database transactions
Recently Published Documents


TOTAL DOCUMENTS

71
(FIVE YEARS 2)

H-INDEX

10
(FIVE YEARS 0)

2021 ◽  
Vol 50 (1) ◽  
pp. 14-14
Author(s):  
Alan D. Fekete

Many computing researchers and practitioners may be surprised to find a "research highlight" which innovates on the way to process database transactions. Work in the early 1970s, by Turing winner Jim Gray and others, established a standard set of techniques for transaction management. These remain the basis of most commercial and open-source platforms [1], and they are still taught in university database classes. So why is important research still needed in this topic? The technology environment keeps evolving, and new performance characteristics mean that new algorithms and system designs become appropriate. This perspective will summarise the early work, and point to how the field has continued to progress.


Author(s):  
Prakash Kumar Singh

In broadcasting, schemes are widely used in a wireless environment. In this chapter, a heuristic broadcasting scheme is proposed that directly affects the concurrency of database transactions. The proposed broadcasting scheme is suitable for real-time transactions. A heuristic scheme is developed in a mobile environment to enhance system performance. Further simulation results in the chapter show that the proposed broadcasting scheme is suitable to improve transaction processing in a wireless environment.


Author(s):  
Harmeet Kaur Khanuja ◽  
Dattatraya Adane

The extensive usage of web has given rise to financially motivated illegal covert online transactions. So the digital investigators have approached databases for investigating undetected illegal transactions. The authors here have designed and developed a methodology to find the illegal financial transactions through the database logs. The objective is to monitor database transactions for detecting and reporting risk level of suspicious transactions. Initially, the process extracts SQL transactions from logs of different database systems, then transforms and loads them separately in uniform XML format which gives the transaction records and its metadata. The transaction records are processed with well-defined rules to get outliers present as suspicious transactions. This gives the initial belief of the transactions to be suspicious. The belief value of transactions is further rationalised using Dempster-Shafer's theory. This verifies the uncertainty and risk level of the suspected transactions to assure occurrences of fraud transactions.


Author(s):  
Chellammal Surianarayanan ◽  
Gopinath Ganapathy ◽  
Pethuru Raj

Author(s):  
Harmeet Kaur Khanuja ◽  
Dattatraya Adane

The objective of this chapter is to monitor database transactions and provide information accountability to databases. It provides a methodology to retrieve and standardize different audit logs in a uniform XML format which are extracted from different databases. The financial transactions obtained through audit logs are then analyzed with database forensic audit. The transactions are examined, detected, and classified as per regulations and well-defined RBI antimony laundering rules to obtain outliers and suspicious transactions within audit logs. Bayesian network is used in this research to represent rule-based outlier detection model which identifies the risk level of the suspicious transactions.


2018 ◽  
Vol 29 (4) ◽  
pp. 28-50 ◽  
Author(s):  
Harmeet Kaur Khanuja ◽  
Dattatraya Adane

The extensive usage of web has given rise to financially motivated illegal covert online transactions. So the digital investigators have approached databases for investigating undetected illegal transactions. The authors here have designed and developed a methodology to find the illegal financial transactions through the database logs. The objective is to monitor database transactions for detecting and reporting risk level of suspicious transactions. Initially, the process extracts SQL transactions from logs of different database systems, then transforms and loads them separately in uniform XML format which gives the transaction records and its metadata. The transaction records are processed with well-defined rules to get outliers present as suspicious transactions. This gives the initial belief of the transactions to be suspicious. The belief value of transactions is further rationalised using Dempster-Shafer's theory. This verifies the uncertainty and risk level of the suspected transactions to assure occurrences of fraud transactions.


In this chapter, we first revisit the basic concepts of database transactions, and discuss how these concepts are achieved in practical systems. Next, we briefly go through the architecture of transaction processing systems in the centralized and the distributed environments. This chapter we have reviewed the basic concepts of database systems and database transactions, and discussed the architecture of transaction processing systems in distributed environments. We will shift our focus to transactions and transaction processing in mobile environments, which possess some unique characteristics such as the mobility of mobile computing hosts, the limitations of wireless communications and the resource constraints of mobile computing devices.


Sign in / Sign up

Export Citation Format

Share Document