Automatic Mining and Processing Dormancy Data in the Database Management System for Small and Medium Enterprises

Article Preview

Abstract:

The paper studies how to mine automatically and process the dormancy data and then improve the performance of database management system. It analyzes the main mode of dormant data into the data warehouse, the innovative design of SQL capture and changer function, as well as gives the statistical method of recognition dormant data in data warehouse, and the SQL change and capture function migration to the application server, automatic capture dormancy data without professional intervention. It helps to solve the problem of the lack of staff and cumulative historical data influence performance of the database management system in the small and medium-sized enterprises.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1927-1930

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zeng Jianhua Visual Studio 2010 (C#) Windows database project development Electronic Industry Press in 2012 January.

Google Scholar

[2] Zeng Jianhua Visual Studio 2010 (C#) Web database project development Electronic Industry Press in 2013 September.

Google Scholar

[3] Chlipala, A. Static checking of dynamically-varying security policies in database-backed applications. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (2010).

Google Scholar

[4] F eldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (2010).

Google Scholar

[5] G entry, C., Halevi, S., Smart, N.P. Homomorphic evaluation of the AES circuit. Cryptology ePrint Archive, Report 2012/099, (2012).

Google Scholar

[6] H omeland Security News Wire. Data breaches compromise nearly 8 million medical records, (2011).

Google Scholar

[7] P opa, R.A., Zeldovich, N. Cryptographic treatment of CryptDB's adjustable join. Technical Report MIT-CSA ILTR-2012-006, MIT ComputerScience and Artificial Intelligence Laboratory, (2012).

Google Scholar

[8] Quinn, B., Arthur, C. Playstation network hackers access data of 77 million users. The Guardian, (2011).

Google Scholar

[9] Y ip, A., Wang, X., Zeldovich, N., Kaashoek, M.F. Improving application security with data flow assertions. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (2009).

DOI: 10.1145/1629575.1629604

Google Scholar