intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Performance and tuning

Xem 1-20 trên 88 kết quả Performance and tuning
  • The paper analyzes and determines the optimal parameters of tuned mass damper to reduce torsional vibration for the machine shaft. The research steps are as follows. First, the optimal parameters of tuned mass damper for the shafts are given by using the maximization of equivalent viscous resistance method. Second, a numerical simulation is performed for configuration of machine shaft to validate the effectiveness of the obtained analytical results.

    pdf9p vifilm 24-09-2024 1 1   Download

  • In this paper, we describe the application of CRO algorithm to search optimal parameters for PID controller because CRO combines both features of local and global searching techniques to increase the chance of finding global solution. The comparison of tuning PID controller by CRO and traditional Ziegler-Nichols method is also presented. The simulated results show the advantages of tuning PID using CRO compared to traditional methods in terms of performance indices and transient responses.

    pdf12p tamynhan9 02-12-2020 55 2   Download

  • Small shared pool Small database buffer cache Small redo log buffer cache Missing indexes Rollback segments and undo tablespace Sort area size incorrectly set Assorted

    ppt16p trinh02 28-01-2013 54 6   Download

  • Globalization Support Features Globalization Support ensures that database utilities and error messages, sort order, date, time, monetary, numeric, and calendar conventions automatically adapt to the native language. Oracle currently supports 57 languages, 88 territories, 84 linguistic sorts (71 monolingual and 13 multilingual), and 235 encoded character sets. The language-dependent operations are controlled by a number of parameters and environment variables on both the client and the server sides. The server and the client may run in the same or different locations.

    ppt42p trinh02 28-01-2013 74 5   Download

  • After completing this lesson, you should be able to do the following: Describe the features of multitable inserts Use the following types of multitable inserts Unconditional INSERT Pivoting INSERT Conditional ALL INSERT Conditional FIRST INSERT Create and use external tables Name the index at the time of creating a primary key constraint

    ppt30p trinh02 28-01-2013 50 6   Download

  • After completing this lesson, you should be able to do the following: Use the Oracle tuning methodology to diagnose and resolve performance problems Use Oracle tools to diagnose performance problems Understand the goals of the workshop

    ppt14p trinh02 28-01-2013 69 5   Download

  • Data Loading Methods Several methods are available for loading data into tables in an Oracle database. Of the methods available, Direct Load insert and SQL*Loader are discussed here. Export and Import are covered in the Oracle9i Database Administration Fundamentals II course. SQL*Loader SQL*Loader loads data from external files into tables of an Oracle database. It has a powerful data parsing engine that places little limitation on the format of the data in the data file. Direct Load Direct Load insert can be used to copy data from one table to another table within the same database.

    ppt40p trinh02 28-01-2013 69 5   Download

  • After completing this lesson, you should be able to do the following: Describe different system architectures Describe the primary steps of OS tuning Identify similarities between OS and DB tuning Understand virtual memory and paging Explain the difference between a process and a thread

    ppt14p trinh02 28-01-2013 46 5   Download

  • Auditing If an unauthorized user is deleting data, then the DBA might decide to audit all connections to the database and all successful and unsuccessful deletions from all tables in the database. The DBA can gather statistics about which tables are being updated, how many logical inputs/outputs (I/Os) are performed, and how many concurrent users connect at peak times.

    ppt16p trinh02 28-01-2013 52 9   Download

  • After completing this lesson, you should be able to do the following: Write a multiple-column subquery Describe and explain the behavior of subqueries when null values are retrieved Write a subquery in a FROM clause Use scalar subqueries in SQL Describe the types of problems that can be solved with correlated subqueries Write correlated subqueries Update and delete rows using correlated subqueries Use the EXISTS and NOT EXISTS operators Use the WITH clause

    ppt36p trinh02 28-01-2013 52 6   Download

  • Oracle provides for easy and controlled privilege management through roles. Roles are named groups of related privileges that are granted to users or to other roles. They are designed to ease the administration of privileges in the database. Role characteristics Roles can be granted to and revoked from users with the same commands that are used to grant and revoke system privileges. Roles can be granted to any user or role. However, a role cannot be granted to itself and cannot be granted circularly. A role can consist of both system and object privileges.

    ppt28p trinh02 28-01-2013 45 3   Download

  • After completing this lesson, you should be able to do the following: Define levels of locking Identify causes of contention Prevent locking problems Use Oracle utilities to detect lock contention Resolve contention in an emergency Resolve deadlock conditions

    ppt30p trinh02 28-01-2013 44 3   Download

  • After completing this lesson, you should be able to do the following: Create materialized views Refresh materialized views Create nested materialized views Create UNION ALL materialized views Explain the use of query rewrites Enable and control query rewrites

    ppt24p trinh02 28-01-2013 45 3   Download

  • Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.

    ppt20p trinh02 28-01-2013 81 3   Download

  • After completing this lesson, you should be able to do the following: Explain the role of the DBA in tuning applications Move tables using the ALTER TABLE command Redefine a table online Create different types of indexes Build and manage index-organized tables Explain and plan OLTP, DSS, and hybrid systems

    ppt38p trinh02 28-01-2013 62 4   Download

  • Profiles A profile is a named set of the following password and resource limits: Password aging and expiration Password history Password complexity verification Account locking CPU time Input/output (I/O) operations Idle time Connect time Memory space (private SQL area for Shared Server only) Concurrent sessions After a profile has been created, the database administrator can assign it to each user. If resource limits are enabled, the Oracle server limits the database usage and resources to the defined profile of the user....

    ppt38p trinh02 28-01-2013 51 5   Download

  • This workshop covers: Creating tables and sequences Modifying data in the tables Modifying table definitions Creating views Writing scripts containing SQL and iSQL*Plus commands Generating a simple report

    ppt14p trinh02 28-01-2013 73 4   Download

  • Data Integrity Data integrity means that data in a database adheres to business rules. There are three primary ways in which data integrity can be maintained: Application code Database triggers Declarative integrity constraints Mapping the business rules using one of the three methods is a design decision. The database administrator is primarily concerned with implementing the methods chosen by the designer and balancing the performance needs against integrity requirements.

    ppt34p trinh02 28-01-2013 51 5   Download

  • After completing this lesson, you should be able to do the following: Compare and evaluate the different storage structures Examine different data access methods Implement different partitioning methods

    ppt26p trinh02 28-01-2013 56 2   Download

  • After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and maintenance of the security model Use the GRANT and REVOKE statements to grant and revoke object privileges Create and access database links

    ppt26p trinh02 28-01-2013 47 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2