Database Systems Journal, Vol. VIII, Issue 1/2017
|
1. Distributed algorithm to train neural networks using the Map Reduce paradigm (p. 3-11)Cristian Mihai BARCA, Electronics, Communications and Computers, University of Pitesti, RomaniaClaudiu Dan BARCA, The Romanian-American University, Bucharest, Romania |
With rapid development of powerful computer systems during past decade, parallel and distributed processing becomes a significant resource for fast neural network training, even for real-time processing. Different parallel computing based methods have been proposed in recent years for the development of system performance. The two main methods are to distribute the patterns that are used for training - training set level parallelism, or to distribute the computation performed by the neural network - neural network level parallelism. In the present research work we have focused on the first method.
Keywords: Artificial Neural Networks, Machine Learning ,Map-Reduce Hadoop, Distributed System. |
2. Performance Enhancement using SQL Statement Tuning Approach (p. 12-21)Hitesh Kumar SHARMA, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, IndiaS.C. NELSON, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, India |
Tuning your SQL statements may be one of the most important tasks you can do to improve the performance of your Oracle system. By tuning your SQL statements to be as efficient as possible, you use your system to its full potential. Some of the things you can do to improve the efficiency of your SQL statements may involve as little effort as rewriting the SQL to take advantage of some property of your database or perhaps even changing the structure of the database itself.
Keywords: SQL tuning, Oracle database, Explain Plan. |
3. Successful social games and their super-power: Big data analytics (p. 22-30)Ioana Roxana STIRCU, The Bucharest University of Economic Studies, Romania |
This article is a short presentation of big data analysis and game analysis. The paper describes the case of social games, and observes the huge improvement that big data analysis has on social games and their success. It also contains a presentation of Pokémon GO, and its evolution on the market, from launch until today. A set of metrics and algorithms are proposed, that can be used to improve game features and monetization. In the last section, I apply a Naive Bayes classifier, using WEKA, on a set of data collected from social media networks, to predict how using a game that implies walking influences the amount of daily steps a player makes.
Keywords: big data analysis, Naive Bayes classifier, WEKA, monetization, Pokémon GO case study, social networks, social games. |
4. Explain Plan and SQL Trace the Two Approaches for RDBMS Tuning (p. 31-39)Hitesh Kumar SHARMA, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, IndiaS.C. NELSON, University of Petroleum & Energy Studies, Dehardun, Uttarakhand, India |
Probably the best way to determine whether your SQL statements are properly optimized is by using the Oracle SQL Trace facility and the EXPLAIN PLAN command. You can use the SQL Trace facility and the Oracle program TKPROF, which is used to translate trace files, to trace production SQL statements, and gather statistics about those statements. You use SQL Trace to gather information into a trace file; the Oracle program TKPROF formats the trace information into useful, understandable data.
Keywords: SQL tuning, Oracle database, Explain Plan, SQL Trace. |
5. Information security in digital trunking systems (p. 40-48)Claudiu Dan BARCA, Romanian-American University, Bucharest, Romania |
In Europe, most countries have implemented its digital trunking systems to meet the communication needs of various public safety organizations.The development of these systems will be closely correlated with the evolution of operational requirements and communications services needed by users. For all these digital trunking systems, information security has proven to be an essential aspect. In this paper we present some aspects of the security functions of the Tetra system because this system was imposed as an open standard ETSI and is used as a Schengen cooperation system.
Keywords: digital trunking systems, Tetra, algorithm, encryption,interoperability. |