A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Benchmark for Real-Time Database Systems for Telecommunications
[chapter]
1999
Lecture Notes in Computer Science
However, previous proposals do not consider timely response and other telecommunication application requirements. ...
This paper shortly reviews telecommunication requirements and previous work on real-time databases. ...
Compared to the traditional benchmarking of OLAP applications (TPC-B, TPC-C), which originate from banking applications and business applications, telecommunication databases contain much less data. ...
doi:10.1007/3-540-45432-2_7
fatcat:b4w2epvmgve3ff2rwnmquydvtu
Mining Sequential Alarm Patterns in a Telecommunication Database
[chapter]
1999
Lecture Notes in Computer Science
Such information systems as stock trading, banking, wireless conferencing, are being provided by information services and application providers [5][6][7][13], and mobile users are able to access such information ...
A telecommunication system produces daily a large amount of alarm data which contains hidden valuable information about the system behavior. ...
Merging the repeated alarm events should be done in accordance with the ceased table in the telecommunication database system. ...
doi:10.1007/3-540-45432-2_4
fatcat:erdo4ogsmvffvawsamllbj6xie
Urban photograph localization using the INSTREET application—accuracy and performance analysis
2013
Multimedia tools and applications
The paper proposes a solution to the problem of geolocation of photographs by using an algorithm to compare their content against a geolocated database of street view images, and analyzing the performance ...
The paper also describes the results of optimizing the performance of the algorithm and its accuracy. ...
The time performance of the application has since been improved by pre-calculating all the descriptors and limiting the search process just to comparing the descriptors. ...
doi:10.1007/s11042-013-1538-1
fatcat:pahq6q6lynfspetd6mdzahfsma
Telecommunication research in information systems
1991
ACM SIGMIS Database the DATABASE for Advances in Information Systems
Donovan (1988) stressed that IS manager' s primary role is to establish a communications structure that provides application productivity . ...
Thi s paper proceeds with a background discussion of stag e theories, the description of the research methodology, an d analysis of the data , BACKGROUND insights on ho w function . ...
To answer this question , rank regression analysis was performed to see how th e number of telecommunication articles has changed over th e eleven years . ...
doi:10.1145/109022.109026
fatcat:hrgqcciczbhl5gzwv7j5teps6i
Customer Data Analysis Model using Business Intelligence Tools in Telecommunication Companies
2015
Database Systems Journal
This article presents a customer data analysis model in a telecommunication company and business intelligence tools for data modelling, transforming, data visualization and dynamic reports building . ...
For a mature market, knowing the information inside the data and making forecast for strategic decision become more important in Romanian Market. ...
Acknowledgments Personal thanks to professor Ion Lungu who help me in my odyssey of performing. And also to my kids, all special, who let me write in the nights. ...
doaj:eef84cb1bf8a483ba5c5a7b61353cb09
fatcat:6nxufqx3ejh4ddzvyswqmj6noa
Telecommunication research in information systems: an investigation of the literature
1991
ACM SIGMIS Database the DATABASE for Advances in Information Systems
Donovan (1988) stressed that IS manager' s primary role is to establish a communications structure that provides application productivity . ...
Thi s paper proceeds with a background discussion of stag e theories, the description of the research methodology, an d analysis of the data , BACKGROUND insights on ho w function . ...
To answer this question , rank regression analysis was performed to see how th e number of telecommunication articles has changed over th e eleven years . ...
doi:10.1145/126743.126751
fatcat:6ea43tqfjveixfpp64wooiiy5m
Performance Modeling of Database Systems: a Survey
2018
Journal of Telecommunications and Information Technology
The paper introduces queueing networks and considers several classification criteria applicable to such models. ...
This survey distinguishes methodologies, which evaluate database performance at the integrated system level. ...
Database System Performance Evaluation Models Following Osman and Knottenbelt [2] , we would like to describe performance analysis methodologies which do not focus on particular database management system ...
doi:10.26636/jtit.2018.128918
fatcat:dzdp6dy4kvbebnrw2zm24ayhb4
Construction and Realization for Multi-dimensional Database Based on RDBMS
2016
TELKOMNIKA (Telecommunication Computing Electronics and Control)
Based on ArcSDE, this paper has proposed a new construction and management method for spatial database which has better performance than the traditional method. ...
Being different from other database product (Oracel Spatial), ArcSDE provides a suite of services that enhance data management performance, extend the range of data types that can be stored in a RDBMS, ...
Only after you have performed a full database backup, you can perform an incremental backup. ...
doi:10.12928/telkomnika.v14i2a.4377
fatcat:k2es26yrynh3la32q5jtw324cq
Database techniques for resilient network monitoring and inspection
2020
TELKOMNIKA (Telecommunication Computing Electronics and Control)
This paper explains why many storage methods are insufficient for providing real-time analysis on sizable datasets and examines database techniques attempt to address this challenge. ...
Then, to provide an example application of these databases, we develop a simple analytic which collects statistical information and classifies IP addresses based upon behavior. ...
IP flow analysis at supercomputing To begin to evaluate the performance and use of a network flow database, we developed an analytic to produce flow metrics in real-time at SC19 (supercomputing 2019). ...
doi:10.12928/telkomnika.v18i5.14305
fatcat:bkieczwh25aaldbm6oid3in3ve
A novel machine learning approach for database exploitation detection and privilege control
2019
Journal of Information and Telecommunication
Detecting their malicious activities is difficult as each database has its own set of unique usage activities and the generic exploitation avoidance rules are usually not applicable. ...
The empirical analysis shows that the proposed approach can intuitively adapt to any database that supports a wide variety of clients and enforce stringent control customized to the specific IT systems ...
Richi Nayak has contributed to the area of data mining and she holds multiple awards in researches and academic achievement. ...
doi:10.1080/24751839.2019.1570454
fatcat:zzzk4xv5dnhnteh6ma7umhepgu
The Replication of Academic Database System using Linux Ubuntu Server Technology
2020
Journal of Computer Science, Information Technology and Telecommunication Engineering
The replication of the Web-Based Student Academic System Database is implemented using VMWare workstation 9.0. ...
By using Ubuntu Server 12.04 which is a server, there are three servers that are built including the master server, slave 1 and slave 2, with the three servers synchronized and replicated automatically ...
Replication is also possible to support application performance, physical data distribution according to its use, such as online transaction processing and DSS (Desiscion Support System) or distributed ...
doi:10.30596/jcositte.v1i2.5017
fatcat:qbgwhqncwrc5lmpvczj773cttq
Efficient Index-based Search Protocols for Encrypted Databases
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
Our proposal is generic, can be applied to several application domains, and practically compared to similar works. ...
By creating index tables before the execution of the queries, it has become possible to execute a search query with high performance. ...
Our complexity analysis and experimental results on a large dataset clearly show the contribution of our work: the performance of the system is outstanding. ...
doi:10.5220/0006869804360447
dblp:conf/icete/NateghizadEL18
fatcat:igmor5b4tfbzvixic3wee77a4q
Adaptive load forecasting using reinforcement learning with database technology
2019
Journal of Information and Telecommunication
As shown in empirical analysis, the solution interacts with the environment and performs the optimum forecasting routine intuitively. ARTICLE HISTORY ...
To deal with the varying accuracy of the forecasting models on different substations' loads, the proposed solution compares and uses the best models and recalibrate them iteratively by comparing the model's ...
Chee Keong is also currently working as a senior database administrator with Energy Queensland and he holds multiple Oracle certified professional certifications. ...
doi:10.1080/24751839.2019.1596470
fatcat:kj7wavmta5gftcl46hx7zkn5s4
Backward chaining inference as a database stored procedure – the experiments on real-world knowledge bases
2018
Journal of Information and Telecommunication
Inference was performed on a rule base buffered in memory structures. ...
Backward chaining inference as a database stored procedure -the experiments on real-world knowledge bases. ...
analysis, . a revised and extended version of the abstract, introduction and conclusions. ...
doi:10.1080/24751839.2018.1479931
fatcat:h42ary4lnrc5ndaw3n5w7pj3bu
Performance Analysis of Unified Enterprise Application Security Framework
2005
2005 Student Conference on Engineering Sciences and Technology
from any underlying authentication technology and authorization policy. ...
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. ...
Interceptors are also used to log each activity in a centralized database, which is used for real time or off line analysis of anomaly detection. ...
doi:10.1109/sconest.2005.4382878
fatcat:7orgxdffwjd33deazp4pssz6k4
« Previous
Showing results 1 — 15 out of 61,905 results