To see the other types of publications on this topic, follow the link: Database transaction.

Journal articles on the topic 'Database transaction'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Database transaction.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kaur, Harpreet, Mritunjay Kumar, and Gulshan Kumar. "Performance evaluation of conflict serializability against 2PL in Homogenous Distributed Database." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 7, no. 1 (2013): 510–17. http://dx.doi.org/10.24297/ijct.v7i1.3481.

Full text
Abstract:
There are many techniques in the recent years that provide the synchronization among the transactions using shared data like 2 phase locking protocol and time stamping in distributed database system. These techniques are efficient and provide fast transactional operations and serializable execution of the transactions. But these existing techniques like 2PL abort the transaction when a conflict occurs in transaction actions that result in degradation in the performance. In this dissertation we analyse the purposed techniques that provide the serial execution of the concurrent transactions. To
APA, Harvard, Vancouver, ISO, and other styles
2

Mohamed, Asghaiyer. "Network load traffic on MySQL atomic transaction database." Bulletin of Social Informatics Theory and Application 4, no. 1 (2020): 35–39. http://dx.doi.org/10.31763/businta.v4i1.188.

Full text
Abstract:
Internet technology is developing very rapidly especially on the database system. Today's database has led to data that cannot be processed into the traditional way that we call big data. Some data stored on the server requires a way for the data to be valid and intact for that transaction mechanism appears on RDBMS which ensures that the data stored will become a unified whole as in customer account data, withdrawal of money at ATMs, e-transactions -commerce and so on.
 Of course the use of transactions in a database by not using Atomic transactions has a difference in terms of traffic o
APA, Harvard, Vancouver, ISO, and other styles
3

Khanuja, Harmeet Kaur, and Dattatraya Adane. "Monitor and Detect Suspicious Transactions With Database Forensic Analysis." Journal of Database Management 29, no. 4 (2018): 28–50. http://dx.doi.org/10.4018/jdm.2018100102.

Full text
Abstract:
The extensive usage of web has given rise to financially motivated illegal covert online transactions. So the digital investigators have approached databases for investigating undetected illegal transactions. The authors here have designed and developed a methodology to find the illegal financial transactions through the database logs. The objective is to monitor database transactions for detecting and reporting risk level of suspicious transactions. Initially, the process extracts SQL transactions from logs of different database systems, then transforms and loads them separately in uniform XM
APA, Harvard, Vancouver, ISO, and other styles
4

Jain, Ashish. "Transaction Processing in Mobile Database Systems." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 7, no. 02 (2015): 87–92. http://dx.doi.org/10.18090/samriddhi.v7i2.8631.

Full text
Abstract:
In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore, there is a need to provide a means to allow concurrent management of transactions. Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate. This is due the fact that the ACID properties of transactions are not simply followed, in particular the consistency property. Thus, transaction management models adopting weaker form of consistency are needed and these models can now tolerate a limited amo
APA, Harvard, Vancouver, ISO, and other styles
5

RUSINKIEWICZ, MAREK, PIOTR KRYCHNIAK, and ANDRZEJ CICHOCKI. "TOWARDS A MODEL FOR MULTIDATABASE TRANSACTIONS." International Journal of Cooperative Information Systems 01, no. 03n04 (1992): 579–617. http://dx.doi.org/10.1142/s0218215792000155.

Full text
Abstract:
In many application areas the information that may be of interest to a user is stored under the control of multiple, autonomous database systems. To support global transactions in a multidatabase environment, we must coordinate the activities of multiple Database Management Systems that were designed for independent, stand-alone operation. The autonomy and heterogeneity of these systems present a major impediment to the direct adaptation of transaction management mechanisms developed for distributed databases. In this paper we introduce a transaction model designed for a multidatabase environm
APA, Harvard, Vancouver, ISO, and other styles
6

Warnars, Spits. "Perbandingan Penggunaan Database OLTP dan Data Warehouse." CCIT Journal 8, no. 1 (2014): 83–100. http://dx.doi.org/10.33050/ccit.v8i1.274.

Full text
Abstract:
As a permanent storage for business process transaction, database is a crucial and the needed for the system. Using database often does not match with the ability and functionality and even is it possible as theory said about using transaction database and beyond the advantages and disadvantages, separating using between transactional database and database for decision making will mine the ability and the powerful database as much as possible. Beside that daily transaction will increase the database capacity month by month and year by year and will decrease the performance, especially for cust
APA, Harvard, Vancouver, ISO, and other styles
7

Haraty, Ramzi Ahmed, Sanaa Kaddoura, and Ahmed Zekri. "Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 74–86. http://dx.doi.org/10.4018/ijswis.2017040105.

Full text
Abstract:
One of the critical concerns in the current era is information security. Companies are sharing vast online critical data, which exposes their databases to malicious attacks. When protection techniques fail to prevent an attack, recovery is needed. Database recovery is not a straightforward procedure, since the transactions are highly interconnected. Traditional recovery techniques do not consider the interconnection between transactions because this information is not saved anywhere in the log file. Thus, they rollback all the transactions starting from the detected malicious transaction to th
APA, Harvard, Vancouver, ISO, and other styles
8

Jing, Changhong, Wenjie Liu, Jintao Gao, and Ouya Pei. "Research and implementation of HTAP for distributed database." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 39, no. 2 (2021): 430–38. http://dx.doi.org/10.1051/jnwpu/20213920430.

Full text
Abstract:
Data processing can be roughly divided into two categories, online transaction processing OLTP(on-line transaction processing) and online analytical processing OLAP(on-line analytical processing). OLTP is the main application of traditional relational databases, and it is some basic daily transaction processing, such as bank pipeline transactions and so on. OLAP is the main application of the data warehouse system, it supports some more complex data analysis operations, focuses on decision support, and provides popular and intuitive analysis results. As the amount of data processed by enterpri
APA, Harvard, Vancouver, ISO, and other styles
9

Pei, Ouya, Zhanhuai Li, Hongtao Du, Wenjie Liu, and Jintao Gao. "Dependence-Cognizant Locking Improvement for the Main Memory Database Systems." Mathematical Problems in Engineering 2021 (February 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/6654461.

Full text
Abstract:
The traditional lock manager (LM) seriously limits the transaction throughput of the main memory database systems (MMDB). In this paper, we introduce dependence-cognizant locking (DCLP), an efficient improvement to the traditional LM, which dramatically reduces the locking space while offering efficiency. With DCLP, one transaction and its direct successors are collocated in its context. Whenever a transaction is committed, it wakes up its direct successors immediately avoiding the expensive operations, such as lock detection and latch contention. We also propose virtual transaction which has
APA, Harvard, Vancouver, ISO, and other styles
10

Sianturi, Fricles Ariwisanto. "ANALISA PENGARUH LOG TRANSAKSI PADA SISTEM KOMPUTER MENGGUNAKAN ALGORITMA RECOVERY BERBASIS LOG." Journal Of Computer Networks, Architecture and High Performance Computing 1, no. 1 (2018): 6–9. http://dx.doi.org/10.47709/cnapc.v1i1.2.

Full text
Abstract:
This study aims to melakukakan analysis of the effect of the transaction log on a computer based system either on a single system tired, and two tiered through simulated transactions bank system with technology client / server to get a log of transactions on the database system Microsoft Windows SQL Server 2008 R2 management studio a data base. Methods or algorithms are used to analyze the transaction log on the system used is a log-based recovery algorithm.The results based on the analysis, showed that the use of query local database and query the database using sotere procedure to get the tr
APA, Harvard, Vancouver, ISO, and other styles
11

Rokhmah, Siti, and Ihsan Cahyo Utomo. "Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks." International Journal of Computer and Information System (IJCIS) 1, no. 1 (2020): 11–15. http://dx.doi.org/10.29040/ijcis.v1i1.7.

Full text
Abstract:
Abstract—Database is an important part in managing information, because a database is a collection of data that is processed to produce information. because of the importance of the database, many crimes are directed to attack the database, both attacks against access rights or attacks against the data itself. My SQL is a Database Management System (DBMS) that provides several facilities, one of which is the logging facility. Binary Log is a type of database log in the form of binary digits that contains some information including the record of the time of the transaction, the user who made th
APA, Harvard, Vancouver, ISO, and other styles
12

Rudy, Rudy, and Natalia Limantara. "Model Data Warehouse dan Business Intelligence untuk Meningkatkan Penjualan pada PT. S." ComTech: Computer, Mathematics and Engineering Applications 2, no. 1 (2011): 418. http://dx.doi.org/10.21512/comtech.v2i1.2774.

Full text
Abstract:
Today a lot of companies use information system in every business activity. Every transaction is stored electronically in the database transaction. The transactional database does not help much to assist the executives in making strategic decisions to improve the company competitiveness. The objective of this research is to analyze the operational database system and the information needed by the management to design a data warehouse model which fits the executive information needs in PT. S. The research method uses the Nine-Step Methodology data warehouse design by Ralph Kimball. The result i
APA, Harvard, Vancouver, ISO, and other styles
13

Setiadi, Teguh. "APPLICATION OF INFORMATION SYSTEMS FOR TRANSACTION REPORTS BADAN KESWADAYAAN MASYARAKAT SEJAHTERA CASE STUDY SUMBEREJO KENDAL VILLAGE." SAINTEKBU 11, no. 2 (2019): 28. http://dx.doi.org/10.32764/saintekbu.v11i2.358.

Full text
Abstract:
Abstract
 BKM Sejahtera is a collective leadership institution from a community association in the village of Sumberejo which has the role of mobilizing the potential and resources of the community in an effort to overcome various development issues in the village / village area. BKM Sejahtera still has many obstacles in its operations including the process of making reports and transactions - transactions that occur are still done conventionally, namely the making of reports still using Microsoft Excel as a recording of existing transactions but it is less effective because it requires a
APA, Harvard, Vancouver, ISO, and other styles
14

SZABÓOVÁ, Veronika, Csaba SZABÓ, Valerie NOVITZKÁ, and Emília DEMETEROVÁ. "GAME SEMANTICS OF THE TRANSACTION ROLLBACK DATABASE OPERATION." Acta Electrotechnica et Informatica 15, no. 1 (2015): 3–8. http://dx.doi.org/10.15546/aeei-2015-0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Vidyasankar, K. "Unified Theory of Database Serializability12." Fundamenta Informaticae 14, no. 2 (1991): 147–83. http://dx.doi.org/10.3233/fi-1991-14202.

Full text
Abstract:
A database system is a collection of data items, read or written by transactions in a possibly interleaved fashion. An interleaved execution is assumed to be correct if the sequence of the steps of the transactions, called history, is serializable, that is, the effect of the execution is equivalent to that of some serial execution of the same transactions. In this paper we give a new characterization of serializability that brings out the inherent problem of serialization explicitly. We then give a graph-theoretic analogue of serializable histories. We define a new class of graphs, called seri
APA, Harvard, Vancouver, ISO, and other styles
16

Subramanyam, R. B. V., and A. Goswami. "Mining Frequent Fuzzy Grids in Dynamic Databases with Weighted Transactions and Weighted Items." Journal of Information & Knowledge Management 05, no. 03 (2006): 243–57. http://dx.doi.org/10.1142/s0219649206001487.

Full text
Abstract:
Incremental mining algorithms that derive the latest mining output by making use of previous mining results are attractive to business organisations. In this paper, a fuzzy data mining algorithm for incremental mining of frequent fuzzy grids from quantitative dynamic databases is proposed. It extends the traditional association rule problem by allowing a weight to be associated with each item in a transaction and with each transaction in a database to reflect the interest/intensity of items and transactions. It uses the information about fuzzy grids that are already mined from original databas
APA, Harvard, Vancouver, ISO, and other styles
17

Mišovič, Milan, and Ivana Rábová. "An interactive style of the testing database production for EIS." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 54, no. 6 (2006): 133–44. http://dx.doi.org/10.11118/actaun200654060133.

Full text
Abstract:
Using a progressive Information Technology for development of Software Modules for Enterprise Information Systems brings a lot of practical and theoretical problems. One of them is a verification of results achieved in Life Cycle Stages, especially in the analysis stage. Instead of a very deep theoretical approach we can use quite practical testing by means of a testing database. Such testing database has to be constructed gradually from the Data Flow Diagram by a special algorithm.This article introduces a formal description of the entity population and entity states. There is suggested to de
APA, Harvard, Vancouver, ISO, and other styles
18

Aida Jusoh, Julaily, Mustafa Man, and Wan Aezwani Wan Abu Bakar. "Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset." International Journal of Engineering & Technology 7, no. 4.1 (2018): 134. http://dx.doi.org/10.14419/ijet.v7i4.1.28241.

Full text
Abstract:
Pattern mining refers to a subfield of data mining that uncovers interesting, unexpected, and useful patterns from transaction databases. Such patterns reflect frequent and infrequent patterns. An abundant literature has dedicated in frequent pattern mining and tremendous efficient algorithms for frequent itemset mining in the transaction database. Nonetheless, the infrequent pattern mining has emerged to be an interesting issue in discovering patterns that rarely occur in the transaction database. More researchers reckon that rare pattern occurrences may offer valuable information in knowledg
APA, Harvard, Vancouver, ISO, and other styles
19

Gray, Jim. "Database and transaction processing benchmarks." ACM SIGMOD Record 21, no. 2 (1992): 6. http://dx.doi.org/10.1145/141484.130288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Che Fauzi, Ainul Azila, A. Noraziah, Wan Maseri Binti Wan Mohd, A. Amer, and Tutut Herawan. "Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum." Applied Mechanics and Materials 490-491 (January 2014): 1342–46. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1342.

Full text
Abstract:
Replication in distributed database is the process of copying and maintaining database objects in multiple databases that make up a distributed database system. In this paper, we will manage fragmented database replication and transaction management for Malaysian Greater Research Network (MyGRANTS) using a new proposed algorithm called Binary Vote Assignment on Cloud Quorum (BVACQ). This technique will combine replication and fragmentation. Fragmentation in distributed database is very useful in terms of usage, efficiency, parallelism and also for security. This strategy will partition the dat
APA, Harvard, Vancouver, ISO, and other styles
21

YI, JUNKAI, GANG LU, and KEVIN LÜ. "MONITORING CUMULATED ANOMALY IN DATABASES." International Journal of Software Engineering and Knowledge Engineering 19, no. 03 (2009): 421–52. http://dx.doi.org/10.1142/s0218194009004210.

Full text
Abstract:
A new type of database anomaly called Cumulated Anomaly (CA) is dealt with in this paper. It occurs when submitting the time of authorized transactions or the changed data is cumulated out of some thresholds. A database-level detection method for Cumulated Anomaly is proposed based on statistics and fuzzy set theories. By measuring each database transaction with a real number between zero and one, this method quantitatively monitors how dangerous a transaction is. The real number is termed dubiety degree; therefore the method is named as Dubiety-Determining Method (DDM). After formally present
APA, Harvard, Vancouver, ISO, and other styles
22

Valiullin, Timur, Zhexue Huang, Chenghao Wei, Jianfei Yin, Dingming Wu, and Luliia Egorova. "A new approximate method for mining frequent itemsets from big data." Computer Science and Information Systems, no. 00 (2020): 15. http://dx.doi.org/10.2298/csis200124015v.

Full text
Abstract:
Mining frequent itemsets in transaction databases is an important task in many applications. It becomes more challenging when dealing with a large transaction database because traditional algorithms are not scalable due to the memory limit. In this paper, we propose a new approach for approximately mining of frequent itemsets in a big transaction database. Our approach is suitable for mining big transaction databases since it produces approximate frequent itemsets from a subset of the entire database, and can be implemented in a distributed environment. Our algorithm is able to efficiently pro
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Zhi Cheng, Dong Sheng Lin, and Yun Zhi Ning. "Embedded Real-Time Database System Concurrency Control Protocol AC-Based OCC-FV." Applied Mechanics and Materials 263-266 (December 2012): 1402–6. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1402.

Full text
Abstract:
Alternative and compensation are not only two basic characteristics of the real-time transaction but also the body of the concurrency control. At the same time, new problems are brought. AC-Based OCC-FV protocol associates alternative and compensation with optimistic concurrency control protocol OCC-FV. For each transaction in accepted queue, an alternative which causes no conflict can be chosen to join the ready queue as soon as possible. This is just a kind of ideal circumstance. If the conflict is inevitable, it is necessary to choose a suitable alternative to join the concurrency control,
APA, Harvard, Vancouver, ISO, and other styles
24

Mazurova, Oksana, Artem Naboka, and Mariya Shirokopetleva. "RESEARCH OF ACID TRANSACTION IMPLEMENTATION METHODS FOR DISTRIBUTED DATABASES USING REPLICATION TECHNOLOGY." Innovative Technologies and Scientific Solutions for Industries, no. 2 (16) (July 6, 2021): 19–31. http://dx.doi.org/10.30837/itssi.2021.16.019.

Full text
Abstract:
Today, databases are an integral part of most modern applications designed to store large amounts of data and to request from many users. To solve business problems in such conditions, databases are scaled, often horizontally on several physical servers using replication technology. At the same time, many business operations require the implementation of transactional compliance with ACID properties. For relational databases that traditionally support ACID transactions, horizontal scaling is not always effective due to the limitations of the relational model itself. Therefore, there is an appl
APA, Harvard, Vancouver, ISO, and other styles
25

Cui, Guan Xun, Qian Wu, Bo He, and Wei Ni. "An Efficient Parallel Algorithm for Mining Frequent Pattern." Advanced Materials Research 562-564 (August 2012): 876–81. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.876.

Full text
Abstract:
Extraction of frequent patterns in transaction-oriented database is crucial to several data mining tasks such as association rule generation, time series analysis, classification, etc. An Efficient Parallel algorithm for Mining frequent pattern (EPM) was proposed and Fast Distributed association rules Mining (FDM) algorithm was improved. Hash table technology was used to improve the generation efficiency of the 2nd candidate items . It also reduces the number of transactions in transaction database using Tid table technology. A master-slave model of parallel algorithm for mining association ru
APA, Harvard, Vancouver, ISO, and other styles
26

Maliq, Rizky Gelar, R. Rizal Isnanto, and Ike Pertiwi Windasari. "Sistem Pemrosesan Transaksi Pada Toko Bangunan Berbasis Web Dengan PHP dan MySQL." Jurnal Teknologi dan Sistem Komputer 2, no. 2 (2014): 170–74. http://dx.doi.org/10.14710/jtsiskom.2.2.2014.170-174.

Full text
Abstract:
Building supply store is a business entity engaged in the sale of construction materials for the building. Where there are still use the transaction data were administrative in bookkeeping way , so it takes a long time to figure out the sale and purchase transactions. Therefore, the author here takes issue in the sale and purchase itself. Transaction processing systems created using PHP programming language and MySQL database. System where this information can help in recording the transaction in the building supply store . In addition to recording can also be used for the preparation of month
APA, Harvard, Vancouver, ISO, and other styles
27

Rao, Hao. "Design and Implementation of Stone Materials Information System." Advanced Materials Research 850-851 (December 2013): 724–27. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.724.

Full text
Abstract:
Stone Materials Information System use ActionScript to connect SQLite database. Information of stone materials, transaction, customer, employee can be stored by system. Several database tables are created in the system. Functions are used to complete data modification operations. Stone Materials Information System provides convenience for stone material transactions between the manufacturer and the customer.
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Jun, Yu Fen Wang, and Jian Ping Wang. "Concurrency Control Protocol for Real-Time Database and the Analysis Base on Petri Net." Advanced Materials Research 143-144 (October 2010): 12–17. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.12.

Full text
Abstract:
In the article a new concurrency control protocol for real-time database (RTCC) is proposed. The protocol based on the traditional speculative concurrency control protocol (SCC). It dynamically establish the maximum of shadow to reasonably use the resources of system and add the quasi-commit phase to avoid many unnecessary restarting and enhance the concurrency of transaction. The theory of Petri net proof and results of experiment show that this protocol is feasible and effective , and it can meet the needs of real-time transaction. Speculative Concurrency Control is suitable especially for r
APA, Harvard, Vancouver, ISO, and other styles
29

Kang, Hyun Sik, Sukhoon Lee, and Doo-Kwon Baik. "Database Transaction Routing Algorithm Using AOP." KIPS Transactions on Software and Data Engineering 3, no. 11 (2014): 471–78. http://dx.doi.org/10.3745/ktsde.2014.3.11.471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Acharya, Shridhar, and Gael Buckley. "Transaction restarts in Prolog database systems." ACM SIGMOD Record 14, no. 4 (1985): 364–73. http://dx.doi.org/10.1145/971699.318986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Qian, Xiaolei, and Richard Waldinger. "A transaction logic for database specification." ACM SIGMOD Record 17, no. 3 (1988): 243–50. http://dx.doi.org/10.1145/971701.50232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Sheard, Tim, and David Stemple. "Automatic verification of database transaction safety." ACM Transactions on Database Systems 14, no. 3 (1989): 322–68. http://dx.doi.org/10.1145/68012.68014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dong, Zhi-Yuan, Chu-Zhe Tang, Jia-Chen Wang, Zhao-Guo Wang, Hai-Bo Chen, and Bin-Yu Zang. "Optimistic Transaction Processing in Deterministic Database." Journal of Computer Science and Technology 35, no. 2 (2020): 382–94. http://dx.doi.org/10.1007/s11390-020-9700-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Putra, Furqaan, and Rudy Fachruddin. "PERANCANGAN SISTEM INFORMASI DATABASE PEMBELIAN DAN PENJUALAN PRODUK PADA SHAVIRA PANCAKE BANDA ACEH." Jurnal Ilmiah Mahasiswa Ekonomi Akuntansi 5, no. 2 (2020): 193–99. http://dx.doi.org/10.24815/jimeka.v5i2.15553.

Full text
Abstract:
Purchase and sales are things which often heard in a company. The use of manual recording results in a number of problems in the company. Seeing the results of purchases, sales and transaction data manually would take a long time. This study aims to design a database of purchases and sales information systems to help employees manage purchase and sale transactions easier, therefore reducing errors and speed up the proccess of transaction calculations. The system designed in this study uses Microsoft Access. This study uses descriptive qualitative method, data collection techniques was done by
APA, Harvard, Vancouver, ISO, and other styles
35

Lin, Jerry Chun-Wei, Matin Pirouz, Youcef Djenouri, Chien-Fu Cheng, and Usman Ahmed. "Incrementally updating the high average-utility patterns with pre-large concept." Applied Intelligence 50, no. 11 (2020): 3788–807. http://dx.doi.org/10.1007/s10489-020-01743-y.

Full text
Abstract:
Abstract High-utility itemset mining (HUIM) is considered as an emerging approach to detect the high-utility patterns from databases. Most existing algorithms of HUIM only consider the itemset utility regardless of the length. This limitation raises the utility as a result of a growing itemset size. High average-utility itemset mining (HAUIM) considers the size of the itemset, thus providing a more balanced scale to measure the average-utility for decision-making. Several algorithms were presented to efficiently mine the set of high average-utility itemsets (HAUIs) but most of them focus on ha
APA, Harvard, Vancouver, ISO, and other styles
36

Han, Kyong Rok, and Jae Yearn Kim. "FCILINK: Mining Frequent Closed Itemsets Based on a Link Structure between Transactions." Journal of Information & Knowledge Management 04, no. 04 (2005): 257–67. http://dx.doi.org/10.1142/s0219649205001213.

Full text
Abstract:
The problem of discovering association rules between items in a database is an emerging area of research. Its goal is to extract significant patterns or interesting rules from large databases. Recent studies of mining association rules have proposed a closure mechanism. It is no longer necessary to mine the set of all of the frequent itemsets and their association rules. Rather, it is sufficient to mine the frequent closed itemsets and their corresponding rules. In the past, a number of algorithms for mining frequent closed itemsets have been based on items. In this paper, we use the transacti
APA, Harvard, Vancouver, ISO, and other styles
37

Balsters, Herman, and Terry Halpin. "Formal Semantics of Dynamic Constraints and Derivation Rules in ORM." International Journal of Information System Modeling and Design 7, no. 2 (2016): 31–47. http://dx.doi.org/10.4018/ijismd.2016040102.

Full text
Abstract:
This paper provides formal semantics for an extension of the Object-Role Modeling approach to support declaration of dynamic rules. Dynamic rules differ from static rules by involving state transitions, rather than simply individual states. This paper restricts application of dynamic rules to single-step transactions, with a previous state (input to the transaction) and a new state (the result of that transaction). These dynamic rules specify an elementary transaction type by indicating which kinds of objects or facts (being added, deleted or updated) are involved. Dynamic rules may declare pr
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Cui Song. "Database Cluster System Design Based on the Internet of Things." Applied Mechanics and Materials 556-562 (May 2014): 5748–51. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5748.

Full text
Abstract:
The Internet of things is currently an emerging hot technology at home and abroad, bringing profound changes for people's production and life style. At the moment of bringing many benefits, the Internet of things also brings about unprecedented challenges for software, even the whole field of information technology. Specific to the mass, heterogeneity, sensitivity of time and space and dynamic flow, this paper proposes the concurrency control mechanism of the global transaction based on the Internet of things cluster system, effectively improving the concurrence of the global transaction execu
APA, Harvard, Vancouver, ISO, and other styles
39

Djenouri, Youcef, Jerry Chun-Wei Lin, Kjetil Nørvåg, Heri Ramampiaro, and Philip S. Yu. "Exploring Decomposition for Solving Pattern Mining Problems." ACM Transactions on Management Information Systems 12, no. 2 (2021): 1–36. http://dx.doi.org/10.1145/3439771.

Full text
Abstract:
This article introduces a highly efficient pattern mining technique called Clustering-based Pattern Mining (CBPM). This technique discovers relevant patterns by studying the correlation between transactions in the transaction database based on clustering techniques. The set of transactions is first clustered, such that highly correlated transactions are grouped together. Next, we derive the relevant patterns by applying a pattern mining algorithm to each cluster. We present two different pattern mining algorithms, one applying an approximation-based strategy and another based on an exact strat
APA, Harvard, Vancouver, ISO, and other styles
40

Pandey, Anjana, and K. R. Pardasani. "PPCI Algorithm for Mining Temporal Association Rules in Large Databases." Journal of Information & Knowledge Management 08, no. 04 (2009): 345–52. http://dx.doi.org/10.1142/s0219649209002440.

Full text
Abstract:
In this paper an attempt has been made to develop a progressive partitioning and counting inference approach for mining association rules in temporal databases. A temporal database like a sales database is a set of transactions where each transaction T is a set of items in which each item contains an individual exhibition period. The existing models of association rule mining have problems in handling transactions due to a lack of consideration of the exhibition period of each individual item and lack of an equitable support counting basis for each item. As a remedy to this problem we propose
APA, Harvard, Vancouver, ISO, and other styles
41

BERBERIDIS, CHRISTOS, and IOANNIS VLAHAVAS. "DETECTION AND PREDICTION OF RARE EVENTS IN TRANSACTION DATABASES." International Journal on Artificial Intelligence Tools 16, no. 05 (2007): 829–48. http://dx.doi.org/10.1142/s0218213007003564.

