Results 11 to 20 of about 2,577,242 (312)

Big Data-Based E-Commerce Transaction Information Collection Method

open access: yesComplexity, 2021
With the rapid development of e-commerce industry, online shopping has become a craze. With the rapid growth of transaction volume on e-commerce platforms, a large amount of transaction data has been accumulated. From the transaction information of these
Bingwen Yan   +6 more
doaj   +1 more source

Social Friend Recommendation Algorithm Based on Association Rules and Similarity [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that the existing social friend recommendation algorithm only focuses on people and ignores things,a recommendation algorithm based on association rules and similarity is proposed.By calculating the similarity of the information ...
XIANG Chengguan,XIONG Shihuan,WANG Dong,XIONG Weicheng
doaj   +1 more source

Improved smart contract electricity transaction model based on blockchain

open access: yes电力工程技术, 2022
The current electricity transaction process in the electricity market has problems such as high risk, time-consuming, and low efficiency. In order to solve such problems, an improved smart contract electricity transaction model based on blockchain is ...
SHI Quansheng   +4 more
doaj   +1 more source

A new secure 2PL real-time concurrency control algorithm (ES2PL)

open access: yesInternational Journal of Intelligent Networks, 2022
A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity.
Ebrahim Abduljalil   +4 more
doaj   +1 more source

Implementasi Teknologi Blockchain Proof of Work Pada Penelusuran Supply Chain Produk Komputer

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2021
In recent times, the supply chain has developed into a large ecosystem. Various products moving from party to party require cooperation between stakeholders in managing the data generated. The problem is that every company has its own transaction records
Annisya, Emy Haryatmi
doaj   +1 more source

Differentially Testing Database Transactions for Fun and Profit

open access: yesInternational Conference on Automated Software Engineering, 2022
Database Management Systems (DBMSs) utilize transactions to ensure the consistency and integrity of data. Incorrect transaction implementations in DBMSs can lead to severe consequences, e.g., incorrect database states and query results.
Ziyu Cui   +6 more
semanticscholar   +1 more source

RESEARCH OF ACID TRANSACTION IMPLEMENTATION METHODS FOR DISTRIBUTED DATABASES USING REPLICATION TECHNOLOGY

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2021
Today, databases are an integral part of most modern applications designed to store large amounts of data and to request from many users. To solve business problems in such conditions, databases are scaled, often horizontally on several physical servers ...
Oksana Mazurova   +2 more
doaj   +1 more source

Reasons of the transformed toward NOSQL Databases and its data models [PDF]

open access: yesمجلة التربية والعلم, 2020
The relational database model is the main focus of the database for the previous time. It provides robust data storage and structure that supports transaction characteristics and data retrieval with structured query language- SQL.
Shaymaa Razoqi
doaj   +1 more source

A dubiety-determining based model for database cumulated anomaly intrusion [PDF]

open access: yes, 2007
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions ...
Lu, G, Lü, K, Yi, J
core   +1 more source

PTA: An Efficient System for Transaction Database Anonymization

open access: yesIEEE Access, 2016
Several approaches have been proposed to anonymize relational databases using the criterion of k-anonymity, to avoid the disclosure of sensitive information by re-identification attacks.
Jerry Chun-Wei Lin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy