To see the other types of publications on this topic, follow the link: Database Access Pattern and Autonomic Computing System.

Journal articles on the topic 'Database Access Pattern and Autonomic Computing System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 journal articles for your research on the topic 'Database Access Pattern and Autonomic Computing System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Zhikun, Shuqiang Yang, Yunfei Shang, et al. "Fragment Re-Allocation Strategy Based on Hypergraph for NoSQL Database Systems." International Journal of Grid and High Performance Computing 8, no. 3 (2016): 1–23. http://dx.doi.org/10.4018/ijghpc.2016070101.

Full text
Abstract:
NoSQL database is famed for the characteristics of high scalability, high availability, and high fault-tolerance. It is used to manage data for a lot of applications. The computing model has been transferred to “computing close to data”. Therefore, the location of fragment directly affects system's performance. Every site's load dynamical changes because of the increasing data and the ever-changing operation pattern. So system has to re-allocate fragment to improve system's performance. The general fragment re-allocation strategies of NoSQL database scatter the related fragments as possible to
APA, Harvard, Vancouver, ISO, and other styles
2

Hung, Tran Van, and Chuan He Huang. "A Dynamic Data Fragmentation and Distribution Strategy for Main-Memory Database Cluster." Advanced Materials Research 490-495 (March 2012): 1231–36. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1231.

Full text
Abstract:
MMDB cluster system is a memory optimized relation database that implements on cluster computing platform, provides applications with extremely fast response time and very high throughput as required by many applications in a wide range of industries. Here, a new dynamic fragment allocation algorithm (DFAPR) in Partially Replicated allocation scenario is proposed. This algorithm reallocates data with respect to changing data access pattern for each fragment in which data is maintained in current site, migrated or created new replicas on remote sites depend on accessing frequency and average re
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Qiang. "The Use of Artificial Intelligence Combined with Cloud Computing in the Design of Education Information Management Platform." International Journal of Emerging Technologies in Learning (iJET) 16, no. 05 (2021): 32. http://dx.doi.org/10.3991/ijet.v16i05.20309.

Full text
Abstract:
Based on cloud computing theory and service-oriented architecture (SOA) design pattern, a smart education management platform is designed by using cloud computing and artificial intelligence technology. The platform is deployed in the server cluster environment, with Hadpoop managed storage cluster as the data storage center. For the education management, education portal and remote classroom, the corresponding services are launched, which has the advantages of intelligent and efficient, massive data access and intelligent collaborative management. The test results show that the platform can b
APA, Harvard, Vancouver, ISO, and other styles
4

Fidele, Kagiraneza Alexis, and Agus Hartanto. "DoS Attack Prevention Using Rule-Based Sniffing Technique and Firewall in Cloud Computing." E3S Web of Conferences 125 (2019): 21004. http://dx.doi.org/10.1051/e3sconf/201912521004.

Full text
Abstract:
Nowadays, we are entering an era where the internet has become a necessary infrastructure and support that can be applied as a means of regular communication and data service. In these services, cloud-based on servers has an essential role as it can serve numerous types of devices that are interconnected with several protocols. Unfortunately, internet cloud servers become the main target of attacks such as Denial of Service (DoS), Distributed Denial of Service (DDoS). These attacks have illegal access that could interfere in service functions. Sniffing techniques are typically practiced by hac
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Mingjing, Shan Wu, Tian Chen, Changhong Wang, and Guanzheng Liu. "Information-Based Similarity of Ordinal Pattern Sequences as a Novel Descriptor in Obstructive Sleep Apnea Screening Based on Wearable Photoplethysmography Bracelets." Biosensors 12, no. 12 (2022): 1089. http://dx.doi.org/10.3390/bios12121089.

Full text
Abstract:
Obstructive sleep apnea (OSA) is a common respiratory disorder associated with autonomic nervous system (ANS) dysfunction, resulting in abnormal heart rate variability (HRV). Capable of acquiring heart rate (HR) information with more convenience, wearable photoplethysmography (PPG) bracelets are proven to be a potential surrogate for electrocardiogram (ECG)-based devices. Meanwhile, bracelet-type PPG has been heavily marketed and widely accepted. This study aims to investigate the algorithm that can identify OSA with wearable devices. The information-based similarity of ordinal pattern sequenc
APA, Harvard, Vancouver, ISO, and other styles
6

Sekar Setyaningtyas, Bangkit Indarmawan Nugroho, and Zaenul Arif. "TINJAUAN PUSTAKA SISTEMATIS: PENERAPAN DATA MINING TEKNIK CLUSTERING ALGORITMA K-MEANS." Jurnal Teknoif Teknik Informatika Institut Teknologi Padang 10, no. 2 (2022): 52–61. http://dx.doi.org/10.21063/jtif.2022.v10.2.52-61.

Full text
Abstract:
Data Mining adalah metode untuk menganalisis pola dan karakteristik di masa depan serta untuk mengumpulkan informasi tak terduga yang belum pernah terlihat sebelumnya dari database yang besar. Dalam data mining, clustering adalah salah satu teknik yang berguna untuk analisis data. Salah satu algoritma data mining adalah algoritma K-Means yang merupakan teknik clustering berdasarkan pembagian jarak. Tujuan yang ingin dicapai dalam paper ini yakni menganalisis teknik clustering menggunakan algoritma K-Means dalam data mining dengan melakukan review secara mendalam dan mengevaluasi penelusuran me
APA, Harvard, Vancouver, ISO, and other styles
7

Hemker, Bradd G., David C. Brousseau, Ke Yan, Raymond G. Hoffmann, and Julie A. Panepinto. "Health Care Utilization Patterns and Emergency Department Reliance During Transition of Care From Pediatric to Adult Providers In Sickle Cell Disease." Blood 116, no. 21 (2010): 83. http://dx.doi.org/10.1182/blood.v116.21.83.83.

Full text
Abstract:
Abstract Abstract 83 Background: Improved survival of patients with sickle cell disease has led to increased attention on the transition of care from pediatric to adult providers. Recent studies have shown increased emergency department (ED) utilization as well as an increased risk of mortality during this transition period for patients with sickle cell disease. Suggested reasons for such changes include loss of a medical home, loss of insurance, and loss of access to outpatient clinics as pediatric sickle cell patients transition to adult services. Emergency Department Reliance (EDR), defined
APA, Harvard, Vancouver, ISO, and other styles
8

Sgurev, Vassil, Vladimir Jotsov, and Mincho Hadjiski. "Intelligent Systems: Methodology, Models, and Applications in Emerging Technologies." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 1 (2005): 3–4. http://dx.doi.org/10.20965/jaciii.2005.p0003.

Full text
Abstract:
From year to year the number of investigations on intelligent systems grows rapidly. For example this year 245 papers from 45 countries were sent for the Second International IEEE Conference on Intelligent Systems (www.ieee-is.org; www.fnts-bg.org/is) and this is an increase of more than 50% by all indicators. The presented papers on intelligent systems were marked by big audiences and they provoked a significant interest that ultimately led to the formation of vivid discussions, exchange of ideas and locally provoked the creation of working groups for different applied projects. All this refl
APA, Harvard, Vancouver, ISO, and other styles
9

Vishnuvardhan, Mannava, and Ramesh T. "Load Distribution Composite Design Pattern for Genetic Algorithm-Based Autonomic Computing Systems." August 31, 2012. https://doi.org/10.5281/zenodo.7151587.

Full text
Abstract:
Current autonomic computing systems are ad hoc solutions that are designed and implemented from the scratch. When designing software, in most cases two or more patterns are to be composed to solve a bigger problem. A composite design patterns shows a synergy that makes the composition more than just the sum of its parts which leads to ready-made software architectures. As far as we know, there are no studies on composition of design patterns for autonomic computing domain. In this paper we propose pattern-oriented software architecture for self-optimization in autonomic computing system using
APA, Harvard, Vancouver, ISO, and other styles
10

IJCSEA. "International Journal of Computer Science, Engineering and Applications (IJCSEA)." August 31, 2018. https://doi.org/10.5281/zenodo.1404044.

Full text
Abstract:
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
APA, Harvard, Vancouver, ISO, and other styles
11

Ju, Dongyeol, Jungwoo Lee, Sungjun Kim, and Seongjae Cho. "Improvement of volatile switching in scaled silicon nanofin memristor for high performance and efficient reservoir computing." Journal of Chemical Physics 161, no. 1 (2024). http://dx.doi.org/10.1063/5.0218677.

Full text
Abstract:
Conductive-bridge random access memory can be used as a physical reservoir for temporal learning in reservoir computing owing to its volatile nature. Herein, a scaled Cu/HfOx/n+-Si memristor was fabricated and characterized for reservoir computing. The scaled, silicon nanofin bottom electrode formation is verified by scanning electron and transmission electron microscopy. The scaled device shows better cycle-to-cycle switching variability characteristics compared with those of large-sized cells. In addition, synaptic characteristics such as conductance changes due to pulses, paired-pulse facil
APA, Harvard, Vancouver, ISO, and other styles
12

-, Prashant Singh. "Design Patterns for Secure Multi-Tenant Architecture in Financial Services." International Journal on Science and Technology 10, no. 4 (2019). https://doi.org/10.71097/ijsat.v10.i4.5507.