Full text
Abstract:
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have some impact to the system. There are various methods from the areas of statistics and data mining for that purpose. In this article we propose PREVENT, an algorithm which uses inter-transactional patterns for the prediction of rare events in transaction databases. PREVENT is a general purpose inter-transaction association rules mining algorithm that optimally fits the demands of rare event prediction. It requires only
APA, Harvard, Vancouver, ISO, and other styles
42

Lim, J. B., and A. R. Hurson. "Transaction processing in mobile, heterogeneous database systems." IEEE Transactions on Knowledge and Data Engineering 14, no. 6 (2002): 1330–46. http://dx.doi.org/10.1109/tkde.2002.1047771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ibaraki, T., T. Kameda, and N. Katoh. "Cautious transaction schedulers for database concurrency control." IEEE Transactions on Software Engineering 14, no. 7 (1988): 997–1009. http://dx.doi.org/10.1109/32.42740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yu, P. S., S. Balsamo, and Y. H. Lee. "Dynamic transaction routing in distributed database systems." IEEE Transactions on Software Engineering 14, no. 9 (1988): 1307–18. http://dx.doi.org/10.1109/32.6174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ulusoy, Özgür, and Geneva G. Belford. "Real-time transaction scheduling in database systems." Information Systems 18, no. 8 (1993): 559–80. http://dx.doi.org/10.1016/0306-4379(93)90024-u.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Johannsen, Wolfgang. "Transaction models for federative distributed database systems." Future Generation Computer Systems 7, no. 2-3 (1992): 329–37. http://dx.doi.org/10.1016/0167-739x(92)90020-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Hanhu. "Transaction management in distributed database system POREL." Journal of Computer Science and Technology 3, no. 2 (1988): 139–46. http://dx.doi.org/10.1007/bf02943339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

MADRIA, SANJAY KUMAR, S. N. MAHESHWARI, B. CHANDRA, and BHARAT BHARGAVA. "FORMALIZATION AND PROOF OF CORRECTNESS OF THE CRASH RECOVERY ALGORITHM FOR AN OPEN AND SAFE NESTED TRANSACTION MODEL." International Journal of Cooperative Information Systems 10, no. 01n02 (2001): 1–50. http://dx.doi.org/10.1142/s0218843001000242.

Full text
Abstract:
In this paper, we present, formalize and prove the correctness of recovery algorithm for our open and safe nested transaction model using I/O automaton model. Our nested transaction model uses the notion of a recovery point subtransaction in the nested transaction tree. It introduces a prewrite operation before each write operation to increase the potential concurrency. Our transaction model is termed as "open and safe" as prewrites allow early reads (before database writes on disk) without cascading aborts. The systems restart and buffer management operations are modelled as nested transactio
APA, Harvard, Vancouver, ISO, and other styles
49

Olva, Maria, Ririt Dwiputri Permatasari, Sanusi Majid, Pratiwi Syair, and Afdal Suganda. "Pemanfaatan Dasbor pada Pemantauan Data Transaksi Penjualan." Journal of Engineering, Technology, and Applied Science 3, no. 1 (2021): 1–15. http://dx.doi.org/10.36079/lamintang.jetas-0301.188.

Full text
Abstract:
Penelitian ini bertujuan untuk mengimplementasikan dasbor pada pemantauan data transaksi penjualan di PT. Prima Labeling. Data pada sistem diperoleh dari hasil aliran informasi pengolahan data penjualan dan aliran data informasi pemanfaatan dasbor pada pemantauan data transaksi transaksi penjualan pada PT. Prima Labeling. Model sistem yang digunakan adalah UML yang mana pengembangan sistem penelitian menggunakan metode OOAD. Sistem informasi dirancang berbasis situs web dengan menggunakan bahasa pemrograman PHP dan database MySQL. Teknik penelitian kualitatif, dengan mengumpulkan data-data dan
APA, Harvard, Vancouver, ISO, and other styles
50

Olapade, Daramola Thompson, Benjamin Gbolahan Ekemode, and Abel Olaleye. "Considerations for the design and management of property database in opaque markets." Journal of Property Investment & Finance 37, no. 5 (2019): 445–54. http://dx.doi.org/10.1108/jpif-10-2018-0080.

Full text
Abstract:
PurposeEarlier studies have suggested the creation of a central database of concluded property transactions as a panacea to the property data debacle. It is in this regard that the purpose of this paper is to examine the perception of potential users of centralised property database on the consideration for the design and management of such database.Design/methodology/approachQuestionnaires were administered on 190 property practitioners (referred as estate surveying and valuation firms) in Lagos property market. Frequency index, frequency distribution and percentage were employed for data ana
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!