Current Search: Databases (x)
Pages
-
-
Title
-
Advantages of scientific relational data bases.
-
Creator
-
Cerwonka, T., Harbor Branch Oceanographic Institute
-
Date Issued
-
1986
-
PURL
-
http://purl.flvc.org/FCLA/DT/3343803
-
Subject Headings
-
Relational databases, Databases
-
Format
-
Document (PDF)
-
-
Title
-
Information modeling methodologies and techniques.
-
Creator
-
Djaja, Eddy Winata., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
We survey and critically compare various approaches and software products for the modeling and logical design of relational databases. In particular, we examine different information modeling methodologies, such as Information Engineering, CASE$\sp*$Method, the Three Schema Concept, as well as data modeling techniques, such as the Entity-Relationship techniques, and the Object Role Modeling technique.
-
Date Issued
-
1996
-
PURL
-
http://purl.flvc.org/fcla/dt/15357
-
Subject Headings
-
Relational databases, Database design, Database management
-
Format
-
Document (PDF)
-
-
Title
-
Approaches to object/relational database systems.
-
Creator
-
Vijayanagaram, Hemanth Kumar., Florida Atlantic University, Solomon, Martin K., Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
In this thesis, we investigate the different proposed ways of combining object oriented and relational database systems (such combined systems are commonly called object-relational systems). This thesis is based on ideas presented in various papers about object and object relational databases. In this work, a discussion of standards such as ANSI's SQL3 (to be released) and ODMG-93 is given. In particular, the "Class = Relation" and "Class = Domain" approaches to object-relational systems are...
Show moreIn this thesis, we investigate the different proposed ways of combining object oriented and relational database systems (such combined systems are commonly called object-relational systems). This thesis is based on ideas presented in various papers about object and object relational databases. In this work, a discussion of standards such as ANSI's SQL3 (to be released) and ODMG-93 is given. In particular, the "Class = Relation" and "Class = Domain" approaches to object-relational systems are investigated. Arguments supporting the proposition that the latter approach is the correct approach are presented.
Show less
-
Date Issued
-
1996
-
PURL
-
http://purl.flvc.org/fcla/dt/15350
-
Subject Headings
-
Object-oriented databases, Relational databases
-
Format
-
Document (PDF)
-
-
Title
-
IMPLEMENTATION AND ASSESSMENT OF THE REPUTATION-BASED MINING PARADIGM BY A COMPREHENSIVE SIMULATION.
-
Creator
-
Pourtahmasbi, Pouya, Nojoumian, Mehrdad, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
-
Abstract/Description
-
Since the introduction of Bitcoin, numerous studies on Bitcoin mining attacks have been conducted, and as a result, many countermeasures to these attacks have been proposed. The reputation-based mining paradigm is a comprehensive countermeasure solution to this problem with the goal of regulating the mining process and preventing mining attacks. This is accomplished by incentivizing miners to avoid dishonest mining strategies using reward and punishment mechanisms. This model was validated...
Show moreSince the introduction of Bitcoin, numerous studies on Bitcoin mining attacks have been conducted, and as a result, many countermeasures to these attacks have been proposed. The reputation-based mining paradigm is a comprehensive countermeasure solution to this problem with the goal of regulating the mining process and preventing mining attacks. This is accomplished by incentivizing miners to avoid dishonest mining strategies using reward and punishment mechanisms. This model was validated solely based on game theoretical analyses and the real-world implications of this model are not known due to the lack of empirical data. To shed light on this issue, we designed a simulated mining platform to examine the effectiveness of the reputation-based mining paradigm through data analysis. We implemented block withholding attacks in our simulation and ran the following three scenarios: Reputation mode, non-reputation mode, and no attack mode. By comparing the results from these three scenarios, interestingly we found that the reputation-based mining paradigm decreases the number of block withholding attacks, and as a result, the actual revenue of individual miners becomes closer to their theoretical expected revenue. In addition, we observed that the confidence interval test can effectively detect block withholding attacks however, the test also results in a small number of false positive cases. Since the effectiveness of the reputation-based model relies on attack detection, further research is needed to investigate the effect of this model on other dishonest mining strategies.
