Results for 'SQL Server'

90 found
Order:
  1. A Comparison of SQL and NO-SQL Database Management Systems for Unstructured Data.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 13 (7):2086-2093.
    The purpose of this work is to compare the ways in which relational databases—more especially, Microsoft SQL Server—and non-relational databases—MongoDB—handle unstructured data in JSON format. Although a lot of study has been done comparing different database management systems in terms of security, performance, and other aspects, little is known about how these databases are evaluated according to the type of data they handle. The main goal of this study is to examine the various features that relational and non-relational databases (...)
    Download  
     
    Export citation  
     
    Bookmark   62 citations  
  2. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. ADO-Tutor: Intelligent Tutoring System for leaning ADO.NET.Ibrahim A. El Haddad & Samy S. Abu Naser - 2017 - European Academic Research 4 (10).
    This paper describes an Intelligent Tutoring System for helping users with ADO.NET called ADO-Tutor. The Intelligent Tutoring System was designed and developed using (ITSB) authoring tool for building intelligent educational systems. The user learns through the intelligent tutoring system ADO.NET, the technology used by Microsoft.NET to connect to databases. The material includes lessons, examples, and questions. Through the feedback provided by the intelligent tutoring system, the user's understanding of the material is assessed, and accordingly can be guided to different difficulty (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  4. Serverless Information System.Miro Brada - 2013 - Each.Co.Uk.
    In 2013, I've transformed the each_co_uk server side system (aspx / c#) to the client system of a few javascript files ≈400KB potentially webassembly, without plugins / 3rd party / css.. The system maximally reuses functions & data to apply: 1) Linguistic principle of arbitrariness of the sign maximizing repetitions, 2) Multi layer logic of the chess composition, 3) Information Theory minimizing entropy. Some of these ideas were presented at conferences in Santorini, Adelaide, Geneva, Daejon and virtually. Philosophically, any (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. EXPLORING SERVER-LESS COMPUTING FOR EFFICIENT RESOURCE MANAGEMENT IN CLOUD ARCHITECTURES.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):77-83.
    Server-less computing, also known as Function as a Service (FaaS), revolutionizes cloud architecture by allowing developers to focus on code and functionality without managing underlying infrastructure. This paradigm enhances resource management efficiency by dynamically allocating resources only when needed, thus optimizing cost and performance. Server-less models, epitomized by platforms like AWS Lambda, Google Cloud Functions, and Azure Functions, provide automatic scaling and fine-grained billing, making them ideal for applications with variable workloads. While challenges such as cold start latency (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  6.  17
    ANALYSIS OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS INTENDED FOR UNSTRUCTURED DATA.Tambi Varun Kumar - 2015 - International Journal of Current Engineering and Scientific Research (IJCESR) 2 (3):99-113.
    With the exponential growth of digital content, unstructured data has become a dominant force in today's data landscape, accounting for nearly 80% of enterprise information. Traditional relational database management systems (RDBMS), governed by rigid schemas and ACID compliance, were not originally designed to handle the dynamic and heterogeneous nature of unstructured data such as images, videos, logs, emails, and social media feeds. In contrast, NoSQL databases have emerged as a viable alternative, offering flexible schema designs, high scalability, and optimized performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  35
    Strengthened File Auditing Framework for Cloud Servers with Secure Download Key Notifications.DrS. Subha Shree Ajinthan S., Arun Bharathi N., Vel Kumar K. - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (4):3328-3333.
    Securing sensitive files stored on cloud servers presents a paramount challenge in today's digital landscape, demanding a robust file auditing mechanism that transcends traditional methods. This paper introduces an innovative approach to file auditing in cloud environments, distinguished by the integration of secure download key notifications with login processes. Unlike conventional file auditing techniques that primarily focus on monitoring file activities, this proposed solution recognizes the critical need for securely tracking file downloads. To address this gap, we present a sophisticated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. A feminist server stack: co-designing feminist web servers to reimagine Internet futures.Nancy Mauro-Flude - 2022 - CoDesign 18 (1):48-62.
    In this article, we reimagine the Internet as a feminist cosmos called a Feminist Server Stack. By scrutinising how webserver infrastructure is normalised based on imperial conventions and distorted knowledge systems, we suggest alternatives. This embrace of ‘post-patriarchal futures’ (Bardzel 2019, 20) offers counter perspectives on how we may holistically embody the Internet as a situated ecology. When experiencing the Internet materiality, it leads us to imagine beyond the known and possible. We focus on enchanting affirmations and tacit hands-on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  74
    Efficient Enumeration of URLs of Active Hidden Servers over Anonymous Channel.S. Cherishma Sree - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-14.
    This project presents an innovative approach to the efficient enumeration of hidden service URLs (.onion) on the TOR network using a custom-built graphical user interface (GUI) application. The tool leverages web scraping techniques, targeting the Ahmia search engine, to retrieve and analyze active hidden server URLs. Through the integration of Python’s Tkinter library for GUI development and the use of requests and regular expressions for content mining, the application simplifies the process of discovering and visualizing .onion URLs. The tool (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  68
    Cybersecurity Portal for Effective Management of Servers and Firewall.G. Balram, - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (7):1-15.
    Existing systems often lack a centralized platform for managing server and firewall operations, leading to fragmented oversight and delayed responses to cyber threats. This gap frequently results in increased vulnerabilities and operational inefficiencies within organizations. To address this issue, we propose the development of the Cybersecurity Portal, designed to provide real-time monitoring, predictive analytics, and streamlined resource allocation for server and firewall management. The portal will offer comprehensive insights into system performance, potential vulnerabilities, and proactive threat detection. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Real-Time Procurement Data Portal: A Well as Vender Payment Data Portal.Lakkam Nikhith - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-16.
    In the contemporary landscape of public procurement, organizations face increasing complexities in managing procurement and vendor payment processes. This project focuses on developing a real-time procurement and vendor payment management system for North Eastern Electric Power Corporation Limited (NEEPCO), leveraging modern web technologies, including React, Node.js, Express, and SQL. The proposed system aims to centralize and automate the procurement lifecycle, enhancing operational efficiency, transparency, and compliance with government regulations. By integrating with the Government e-Marketplace (GeM), the system facilitates seamless procurement (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  23
    End - to - End Deep Learning for Detecting Web Attacks.ChRam Reddy DrK. Upendra Babu, C. Gnanendra, ChHruthik, C. Vivek Vardhan - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9380-9387.
    Web attacks, such as SQL injection, cross-site scripting (XSS), and distributed denial-ofservice (DDoS), pose significant threats to the security and integrity of online systems. Traditional detection methods, relying on rulebased systems or shallow machine learning, often struggle to keep pace with the evolving sophistication of these attacks. This paper proposes an end-to-end deep learning framework for detecting web attacks, leveraging the power of neural networks to automatically learn complex patterns and features from raw web traffic data. Unlike conventional approaches that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. On Testing the Simulation Theory.Tom Campbell, Houman Owhadi, Joe Savageau & David Watkinson - manuscript
    Can the theory that reality is a simulation be tested? We investigate this question based on the assumption that if the system performing the simulation is nite (i.e. has limited resources), then to achieve low computational complexity, such a system would, as in a video game, render content (reality) only at the moment that information becomes available for observation by a player and not at the moment of detection by a machine (that would be part of the simulation and whose (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  14. Fuzzy and more. Implementing a logic calculator for comparing philosophical theories of vagueness using Structured Query Language. Part 1.Marian Călborean - manuscript
    I aim to develop a tool for comparing theories of vagueness, using Structured Query Language. Relevant SQL snippets will be used throughout.
    Download  
     
    Export citation  
     
    Bookmark  
  15.  35
    Protecting the Hadoop Cluster on the Basis of Big Data Security.Pamarthi Kartheek - 2023 - Journal of Artificial Intelligence, Machine Learning and Data Science 1 (3):831-837.
    Gathering and analyzing enormous volumes of data is known as "big data," and it includes information from users, sensors, healthcare providers, and companies. Using the Hadoop framework, large amounts of data are stored, managed, and dispersed across multiple server nodes. Big Data issues, including security holes in the Hadoop Distributed File System (HDFS), the architecture's core layer, are highlighted in this article. The methodology includes setting up a Hadoop environment, integrating Kerberos for authentication, enabling HDFS encryption zones, implementing SSL/TLS (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  16.  89
    Trending Web Development_ Stacks Performance Analyser (11th edition).Dr Pooja Khanna Atishay Jain, - 2024 - International Journal of Advanced Research in Arts, Science, Engineering and Management 11 (3):5920-5925. Translated by Atishay Jain.
    Web applications are increasing day by day and the choice of technology for building a web application is a tedious task. A good website needs to be scalable, functional, responsive, reliable, secure etc. Therefore, comparing the different trending technologies for web design is crucial. The entire design of our website requires the selection of the programming languages. It is difficult to give a quick solution to this issue without first considering what our website will do both now and in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. AI-Augmented Data Lineage: A Cognitive GraphBased Framework for Autonomous Data Traceability in Large Ecosystems.Pulicharla Dr Mohan Raja - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (1):377-387.
