This paper presents an efficient recovery scheme suitable for real-time mainmemory database. In the recovery scheme, log records are stored in non-volatile RAM which is dividedinto four different partitions based on t...This paper presents an efficient recovery scheme suitable for real-time mainmemory database. In the recovery scheme, log records are stored in non-volatile RAM which is dividedinto four different partitions based on transaction types. Similarly, a main memory database isdivided into four partitions based data types. When the using ratio of log store area exceeds thethreshold value, checkpoint procedure is triggered. During executing checkpoint procedure, someuseless log records are deleted. During restart recovery after a crash, partition reloading policyis adopted to assure that critical data are reloaded and restored in advance, so that the databasesystem can be brought up before the entire database is reloaded into main memory. Therefore downtime is obvionsly reduced. Simulation experiments show our recovery scheme obviously improves thesystem performance, and does a favor to meet the dtadlints of real-time transactions.展开更多
Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of sa...Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of satisfying the timing constraints of transactions, serializability is too strong as a correctness criterion and not suitable for real time databases in most cases. On the other hand, relaxed serializability including epsilon serializability and similarity serializability can allow more real time transactions to satisfy their timing constraints, but database consistency may be sacrificed to some extent. We thus propose the use of weak serializability(WSR) that is more relaxed than conflicting serializability while database consistency is maintained. In this paper, we first formally define the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol WDHP(weak serializable distributed high priority protocol) is outlined for distributed real time databases, where a new lock mode called mask lock mode is proposed for simplifying the condition of global consistency. Finally, through a series of simulation studies, it is shown that using the new concurrency control protocol the performance of distributed real time databases can be greatly improved.展开更多
In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can e...In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold.展开更多
Recovery performance in the event of failures is very important for distributed real-time database systems. This paper presents a time-cognizant logging-based crash recovery scheme (TCLCRS) that aims at distributed ...Recovery performance in the event of failures is very important for distributed real-time database systems. This paper presents a time-cognizant logging-based crash recovery scheme (TCLCRS) that aims at distributed real-time databases, which adopts a main memory database as its ground support. In our scheme, each site maintains a real-time log for local transactions and the subtransactions, which execute at the site, and execte local checkpointing independently. Log records are stored in non-volatile high- speed store, which is divided into four different partitions based on transaction classes. During restart recovery after a site crash, partitioned crash recovery strategy is adopted to ensure that the site can be brought up before the entire local secondary database is reloaded in main memory. The partitioned crash recovery strategy not only guarantees the internal consistency to be recovered, but also guarantee the temporal consistency and recovery of the sates of physical world influenced by uncommitted transactions. Combined with two- phase commit protocol, TCLCRS can guarantee failure atomicity of distributed real-time transactions.展开更多
Paleogeography is a discipline that studies spatial distribution and evolutionary characteristics of geographic objects in earth history(Feng,2003;Feng et al.,2012).It focuses on the sediments,organisms and environmen...Paleogeography is a discipline that studies spatial distribution and evolutionary characteristics of geographic objects in earth history(Feng,2003;Feng et al.,2012).It focuses on the sediments,organisms and environmental proxies,most of which are preserved in the rocks.However,a large amount of this geological and biological information was no longer preserved after the geological process of burial.展开更多
[Objective] This study aimed to establish a method for quantitative detection of mRNA transcriptional level of SS2 adhesive related-factors of Streptococcus suis serotype 2 (SS2) by fluorescent quantitative PCR. []V...[Objective] This study aimed to establish a method for quantitative detection of mRNA transcriptional level of SS2 adhesive related-factors of Streptococcus suis serotype 2 (SS2) by fluorescent quantitative PCR. []Vlethod] The gene fragments en- coding SS2 adhesive related-factors MRP, FBPS and CPS2J and a housekeeping gene aroA were amplified by reverse transcription PCR from the total RNA of SS2, cloned, and sequenced. The recombinant plasmids containing the target genes were constructed, and used as templates in Real-time PCR. [Result] Dynamic curves, stan- dard curves and melting curves of the adhesive related-factors and aroA were ob- tained by the optimized Real-time PCR system. The standard curves showed a good linear relationship between template copy number and circulation number, and the correlation coefficients (FF) of the standard curves were over 0.995. Also, these as- says were highly specific a^d there was single specific melting peak for every gene. Moreover, the assays were highly sensitive and had a detection limit of 1.0×102 copies in 1 μl of initial templates. Finally, it was highly repeatable and had a coeffi- cient of variation less than 2% for intra-assay. [Conclusion] This study will provide a way to reveal the adhesion mechanism of SS2 to different host cells at molecular level.展开更多
Recent studies have addressed that the cache be havior is important in the design of main memory index structures. Cache-conscious indices such as the CSB^+-tree are shown to outperform conventional main memory indic...Recent studies have addressed that the cache be havior is important in the design of main memory index structures. Cache-conscious indices such as the CSB^+-tree are shown to outperform conventional main memory indices such as the AVL-tree and the T-tree. This paper proposes a cacheconscious version of the T-tree, CST-tree, defined according to the cache-conscious definition. To separate the keys within a node into two parts, the CST-tree can gain higher cache hit ratio.展开更多
In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local par...In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local part or in the cloud. It is shown that the time data acquisition remains unchanged as a result of modification. Suggestions have been made about the use of the theory of dynamic systems to hybrid cloud database. The present work is aimed at attracting the attention of specialists in the field of cloud database to the apparatus control theory. The experiment presented in this article allows the use of the description of the known methods for solving important practical problems.展开更多
Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each ...Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly.展开更多
Our paper describes the organizing of database,remarks about SNGO(Surlari National Geomagnetic Observatory)and network infrastructure.Based on the geomagnetic data acquired and stored on the database server,we perform...Our paper describes the organizing of database,remarks about SNGO(Surlari National Geomagnetic Observatory)and network infrastructure.Based on the geomagnetic data acquired and stored on the database server,we perform the processing and analysis of geomagnetic parameters through different spectral,statistical and correlation methods.All these parameters are included in the geomagnetic database on server.The web interface for the database meets the different needs of handling the data collected,raw or processed.The server-side programming language used for design is php.This allow us to select different periods for which access to stored data,required for different search filters and different parameters or data from different time periods can be compared.For a more in-depth analysis of the stored data,through JavaScript programming language graphs for different parameters can be drawn.Access to the web interface can be done with or without authentication,depending on the need to ensure the security of certain data collected,stored and processed.The applications are scalable for different devices that will access it:mobile,tablets,laptops or desktops.展开更多
Objective:To investigate the correlation between immune cell infiltration pattern and clinical features and prognosis of cervical carcinoma.Methods:All cervical cancer transcript data and related clinical data were do...Objective:To investigate the correlation between immune cell infiltration pattern and clinical features and prognosis of cervical carcinoma.Methods:All cervical cancer transcript data and related clinical data were downloaded from the public database Cancer Genome Atlas(TCGA),and the relative proportions of 22 invasive immune cell types were calculated by Cibersort software.Perl was used to assess the correlation between the pattern of immune cell invasion and clinical characteristics(age,clinical stage,tumor grade)in cervical cancer,and the correlation between the pattern of immune cell invasion and survival in cervical cancer was calculated by the K-M Log-Rank method.Result:The distribution of immune cells in 306 cases of cervical cancer and 3 cases of normal tissues was assessed using Cibersort.Compared with normal tissues,the contents of resting dendritic cells,activated dendritic cells,M1 macrophages and activated CD4+memory T cells were higher;the contents of M2 macrophages,neutrophils,regulatory T cells and activated mast cells were lower in cervical cancer tissues.The contents of M1 macrophages,unactivated CD4+memory T cells,andγδT cells were positively correlated with patient age(P<0.05).The contents of follicular helper T cells,activated and unactivated natural killer(NK)cells,and naive CD4 T cells were negatively correlated with patient age(P<0.05).Those with high resting dendritic cell composition had shorter overall survival,while those with high follicular helper T cell composition had longer overall survival(P<0.05).Conclusion:Compared with normal tissues,the composition of immune cells in cervical cancer tissues has certain specificity,which can provide reference for the early screening and diagnosis of the disease.Patients in different age groups may have different immune cell infiltration patterns,which can be used as a basis to explore drug targets in clinical practice.Resting dendritic cells and follicular helper T cells in cervical cancer can be used as possible efficacy predictors of clinical immunotherapy for cervical cancer.展开更多
The Power Integrated Automation System has a large amount of the real-time data, it needs to achieve data sharing in different modules in its own system, sometimes even needs to be shared with the other systems. The t...The Power Integrated Automation System has a large amount of the real-time data, it needs to achieve data sharing in different modules in its own system, sometimes even needs to be shared with the other systems. The thesis discusses the characteristics and the ways of the real-time data sharing in the first place. Then, it compares the merits and drawbacks in different ways. Besides, it gives a viable resolution in different aspects, such as the design of the real-time database, the framework of the communication system and the design of the communication software, as well as the real-time data sharing in different systems.展开更多
随着工业物联网(industrial Internet of things,IIoT)的不断发展,越来越多的设备和传感器开始连接到网络中,产生了大量的时间序列数据(简称“时序数据”),时序数据爆炸式的增长给数据库管理系统带来了新的挑战:持续高吞吐量数据摄取、...随着工业物联网(industrial Internet of things,IIoT)的不断发展,越来越多的设备和传感器开始连接到网络中,产生了大量的时间序列数据(简称“时序数据”),时序数据爆炸式的增长给数据库管理系统带来了新的挑战:持续高吞吐量数据摄取、低延迟多维度数据查询、高性能时间序列索引以及低成本数据存储.近年来时序数据库技术已经成为一个研究热点,一些学者对时序数据库技术进行了深入的研究,同时出现了一些专门用于管理时序数据的时序数据库,并且已经被应用在多个领域,成为工业物联网中不可缺少的关键组成.现有的时序数据库相关综述侧重于时序数据库的功能和性能比较,以及在特定领域中对时序数据库的选择建议,缺少对时序数据库持久化存储、查询、计算和索引等关键技术的研究,同时这些综述工作出现的时间较早,缺少对现代时序数据库关键技术的研究.对学术界时序数据存储研究和工业界时序数据库进行了全面的调查和研究,凝练了时序数据库的4类关键技术:1)时间序列索引优化技术;2)内存数据组织技术;3)高吞吐量数据摄取和低延迟数据查询技术;4)海量历史数据低成本存储技术.同时分析总结了时序数据库评测基准.最后,展望了时序数据库关键技术在未来的发展方向.展开更多
文摘This paper presents an efficient recovery scheme suitable for real-time mainmemory database. In the recovery scheme, log records are stored in non-volatile RAM which is dividedinto four different partitions based on transaction types. Similarly, a main memory database isdivided into four partitions based data types. When the using ratio of log store area exceeds thethreshold value, checkpoint procedure is triggered. During executing checkpoint procedure, someuseless log records are deleted. During restart recovery after a crash, partition reloading policyis adopted to assure that critical data are reloaded and restored in advance, so that the databasesystem can be brought up before the entire database is reloaded into main memory. Therefore downtime is obvionsly reduced. Simulation experiments show our recovery scheme obviously improves thesystem performance, and does a favor to meet the dtadlints of real-time transactions.
文摘Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of satisfying the timing constraints of transactions, serializability is too strong as a correctness criterion and not suitable for real time databases in most cases. On the other hand, relaxed serializability including epsilon serializability and similarity serializability can allow more real time transactions to satisfy their timing constraints, but database consistency may be sacrificed to some extent. We thus propose the use of weak serializability(WSR) that is more relaxed than conflicting serializability while database consistency is maintained. In this paper, we first formally define the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol WDHP(weak serializable distributed high priority protocol) is outlined for distributed real time databases, where a new lock mode called mask lock mode is proposed for simplifying the condition of global consistency. Finally, through a series of simulation studies, it is shown that using the new concurrency control protocol the performance of distributed real time databases can be greatly improved.
文摘In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold.
