Results 31 to 40 of about 9,715,830 (339)

Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

open access: yesIEEE Access, 2020
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj   +1 more source

Brief introduction of medical database and data mining technology in big data era

open access: yesJournal of Evidence-Based Medicine, 2020
Data mining technology can search for potentially valuable knowledge from a large amount of data, mainly divided into data preparation and data mining, and expression and analysis of results.
Jin Yang   +8 more
semanticscholar   +1 more source

From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back [PDF]

open access: yes, 2014
In this work we establish and investigate connections between causes for query answers in databases, database repairs wrt. denial constraints, and consistency-based diagnosis.
Bertossi, Leopoldo, Salimi, Babak
core   +3 more sources

THE PROBLEM OF FEATURE EXTRACTION OF CONCEPTS IN ONTOLOGICAL MODELING OF SUBJECT AREA

open access: yesОткрытое образование (Москва), 2016
This article attempts to combining scientific knowledge in a logical theory and concepts of database theory in terms of determining the essential features of concepts (entities) and their properties.
Denis V. Vlasov
doaj   +1 more source

A look at the density functional theory zoo with the advanced GMTKN55 database for general main group thermochemistry, kinetics and noncovalent interactions.

open access: yesPhysical Chemistry, Chemical Physics - PCCP, 2017
We present the GMTKN55 benchmark database for general main group thermochemistry, kinetics and noncovalent interactions. Compared to its popular predecessor GMTKN30 [Goerigk and Grimme J. Chem. Theory Comput., 2011, 7, 291], it allows assessment across a
L. Goerigk   +5 more
semanticscholar   +1 more source

PathIN: an integrated tool for the visualization of pathway interaction networks

open access: yesComputational and Structural Biotechnology Journal, 2023
PathIN is a web-service that provides an easy and flexible way for rapidly creating pathway-based networks at several functional biological levels: genes, compounds and reactions.
George Minadakis   +3 more
doaj   +1 more source

تحليل وتصميم نظام الي لتسجيل السيارات

open access: yesIraqi Journal for Computers and Informatics, 1978
يتناول هذا البحث نظام تسجيل السيارات وتجديد اجازات التسجيل ، وتتمثل غايتنا في ايجاد الحلول المناسبة لهذا الجانب ، وذلك من خلال التحليل الاحصائي للنظام الحالي ، ومحاولة السيطرة على عامل الوقت و تخفيف الازدحام ، ومن ثم اقتراح نظام جديد يستند على نظام ...
سرمد جورج   +1 more
doaj   +1 more source

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

open access: yesIEEE Symposium on Security and Privacy, 2019
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks that are supported by streamlined performance analyses.
Paul Grubbs   +3 more
semanticscholar   +1 more source

Lower bounds in differential privacy [PDF]

open access: yes, 2011
This is a paper about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise
C. Dwork   +3 more
core   +2 more sources

A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory

open access: yesIEEE Access, 2023
Currently, many companies and institutions use centralized or distributed databases to store massive amounts of data. However, the use of untrusted centralized third-party auditors can result in security issues because these auditors may be malicious and
Siqi He   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy