Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 88155
The Effect of Artificial Intelligence on Data Base Evolution
Authors: Wasim Refaat Botros Gayed
Abstract:
records system is the drift of statistics from exclusive ranges to distinct guidelines for selection making and information operations in information device (IS). facts can be violated by distinct manner like manual or technical mistakes, records tampering or loss of integrity. security device known as firewall of IS is effected via such type of violations. The drift of data among diverse stages of facts gadget is done by way of networking system. The flow of statistics on community is in form of packets or frames. To protect those packets from unauthorized get entry to, virus assaults, and to maintain the integrity level, community protection is an crucial element. To guard the records to get pirated, diverse security strategies are used. This paper represents the diverse security techniques and indicates one-of-a-kind harmful assaults with the assist of distinct statistics evaluation. This paper can be beneficial for the companies to make the system greater at ease, effective, and beneficial for future decisions makingDatabases are the key components of the software program systems. because of the exponential increase of information, it's far the priority that the statistics must be correct and to be had. The data in databases is prone to inner and outside threats, particularly while it consists of touchy statistics like scientific or army packages. each time the facts is modified with the aid of malicious reason, records evaluation result may additionally cause disastrous decisions. Autonomic self-recuperation is molded towards computer machine after inspiring from the autonomic gadget of human frame. so one can guarantee the accuracy and availability of information, we advise a technique which on a concern foundation, tries to keep away from any malicious transaction from execution and in case a malicious transaction influences the device, it heals the machine in an isolated mode in any such way that the supply of gadget would not be compromised. the use of this autonomic device, the management price and time of DBAs may be minimized. in the long run, we test our version and present the findings.Keywords: access control, security, big data, domain information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 3