Results 71 to 80 of about 7,062 (219)

Екстракція структурованих даних з Web-ресурсів

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2012
В статті запропоновано опис і обґрунтування програмного інструментарію на основі асинхронних можливостей платформи .NET та динамічної структури бази даних MongoDb для екстракції даних з Web-ресурсів в форматі HTML.
Світлана Ігорівна Шаповалова
doaj   +1 more source

Blockchain and NoSQL: Enhancing Throughput via a Deep Learning‐Based Hybrid Architecture

open access: yesInternet Technology Letters, Volume 8, Issue 4, July/August 2025.
ABSTRACT Any data structure used to store information can be considered a database. Blockchain technology, at its core, is no more than a ledger to store information about transactions. In recent years, such technology has gained immense popularity in a wide range of applications.
Longo Antonello   +4 more
wiley   +1 more source

RUNTIME PERFORMANCE BENCHMARKING FOR NOSQL DATABASES

open access: yesStudia Universitatis Babes-Bolyai: Series Informatica, 2019
An experimental study regarding the performance of NoSQL database management systems is presented in this paper. In this study, two NoSQL database management systems (MongoDB and Cassandra) were compared, and the following factors were considered ...
Camelia-Florina ANDOR, Bazil PÂRV
doaj   +1 more source

Structural biology at the National Synchrotron Light Source II

open access: yesJournal of Synchrotron Radiation, Volume 32, Issue 4, Page 873-883, July 2025.
We describe the structural biology resources available at the National Synchrotron Light Source II at Brookhaven National Laboratory and ponder the future for automated experiments, micro‐focusing crystallography and structure prediction to inform structural biology studies.The structural biology program at the National Synchrotron Light Source II ...
J. Aishima   +19 more
wiley   +1 more source

Toxic Discourse in the Digital Battlefield: Analysing Telegram Channels During the Russia–Ukraine ‘Conflict’

open access: yesExpert Systems, Volume 42, Issue 7, July 2025.
ABSTRACT Instant messenger Telegram has emerged as a favoured platform for far‐right activism, conspiracy theories, political propaganda, and misinformation, which has its own target audience. This study explores the application of multilingual pre‐trained language models to detect and measure toxicity in political content on Telegram channels.
Arsenii Tretiakov   +3 more
wiley   +1 more source

Performance Evaluation of IoT Data Management Using MongoDB Versus MySQL Databases in Different Cloud Environments

open access: yesIEEE Access, 2020
The Internet of Things (IoT) introduces a new challenge for Database Management Systems (DBMS). In IoT, large numbers of sensors are used in daily lives.
Mahmoud Moustafa Eyada   +3 more
doaj   +1 more source

A study of drag‐and‐drop query refinement and query history visualization for mobile exploratory search

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 6, Page 848-866, June 2025.
Abstract When undertaking complex search scenarios, the underlying information need cannot be satisfied by finding a single optimal resource; instead, searchers need to engage in exploratory search processes to find multiple resources by iteratively revising and reformulation their queries.
Mohammad Hasan Payandeh   +4 more
wiley   +1 more source

Machine Learning‐Powered Optimization of a CHO Cell Cultivation Process

open access: yesBiotechnology and Bioengineering, Volume 122, Issue 5, Page 1153-1164, May 2025.
This study investigated the use of a machine learning algorithm to optimize the cultivation of CHO cells used to produce therapeutic monoclonal antibodies. Richter and coworkers developed an artificial neural network that was trained on a very diverse dataset of historical and new cultivation data to find better cultivation conditions. After validation
Jannik Richter   +7 more
wiley   +1 more source

Implementing an Operational Cloud‐Based Now‐ and Forecasting System for Space Weather Ground Effects in the UK

open access: yesSpace Weather, Volume 23, Issue 5, May 2025.
Abstract The enhanced variation of the magnetic field during severe to extreme geomagnetic storms induces a large geoelectric field in the subsurface. Grounded infrastructure can be susceptible to geomagnetically induced currents (GICs) during these events.
C. D. Beggan   +12 more
wiley   +1 more source

An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks

open access: yesBig Data Mining and Analytics
The current large-scale Internet of Things (IoT) networks typically generate high-velocity network traffic streams. Attackers use IoT devices to create botnets and launch attacks, such as DDoS, Spamming, Cryptocurrency mining, Phishing, etc.
Selvam Saravanan   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy