Results 21 to 30 of about 299,213 (341)

Statistical and fuzzy approach for database security [PDF]

open access: yes, 2007
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on statistical and fuzzy set theories for Cumulated Anomaly, is proposed. DDM
Lu, G, Lü, K, Yi, J
core   +1 more source

RESEARCH OF ACID TRANSACTION IMPLEMENTATION METHODS FOR DISTRIBUTED DATABASES USING REPLICATION TECHNOLOGY

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2021
Today, databases are an integral part of most modern applications designed to store large amounts of data and to request from many users. To solve business problems in such conditions, databases are scaled, often horizontally on several physical servers ...
Oksana Mazurova   +2 more
doaj   +1 more source

Reasons of the transformed toward NOSQL Databases and its data models [PDF]

open access: yesمجلة التربية والعلم, 2020
The relational database model is the main focus of the database for the previous time. It provides robust data storage and structure that supports transaction characteristics and data retrieval with structured query language- SQL.
Shaymaa Razoqi
doaj   +1 more source

Efficient Cross-Chain Transaction Processing on Blockchains

open access: yesApplied Sciences, 2022
Blockchain has received great attention in academia and industry due to its decentralization and immutability. From the perspective of transaction processing, blockchain is a distributed shared ledger and database with the characteristics of ...
Wenqi Wang   +3 more
doaj   +1 more source

An interactive style of the testing database production for EIS

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2006
Using a progressive Information Technology for development of Software Modules for Enterprise Information Systems brings a lot of practical and theoretical problems.
Milan Mišovič, Ivana Rábová
doaj   +1 more source

An N-List-Based Approach for Mining Frequent Inter-Transaction Patterns

open access: yesIEEE Access, 2020
Mining frequent inter-transaction patterns (ITPs) from large databases is both useful and of interest. Since frequent inter-transaction patterns (FITPs) are discovered across transactions in a transaction database (TD), the number of patterns is very ...
Thanh-Ngo Nguyen   +4 more
doaj   +1 more source

Protocols for Integrity Constraint Checking in Federated Databases [PDF]

open access: yes, 1996
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints can be very useful in federated databases, but the lack of global queries ...
Grefen, Paul, Widom, Jennifer
core   +3 more sources

The Complexity of the Data Retrieval Process Using the Proposed Index Extension

open access: yesIEEE Access, 2022
Data retrieval, access, and tuple identification are inevitable in database processing, ensuring performance. The entities and relationships form a relational database.
Michal Kvet, Jozef Papan
doaj   +1 more source

Machine learning approach to detect intruders in database based on hexplet data structure

open access: yesJournal of Electrical Systems and Information Technology, 2016
Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders.
Saad M. Darwish
doaj   +1 more source

EXPLORING THE EXPEDIENCY OF BLOCKCHAIN-BASED SOLUTIONS: REVIEW AND CHALLENGES

open access: yesApplied Computer Science
A distributed type of database where digital data is stored as blocks chained together is called a Blockchain. Each block consists of several transactions, authenticated using cryptographic keys, and approved by a group of validators.
Francisco Javier MORENO ARBOLEDA   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy