Results 21 to 30 of about 1,622,308 (337)
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj +1 more source
Data Governance Framework in Data Exchange Centers [PDF]
Purpose: Data governance frameworks have typically been discussed within the confines of an organization, with less focus on inter-organizational contexts.
Mohamadreza Mortazavi +2 more
doaj +1 more source
THE PROBLEM OF FEATURE EXTRACTION OF CONCEPTS IN ONTOLOGICAL MODELING OF SUBJECT AREA
This article attempts to combining scientific knowledge in a logical theory and concepts of database theory in terms of determining the essential features of concepts (entities) and their properties.
Denis V. Vlasov
doaj +1 more source
Lower bounds in differential privacy [PDF]
This is a paper about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise
C. Dwork +3 more
core +2 more sources
PathIN: an integrated tool for the visualization of pathway interaction networks
PathIN is a web-service that provides an easy and flexible way for rapidly creating pathway-based networks at several functional biological levels: genes, compounds and reactions.
George Minadakis +3 more
doaj +1 more source
تحليل وتصميم نظام الي لتسجيل السيارات
يتناول هذا البحث نظام تسجيل السيارات وتجديد اجازات التسجيل ، وتتمثل غايتنا في ايجاد الحلول المناسبة لهذا الجانب ، وذلك من خلال التحليل الاحصائي للنظام الحالي ، ومحاولة السيطرة على عامل الوقت و تخفيف الازدحام ، ومن ثم اقتراح نظام جديد يستند على نظام ...
سرمد جورج +1 more
doaj +1 more source
A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory
Currently, many companies and institutions use centralized or distributed databases to store massive amounts of data. However, the use of untrusted centralized third-party auditors can result in security issues because these auditors may be malicious and
Siqi He +3 more
doaj +1 more source
Screening 0D Materials for 2D Nanoelectronics Applications
As nanoelectronic devices based on 2D materials are moving toward maturity, optimization of the properties of the active 2D material must be accompanied by equal attention to optimizing the properties of and the interfaces to the other materials around ...
Mohammad Bagheri, Hannu‐Pekka Komsa
doaj +1 more source
Some Problems Related to Reducts of Consistent Incomplete Decision Tables [PDF]
In multi-criteria decision making, attribute reduction has attracted the attention of researchers for more than two decades. So far, numerous scientists have proposed algorithms to construct reducts in decision tables.
Dinh Thu Khanh +3 more
doaj +1 more source
Serializability theory for replicated databases
In a one-copy distributed database, each data item is stored at exactly one site of a distributed system. In a replicated database, some data items are stored at multiple sites. The main motivation for replicated data is improved reliability: by storing important data at multiple sites, the system can tolerate failures more gracefully.
P A Bernstein, N Goodman
openaire +3 more sources

