Research on In-Memory Database and Technology Selection
(*) Corresponding author
DOI: https://doi.org/10.15866/irecos.v17i2.21948
Abstract
Technology serves business. The selection of in-memory database should first follow the requirements of business scenarios. Service characteristics determine the application characteristics of data, including the amount of data, concurrency, read/write characteristics, consistency, response time, operation complexity, and service continuity, and the technical requirements for database consistency, fault tolerance, scalability, and security. Before selecting the memory database, it is recommended to sort out the business requirements and quantify them. Then map the core data application characteristics to database technical requirements; finally, select the type according to the selected technical requirements.
Copyright © 2022 Praise Worthy Prize - All rights reserved.
Keywords
Full Text:
PDFReferences
He Zhenying, Wang Lu, Lu Chang et al. Efficiently answering top-k frequent term queries in temporal-categorical range Information Sciences, 2021, 574.
https://doi.org/10.1016/j.ins.2021.05.081
Kazi Abrar, Smid Michiel Closest-pair queries and minimum-weight queries are equivalent for squares Computational Geometry, 2021(prepublish).
https://doi.org/10.1016/j.comgeo.2021.101810
Bai Mei, Jiang Senan, Zhang Xin et al. An efficient skyline query algorithm in the distributed environment Journal of Computational Science, 2021(prepublish).
https://doi.org/10.1016/j.jocs.2021.101524
Almobydeen Shahed Bassam, Viqueira José R.R., Lama Manuel GeoSPARQL query support for scientific raster array data Computers and Geosciences, 2022, 159.
https://doi.org/10.1016/j.cageo.2021.105023
Bazaga Adrián, Gunwant Nupur, Micklem Gos Translating synthetic natural language to database queries with a polyglot deep learning framework Scientific Reports, 2021, 11(1).
https://doi.org/10.1038/s41598-021-98019-3
Xing Xiaogang, Chen Yuling, Li Tao et al. A blockchain index structure based on subchain query Journal of Cloud Computing, 2021, 10(1).
https://doi.org/10.1186/s13677-021-00268-0
Hardware Decompression Techniques for FPGA-Based Embedded Systems . Dirk Koch;Christian Beckhoff;Jürgen Teich. ACM Transactions on Reconfigurable Technology and Systems (TRETS). 2009(2).
https://doi.org/10.1145/1534916.1534919
Han Geonhui, Lee Chuljun, Lee Jae Eun et al. Alternative negative weight for simpler hardware implementation of synapse device based neuromorphic system Scientific Reports, 2021, 11(1).
https://doi.org/10.1038/s41598-021-02176-4
Ankush Srivastava, Prokash Ghosh A Novel Approach of Data Content Zeroization Under Memory Attacks Journal of Electronic Testing, 2020, 36(prepublish).
https://doi.org/10.1007/s10836-020-05867-4
Zhong Wang, Daniel Sun, Guangtao Xue et al. Ada-Things: An adaptive virtual machine monitoring and migration strategy for internet of things applications Journal of Parallel and Distributed Computing, 2019, 132
https://doi.org/10.1016/j.jpdc.2018.06.009
Mohamed Amine Khelif, Jordane Lorandel, Olivier Romain et al. Toward a hardware man-in-the-middle attack on PCIe bus Microprocessors and Microsystems, 2020, 77(prepublish).
https://doi.org/10.1016/j.micpro.2020.103198
Pramod Kumar Patel, M.M. Malik, Tarun K. Gupta A novel high-density dual threshold GNRFET SRAM design with improved stability Microprocessors and Microsystems, 2020, 73(C).
https://doi.org/10.1016/j.micpro.2019.102956
Colonnelli Iacopo, Aldinucci Marco, Cantalupo Barbara et al. Distributed workflows with Jupyter Future Generation Computer Systems, 2022, 128.
https://doi.org/10.1016/j.future.2021.10.007
Paul Kroll, Alexandra Hofer, Ines V. Stelzer et al. Workflow to set up substantial target-oriented mechanistic process models in bioprocess engineering Process Biochemistry, 2017, 62.
https://doi.org/10.1016/j.procbio.2017.07.017
Mingda Zhang, Liangcun Jiang, Jing Zhao et al. Coupling OGC WPS and W3C PROV for provenance-aware geoprocessing workflows Computers and Geosciences, 2020, 138(prepublish).
https://doi.org/10.1016/j.cageo.2020.104419
Kyomuhangi Irene, Giorgi Emanuele A unified and flexible modelling framework for the analysis of malaria serology data Epidemiology and Infection, 2021, 149(99).
https://doi.org/10.1017/S0950268821000753
Eslam Mohsin Hassib, Aida Osman AbdElgwad, Ahmed Ibrahim Saleh, A Hybrid Intrusion Prevention System (HIPS) for Web Database Security International Journal of Engineering Science and Technology, 2010, 2(7).
Mrs. M. Lalitha, G. Sneha Privacy and Protection for Location Based Services International Journal of Advanced Engineering Research and Science, 2016, 3(12).
https://doi.org/10.22161/ijaers/3.12.41
Anonymous eSoft, Inc: eSoft Reaches Major Milestone with SiteFilter Coverage; 99.9% of web sites visited by customers categorised in SiteFilter database M2 Presswire, 2008.
Atul Kant Kaushik, R. C. Joshi Network Forensic System for ICMP Attacks International Journal of Computer Applications, 2010, 2(3).
https://doi.org/10.5120/649-906
Internet Information Provider Companies; Patent Issued for System and Method for Classifying an Electronic Document Journal of Engineering, 2015.
Lisa Rosenfeld, John Torous, Ipsit V. Vahia Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies The American Journal of Geriatric Psychiatry, 2017, 25(8).
https://doi.org/10.1016/j.jagp.2017.04.009
A Redlich, B Rittenhouse Examining the Effect of Missing Data on the Acmg Newborn Screening Criteria of Least Consensus for Carnitine Palmitoyltransferase II Deficiency (CPTII) Value in Health, 2018, 21.
https://doi.org/10.1016/j.jval.2018.04.885
Shruti Khare, Kritika Gupta, Arti Tripathi Mutant Phenotype Prediction and Protein Model Discrimination using Deep Sequencing Data Biophysical Journal, 2018, 114(3).
https://doi.org/10.1016/j.bpj.2017.11.1116
Refbacks
- There are currently no refbacks.
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize