Results for 'SQL '

11 found
Order:
  1. A Comparison of SQL and NO-SQL Database Management Systems for Unstructured Data.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 13 (7):2086-2093.
    The purpose of this work is to compare the ways in which relational databases—more especially, Microsoft SQL Server—and non-relational databases—MongoDB—handle unstructured data in JSON format. Although a lot of study has been done comparing different database management systems in terms of security, performance, and other aspects, little is known about how these databases are evaluated according to the type of data they handle. The main goal of this study is to examine the various features that relational and non-relational databases provide (...)
    Download  
     
    Export citation  
     
    Bookmark   62 citations  
  2. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  81
    Real-Time Procurement Data Portal: A Well as Vender Payment Data Portal.Lakkam Nikhith - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-16.
    In the contemporary landscape of public procurement, organizations face increasing complexities in managing procurement and vendor payment processes. This project focuses on developing a real-time procurement and vendor payment management system for North Eastern Electric Power Corporation Limited (NEEPCO), leveraging modern web technologies, including React, Node.js, Express, and SQL. The proposed system aims to centralize and automate the procurement lifecycle, enhancing operational efficiency, transparency, and compliance with government regulations. By integrating with the Government e-Marketplace (GeM), the system facilitates seamless procurement (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Fuzzy and more. Implementing a logic calculator for comparing philosophical theories of vagueness using Structured Query Language. Part 1.Marian Călborean - manuscript
    I aim to develop a tool for comparing theories of vagueness, using Structured Query Language. Relevant SQL snippets will be used throughout.
    Download  
     
    Export citation  
     
    Bookmark  
  5. Serverless Information System.Miro Brada - 2013 - Each.Co.Uk.
    In 2013, I've transformed the each_co_uk server side system (aspx / c#) to the client system of a few javascript files ≈400KB potentially webassembly, without plugins / 3rd party / css.. The system maximally reuses functions & data to apply: 1) Linguistic principle of arbitrariness of the sign maximizing repetitions, 2) Multi layer logic of the chess composition, 3) Information Theory minimizing entropy. Some of these ideas were presented at conferences in Santorini, Adelaide, Geneva, Daejon and virtually. Philosophically, any system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  73
    Trending Web Development_ Stacks Performance Analyser (11th edition).Dr Pooja Khanna Atishay Jain, - 2024 - International Journal of Advanced Research in Arts, Science, Engineering and Management 11 (3):5920-5925. Translated by Atishay Jain.
    Web applications are increasing day by day and the choice of technology for building a web application is a tedious task. A good website needs to be scalable, functional, responsive, reliable, secure etc. Therefore, comparing the different trending technologies for web design is crucial. The entire design of our website requires the selection of the programming languages. It is difficult to give a quick solution to this issue without first considering what our website will do both now and in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  77
    AI-Augmented Data Lineage: A Cognitive GraphBased Framework for Autonomous Data Traceability in Large Ecosystems.Pulicharla Dr Mohan Raja - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (1):377-387.
    In the era of big data and distributed ecosystems, understanding the origin, flow, and transformation of data across complex infrastructures is critical for ensuring transparency, accountability, and informed decision-making. As data-driven enterprises increasingly rely on hybrid cloud architectures, data lakes, and real-time pipelines, the complexity of tracking data movement and transformations grows exponentially. Traditional data lineage solutions, often based on static metadata extraction or rule-based approaches, are insufficient in dynamically evolving environments and fail to provide granular, context-aware insights. This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. ITS for Data Manipulation Language (DML) Commands Using SQLite.Mahmoud Jamal Abu Ghali & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):57-92.
    In many areas, technology has facilitated many things, diagnosing diseases, regulating traffic and teaching students in schools rely on Intelligent systems to name a few. At present, traditional classroom-based education is no longer the most appropriate in schools. From here, the idea of intelligent e-learning for students to increase their culture and keep them updated in life began. E-learning has become an ideal solution, relying on artificial intelligence, which has a footprint in this through the development of systems based on (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. ADO-Tutor: Intelligent Tutoring System for leaning ADO.NET.Ibrahim A. El Haddad & Samy S. Abu Naser - 2017 - European Academic Research 4 (10).
    This paper describes an Intelligent Tutoring System for helping users with ADO.NET called ADO-Tutor. The Intelligent Tutoring System was designed and developed using (ITSB) authoring tool for building intelligent educational systems. The user learns through the intelligent tutoring system ADO.NET, the technology used by Microsoft.NET to connect to databases. The material includes lessons, examples, and questions. Through the feedback provided by the intelligent tutoring system, the user's understanding of the material is assessed, and accordingly can be guided to different difficulty (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  11. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations