Filters








61,905 Hits in 3.2 sec

Benchmark for Real-Time Database Systems for Telecommunications [chapter]

Jan Lindström, Tiina Niklander
1999 Lecture Notes in Computer Science  
However, previous proposals do not consider timely response and other telecommunication application requirements.  ...  This paper shortly reviews telecommunication requirements and previous work on real-time databases.  ...  Compared to the traditional benchmarking of OLAP applications (TPC-B, TPC-C), which originate from banking applications and business applications, telecommunication databases contain much less data.  ... 
doi:10.1007/3-540-45432-2_7 fatcat:b4w2epvmgve3ff2rwnmquydvtu

Mining Sequential Alarm Patterns in a Telecommunication Database [chapter]

Pei-Hsin Wu, Wen-Chih Peng, Ming-Syan Chen
1999 Lecture Notes in Computer Science  
Such information systems as stock trading, banking, wireless conferencing, are being provided by information services and application providers [5][6][7][13], and mobile users are able to access such information  ...  A telecommunication system produces daily a large amount of alarm data which contains hidden valuable information about the system behavior.  ...  Merging the repeated alarm events should be done in accordance with the ceased table in the telecommunication database system.  ... 
doi:10.1007/3-540-45432-2_4 fatcat:erdo4ogsmvffvawsamllbj6xie

Urban photograph localization using the INSTREET application—accuracy and performance analysis

Michał Grega, Seweryn Łach
2013 Multimedia tools and applications  
The paper proposes a solution to the problem of geolocation of photographs by using an algorithm to compare their content against a geolocated database of street view images, and analyzing the performance  ...  The paper also describes the results of optimizing the performance of the algorithm and its accuracy.  ...  The time performance of the application has since been improved by pre-calculating all the descriptors and limiting the search process just to comparing the descriptors.  ... 
doi:10.1007/s11042-013-1538-1 fatcat:pahq6q6lynfspetd6mdzahfsma

Telecommunication research in information systems

Dennis A. Adams, Mary C. Lacity, James R. Mullins
1991 ACM SIGMIS Database the DATABASE for Advances in Information Systems  
Donovan (1988) stressed that IS manager' s primary role is to establish a communications structure that provides application productivity .  ...  Thi s paper proceeds with a background discussion of stag e theories, the description of the research methodology, an d analysis of the data , BACKGROUND insights on ho w function .  ...  To answer this question , rank regression analysis was performed to see how th e number of telecommunication articles has changed over th e eleven years .  ... 
doi:10.1145/109022.109026 fatcat:hrgqcciczbhl5gzwv7j5teps6i

Customer Data Analysis Model using Business Intelligence Tools in Telecommunication Companies

Monica LIA
2015 Database Systems Journal  
This article presents a customer data analysis model in a telecommunication company and business intelligence tools for data modelling, transforming, data visualization and dynamic reports building .  ...  For a mature market, knowing the information inside the data and making forecast for strategic decision become more important in Romanian Market.  ...  Acknowledgments Personal thanks to professor Ion Lungu who help me in my odyssey of performing. And also to my kids, all special, who let me write in the nights.  ... 
doaj:eef84cb1bf8a483ba5c5a7b61353cb09 fatcat:6nxufqx3ejh4ddzvyswqmj6noa

Telecommunication research in information systems: an investigation of the literature

Dennis A. Adams, Mary C. Lacity, James R. Mullins
1991 ACM SIGMIS Database the DATABASE for Advances in Information Systems  
Donovan (1988) stressed that IS manager' s primary role is to establish a communications structure that provides application productivity .  ...  Thi s paper proceeds with a background discussion of stag e theories, the description of the research methodology, an d analysis of the data , BACKGROUND insights on ho w function .  ...  To answer this question , rank regression analysis was performed to see how th e number of telecommunication articles has changed over th e eleven years .  ... 
doi:10.1145/126743.126751 fatcat:6ea43tqfjveixfpp64wooiiy5m

Performance Modeling of Database Systems: a Survey

Antonia Krajewska, Research and Academic Computer Network (NASK)
2018 Journal of Telecommunications and Information Technology  
The paper introduces queueing networks and considers several classification criteria applicable to such models.  ...  This survey distinguishes methodologies, which evaluate database performance at the integrated system level.  ...  Database System Performance Evaluation Models Following Osman and Knottenbelt [2] , we would like to describe performance analysis methodologies which do not focus on particular database management system  ... 
doi:10.26636/jtit.2018.128918 fatcat:dzdp6dy4kvbebnrw2zm24ayhb4

Construction and Realization for Multi-dimensional Database Based on RDBMS

Feng He, Wang Yu
2016 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
Based on ArcSDE, this paper has proposed a new construction and management method for spatial database which has better performance than the traditional method.  ...  Being different from other database product (Oracel Spatial), ArcSDE provides a suite of services that enhance data management performance, extend the range of data types that can be stored in a RDBMS,  ...  Only after you have performed a full database backup, you can perform an incremental backup.  ... 
doi:10.12928/telkomnika.v14i2a.4377 fatcat:k2es26yrynh3la32q5jtw324cq

Database techniques for resilient network monitoring and inspection

Zahraa A. Jaaz, Suha Sahib Oleiwi, Seba Aziz Sahy, Israa Albarazanchi
2020 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
This paper explains why many storage methods are insufficient for providing real-time analysis on sizable datasets and examines database techniques attempt to address this challenge.  ...  Then, to provide an example application of these databases, we develop a simple analytic which collects statistical information and classifies IP addresses based upon behavior.  ...  IP flow analysis at supercomputing To begin to evaluate the performance and use of a network flow database, we developed an analytic to produce flow metrics in real-time at SC19 (supercomputing 2019).  ... 
doi:10.12928/telkomnika.v18i5.14305 fatcat:bkieczwh25aaldbm6oid3in3ve

A novel machine learning approach for database exploitation detection and privilege control

Chee Keong Wee, Richi Nayak
2019 Journal of Information and Telecommunication  
Detecting their malicious activities is difficult as each database has its own set of unique usage activities and the generic exploitation avoidance rules are usually not applicable.  ...  The empirical analysis shows that the proposed approach can intuitively adapt to any database that supports a wide variety of clients and enforce stringent control customized to the specific IT systems  ...  Richi Nayak has contributed to the area of data mining and she holds multiple awards in researches and academic achievement.  ... 
doi:10.1080/24751839.2019.1570454 fatcat:zzzk4xv5dnhnteh6ma7umhepgu

The Replication of Academic Database System using Linux Ubuntu Server Technology

2020 Journal of Computer Science, Information Technology and Telecommunication Engineering  
The replication of the Web-Based Student Academic System Database is implemented using VMWare workstation 9.0.  ...  By using Ubuntu Server 12.04 which is a server, there are three servers that are built including the master server, slave 1 and slave 2, with the three servers synchronized and replicated automatically  ...  Replication is also possible to support application performance, physical data distribution according to its use, such as online transaction processing and DSS (Desiscion Support System) or distributed  ... 
doi:10.30596/jcositte.v1i2.5017 fatcat:qbgwhqncwrc5lmpvczj773cttq

Efficient Index-based Search Protocols for Encrypted Databases

Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
Our proposal is generic, can be applied to several application domains, and practically compared to similar works.  ...  By creating index tables before the execution of the queries, it has become possible to execute a search query with high performance.  ...  Our complexity analysis and experimental results on a large dataset clearly show the contribution of our work: the performance of the system is outstanding.  ... 
doi:10.5220/0006869804360447 dblp:conf/icete/NateghizadEL18 fatcat:igmor5b4tfbzvixic3wee77a4q

Adaptive load forecasting using reinforcement learning with database technology

Chee Keong Wee, Richi Nayak
2019 Journal of Information and Telecommunication  
As shown in empirical analysis, the solution interacts with the environment and performs the optimum forecasting routine intuitively. ARTICLE HISTORY  ...  To deal with the varying accuracy of the forecasting models on different substations' loads, the proposed solution compares and uses the best models and recalibrate them iteratively by comparing the model's  ...  Chee Keong is also currently working as a senior database administrator with Energy Queensland and he holds multiple Oracle certified professional certifications.  ... 
doi:10.1080/24751839.2019.1596470 fatcat:kj7wavmta5gftcl46hx7zkn5s4

Backward chaining inference as a database stored procedure – the experiments on real-world knowledge bases

Tomasz Xie¸ski, Roman Simiński
2018 Journal of Information and Telecommunication  
Inference was performed on a rule base buffered in memory structures.  ...  Backward chaining inference as a database stored procedure -the experiments on real-world knowledge bases.  ...  analysis, . a revised and extended version of the abstract, introduction and conclusions.  ... 
doi:10.1080/24751839.2018.1479931 fatcat:h42ary4lnrc5ndaw3n5w7pj3bu

Performance Analysis of Unified Enterprise Application Security Framework

Riaz A. Shaikh, Kashif Sharif, Ejaz Ahmed
2005 2005 Student Conference on Engineering Sciences and Technology  
from any underlying authentication technology and authorization policy.  ...  Unified Enterprise application security is a new emerging approach for providing protection against application level attacks.  ...  Interceptors are also used to log each activity in a centralized database, which is used for real time or off line analysis of anomaly detection.  ... 
doi:10.1109/sconest.2005.4382878 fatcat:7orgxdffwjd33deazp4pssz6k4
« Previous Showing results 1 — 15 out of 61,905 results