In this part, you are asked to explore and/or investigate distributed database management system (DDBMS). You can either explore the main concepts or

In this part, you are asked to explore and/or investigate distributed database management system (DDBMS). You can either explore the main concepts or technical challenges of DDBMS in general (without directly specifying a certain DBMS) or you can research a specific DBMS and present how it manages different aspects of distribution.

Your exploration or research should focus on an in-depth review of theories, techniques, algorithms, approaches, mechanisms, and implementation of one or some of the following aspects:

  • Distributed database support in systems such as Cassandra, Clusterpoint, SQL Server, Oracle, FoundationDB, NuoDB, etc.
  • Distributed DBMS architecture: models for distributed DBMS, Distributed systems architectures, etc.
  • Distributed database design: distribution design issues, fragmentation/partition, allocation issues, etc.
  • Query decomposition and data localization.
  • Distributed database security.
  • Distributed concurrency control.
  • Distributed DBMS reliability

Your topic could also investigate a sub-problem of a cutting-edge research problem with these aspects.

Your investigation will be based on recent papers, technical documents, and software packages (open source preferred). You are encouraged to read some papers from the following sites for new techniques in DBMS:

  • Communications of the ACM
  • CiteSeer
  • IEEE electronic library
  • IGI Global electronic library

Once you have decided on a topic, you need to set up the feasible yet meaningful outcomes of your exploration or research on it. Overall, the outcomes should be interesting and beneficial to the professional community of DBMS research and development. Some possible outcomes are:

  • your analysis, findings and discoveries of problems
  • results of your test, survey and comparison
  • your proposed new or improved methods, algorithms, etc.
  • your useful implementation
  • your insight on future directions.

You are asked to write a report of 5 to 10 pages maximum. It should be in a technical report or conference paper format, and include the following contents:

  • Title
  • Abstract: no more than 300 words.
  • Introduction/background: motivation and overall introduction, including necessary literature review and citations.
  • Methods: describe the problem, and the methods you use to explore or address the problem.
  • Results and findings: include experimental, theoretical analysis, and implementation accomplished based on your methods.
  • Related work: summarize the related work; compare your methods and results with others’ work. Citations are required.
  • Conclusion and future work: end your exploration and research by pointing out possible directions.
  • References: include all cited references.

Make sure you include proper citation of viewpoints, methods, algorithms, data, results, figures, tables, etc. from other papers or contributions whenever you use them in your report. All your references should be published, or at least publicly and stably accessible from the Internet.

In addition to the report, you can also submit any necessary complementary material you have such as practical results, code of programs you have done, and other support packages.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Career Focus (Required/Graded) SubscribeThe CompTIA A+ certification demonstrates to employers that you have the knowledge, ability, and skills in

Career Focus (Required/Graded) SubscribeThe CompTIA A+ certification demonstrates to employers that you have the knowledge, ability, and skills in entry-level PC technology. Many industry insiders started with the CompTIA A+, and that led them to higher-paying, more complex jobs in both IT and cybersecurity. Many large corporations such as Apple, Cisco,

CompTIA’s T/S Methodology (Required/Graded) SubscribeFor this discussion, you will be assessing the following help desk ticket below from Chikako

CompTIA’s T/S Methodology (Required/Graded) SubscribeFor this discussion, you will be assessing the following help desk ticket below from Chikako (connectivity issue). Use the CompTIA 6-step troubleshooting process below to help figure out the connectivity issue. CompTIA 6-Step Troubleshooting Process: Identify the problem. Establish a theory of probable cause. Evaluate the theory

Accounting: Business and finance: computerscience: Economics: Marketing: Social Science Am a professional academic writer, content creator and, copywriter

Accounting: Business and finance: computerscience: Economics: Marketing: Social Science Am a professional academic writer, content creator and, copywriter with 7 years of research based experience.  My accounting: Business and finance: computerscience: Economics: Marketing: Social Science Am a professional academic writer, content creator and, copywriter with 7 years of research based

Explain why we cannot corrupt the output buffer of Buffovrflw_Demo4 through we can trigger a segmentation fault We cannot corrupt the output buffer of

Explain why we cannot corrupt the output buffer of Buffovrflw_Demo4 through we can trigger a segmentation fault We cannot corrupt the output buffer of `Buffovrflw_Demo4` because the program is likely designed with protections such as stack canaries, non-executable stack, or address space layout randomization (ASLR). These mechanisms prevent direct buffer

Accounting: Business and finance: computerscience: Economics: Marketing: Social Science Am a professional academic writer, content creator and, copywriter

Accounting: Business and finance: computerscience: Economics: Marketing: Social Science Am a professional academic writer, content creator and, copywriter with 7 years of research based experience. My passion for research, writing, and editin g makes me the perfect professional for varying topics in Studydaddy. I understand the value of detailed research

BYOD Registration Form Resources To complete this project, you may need to review instructions on how to take a screenshot.   Locate System

BYOD Registration Form Resources To complete this project, you may need to review instructions on how to take a screenshot.   Locate System Information Review this resource to check how to locate your system information.   Template Use the BYOD Ingest Form Template to complete the project. Delete the instructional text from the template before you submit.    2024 University of