Results 61 to 70 of about 21,481 (199)
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
SQL OR NoSQL DATABASES? CRITICAL DIFFERENCES [PDF]
The recent years, marked by an unprecedented increase in the volume of data stored and managed, have simultaneously brought many problems and difficulties regarding the adequate management systems of very large databases, especially the traditional ...
ANA-GABRIELA BABUCEA
doaj
KVMod—A Novel Approach to Design Key-Value NoSQL Databases
The growth of structured, semi-structured, and unstructured data produced by the new applications is a result of the development and expansion of social networks, the Internet of Things, web technology, mobile devices, and other technologies. However, as
Ahmed Dourhri +2 more
doaj +1 more source
Which NoSQL Database? A Performance Overview [PDF]
NoSQL data stores are widely used to store and retrieve possibly large amounts of data, typically in a key-value format. There are many NoSQL types with different performances, and thus it is important to compare them in terms of performance and verify ...
Abramova, Veronika +2 more
core +1 more source
ABSTRACT Using survey research, we investigate accountants' self‐rated knowledge of a variety of digital technologies (DTs). We find that accountants' self‐rated knowledge of established DTs is almost in line with IES2 requirements, but their self‐rated knowledge of emerging DTs is significantly below IES2 requirements. Of greater concern, we find that
Richard Busulwa +3 more
wiley +1 more source
Automated Algorithm for Data Migration from Relational to NoSQL Databases
One of the barriers that the developer community face once turning to the newly, highly distributable, schema agnostic and non-relational database, called NoSQL, which is how to migrate their legacy relational database (which is already filled with a ...
Alza A. Mahmood
doaj +1 more source
Automatic Migration of Data to NoSQL Databases Using Service Oriented Architecture [PDF]
For the past few years there has been an exponential rise in the use of databases which are not true relational databases. There is no correct definition of such databases but can only be described with a set of common characteristics such absence of a ...
Koshy, Rohan
core
Carbon Catcher Design Report [PDF]
Overview. The design of the overall Carbon Catcher project can be separated into four distinct systems, each of which is assigned a specialized committee. The committee names and responsibilities are listed below: Air Mover The overall goal for the Air
Barbakh, Ahmad +5 more
core +1 more source
Android‐based application for empowering farmers with E‐commerce. ABSTRACT Agriculture faces critical challenges such as timely disease detection, fragmented market access, and limited use of real‐time technology in the field. To address these issues, we developed AgriSage, an Android‐based intelligent mobile application that integrates artificial ...
Shabeena Naveed +7 more
wiley +1 more source
Queryng data in NoSQL databases
The goal of this paper is to give an overview of fundamental concepts and types of NoSQL databases, to show some examples of database queries, some related research, and the implementation of those queries in an original practical example. The introduction is a brief representation and description of the NoSQL database.
Babić, Andrea +2 more
openaire +3 more sources