Full text
Abstract:
The financial services industry has been at the forefront of digital transformation, leveraging cloud computing, Software-as-a-Service (SaaS), and platform ecosystems to deliver scalable and agile services. However, the shift towards cloud-based multi-tenant architectures introduces significant security, privacy, and compliance challenges, particularly in an industry governed by stringent regulations such as GDPR, PCI-DSS, and FFIEC guidelines. Designing a secure multi-tenant architecture requires careful balancing of tenant isolation, data protection, access control, and system performance. T
APA, Harvard, Vancouver, ISO, and other styles
13

-, Bhanu Prakash Reddy Rella. "Machine Learning-Driving Optimization of Legacy Database Systems." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10, no. 6 (2022). https://doi.org/10.37082/ijirmps.v10.i6.232231.

Full text
Abstract:
The emergence of machine learning (ML) as a solution to enhance the database management system and operational performance is becoming one of the trends in the data management. Legacy systems (quite often suffer from) poor performance. These issues prevent business institutions from growing and keep up with an increasingly information-driven climate. By utilizing the latest ML technologies, companies can replace old systems, keep up with today's requirements, and achieve overall performance. This paper will be about using machine learning in the old database systems optimization, particularly
APA, Harvard, Vancouver, ISO, and other styles
14

M., L. Anitha, and A. Radhakrishna Rao K. "Fusion of Finger Inner Knuckle Print and Hand Geometry Features to Enhance the Performance of Biometric Verification System." September 1, 2016. https://doi.org/10.5281/zenodo.1127210.

Full text
Abstract:
With the advent of modern computing technology, there is an increased demand for developing recognition systems that have the capability of verifying the identity of individuals. Recognition systems are required by several civilian and commercial applications for providing access to secured resources. Traditional recognition systems which are based on physical identities are not sufficiently reliable to satisfy the security requirements due to the use of several advances of forgery and identity impersonation methods. Recognizing individuals based on his/her unique physiological characteristics
APA, Harvard, Vancouver, ISO, and other styles
15

M.SUJITHRA1, AND DR G. PADMAVATHI. "BIOMETRIC SYSTEM PENETRATION IN RESOURCE CONSTRAINED MOBILE DEVICE." March 7, 2013. https://doi.org/10.5121/ijbb.2013.3104.

Full text
Abstract:
International Journal on Bioinformatics & Biosciences (IJBB) Vol.3, No.1, March 2013 DOI : 10.5121/ijbb.2013.3104 35 BIOMETRIC SYSTEM PENETRATION IN RESOURCE CONSTRAINED MOBILE DEVICE M.SUJITHRA1 AND DR G. PADMAVATHI 2 1Assistant Professor, Department of Computer Technology & Applications, Coimbatore Institute of Technology, Email: sujisrinithi@gmail.com 2 Professor& Head, Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore, Tamil Nadu, India. ABSTRACT Over the past few years, the usage of mobile devices to access dat
APA, Harvard, Vancouver, ISO, and other styles
16

Anzar. "AN EFFICIENT PSO OPTIMIZED INTEGRATION WEIGHT ESTIMATION USING D-PRIME STATISTICS FOR A MULTIBIOMETRIC SYSTEM." September 28, 2012. https://doi.org/10.5121/ijbb.2012.2304.

Full text
Abstract:
International Journal on Bioinformatics & Biosciences (IJBB) Vol.2, No.3, September 2012 DOI : 10.5121/ijbb.2012.2304 31 AN EFFICIENT PSO OPTIMIZED INTEGRATION WEIGHT ESTIMATION USING D-PRIME STATISTICS FOR A MULTIBIOMETRIC SYSTEM S. M. Anzar1 and P. S. Sathidevi2 1Department of Electronics & Communication Engineering, National Institute of Technology, Calicut, India, 673601 p090004ec@nitc.ac.in 2Department of Electronics & Communication Engineering, National Institute of Technology, Calicut, India, 673601 sathi@nitc.ac.in ABSTRACT The efficiency of a multibiometric system can be i
APA, Harvard, Vancouver, ISO, and other styles
17

Carlson, Kristen. "Highlights of the Issue." SuperIntelligence - Robotics - Safety & Alignment 1, no. 1 (2024). https://doi.org/10.70777/si.v1i1.11101.

Full text
Abstract:
To emphasize the journal’s concern with AGI safety, we inaugurate Artificial General Intelligence (AGI) by focusing the first issue on Risks, Governance, and Safety & Alignment Methods. Risks The AI Risk Repository: A Comprehensive Meta-Review, Database, and Taxonomy of Risks from Artificial Intelligence The most comprehensive AI risk taxonomy — 777 specific risks classified into 43 categories — to date has been created by workers collaborating from a half-dozen institutions. We except 11 key pages from the original 79-page report. Their ‘living’ Repository is online and free to download a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!