Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
When database is stored in one computer or server, certain issues related to disaster (in terms of natural or un-natural) problem may arise with reference to geographical connection and geographical distribution of servers. Here, replication feature plays an important role. There were many techniq...
| Main Authors: | Dildar Hussain, Mohammad Omar, Khairol Amali Ahmad, Ja’afar Adnan, Khaleel Ahmad |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit Universiti Kebangsaan Malaysia
2021
|
| Online Access: | http://journalarticle.ukm.my/19090/ http://journalarticle.ukm.my/19090/1/10.pdf |
Similar Items
Database-backed library web sites: a case study of the use of PHP and MySQL at the University of Nottingham
by: Gardner, Mike, et al.
Published: (2001)
by: Gardner, Mike, et al.
Published: (2001)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
A study on microsoft SQL server 2000 / Ireen Munira Ibrahim
by: Ibrahim, Ireen Munira
Published: (2003)
by: Ibrahim, Ireen Munira
Published: (2003)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
OriDB: a DNA replication origin database
by: Nieduszynski, Conrad A., et al.
Published: (2007)
by: Nieduszynski, Conrad A., et al.
Published: (2007)
A survey of NewSQL DBMSs focusing on taxonomy, comparison and open issues
by: Abdullah, Muhammed, et al.
Published: (2021)
by: Abdullah, Muhammed, et al.
Published: (2021)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
Control of master-slave microgrid based on CAN bus
by: Alfergani, Asma, et al.
Published: (2018)
by: Alfergani, Asma, et al.
Published: (2018)
Haptic Interface For A Master Slave Robotic Gripper
by: Tay , Tee Tiong
Published: (2008)
by: Tay , Tee Tiong
Published: (2008)
OriDB, the DNA replication origin database updated and extended
by: Siow, Cheuk C., et al.
Published: (2012)
by: Siow, Cheuk C., et al.
Published: (2012)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Data Mining in Supplier Selection: A Practical Application Using Microsoft SQL Server 2005
by: Sunarya, Rajasa Utama
Published: (2008)
by: Sunarya, Rajasa Utama
Published: (2008)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Using MySQL for learning management system
by: Saudi, Azali, et al.
Published: (2004)
by: Saudi, Azali, et al.
Published: (2004)
Voicing the voiceless: unraveling the Master/Slave relationship in Nadine Gordimer's July's People
by: Majeed, Abdulhameed A., et al.
Published: (2018)
by: Majeed, Abdulhameed A., et al.
Published: (2018)
Computation efficiency of master-slave processors in multitasking applications: a performance analysis
by: Mukerjee, Malay R.
Published: (1997)
by: Mukerjee, Malay R.
Published: (1997)
Development of master-slave robotic hand for Mirror Visual Feedback (MVF) therapy
by: Mohd Ali, A. M., et al.
Published: (2011)
by: Mohd Ali, A. M., et al.
Published: (2011)
Illness and the development of Master-Slave relations in Morrison’s A Mercy and Lalami’s The Moor’s Account
by: al-Sewwi, Esraa, et al.
Published: (2020)
by: al-Sewwi, Esraa, et al.
Published: (2020)
A new auditing mechanism for open source NoSQL database a case study on open source MongoDB database
by: Mohamed, Hany Heidar Hussein
Published: (2015)
by: Mohamed, Hany Heidar Hussein
Published: (2015)
Influence of Network Speed on Structured Query Language (SQL) Database Data Transmission Performance in an Internet of Things (IoT) Sensing Device on Single Board Computers (SBC)
by: Nor Azhar, Ahmad, et al.
Published: (2019)
by: Nor Azhar, Ahmad, et al.
Published: (2019)
Modeling of technical management information system with UML and implementation using the combination of PHP and MYSQL
by: Nik Mahamood, Nik Maria
Published: (2003)
by: Nik Mahamood, Nik Maria
Published: (2003)
Servitude and slave narratives: tracing ‘new slaveries’ in Mende Nazer’s Slave and Zadie Smith’s ‘The Embassy of Cambodia’
by: Ward, Abigail
Published: (2016)
by: Ward, Abigail
Published: (2016)
Craving freedom, we become slaves
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
Similar Items
-
Database-backed library web sites: a case study of the use of PHP and MySQL at the University of Nottingham
by: Gardner, Mike, et al.
Published: (2001) -
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015) -
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)