
 
In this work, the authors claimed the need of both 
database audit and control checking (mechanisms 
for detecting errors in the data flow of the client) to 
guarantee a high detection coverage. In general, off-
the-shelf database systems are equipped with 
utilities to perform data audits, such as described in 
(Haugk et al, 1985), (Costa et al, 2000), (Bagchi et 
al, 2001), (Oracle8 Server Utilities). 
Our research objective, in this work, is to 
investigate on such approach to derive optimal 
maintenance policies of database supports in such 
systems. It is noteworthy then to underline the 
specific characteristics possessed by such 
communication systems which have to be taken into 
account in devising approaches for their 
maintenance. The two main factors characterizing 
wireless communication systems are: 1) Short-
persistence of most of the data stored in the database 
(typically, of the same duration of the user call). 2) 
The highly dynamic evolution of the environmental 
conditions (e.g., varying number of active calls) and 
the changes over time of the requirements and 
services offered from these communication systems. 
These two factors make maintenance difficult to 
achieve by traditional methods, and consequently 
approaches using learning and adaptation to replace 
missing or incorrect environment knowledge by the 
experimentation, observation, prediction, and 
generalization, come out to be very attractive. 
The methodology using DEpendability 
Evaluation of Multiple phased systems (DEEM) tool 
to model and analyze the dependability attributes of 
different scheduled audit strategies is developed. 
This methodology, essentially based on 
Deterministic and Stochastic Petri Nets (DSPN) and 
supported by DEEM tool, aims to derive appropriate 
settings for the order and frequencies of database 
audits to optimize selected performance indicators. 
Afterwards, an intelligent software agent based on a 
reinforcement Q-Learning approach is developed for 
planning and learning to derive optimal maintenance 
policies adaptively and Artificial Neural Networks 
(ANN) for its implementation. 
2 INTELLIGENT 
MAINTENANCE SYSTEM 
Wireless and mobile systems include a database 
subsystem, storing system-related as well as clients-
related information, and providing basic services to 
the application process, such as read, write and 
search operations. Data concerning the status, the 
access rights and features available to the users, 
routing information for dispatch calls, are all 
examples of data contained in such database, 
organized in appropriate data structures usually 
called tables (e.g., database tables A, B, and C). The 
database is subject to corruption determined by a 
variety of hardware and/or software faults, such as 
internal bugs and transient hardware faults. The 
occurrences of such faults have the potential of 
yielding to service unavailability. Because of the 
central role played by such database in ensuring a 
correct service to clients, means to pursue the 
integrity/correctness of data have to be carried out. 
The synopsis, shown in Figure 1, of an intelligent 
database maintenance system, built of a given audit 
operation set, and an audit manager, is suggested in 
order to allow to select, in each time period, the 
optimal maintenance policy, the optimal audit 
behavior. The part, in Figure 1, labelled "Relevant 
Parameters" indicates those parameters of the 
wireless communication systems which determine 
the states space of these systems, mainly the time 
(the nature of the application under study imposes 
the time as relevant parameter), the mean number of 
user calls N
call
, and the pointer failure rate λ
C
. 
2.1  Audit Operation Set 
In this work, we are not interested in defining or 
analyzing audit operations from the point of view of 
the detection and/or correction capabilities offered 
by them. Instead, a given set of audit operations is 
assumed to be provided (as shown in Figure 1 e.g., 
Audit1_AB, Audit1_BC, Audit2_AB, Audit2_BC 
are audit operations dealing with database tables A, 
B, and C) to cope with data corruption, where each 
audit operation is characterized by a cost (in 
execution time) and coverage (as a measure of its 
ability to detect and/or correct wrong data). 
2.2  Audit Manager (Decision-making) 
The audit manager is responsible for applying a 
maintenance strategy to cope with database 
corruption and therefore preventing system 
unavailability; it activates different audit operations 
at different time intervals. To achieve this goal, it 
has to select the part of the database to 
check/recover, the detection/recovery scheme to 
apply, and the frequency with which each 
check/recovery operation has to be performed. It is 
implemented by a decision-making subsystem which 
integrates a methodology to model and analyze 
maintenance strategies (where e.g., Table Pointers 
are
 structured in homogeneous sets A, B, and C as  
WINSYS 2011 - International Conference on Wireless Information Networks and Systems
116