A new vertical fragmentation algorithm based on ant collective behavior in distributed database systems

被引:0
|
作者
Mehdi Goli
Seyed Mohammad Taghi Rouhani Rankoohi
机构
[1] Shahid Beheshti University,Electrical & Computer Engineering Department
来源
关键词
Distributed database design; Data fragmentation; Vertical fragmentation; Optimal fragment numbers; Minimum transaction access cost; Ant clustering algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
Considering the existing massive volumes of data processed nowadays and the distributed nature of many organizations, there is no doubt how vital the need is for distributed database systems. In such systems, the response time to a transaction or a query is highly affected by the distribution design of the database system, particularly its methods for fragmentation, replication, and allocation data. According to the relevant literature, from the two approaches to fragmentation, namely horizontal and vertical fragmentation, the latter requires the use of heuristic methods due to it being NP-Hard. Currently, there are a number of different methods of providing vertical fragmentation, which normally introduce a relatively high computational complexity or do not yield optimal results, particularly for large-scale problems. In this paper, because of their distributed and scalable nature, we apply swarm intelligence algorithms to present an algorithm for finding a solution to vertical fragmentation problem, which is optimal in most cases. In our proposed algorithm, the relations are tried to be fragmented in such a way so as not only to make transaction processing at each site as much localized as possible, but also to reduce the costs of operations. Moreover, we report on the experimental results of comparing our algorithm with several other similar algorithms to show that ours outperforms the other algorithms and is able to generate a better solution in terms of the optimality of results and computational complexity.
引用
收藏
页码:435 / 455
页数:20
相关论文
共 50 条
  • [31] A new ant colony optimization based algorithm for data allocation problem in distributed databases
    Adl, Rosa Karimi
    Rankoohi, Seyed Mohammad Taghi Rouhani
    KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 20 (03) : 349 - 373
  • [32] A new ant colony optimization based algorithm for data allocation problem in distributed databases
    Rosa Karimi Adl
    Seyed Mohammad Taghi Rouhani Rankoohi
    Knowledge and Information Systems, 2009, 20 : 349 - 373
  • [33] An improved algorithm for concurrency control in distributed database systems
    Yao, WL
    Perrizo, W
    He, XD
    INFORMATION SCIENCES, 1997, 103 (1-4) : 23 - 36
  • [34] Design of distributed database systems: an iterative genetic algorithm
    Sukkyu Song
    Journal of Intelligent Information Systems, 2015, 45 : 29 - 59
  • [35] Design of distributed database systems: an iterative genetic algorithm
    Song, Sukkyu
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2015, 45 (01) : 29 - 59
  • [36] Dynamic Cost Ant Colony Algorithm to Optimize Query for Distributed Database Based on Quantum-Inspired Approach
    Mohsin, Sayed A.
    Younes, Ahmed
    Darwish, Saad M.
    SYMMETRY-BASEL, 2021, 13 (01): : 1 - 20
  • [37] Database Query Optimization Based on Parallel Ant Colony Algorithm
    Zheng, Wenbo
    Jin, Xin
    Deng, Fei
    Mo, Shaocong
    Qu, Yili
    Yang, Yuntao
    Li, Xiaojie
    Long, Sijie
    Zheng, Chengfeng
    Liu, Jingyi
    Xie, Zefeng
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 653 - 656
  • [38] A New Distributed Mining Association Rules Algorithm in Distributed Database System
    Gao, Shutao
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 658 - 662
  • [39] A new approach for distribution state estimation based on ant colony algorithm with regard to distributed generation
    Niknam, T
    Ranjbar, AM
    Shirani, AR
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2005, 16 (02) : 119 - 131
  • [40] Based on the Ant Colony Algorithm is a Distributed Intrusion Detection Method
    Wang, Yiran
    Wang, Chunxia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 153 - 164