsu.edu/uhtbin/catkey/865955.

Full text
Abstract:
Almost all of the database products developed over the past few years are based on what is called the relational approach.The purpose of this thesis is to characterize a relational data base management system, we do this by studying the relational model in some depth.The relational model is not static, rather it has been evolving over time. We trace the evolution of the relational model. We will also consider the ramifications of the relational model for modern database systems.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Prasher, Sham. "Query processing in multiresolution spatial databases /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18682.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Caprioli, Michael J. "Contracts database part of the solution /." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/MCaprioli2008.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Bielecki, Pavel. "Distributed relational database system of occasionally connected databases." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Rashid, Awais. "A database evolution approach for object oriented databases." Thesis, Lancaster University, 2001. http://eprints.lancs.ac.uk/11951/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Vargas, Herring Luis Carlos. "Integrating databases and publish/subscribe." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hon, Wing-Keung. "The next generation of database : object-oriented database." Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/917035.

Full text
Abstract:
As some new computer applications, such as computer-aided design, multimedia systems, and knowledge-based systems, require more complex data structures, the traditional database system seems to be unable to support these new requirements. A recently developed database technology, object-oriented database, provides a solution to these problems.The purpose of this thesis is to investigate what is object-oriented database, especially in its internal organization such as object persistency. Two object-oriented database systems, EXODUS and ODE, are discussed in detail. In addition, a comparison between the relational databases and object-oriented databases is made.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
31

Chao, Da-Wei David. "Development and evaluation of remote database snapshot refresh methods /." Thesis, Connect to this title online; UW restricted, 1990. http://hdl.handle.net/1773/8830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ferreira, André Abecasis Gomes. "Efficient middleware for database replication." Master's thesis, FCT-UNL, 2008. http://hdl.handle.net/10362/1866.

Full text
Abstract:
Dissertação de Mestrado em Engenharia Informática
Database systems are used to store data on the most varied applications, like Web applications, enterprise applications, scientific research, or even personal applications. Given the large use of database in fundamental systems for the users, it is necessary that database systems are efficient e reliable. Additionally, in order for these systems to serve a large number of users, databases must be scalable, to be able to process large numbers of transactions. To achieve this, it is necessary to resort to data replication. In a replicated system, all nodes contain a copy of the database. Then, to guarantee that replicas converge, write operations must be executed on all replicas. The way updates are propagated leads to two different replication strategies. The first is known as asynchronous or optimistic replication, and the updates are propagated asynchronously after the conclusion of an update transaction. The second is known as synchronous or pessimistic replication, where the updates are broadcasted synchronously during the transaction. In pessimistic replication, contrary to the optimistic replication, the replicas remain consistent. This approach simplifies the programming of the applications, since the replication of the data is transparent to the applications. However, this approach presents scalability issues, caused by the number of exchanged messages during synchronization, which forces a delay to the termination of the transaction. This leads the user to experience a much higher latency in the pessimistic approach. On this work is presented the design and implementation of a database replication system, with snapshot isolation semantics, using a synchronous replication approach. The system is composed by a primary replica and a set of secondary replicas that fully replicate the database- The primary replica executes the read-write transactions, while the remaining replicas execute the read-only transactions. After the conclusion of a read-write transaction on the primary replica the updates are propagated to the remaining replicas. This approach is proper to a model where the fraction of read operations is considerably higher than the write operations, allowing the reads load to be distributed over the multiple replicas. To improve the performance of the system, the clients execute some operations speculatively, in order to avoid waiting during the execution of a database operation. Thus, the client may continue its execution while the operation is executed on the database. If the result replied to the client if found to be incorrect, the transaction will be aborted, ensuring the correctness of the execution of the transactions.
APA, Harvard, Vancouver, ISO, and other styles
33

Zhao, Wenzhong. "Probabilistic databases and their application." Lexington, Ky. : [University of Kentucky Libraries], 2004. http://lib.uky.edu/ETD/ukycosc2004d00183/wzhao0.pdf.

Full text
Abstract:
Thesis (Ph. D.)--University of Kentucky, 2004.
Title from document title page (viewed Jan. 7, 2005). Document formatted into pages; contains x, 180p. : ill. Includes abstract and vita. Includes bibliographical references (p. 173-178).
APA, Harvard, Vancouver, ISO, and other styles
34

Acar, Aybar C. "Query consolidation interpreting queries sent to independent heterogenous databases /." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3223.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.
Vita: p. 169. Thesis director: Amihai Motro. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science. Title from PDF t.p. (viewed Aug. 27, 2008). Includes bibliographical references (p. 162-168). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
35

Kong, Qinzheng. "Incomplete information in a deductive database." Thesis, Heriot-Watt University, 1989. http://hdl.handle.net/10399/927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Xie, Dongqing. "A Web database builder system WEBDB /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000365.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.
Title from title page of source document. Document formatted into pages; contains xi, 62 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Lijun. "A Web-based database application builder." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000113.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains ix, 64 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
38

Baig, Anwar. "Enhanced database system for active design modelling." Thesis, University of Nottingham, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hall, Andrew Brian. "DJ: Bridging Java and Deductive Databases." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/33383.

Full text
Abstract:

Modern society is intrinsically dependent on the ability to manage data effectively. While relational databases have been the industry standard for the past quarter century, recent growth in data volumes and complexity requires novel data management solutions. These trends revitalized the interest in deductive databases and highlighted the need for column-oriented data storage. However, programming technologies for enterprise computing were designed for the relational data management model (i.e., row-oriented data storage). Therefore, developers cannot easily incorporate emerging data management solutions into enterprise systems.

To address the problem above, this thesis presents Deductive Java (DJ), a system that enables enterprise programmers to use a column oriented deductive database in their Java applications. DJ does so without requiring that the programmer become proficient in deductive databases and their non-standardized, vendor-specific APIs. The design of DJ incorporates three novel features: (1) tailoring orthogonal persistence technology to the needs of a deductive database with column-oriented storage; (2) using Java interfaces as a primary mapping construct, thereby simplifying method call interception; (3) providing facilities to deploy light-weight business rules.

DJ was developed in partnership with LogicBlox Inc., an Atlanta based technology startup.


Master of Science
APA, Harvard, Vancouver, ISO, and other styles
40

Shou, Yutao Sindy, and 壽玉濤. "Efficient query processing for spatial and temporal databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29853655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Pretorius, Dawid Johannes. "NoSQL database considerations and implications for businesses." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85727.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2013.
ENGLISH ABSTRACT: NoSQL databases, a new way of storing and retrieving data, can provide businesses with many benefits, although they also pose many risks for businesses. The lack of knowledge among decision-makers of businesses regarding NoSQL databases can lead to risks left unaddressed and missed opportunities. This study, by means of an extensive literature review, identifies the key drivers, characteristics and benefits of a NoSQL database, thereby providing a clear understanding of the subject. The business imperatives related to NoSQL databases are also identified and discussed. This can help businesses to determine whether a NoSQL database might be a viable solution, and to align business and information technology (IT) objectives. The key strategic and operational IT risks are also identified and discussed, based on the literature review. This can help business to ensure that the risks related to the use of NoSQL databases are appropriately addressed. Lastly, the identified risks were mapped to the processes of COBIT (Control Objectives for Information and Related Technology) to inform a business of the highest risk areas and the associated focus areas.
AFRIKAANSE OPSOMMING: NoSQL databasisse, 'n nuwe manier om data te stoor en herwin, het die potensiaal om baie voordele vir besighede in te hou, maar kan ook baie risiko's teweeg bring. Gebrekkige kennis onder besigheidsbesluitnemers oor NoSQL databasisse kan lei tot onaangespreekte risiko’s en verlore geleenthede. Hierdie studie, deur middel van 'n uitgebreide literatuuroorsig, identifiseer die sleutel eienskappe, kenmerke en voordele van 'n NoSQL databasis, om sodoende 'n duidelike begrip van die onderwerp te verkry. Die besigheidsimperatiewe wat verband hou met NoSQL databasisse is ook geïdentifiseer en bespreek. Dit kan besighede help om te bepaal of 'n NoSQL databasis 'n werkbare oplossing kan wees, asook sake- en inligtingstegnologie (IT) doelwitte in lyn met mekaar bring. Na aanleiding van die literatuurstudie is die sleutel-strategiese en operasionele IT-risiko's geïdentifiseer en bespreek. Dit kan help om aan besighede sekerheid te verskaf dat die risiko's wat verband hou met die gebruik van NoSQL databasisse toepaslik aangespreek word. Laastens is die geïdentifiseerde risiko's gekoppel aan die prosesse van COBIT om 'n besigheid van die hoë-risiko areas en die gepaardgaande fokusareas in te lig.
APA, Harvard, Vancouver, ISO, and other styles
42

Rehn, Marcus, and Emil Sunesson. "Main-memory database VS Traditional database." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2801.

Full text
Abstract:
There has been a surge of new databases in recent years. Applications today create a higher demand on database performance than ever before. Main-memory databases have come into the market quite recently and they are just now catching a lot of interest from many different directions. Main-memory databases are a type of database that stores all of its data in the primary memory. They provide a big increase in performance to a lot of different applications. This work evaluates the difference in performance between two chosen candidates. To represent main memory databases we chose VoltDB and to represent traditional databases we chose MySQL. We have performed several tests on those two databases. We point out differences in functionality, performance and design choices. We want to create a reference where anyone that considers changing from a traditional database to a main memory database, can find support for their decision. What are the advantages and what are the disadvantages of using a main-memory database, and when should we switch from our old database to a newer technology.
APA, Harvard, Vancouver, ISO, and other styles
43

Khayundi, Peter. "A comparison of open source object-oriented database products." Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/254.

Full text
Abstract:
Object oriented databases have been gaining popularity over the years. Their ease of use and the advantages that they offer over relational databases have made them a popular choice amongst database administrators. Their use in previous years was restricted to business and administrative applications, but improvements in technology and the emergence of new, data-intensive applications has led to the increase in the use of object databases. This study investigates four Open Source object-oriented databases on their ability to carry out the standard database operations of storing, querying, updating and deleting database objects. Each of these databases will be timed in order to measure which is capable of performing a particular function faster than the other.
APA, Harvard, Vancouver, ISO, and other styles
44

Savasere, Ashok. "Efficient algorithms for mining association rules in large databases of cutomer transactions." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/8260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Peng, Yun. "Estimation techniques for advanced database applications." HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_ra/1526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hansen, David Marshall. "An object oriented heterogeneous database architecture /." Full text open access at:, 1995. http://content.ohsu.edu/u?/etd,196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Jiao, Toni C. "Database development and intranet based image included database management system for ballistic firearm identification system." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1551.

Full text
Abstract:
The process of imaging, collecting and searching a cartridge case to identifying its suspected firearm is a time consuming procedure. Within this study, a cartridge case identification database management system in an Intranet environment is designed and implemented, thus enabling firearm examiners from different forensic laboratories to engage firearm identification without the constraints of time and location. Specifically, the study investigates appropriate database management system for image involved and Intranet secured ballistics firearm identification database. The results demonstrated that a computerized firearm identification system could be implemented in Intranet with a secure, scalable, performable Intranet database management system.
APA, Harvard, Vancouver, ISO, and other styles
48

Higgins, Christopher Paul. "Logic and databases : an object oriented approach." Thesis, University of York, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Quarles, April Michelle. "An analysis of database design transformations as applied to the Advanced Education Database System." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-04272010-020138/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Oh, Yong-Chul. "Secure database modeling and design." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/13043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography