Results 41 to 50 of about 177,998 (264)

Comparison of MySQL, MSSQL, PostgreSQL, Oracle databases performance, including virtualization

open access: yesJournal of Computer Sciences Institute, 2020
Oracle, MSSQL, MySQL and PostgreSQL are four of the most popular relational databases. They are often used in internet applications. This paper aims to compare the efficiency of these technologies in terms of speed using virtualization with Docker.
Wojciech Truskowski   +2 more
doaj   +1 more source

Digitizing collections to unlock the full potential of palynology: A case study with the Smithsonian palynology collection

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Large palynological collections have been built over decades and contain vital information. However, they are often difficult to access and use effectively. What is the point of having such collections if they are not fully utilizable? To solve this problem, we digitized the Smithsonian palynological collection using both light and confocal microscopy.
Carlos Jaramillo   +37 more
wiley   +1 more source

A Backend Framework for the Efficient Management of Power System Measurements [PDF]

open access: yes, 2016
Increased adoption and deployment of phasor measurement units (PMU) has provided valuable fine-grained data over the grid. Analysis over these data can provide insight into the health of the grid, thereby improving control over operations. Realizing this
Bass, Robert   +5 more
core   +3 more sources

AAKD: A standardized and comprehensive acupuncture anesthesia knowledge platform for enhanced recovery after surgery and mechanism

open access: yesVIEW, EarlyView.
Acupuncture anesthesia (AA) is an application of acupuncture innovation in surgical operations, combined with anesthetic techniques, and is a model of integrated Chinese and Western medicine. We proposed the Acupuncture Anesthesia Knowledge Database (AAKD), in which all data have been meticulously curated by field experts and assessed by a multi ...
Ying Wang   +11 more
wiley   +1 more source

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

Aplikasi Pengumpulan Data Survei Memanfaatkan SMS Gateway

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2016
Application for collecting survey data utilizing SMS technology is used to facilitate the process of survey and data processing. Surveyor can simply send the data via SMS and the results are immediately processed in the server, then displayed via ...
Andrew B. Osmond   +2 more
doaj   +1 more source

Prediction and classification for GPCR sequences based on ligand specific features [PDF]

open access: yes, 2006
Functional identification of G-Protein Coupled Receptors (GPCRs) is one of the current focus areas of pharmaceutical research. Although thousands of GPCR sequences are known, many of them are orphan sequences (the activating ligand is unknown). Therefore,
F. Horn   +8 more
core   +1 more source

Plant organelle C‐to‐U RNA editing factors can operate successfully in yeast (Saccharomyces cerevisiae) as an easily amenable eukaryotic system for their functional analysis

open access: yesThe FEBS Journal, EarlyView.
Plant‐type pentatricopeptide repeat proteins capable of C‐to‐U RNA editing perform faithfully when expressed in a new heterologous system, the yeast Saccharomyces cerevisiae. They were tested with constitutive and inducible expression and with a set of different solubility tags. PPR56, PPR65, and PPR78 from P.
Shyam Ramanathan   +4 more
wiley   +1 more source

Framework Of Information System Of IT Service Desk Using UML (Unified Modelling Language) Technique - Study Case In Republic Of Indonesia State Civil Service Agency

open access: yesJournal of Technology Informatics and Engineering
At Republic of Indonesia State Civil Service Agency in carrying out work, it is often found that problems both software and hardware are installed in the computer and must be resolved immediately.
Melyani Melyani   +6 more
doaj   +1 more source

PURR - The Persistent URL Resource Resolver [PDF]

open access: yes, 2001
URLs have a precarious functional lifespan. They resolve the intended target (web page, PDF, audio stream, and so on) only so long as the target is available, otherwise they'll point to a dead end.
Sponsler, Ed
core  

Home - About - Disclaimer - Privacy