Results 51 to 60 of about 82,951 (280)
Multi-Model Database Systems: The State of Affairs [PDF]
Nowadays, more and more organizations are coping with a very large volume of data in different formats and a very high growth rate. Under these conditions, relational databases are no longer sufficient for data management within these organizations, as ...
Gianina MIHAI
doaj
Information system to support the operation of the car park
Introduction/purpose: Information systems represent a set of people, data, processes and information technologies related to the purpose of data collection, processing, storage and their filtering into useful information needed for supporting ...
Nemanja D. Kaplanović
doaj +1 more source
INDEXES SELECTION FOR BLOCKS OF RELATED SQL QUERIES [PDF]
This paper discusses the problem of minimizing the response time for a given database workload by a proper choice of indexes. The main objective of our contribution is to illustrate the database queries as a group and search for good indexes for the ...
Radosław BOROŃSKI
doaj
Data Management: 25 Years of Forecasts
In October 2013, the eighth meeting of researchers in the field of databases was held. The first such meeting took place in February 1988, so that 25 years passed between them.
S. D. Kuznetsov
doaj +1 more source
This study follows the previous study entitled ‘Rough set-based rule generation and Apriori-based rule generation from table data sets: A survey and a combination’, and this is the second study on ‘Rough set-based rule generation and Apriori-based rule ...
Hiroshi Sakai, Zhiwen Jian
doaj +1 more source
Design and Implementation Web Site for UOT Using Mobile Devices [PDF]
A mobile phone allows its user to make and receive telephone calls to and from the public telephone network which includes other mobiles and fixed-line phones across the world.
Zahraa Abid AL-Huseen+3 more
doaj +1 more source
SQL Injection Attack: Quick View
SQL injection is a type of security vulnerability that occurs in database-driven web applications where an attacker injects malicious code into the application to gain unauthorized access to sensitive information.
V. Abdullayev, Dr. Alok Singh Chauhan
semanticscholar +1 more source
mRAT-SQL+GAP: A Portuguese Text-to-SQL Transformer [PDF]
The translation of natural language questions to SQL queries has attracted growing attention, in particular in connection with transformers and similar language models. A large number of techniques are geared towards the English language; in this work, we thus investigated translation to SQL when input questions are given in the Portuguese language. To
Marcelo Archanjo José+1 more
openaire +2 more sources
This paper examines the application of the CHASING M2 PRO MAX underwater robot for the creation of databases for the technical inspection of the underwater components of water transport vehicles and their infrastructure.
Justas Žaglinskis, Evelina Noreikaitė
doaj +1 more source
Survey of Just-in-Time Query Compilation Methods
Data processing systems have been traditionally optimized for I/O, mainly because, until pretty recently, disk storage has been the most affordable type of storage and the most prevalent one.
E. Y. Sharygin, R. A. Buchatskiy
doaj +1 more source