Do you want to publish a course? Click here

محاكاة عمل قواعد المعطيات الموزعة في بيئة زمن حقيقي مع تشارك الحمولة

736   0   6   0 ( 0 )
 Publication date 2003
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

No English abstract

References used
Al-Dahoud, Ali,” A Dynamic Cluster Construct for Load Balance in Big Heterogeneous Distributed Systems “ , 2001 international Symposium on Performance Evaluation of Computer and Telecommunication Systems , Orlando,Florida , july
Krishna, C.M., and Shin, K.G (1997),” Real-Time Systems”, The McGraw-Hill Companies, Inc
rate research

Read More

The volume of data being generated nowadays is increasing at phenomenal rate. Extracting useful knowledge from such data collections is an important and challenging issue. A promising technique is the rough set approach, a new mathematical method to data analysis based on classification of objects into similarity classes, which are indiscernible with respect to some features. This paper focuses on discovering maximal generalized decision rules in databases based on a simple or multiple regression, generalized theory, and decision matrix.
The mentioning relational database system term has become a synonymous to database system, but the monopoly of big companies that work in database systems field has become an obsession for persons who work in this field, because of the high costs o f this systems. For this reason the concerns turn towards the advanced technique : the native XML database systems which are free or most of them are open source systems because of the increasing dependency on XML files and particularly in transporting data between different applications and the availability of collections of related files. This has summoned towards a system to manage and organize them, for this reason the NXDs appeared. The aim of this study is making a comparison between the capabilities of RDBMS and NXDs in accordance to multiple standards , investing these two techniques in practical application , make the relevant tests which reflect the use of these techniques on the suggested application , display the results and give future suggestions.
An increasingly common requirement in distributed network environments is the need to distribute security mechanisms across several network components. This includes both cryptographic key distribution and cryptographic computation. Most proposed se curity mechanisms are based on threshold cryptography, which allows a cryptographic computation to be shared amongst network components in such a way that a threshold of active components are required for the security operation to be successfully enabled. Although there are many different proposed techniques available, we feel that the practical issues that determine both what kind of technique is selected for implementation and how it is implemented are often glossed over. In this paper we thus establish a new framework for network security architects to apply when considering adoption of such mechanisms. This framework identifies the critical design decisions that need to be taken into account and is intended to aid both design and implementation. As part of this framework we propose a taxonomy of management models and application environments. We also demonstrate the utility of the framework by applying it to a VPN environment.
أصبحت جميع المواقع الموجودة على الشبكة العنكبوتية والمخدمات تهتم بأمور السرية التامة في مواقعها بالإضافة إلى عمليات تطوير حماية البيانات الخاصة بها
There was within the last 50 years a lot of database applications in which time plays an important role. These applications revealed a lack in time support within the current DBMSs as the application should give the data the temporal semantics rela ted to it, also to check the temporal constraints. Therefore, researches were made in order to embed this temporal semantics and constraints in the DBMS itself, also to provide a new query language that can be tagged as “temporal”.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا