Information and data protection within a RDBMS
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc).
Y. Khmelevsky
doaj +2 more sources
Computer Information Processing System Based on RFID Internet-of-Things Encryption Technology
With the increasing development of information science and technology and the vigorous use and promotion of new technologies, profound changes have taken place in all aspects of our daily life. With this huge change, the IoT industry was born.
C. Yuan
semanticscholar +1 more source
ENHANCED COMPUTATION ARCHITECTURE FOR BIG DATA ANALYTICS USING ENCRYPTION ALGORITHM
Big data infrastructure needs to be structured in the most critical aspects and wisely calculate how large data applications are managed in order to achieve the most important security issues required. One of them is privacy is a related feature as users
Praveen S. Banasode+1 more
semanticscholar +1 more source
Discussion and Analysis of Computer Information Data Security and Encryption Technology
With the continuous development of science and technology, Internet technology has become more and more mature, and the advantages of actual information technology have gradually emerged.
R. Hao
semanticscholar +1 more source
Encryption and Decryption Techniques in Cloud Computing
While big data applications in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real time is one of the most important issues during data processing and transfer.
P. Saraswat, Swapnil Raj
semanticscholar +1 more source
Expert System to Diagnose Angina Pectoris Disease (Sitting Wind) Using the Naïve Bayes Method
aspects of data or information. The issue of security and confidentiality of computer data is something that is important in this information era, especially for the Teluk Segara Sub-District Office, Bengkulu City.
Intan Diba Aulia Sari+2 more
semanticscholar +1 more source
Analysis Of Voice Data Security Security By Using The Rc4 Algorithm
Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One of the fields of science that is used to secure data is cryptography. Cryptography is a science that
Rika Nurhidayati+2 more
semanticscholar +1 more source
ARTIFICIAL INTELLIGENCE ENABLED INTERNET OF MEDICAL THINGS (IOMT) TECHNIQUES AND METHODS
Artificial Intelligence or AI has been a boon in the medical sector as it allows the overall improvement of medical facilities. The deployment of an efficient and effective management within the healthcare society has been improved with the help of AI ...
Hani A. Harb
semanticscholar +1 more source
AI-based System for the Detection and Prevention of COVID-19
The COVID-19 pandemic has had catastrophic consequences all over the world since the detection of the first case in December 2019. Currently, exponential growth is expected.
Sofien Chokri+4 more
semanticscholar +1 more source
Efficient Cloud Storage with Data Partitioning and Replication Using Advanced Encryption Standard
Cloud computing associate the computing and storage resources controlled by different operating systems to make available services such as large-scaled data storage and high performance computing to users. The benefits of low-cost, negligible management (
S. Abirami, P. ShanmugaPriya.
semanticscholar +1 more source