基金Project supported by National Natural Science Foundation ofChina (Grant No .60203017) Defense Pre-research Projectof the"Tenth Five-Year-Plan"of China (Grant No .413150403)
文摘Recovery performance in the event of failures is very important for distributed real-time database systems. This paper presents a time-cognizant logging-based crash recovery scheme (TCLCRS) that aims at distributed real-time databases, which adopts a main memory database as its ground support. In our scheme, each site maintains a real-time log for local transactions and the subtransactions, which execute at the site, and execte local checkpointing independently. Log records are stored in non-volatile high- speed store, which is divided into four different partitions based on transaction classes. During restart recovery after a site crash, partitioned crash recovery strategy is adopted to ensure that the site can be brought up before the entire local secondary database is reloaded in main memory. The partitioned crash recovery strategy not only guarantees the internal consistency to be recovered, but also guarantee the temporal consistency and recovery of the sates of physical world influenced by uncommitted transactions. Combined with two- phase commit protocol, TCLCRS can guarantee failure atomicity of distributed real-time transactions.
基金granted by the National Science and Technology Major Project of China(Grant No.2017ZX05035002-001)the National Natural Science Foundation of China(Grant Nos.41802017 and 41725007)+1 种基金the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB26000000)the State Key Laboratory of Palaeobiology and Stratigraphy(Grant No.20172112).
文摘Paleogeography is a discipline that studies spatial distribution and evolutionary characteristics of geographic objects in earth history(Feng,2003;Feng et al.,2012).It focuses on the sediments,organisms and environmental proxies,most of which are preserved in the rocks.However,a large amount of this geological and biological information was no longer preserved after the geological process of burial.
基金Supported by National Natural Science Foundation of China(31072155)Natural Science Foundation of Jiangsu Province(BK2010068)+1 种基金Fund for Independent Innovation of Agricultural Science in Jiangsu Province[CX(11)2060]Special Fund for Agroscientific Research in the Public Interest(201303041)~~
文摘[Objective] This study aimed to establish a method for quantitative detection of mRNA transcriptional level of SS2 adhesive related-factors of Streptococcus suis serotype 2 (SS2) by fluorescent quantitative PCR. []Vlethod] The gene fragments en- coding SS2 adhesive related-factors MRP, FBPS and CPS2J and a housekeeping gene aroA were amplified by reverse transcription PCR from the total RNA of SS2, cloned, and sequenced. The recombinant plasmids containing the target genes were constructed, and used as templates in Real-time PCR. [Result] Dynamic curves, stan- dard curves and melting curves of the adhesive related-factors and aroA were ob- tained by the optimized Real-time PCR system. The standard curves showed a good linear relationship between template copy number and circulation number, and the correlation coefficients (FF) of the standard curves were over 0.995. Also, these as- says were highly specific a^d there was single specific melting peak for every gene. Moreover, the assays were highly sensitive and had a detection limit of 1.0×102 copies in 1 μl of initial templates. Finally, it was highly repeatable and had a coeffi- cient of variation less than 2% for intra-assay. [Conclusion] This study will provide a way to reveal the adhesion mechanism of SS2 to different host cells at molecular level.
基金Supported bythe National High Technology of 863Project (2002AA1Z2308 ,2002AA118030)
文摘Recent studies have addressed that the cache be havior is important in the design of main memory index structures. Cache-conscious indices such as the CSB^+-tree are shown to outperform conventional main memory indices such as the AVL-tree and the T-tree. This paper proposes a cacheconscious version of the T-tree, CST-tree, defined according to the cache-conscious definition. To separate the keys within a node into two parts, the CST-tree can gain higher cache hit ratio.
文摘In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local part or in the cloud. It is shown that the time data acquisition remains unchanged as a result of modification. Suggestions have been made about the use of the theory of dynamic systems to hybrid cloud database. The present work is aimed at attracting the attention of specialists in the field of cloud database to the apparatus control theory. The experiment presented in this article allows the use of the description of the known methods for solving important practical problems.
基金Supported by the Defense Pre-Research Project ofthe"Tenth Five-Year-Plan"of China (413150403)
文摘Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly.
基金the Romanian Ministry of Education and Research for financing the projects:“The realization of 3D geological/geophysical models for the characterization of some areas of economic and scientific interest in Romania”,with Contract No.49N/2019“Institutional capacities and services for research,monitoring and forecasting of risks in extra-atmospheric space”,acronym SAFESPACE,Contract No.16PCCDI/2018,within PNCDIII.
文摘Our paper describes the organizing of database,remarks about SNGO(Surlari National Geomagnetic Observatory)and network infrastructure.Based on the geomagnetic data acquired and stored on the database server,we perform the processing and analysis of geomagnetic parameters through different spectral,statistical and correlation methods.All these parameters are included in the geomagnetic database on server.The web interface for the database meets the different needs of handling the data collected,raw or processed.The server-side programming language used for design is php.This allow us to select different periods for which access to stored data,required for different search filters and different parameters or data from different time periods can be compared.For a more in-depth analysis of the stored data,through JavaScript programming language graphs for different parameters can be drawn.Access to the web interface can be done with or without authentication,depending on the need to ensure the security of certain data collected,stored and processed.The applications are scalable for different devices that will access it:mobile,tablets,laptops or desktops.
基金Scientific research project of Hubei provincial health commission(No.WJ2019M118)。
文摘Objective:To investigate the correlation between immune cell infiltration pattern and clinical features and prognosis of cervical carcinoma.Methods:All cervical cancer transcript data and related clinical data were downloaded from the public database Cancer Genome Atlas(TCGA),and the relative proportions of 22 invasive immune cell types were calculated by Cibersort software.Perl was used to assess the correlation between the pattern of immune cell invasion and clinical characteristics(age,clinical stage,tumor grade)in cervical cancer,and the correlation between the pattern of immune cell invasion and survival in cervical cancer was calculated by the K-M Log-Rank method.Result:The distribution of immune cells in 306 cases of cervical cancer and 3 cases of normal tissues was assessed using Cibersort.Compared with normal tissues,the contents of resting dendritic cells,activated dendritic cells,M1 macrophages and activated CD4+memory T cells were higher;the contents of M2 macrophages,neutrophils,regulatory T cells and activated mast cells were lower in cervical cancer tissues.The contents of M1 macrophages,unactivated CD4+memory T cells,andγδT cells were positively correlated with patient age(P<0.05).The contents of follicular helper T cells,activated and unactivated natural killer(NK)cells,and naive CD4 T cells were negatively correlated with patient age(P<0.05).Those with high resting dendritic cell composition had shorter overall survival,while those with high follicular helper T cell composition had longer overall survival(P<0.05).Conclusion:Compared with normal tissues,the composition of immune cells in cervical cancer tissues has certain specificity,which can provide reference for the early screening and diagnosis of the disease.Patients in different age groups may have different immune cell infiltration patterns,which can be used as a basis to explore drug targets in clinical practice.Resting dendritic cells and follicular helper T cells in cervical cancer can be used as possible efficacy predictors of clinical immunotherapy for cervical cancer.
文摘The Power Integrated Automation System has a large amount of the real-time data, it needs to achieve data sharing in different modules in its own system, sometimes even needs to be shared with the other systems. The thesis discusses the characteristics and the ways of the real-time data sharing in the first place. Then, it compares the merits and drawbacks in different ways. Besides, it gives a viable resolution in different aspects, such as the design of the real-time database, the framework of the communication system and the design of the communication software, as well as the real-time data sharing in different systems.
文摘随着工业物联网(industrial Internet of things,IIoT)的不断发展,越来越多的设备和传感器开始连接到网络中,产生了大量的时间序列数据(简称“时序数据”),时序数据爆炸式的增长给数据库管理系统带来了新的挑战:持续高吞吐量数据摄取、低延迟多维度数据查询、高性能时间序列索引以及低成本数据存储.近年来时序数据库技术已经成为一个研究热点,一些学者对时序数据库技术进行了深入的研究,同时出现了一些专门用于管理时序数据的时序数据库,并且已经被应用在多个领域,成为工业物联网中不可缺少的关键组成.现有的时序数据库相关综述侧重于时序数据库的功能和性能比较,以及在特定领域中对时序数据库的选择建议,缺少对时序数据库持久化存储、查询、计算和索引等关键技术的研究,同时这些综述工作出现的时间较早,缺少对现代时序数据库关键技术的研究.对学术界时序数据存储研究和工业界时序数据库进行了全面的调查和研究,凝练了时序数据库的4类关键技术:1)时间序列索引优化技术;2)内存数据组织技术;3)高吞吐量数据摄取和低延迟数据查询技术;4)海量历史数据低成本存储技术.同时分析总结了时序数据库评测基准.最后,展望了时序数据库关键技术在未来的发展方向.