Show less
-
Date Issued
-
2021
-
PURL
-
http://purl.flvc.org/fau/fd/FA00013730
-
Subject Headings
-
Cryptocurrencies, Bitcoin, Blockchains (Databases)
-
Format
-
Document (PDF)
-
-
Title
-
EVALUATING THE MARKET PERCEPTION OF PROOF OF WORK AND PROOF OF STAKE PROTOCOLS: A DIFFERENCE-IN-DIFFERENCE ANALYSIS.
-
Creator
-
Mirsky, Nicolas Aaron, Luther, William, Florida Atlantic University, Department of Economics, College of Business
-
Abstract/Description
-
I assessed the impact of the Merge in Ethereum by analyzing the change in its market capitalization following the event. This study can provide insights into market preferences for proof-of-work versus proof-of-stake protocols. A difference-in-difference analysis was conducted, using Ethereum Classic as the control group and Ethereum as the treatment group to estimate the local average treatment effect following the Merge as the intervention. As a robustness check, the analysis was repeated...
Show moreI assessed the impact of the Merge in Ethereum by analyzing the change in its market capitalization following the event. This study can provide insights into market preferences for proof-of-work versus proof-of-stake protocols. A difference-in-difference analysis was conducted, using Ethereum Classic as the control group and Ethereum as the treatment group to estimate the local average treatment effect following the Merge as the intervention. As a robustness check, the analysis was repeated using the Top 100 cryptocurrencies as the control group. I find no evidence that the Merge improved the market capitalization of Ethereum relative to Ethereum Classic or the Top 100 cryptocurrencies.
Show less
-
Date Issued
-
2024
-
PURL
-
http://purl.flvc.org/fau/fd/FA00014447
-
Subject Headings
-
Ethereum, Blockchains (Databases), Economics
-
Format
-
Document (PDF)
-
-
Title
-
A relational algebra implementation.
-
Creator
-
Rivero, Gene Richard., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
Although the Relational Algebra (RA) is a fundamental component of the relational model of database storage and retrieval, it has not been widely implemented in commercial database systems. The Structured Query Language (SQL) has been for some time the most widely implemented relational database language. This thesis provides and describes the first implementation of a particularly powerful version of the relational algebra that includes an n-ary join operator as well as including the...
Show moreAlthough the Relational Algebra (RA) is a fundamental component of the relational model of database storage and retrieval, it has not been widely implemented in commercial database systems. The Structured Query Language (SQL) has been for some time the most widely implemented relational database language. This thesis provides and describes the first implementation of a particularly powerful version of the relational algebra that includes an n-ary join operator as well as including the division operator, and nested expressions. With this implementation, that powerful version of the relational algebra can be used as a front end to any SQL-92 compliant database management system, such as Oracle, Informix, DB2, Sybase, SQL Server, and Access.
Show less
-
Date Issued
-
2003
-
PURL
-
http://purl.flvc.org/fcla/dt/13067
-
Subject Headings
-
Relation algebras, SQL (Computer program language), Database management, Relational databases
-
Format
-
Document (PDF)
-
-
Title
-
Formal specification of authorization and user group models for object-oriented databases.
-
Creator
-
Wei, Dong., Florida Atlantic University, Fernandez, Eduardo B., France, Robert B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
The use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can...
Show moreThe use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can be used as a basis for implementation and possible verification in those cases where a high level of security is required.
Show less
-
Date Issued
-
1995
-
PURL
-
http://purl.flvc.org/fcla/dt/15175
-
Subject Headings
-
Object-oriented databases, Computer software--Development, Database security
-
Format
-
Document (PDF)
-
-
Title
-
The evolution and extension of PEIRCE RDBMS.
-
Creator
-
Hard, Bruce W., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
In 1981, Dr, Martin K. Solomon and Carl D. Kirshen published the paper, "PEIRCE: A Relational DBMS for Small Systems," that utilized Codd's relational algebra as a basis for this interactive database management system. Looking back, it is easy to see that PEIRCE was ahead of its time in many ways, especially by showing an early understanding of the relationship of triggers and virtual files, and recognizing the need for a user interface, known as the Clerk Oriented Interface. An historical...
Show moreIn 1981, Dr, Martin K. Solomon and Carl D. Kirshen published the paper, "PEIRCE: A Relational DBMS for Small Systems," that utilized Codd's relational algebra as a basis for this interactive database management system. Looking back, it is easy to see that PEIRCE was ahead of its time in many ways, especially by showing an early understanding of the relationship of triggers and virtual files, and recognizing the need for a user interface, known as the Clerk Oriented Interface. An historical overview of PEIRCE will be given, along with a comparison of PEIRCE to the ever popular state-of-the-art ORACLE relational database management system, as well as an explanation of my new extensions to the subsystems of the PEIRCE DBMS. The historical overview is useful because it covers the evolution of PEIRCE over a period of more than 15 years, and collects the previously disjoint information into one place. Also, this overview is interesting because it reflects the change in database and computer technology over that time.
Show less
-
Date Issued
-
1994
-
PURL
-
http://purl.flvc.org/fcla/dt/15062
-
Subject Headings
-
Computer software, Relational databases, Database management--Computer programs
-
Format
-
Document (PDF)
-
-
Title
-
Content analysis of design practices.
-
Creator
-
Shah, Prerak Pradyumna., Florida Atlantic University, Coulter, Neal S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
A database based on best manufacturing practices documents is explored relative to the "design" component of such best practices. This content analysis study yields lexical maps of key terms. Maps are categorized depending on their node arrangement in the following main groups: Cyclic maps, Sequential maps, Spoke-patterned maps and Isolated maps. A comparative study of names selected by different naming algorithms helps us in establishing the relation between map patterns and naming...
Show moreA database based on best manufacturing practices documents is explored relative to the "design" component of such best practices. This content analysis study yields lexical maps of key terms. Maps are categorized depending on their node arrangement in the following main groups: Cyclic maps, Sequential maps, Spoke-patterned maps and Isolated maps. A comparative study of names selected by different naming algorithms helps us in establishing the relation between map patterns and naming algorithms. Super network and distributions maps generated from the same database are useful in defining relations among the different maps. This study outlines the overall structure of design process through the maps' names and their interrelations.
Show less
-
Date Issued
-
1997
-
PURL
-
http://purl.flvc.org/fcla/dt/15420
-
Subject Headings
-
Content analysis (Communication), Production management--Databases
-
Format
-
Document (PDF)
-
-
Title
-
An evaluation of the POSTGRES DBMS.
-
Creator
-
John, Agustus Worrial., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
In 1970, E. F. Codd published the paper "A relational model of data for large shared data banks" that introduced the relational data model for managing data. SQL, currently the most widely used relational language, was introduced in the experimental IBM database management system (DBMS) System R. Another DBMS, called INGRES, was developed at about the same time as System R (under the leadership of M. Stonebraker), and it was based on the relational database language QUEL. Since that time,...
Show moreIn 1970, E. F. Codd published the paper "A relational model of data for large shared data banks" that introduced the relational data model for managing data. SQL, currently the most widely used relational language, was introduced in the experimental IBM database management system (DBMS) System R. Another DBMS, called INGRES, was developed at about the same time as System R (under the leadership of M. Stonebraker), and it was based on the relational database language QUEL. Since that time, inadequacies of the relational model and the need to handle more complex database issues warranted the extension of the relational model and the implementation of a DBMS that meets those needs. M. Stonebraker developed the post-relational DBMS POSTGRES based on the POSTQUEL database language. An evaluation of POSTGRES will be conducted to determine the adequacy of POSTGRES with respect to traditional relational database issues, as well as more complex issues that are considered post-relational.
Show less
-
Date Issued
-
1993
-
PURL
-
http://purl.flvc.org/fcla/dt/14992
-
Subject Headings
-
Database management--Computer programs--Evaluation
-
Format
-
Document (PDF)
-
-
Title
-
THE IMPLEMENTATION OF PEIRCE: A PORTABLE AND EFFICIENT DATABASE MANAGEMENT SYSTEM.
-
Creator
-
HSU, CHUNG HSANG., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
This thesis describes the use and implementation of the PEIRCE DBMS. PEIRCE is an easy-to-use, efficient, portable and relationally complete database management system. The design philosophy behind PEIRCE is to provide a powerful and efficient data manipulation language that can be easily implemented on a variety of computers, including microcomputers. PEIRCE requires the user to learn only a small number of simple, yet powerful commands. It is PEIRCE not the user that bears the burden of...
Show moreThis thesis describes the use and implementation of the PEIRCE DBMS. PEIRCE is an easy-to-use, efficient, portable and relationally complete database management system. The design philosophy behind PEIRCE is to provide a powerful and efficient data manipulation language that can be easily implemented on a variety of computers, including microcomputers. PEIRCE requires the user to learn only a small number of simple, yet powerful commands. It is PEIRCE not the user that bears the burden of efficiently implementing these commands. PEIRCE has been entirely written in C to enhance portability to many computers.
Show less
-
Date Issued
-
1984
-
PURL
-
http://purl.flvc.org/fcla/dt/14227
-
Subject Headings
-
Computer software, Database management--Computer programs
-
Format
-
Document (PDF)
-
-
Title
-
APPLICATION OF BLOCKCHAIN NETWORK FOR THE USE OF INFORMATION SHARING.
-
Creator
-
Zamir, Linir, Liu, Feng-Hao, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
The Blockchain concept was originally developed to provide security in the Bitcoin cryptocurrency network, where trust is achieved through the provision of an agreed-upon and immutable record of transactions between parties. The use of a Blockchain as a secure, publicly distributed ledger is applicable to fields beyond finance, and is an emerging area of research across many other fields in the industry. This thesis considers the feasibility of using a Blockchain to facilitate secured...
Show moreThe Blockchain concept was originally developed to provide security in the Bitcoin cryptocurrency network, where trust is achieved through the provision of an agreed-upon and immutable record of transactions between parties. The use of a Blockchain as a secure, publicly distributed ledger is applicable to fields beyond finance, and is an emerging area of research across many other fields in the industry. This thesis considers the feasibility of using a Blockchain to facilitate secured information sharing between parties, where a lack of trust and absence of central control are common characteristics. Implementation of a Blockchain Information Sharing system will be designed on an existing Blockchain network with as a communicative party members sharing secured information. The benefits and risks associated with using a public Blockchain for information sharing will also be discussed.
Show less
-
Date Issued
-
2019
-
PURL
-
http://purl.flvc.org/fau/fd/FA00013351
-
Subject Headings
-
Blockchains (Databases), Blockchains (Databases)--Industrial applications, Data encryption (Computer science), Personal data protection, Bitcoin
-
Format
-
Document (PDF)
-
-
Title
-
Delivering document management systems through the ASP approach.
-
Creator
-
Furht, Borko, Sheen, Jim, Aganovic, Zijad
-
Date Issued
-
2001
-
PURL
-
http://purl.flvc.org/fcla/dt/335574
-
Subject Headings
-
Application software., Software architecture., Internet programming., Database management.
-
Format
-
Document (PDF)
-
-
Title
-
Image retrieval using visual attention.
-
Creator
-
Mayron, Liam M., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
The retrieval of digital images is hindered by the semantic gap. The semantic gap is the disparity between a user's high-level interpretation of an image and the information that can be extracted from an image's physical properties. Content based image retrieval systems are particularly vulnerable to the semantic gap due to their reliance on low-level visual features for describing image content. The semantic gap can be narrowed by including high-level, user-generated information. High-level...
Show moreThe retrieval of digital images is hindered by the semantic gap. The semantic gap is the disparity between a user's high-level interpretation of an image and the information that can be extracted from an image's physical properties. Content based image retrieval systems are particularly vulnerable to the semantic gap due to their reliance on low-level visual features for describing image content. The semantic gap can be narrowed by including high-level, user-generated information. High-level descriptions of images are more capable of capturing the semantic meaning of image content, but it is not always practical to collect this information. Thus, both content-based and human-generated information is considered in this work. A content-based method of retrieving images using a computational model of visual attention was proposed, implemented, and evaluated. This work is based on a study of contemporary research in the field of vision science, particularly computational models of bottom-up visual attention. The use of computational models of visual attention to detect salient by design regions of interest in images is investigated. The method is then refined to detect objects of interest in broad image databases that are not necessarily salient by design. An interface for image retrieval, organization, and annotation that is compatible with the attention-based retrieval method has also been implemented. It incorporates the ability to simultaneously execute querying by image content, keyword, and collaborative filtering. The user is central to the design and evaluation of the system. A game was developed to evaluate the entire system, which includes the user, the user interface, and retrieval methods.
Show less
-
Date Issued
-
2008
-
PURL
-
http://purl.flvc.org/fcla/flaent/EN00154040/68_1/98p0137i.pdf, http://purl.flvc.org/FAU/58006
-
Subject Headings
-
Image processing, Digital techniques, Database systems, Cluster analysis, Multimedia systems
-
Format
-
Document (PDF)
-
-
Title
-
Concord: A proactive lightweight middleware to enable seamless connectivity in a pervasive environment.
-
Creator
-
Mutha, Mahesh., Florida Atlantic University, Hsu, Sam, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
One of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The...
Show moreOne of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The rewards for this simple model are many. First, Concord uses the existing computing infrastructure. Second, Concord standardizes the interfaces for all services and platforms. Third new services can be added dynamically without any need for reconfiguration. Finally, Concord consists of Database that can maintain and publish the active set of available resources. Thus Concord provides a solid system for integration of various entities to provide seamless connectivity and enable proactive behavior.
Show less
-
Date Issued
-
2005
-
PURL
-
http://purl.flvc.org/fcla/dt/13234
-
Subject Headings
-
CONCORD (Computer architecture), Middleware, Computer architecture, Database management
-
Format
-
Document (PDF)
-
-
Title
-
Binary representation of DNA sequences towards developing useful algorithms in bioinformatic data-mining.
-
Creator
-
Pandya, Shivani., Florida Atlantic University, Neelakanta, Perambur S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis refers to a research addressing the use of binary representation of the DNA for the purpose of developing useful algorithms for Bioinformatics. Pertinent studies address the use of a binary form of the DNA base chemicals in information-theoretic base so as to identify symmetry between DNA and complementary DNA. This study also refers to "fuzzy" (codon-noncodon) considerations in delinating codon and noncodon regimes in a DNA sequences. The research envisaged further includes a...
Show moreThis thesis refers to a research addressing the use of binary representation of the DNA for the purpose of developing useful algorithms for Bioinformatics. Pertinent studies address the use of a binary form of the DNA base chemicals in information-theoretic base so as to identify symmetry between DNA and complementary DNA. This study also refers to "fuzzy" (codon-noncodon) considerations in delinating codon and noncodon regimes in a DNA sequences. The research envisaged further includes a comparative analysis of the test results on the aforesaid efforts using different statistical metrics such as Hamming distance Kullback-Leibler measure etc. the observed details supports the symmetry aspect between DNA and CDNA strands. It also demonstrates capability of identifying non-codon regions in DNA even under diffused (overlapped) fuzzy states.
Show less
-
Date Issued
-
2003
-
PURL
-
http://purl.flvc.org/fcla/dt/13089
-
Subject Headings
-
Bioinformatics, Data mining, Nucleotide sequence--Databases, Computer algorithms
-
Format
-
Document (PDF)
-
-
Title
-
Remote database access over Internet in Windows environment.
-
Creator
-
Ren, Yongjian., Florida Atlantic University, Hsu, Sam, Solomon, Martin K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in...
Show moreThis thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in Microsoft Visual C++ developer's studio, and a Student Record example is demonstrated. For the Oracle Webserver-based approach, the Oracle Webserver 1.1 has been setup and an Online Shopping Club example is demonstrated. For the CORBA-based approach, Orbix Web 2.0.1 and JDK 1.1.1 are utilized as the CORBA system and the development language, respectively, and several examples including single server, multiple servers and multiple databases are presented. An extended SQL syntax is proposed to manipulate data from multiple database systems residing on different hosts in one SQL statement. The implementation of extended SQL statements in CORBA's server/client application is also suggested. With the help of extended SQL syntax and CORBA's multiple server access feature, an example of the client application accessing two databases at a time is illustrated. The pros and cons are discussed of the three remote database access approaches studied in the thesis: (I) The CGI-based approach, which is the most generic and widely used approach. (II) The Oracle Webserver approach, which is a relatively simplified way of the CGI approach, easy to apply but limited in applications. (III) The CORBA-based approach, which is the most powerful and sophisticated approach for remote database access.
Show less
-
Date Issued
-
1998
-
PURL
-
http://purl.flvc.org/fcla/dt/15590
-
Subject Headings
-
Database management, World Wide Web, Microsoft network (Online service)
-
Format
-
Document (PDF)
-
-
Title
-
A critical investigation of SQLJ.
