Results 21 to 30 of about 1,622,308 (337)

Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

open access: yesIEEE Access, 2020
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj   +1 more source

Data Governance Framework in Data Exchange Centers [PDF]

open access: yesعلوم و فنون مدیریت اطلاعات
Purpose: Data governance frameworks have typically been discussed within the confines of an organization, with less focus on inter-organizational contexts.
Mohamadreza Mortazavi   +2 more
doaj   +1 more source

THE PROBLEM OF FEATURE EXTRACTION OF CONCEPTS IN ONTOLOGICAL MODELING OF SUBJECT AREA

open access: yesОткрытое образование (Москва), 2016
This article attempts to combining scientific knowledge in a logical theory and concepts of database theory in terms of determining the essential features of concepts (entities) and their properties.
Denis V. Vlasov
doaj   +1 more source

Lower bounds in differential privacy [PDF]

open access: yes, 2011
This is a paper about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise
C. Dwork   +3 more
core   +2 more sources

PathIN: an integrated tool for the visualization of pathway interaction networks

open access: yesComputational and Structural Biotechnology Journal, 2023
PathIN is a web-service that provides an easy and flexible way for rapidly creating pathway-based networks at several functional biological levels: genes, compounds and reactions.
George Minadakis   +3 more
doaj   +1 more source

تحليل وتصميم نظام الي لتسجيل السيارات

open access: yesIraqi Journal for Computers and Informatics, 1978
يتناول هذا البحث نظام تسجيل السيارات وتجديد اجازات التسجيل ، وتتمثل غايتنا في ايجاد الحلول المناسبة لهذا الجانب ، وذلك من خلال التحليل الاحصائي للنظام الحالي ، ومحاولة السيطرة على عامل الوقت و تخفيف الازدحام ، ومن ثم اقتراح نظام جديد يستند على نظام ...
سرمد جورج   +1 more
doaj   +1 more source

A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory

open access: yesIEEE Access, 2023
Currently, many companies and institutions use centralized or distributed databases to store massive amounts of data. However, the use of untrusted centralized third-party auditors can result in security issues because these auditors may be malicious and
Siqi He   +3 more
doaj   +1 more source

Screening 0D Materials for 2D Nanoelectronics Applications

open access: yesAdvanced Electronic Materials, 2023
As nanoelectronic devices based on 2D materials are moving toward maturity, optimization of the properties of the active 2D material must be accompanied by equal attention to optimizing the properties of and the interfaces to the other materials around ...
Mohammad Bagheri, Hannu‐Pekka Komsa
doaj   +1 more source

Some Problems Related to Reducts of Consistent Incomplete Decision Tables [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2022
In multi-criteria decision making, attribute reduction has attracted the attention of researchers for more than two decades. So far, numerous scientists have proposed algorithms to construct reducts in decision tables.
Dinh Thu Khanh   +3 more
doaj   +1 more source

Serializability theory for replicated databases

open access: yesJournal of Computer and System Sciences, 1985
In a one-copy distributed database, each data item is stored at exactly one site of a distributed system. In a replicated database, some data items are stored at multiple sites. The main motivation for replicated data is improved reliability: by storing important data at multiple sites, the system can tolerate failures more gracefully.
P A Bernstein, N Goodman
openaire   +3 more sources

Home - About - Disclaimer - Privacy