Results 191 to 200 of about 7,062 (219)
Some of the next articles are maybe not open access.
DICOM data storage and retrieval with MongoDB
Medical Imaging, 2022We have created a database for the storage of DICOM data using MongoDB. Data is stored in chunks using gridfs and accessible via queries on any field of the DICOM header, as well as other pre-defined metadata fields.
W. Gohn +4 more
semanticscholar +1 more source
MongoDB integration with Python and Node.js, Express.js
2024 Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)This scholarly article presents a detailed examination of the seamless integration of MongoDB, a well-established NoSQL database, with two widely used programming languages—Python and Node.js.
Avss Somasundar +5 more
semanticscholar +1 more source
Design of MongoDB based Website for E-Commerce Applications
2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI)The popularity of online shopping is expanding quickly, which has boosted need for reliable and effective e-commerce systems. This work seeks to create an e-commerce website in response to this need utilizing the MERN (MongoDB, Ex-press.js, React.js ...
Mamta B. Savadatti +5 more
semanticscholar +1 more source
Comparative Study Between the MySQL Relational Database and the MongoDB NoSQL Database
International Journal of Software Science and Computational Intelligence, 2021NoSQL databases are new architectures developed to remedy the various weaknesses that have affected relational databases in highly distributed systems such as cloud computing, social networks, electronic commerce.
Houcine Matallah +2 more
semanticscholar +1 more source
PERANCANGAN APLIKASI WEB MANAJEMEN DATA PRODUK BISNIS PERHIASAN BERBASIS FLASK DAN MONGODB
IT-Explore: Jurnal Penerapan Teknologi Informasi dan KomunikasiPenelitian ini bertujuan untuk merancang aplikasi web manajemen data produk berbasis Flask dan MongoDB untuk studi kasus usaha yang bergerak dalam bisnis perhiasan.
Usman Syach, Sri Winarso Martyas Edi
semanticscholar +1 more source
2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI), 2021
Big Data is an ensemble of technologies founded on NoSQL databases that enable scalability of volumes, numbers, and data types. NoSQL databases assert that their performance is better than legacy relational database systems for higher workloads ...
Nadia Ben Seghier, O. Kazar
semanticscholar +1 more source
Big Data is an ensemble of technologies founded on NoSQL databases that enable scalability of volumes, numbers, and data types. NoSQL databases assert that their performance is better than legacy relational database systems for higher workloads ...
Nadia Ben Seghier, O. Kazar
semanticscholar +1 more source
Next-Gen Database Queries: AI-Driven Natural Language Interface for MongoDB
International Journal for Research in Applied Science and Engineering TechnologyThis paper present an novel concept to query MongoDB database using NLP and Large Language Model (LLM). It is called LLM Based MongoDB Querying System through which users can search in MongoDB databases just by using simple words of English language ...
Arpan Shaileshbhai Korat
semanticscholar +1 more source
SMEAGOL: A Static Code Smell Detector for MongoDB
IEEE International Conference on Software Analysis, Evolution, and ReengineeringMongoDB is one of the most popular NoSQL database engines. To foster scalability, it provides multiple features such as schemaless data storage or sharding. However, those new features introduce additional considerations for the maintainer to be careful,
Boris Cherry +3 more
semanticscholar +1 more source
Comprehensive C2 Analysis and Anomaly Detection in HTTP Traffic: A MongoDB-Based Approach
2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)In the evolving cybersecurity landscape, targeted attacks by sophisticated adversaries pose a significant challenge. These attackers aim to steal high-level employees’ system privileges, enabling unauthorized access to crucial information.
H. Pranav, E. Suryaa, Manju Venugopalan
semanticscholar +1 more source