-
Creator
-
Borkar, Anjali P., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
We critically investigate, evaluate, and illustrate the language of SQL and Java provided by SQLJ. We investigate the main constructs of SQLJ, such as use of declarative and executable statements, SQLJ clauses, and use of bind variables in SQLJ applications. We also observe usage of named and position iterators and we illustrate how to develop and run applications on the server side. In particular, we analyze the difference between SQLJ and JDBC and we find that SQLJ is good for static SQL...
Show moreWe critically investigate, evaluate, and illustrate the language of SQL and Java provided by SQLJ. We investigate the main constructs of SQLJ, such as use of declarative and executable statements, SQLJ clauses, and use of bind variables in SQLJ applications. We also observe usage of named and position iterators and we illustrate how to develop and run applications on the server side. In particular, we analyze the difference between SQLJ and JDBC and we find that SQLJ is good for static SQL whereas JDBC is good for dynamic SQL. We also compare the relationship of SQLJ to ANSI/ISO embedded SQL. Finally we evaluate the advantages of developing SQLJ stored procedure over PL/SQL procedures.
Show less
-
Date Issued
-
1999
-
PURL
-
http://purl.flvc.org/fcla/dt/15722
-
Subject Headings
-
Database management, SQL (Computer program language), Java (Computer program language)
-
Format
-
Document (PDF)
-
-
Title
-
GSM network simulation and performance analysis.
-
Creator
-
Bothra, Piyush., Florida Atlantic University, Ilyas, Mohammad
-
Abstract/Description
-
This research focuses on analyzing the effect of change in network parameters on the performance of GSM cellular network. A simulation model is created using visual C++ and network performance in terms of call failures and handover failures are studied. A cellular network architecture and its performance are based on so many parameters and complexities that it is very difficult to analyze the effect of a parameter on any one aspect of performance. The purpose of this thesis is to study the...
Show moreThis research focuses on analyzing the effect of change in network parameters on the performance of GSM cellular network. A simulation model is created using visual C++ and network performance in terms of call failures and handover failures are studied. A cellular network architecture and its performance are based on so many parameters and complexities that it is very difficult to analyze the effect of a parameter on any one aspect of performance. The purpose of this thesis is to study the performance of network with respect to some of those parameters while neglecting other effects. The simulated network takes parameters like cell diameter, traffic intensity and mobility pattern as input and a simulation run results in the evaluation of the call failure and success statistics.
Show less
-
Date Issued
-
2002
-
PURL
-
http://purl.flvc.org/fcla/dt/12952
-
Subject Headings
-
Database management, SQL (Computer program language), Java (Computer program language)
-
Format
-
Document (PDF)
-
-
Title
-
Gapless alignment revisited.
-
Creator
-
Raley, Elizabeth Anne, Florida Atlantic University, Yu, Yi-Kuo
-
Abstract/Description
-
The purpose of sequence alignment is to detect mutual similarity, characterized by the so-called "alignment score", between sequences compared. To quantitatively assess the confidence level of an alignment result requires the knowledge of alignment score statistics under a certain null model and is the central issue in sequence alignment. In this thesis, the score statistics of Markov null model were revisited and the score statistics of non-Markov null model were investigated for two state...
Show moreThe purpose of sequence alignment is to detect mutual similarity, characterized by the so-called "alignment score", between sequences compared. To quantitatively assess the confidence level of an alignment result requires the knowledge of alignment score statistics under a certain null model and is the central issue in sequence alignment. In this thesis, the score statistics of Markov null model were revisited and the score statistics of non-Markov null model were investigated for two state-of-the-art algorithms, namely, the gapless Smith-Waterman and Hybrid algorithms. These two algorithms were further used to find highly related signals in unrelated sequences and in weakly related sequences corresponding, respectively, to Markov null model and non-Markov null model. The confidence levels of these models were also studied. Since the sequence similarity we are interested in comes from evolutionary history, we also investigated the relationship between sequence alignment, the tool to find similarity, and evolution. The average evolution distance between the daughter sequences was found and compared with their expected values, for individual trees and as an average over many trees.
Show less
-
Date Issued
-
2001
-
PURL
-
http://purl.flvc.org/fcla/dt/12856
-
Subject Headings
-
Bioinformatics, Amino acid sequence--Databases, Markov processes
-
Format
-
Document (PDF)
Pages