    In the era of big data and distributed ecosystems, understanding the origin, flow, and transformation of data across complex infrastructures is critical for ensuring transparency, accountability, and informed decision-making. As data-driven enterprises increasingly rely on hybrid cloud architectures, data lakes, and real-time pipelines, the complexity of tracking data movement and transformations grows exponentially. Traditional data lineage solutions, often based on static metadata extraction or rule-based approaches, are insufficient in dynamically evolving environments and fail to provide granular, context-aware insights. This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Moral uncertainty and human embryo experimentation.Graham Oddie - 1994 - In K. W. M. Fulford, Grant Gillett & Janet Martin Soskice, Medicine and Moral Reasoning. New York: Cambridge University Press. pp. 3--144.
    Moral dilemmas can arise from uncertainty, including uncertainty of the real values involved. One interesting example of this is that of experimentation on human embryos and foetuses, If these have a moral stauts similar to that of human persons then there will be server constraitns on what may be done to them. If embryous have a moral status similar to that of other small clusters of cells, then constraints will be motivated largely by consideration for the persons into whom (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  19.  14
    GenAI-Powered Automated Data Analytics and Visualization.M. Sridevi K. Vanitha Mani, S. Jeyasudha, D. C. Kavya Nandhini, , G. P. Kiruthiga - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The Automated Data Analytics System leverages Generative AI, specifically OpenAI’s GPT-4, to empower non-technical users to interact with enterprise data through natural language queries. Seamlessly integrated with a Snowflake data warehouse and built on a Streamlit-based user interface, the tool automatically translates user input into SQL queries, executes them, and delivers structured insights along with dynamic visualizations. This eliminates the need for manual SQL writing and custom development, significantly lowering the technical barriers traditionally associated with data analysis. The intuitive interface (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Spotify Status Dataset.Mohammad Ayman Mattar & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):14-21.
    Abstract: The Spotify Status Dataset is a valuable resource that provides real-time insights into the operational status and performance of Spotify, a popular music streaming platform. This dataset contains a wide array of information related to server uptime, user activity, service disruptions, and more, serving as a critical tool for both Spotify's internal monitoring and the broader data analysis community. As digital services like Spotify continue to play a central role in music consumption, understanding the platform's status becomes crucial (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  23
    Evaluation for Vulnerability Scanning in Web Applications.Atharva Kharate Prof Smita Chunamari - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4):9460-9467.
    As the internet continues to evolve, the security of web applications has become a paramount concerns for businesses and individuals alike. The ”Website Vulnerability Scanner” project is designed to address this challenge by developing a comprehensive tool that automat-can detect, analyze, and report potential security vulnerabilities on websites. This scanner focuses on identifying a wide range of common web application vulnerabilities, including but not limited to SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), broken authentication, insecure file uploads, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Without a Trace: Why did Corona Apps Fail?Lucie White & Philippe van Basshuysen - 2021 - Journal of Medical Ethics 47 (12):1-4.
    At the beginning of the COVID-19 pandemic, high hopes were put on digital contact tracing, using mobile phone apps to record and immediately notify contacts when a user reports as infected. Such apps can now be downloaded in many countries, but as second waves of COVID-19 are raging, these apps are playing a less important role than anticipated. We argue that this is because most countries have opted for app configurations that cannot provide a means of rapidly informing users of (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  24. Personality Model.Miro Brada - 2000 - Problem Paradise:42-43.
    In 1995, as a student of psychology inspired by natural science, I defined a logical model of personality explaining psychosis. I created (for my MA thesis, 1998 and grant research, 1999) new kind of tests assessing intelligence, creativity, prejudices, expectations to show more exact methods in psychology. During my Phd study in economics, I developed 'Maximization of Uniqueness (Originality)' model enhancing the classic utility to explain irrational motivations linking economics and psychology. Later I became computer programmer developing functional programming. According (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  16
    An Interactive E-Learning Platform.Prof . V. V. Kumbhar Snehal Kumbhar, Rohini Nigave, Sayali Patil, Tanvi Patil - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9511-9515.
    This project is a robust online education platform designed to streamline learning and teaching experiences. It integrates features for course management, user authentication, and interactive learning. Core functionalities include user registration, tutor and student profile management, course search and enrollment, video content streaming, and interactive elements like bookmarks, comments, and likes to enhance user engagement. The backend, powered by PHP, ensures dynamic content delivery, while the frontend employs CSS and JavaScript for a user-friendly interface. The database, structured using SQL, efficiently (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  22
    Enhancing Public Safety and Communication through a Web-Based Platform: A Case Study on the Chandrapur Police Website.Prof Maheen Yousufuddin Quazi Vinay Dinesh Rautulwar, Kritik Harichandra Bhoyar, Mohammad Waris Irfan Ali, Siddiqui, Abhishek Sadanand Bandewar, Rahul Ajay Yadav, Khan Wasif Javed - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4):9532-9539.
    The Chandrapur Police Website is a secure, web-based platform aimed at improving communication between the public and law enforcement in Chandrapur, Maharashtra. It provides essential services like online crime reporting, safety tips, emergency contacts, missing persons updates, and real-time alerts.Built with PHP, MySQL, HTML, CSS, JavaScript, and AJAX, the system supports officer management, complaint tracking, and live updates. Security is ensured through input validation, secure authentication, session management, and CSRF protection, safeguarding sensitive data from threats like SQL injection and unauthorized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  55
    Design and Implementation of an IoT-Based Real-Time Disaster Detection and Alert System.R. Radhika - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-14.
    Natural disasters such as earthquakes, floods, wildfires, and landslides pose significant threats to human life, property, and infrastructure. Early detection and timely response are critical in minimizing the damage caused by such events. This paper presents the design and implementation of an IoT-based real-time disaster detection and alert system that leverages a network of low-cost sensors, microcontrollers, and cloud connectivity to monitor environmental parameters and detect potential disasters. The proposed system integrates various IoT sensors— including temperature, humidity, water level, gas, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  8
    Full-Stack Expence Management Syatem.Dipali Khairnar Saee Barve, Shubham More, Abhijit Panickar, Harsh Pinjan - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    In today’s digital era, effective financial management is paramount for both individuals and businesses to ensure financial stability, informed decision-making, and long-term growth. The Expense Tracker project is designed as a comprehensive solution to streamline the process of tracking, managing, and analyzing expenditures. This system provides users with a structured, automated, and user-friendly platform to monitor their financial activities efficiently. By allowing users to record transactions, categorize expenses, set budgetary limits, and generate insightful spending reports, the application empowers them to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The extent of online platforms utilization for scholarly research dissemination: A survey of academic staff in African Universities.Valentine Joseph Owan, Michael Ekpenyong Asuquo, Eno Etudor-Eyo & Violet Makuku - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 5585.
    An assessment of the extent of the use of electronic platforms by African academic staff in universities to disseminate research was done in this study. The study is informed by the growing importance of online repositories and preprint servers in the scientific communication of scholarly output, especially in an era where the use of metrics for research appraisals and funding decisions is commonly practised. The quantitative research method was adopted, based on the descriptive survey research design. The snowball sampling technique (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  88
    Geo-Tagging of Plantation in The Catchment Area of Hydro Project.G. Prabhakar Raju - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-13.
    This project centers on developing a geo-tagging and monitoring system for plantations within the catchment area of a hydro project. Designed for the forest department, it provides real-time insights into environmental conditions to support the sustainable management of forest resources. The system comprises an Arduino Uno microcontroller that integrates GPS, DHT11 (temperature and humidity sensor), and LoRa modules to track and communicate critical data, such as the geographic location, temperature, and humidity around each plantation site. Powered by a 7.4V Li-ion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  47
    Energy Efficient Resource Utilization in Cloud.Profb. R. Devhare Prajwal Sonawane, Shubham Raj, Shriram Bade, Pranav Swami - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (2):871-882.
    The advent of cloud computing has revolutionized the way organizations manage and deploy their IT infrastructure. Cloud services offer flexibility, scalability, and cost-efficiency, but they also consume a substantial amount of energy and contribute to environmental concerns. This abstract provides an overview of the research conducted on energy-efficient resource utilization in the cloud, focusing on strategies to reduce energy consumption while maintaining optimal performance and resource utilization. The primary objective of this research is to address the growing concern of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  86
    Analysis and Identification of Malicious Applications.Mr Kamalakar - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-12.
    The "Malware App Detection System" project enhances mobile security by detecting malicious apps through machine learning (ML) analysis of app behaviours. It examines behaviours like system calls (requests apps make to the operating system), permissions (levels of access apps have), and network connections (internet interactions). This focus on behaviour, rather than relying on specific malware signatures, enables the system to identify both known and new threats. The detection system is built using a dataset of both benign (harmless) and malicious apps, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Eriugena and alKindi, 9th Century Protagonists of pro-Scientific Cultural Change.Alfred Gierer - 1999 - Abridged English translation of: Acta Historica Leopoldina 29.
    Ancient Greek philosophers were the first to postulate the possibility of explaining nature in theoretical terms and to initiate attempts at this. With the rise of monotheistic religions of revelation claiming supremacy over human reason and envisaging a new world to come, studies of the natural order of the transient world were widely considered undesirable. Later, in the Middle Ages, the desire for human understanding of nature in terms of reason was revived. This article is concerned with the fundamental reversal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  40
    Federated Learning: An Intrusion Detection Privacy Preserving Approach to Decentralized AI Model Training for IOT Security.Mittal Mohit - 2018 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 7 (1):1-8.
    There are various aspects to Internet of Things security, such as guaranteeing the safety of both the devices and the Internet of Things networks to which they connect. Many other types of equipment, including industrial robots, smart grids, construction automation systems, entertainment gadgets, and many more, are included in this, despite the fact that they were not designed with network security in mind. When it comes to securing systems, networks, and data, IoT device security must be able to resist a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  78
    Вибір операційної системи для створення інформаційних ресурсів.Юрій Ткачов - 2023 - Svìt Naukovih Doslìdženʹ 17:81-85.
    The rapid digitalization of various societal sectors in Ukraine, including public services, banking, e-learning, and logistics, emphasizes the need for enhanced practical IT competencies among students. Despite the widespread availability of digital devices, educational curricula often lack tasks that provide hands-on experience with configuring networks and operating systems. This study aimed to address this gap by updating the curriculum of the "Information Processes and Methods of Their Algorithmization" course to focus on practical tasks that involve creating and configuring information resources. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  71
    Enhancing Logging Mechanisms in the Education Portal.Bala Krishna G. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-12.
    This paper has been designed to develop the user-friendly server log management and monitoring system for the educational portal in an endeavor to enhance its capabilities. Server log management assumes a primary role in the current digital world in the maintenance of the health of the system, in the diagnosis of problems, and in ensuring that accountability is maintained. Current practice in log management is usually disjointed and does not have advanced mechanisms capable of handling the complexities of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  97
    Understanding the Impact of Current Trends, Challenges, and Technological Advances on Scholarly Publications.Yusuf Muhammed Durna, Mustafa Said Tekin & İlhan Bahşi - 2024 - Journal of Craniofacial Surgery 35 (7):2200-2201.
    To the Editor: In the rapidly changing world of scientific publication, the new system is complex, and there are many changes.1 Many variables, such as current trends, challenges, and technological developments, lead to various changes in the processes or contents of scientific publications. Understanding these changes is crucial for academic productivity. In contrast, some of these changes may have positive effects, while others may have negative effects. -/- In this context, in this letter, we wanted to emphasize the need to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  58
    Virtual Machine for Big _Data in Cloud Computing (13th edition).Banupriya I. Manivannan B., - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):18380-18386. Translated by Manivannan B.
    Cloud computing has revolutionized data management for businesses and individuals a like, ushering in an era of unprecedented accessibility and scalability. As demand for cloud services continues to surge, the imperative for efficient and secure systems becomes paramount. One approach to meeting this challenge is the consolidation of virtual machines onto fewer physical servers, optimizing resource utilization and yielding significant energy savings. Moreover, this consolidation strategy bolsters overall security by enabling more effective monitoring and control of virtual machine instances. Through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  55
    The Different Way of Utilizing the Intellectual of Artificial Intelligence in the Animal Farming Field Progress of AI.K. Krishna Kumar Deepak Kumar, Laith H. Alzubaidi, Awadhesh Chandramauli, Raheem Unissa, Saloni Bansal - 2024 - International Conference on Advance Computing and Innovative Technologies in Engineering 4 (1):1624-1626.
    The goal of this project is to create a prototype smart farm using Internet of Things (IoT) technology. Developing an Internet of Things feeding control system and designing and implementing environmental monitoring and control systems for farm housing are the primary objectives. The development method uses open-source hardware and software and is conducted in pig farms in the Thai region of Nakhon Si Thammara. An ESP8266 Wi-Fi microcontroller is crucial to the system design, allowing several sensors to be connected to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  69
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks (14th edition).Sugumar R. - 2024 - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 14 (2):66-81.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better performances. These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  62
    Transforming Edge Computing With Machine Learning: Real-Time Analytics for IoT In.Priya U. Hari - 2024 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 11 (6):9367-9372.
    Edge computing, combined with machine learning (ML), is emerging as a transformative paradigm for handling the data deluge generated by the Internet of Things (IoT) devices. Traditional cloud computing is often inadequate for the low-latency, high-throughput demands of IoT applications, especially in real-time analytics. By processing data locally at the edge of the network, edge computing reduces latency, enhances privacy, and alleviates the bandwidth burden on centralized cloud servers. The integration of ML algorithms into edge devices further augments the decision-making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  27
    Advanced IoT-Based Automotive Accident Detection and Intimation System for Enhanced Emergency Response and Safety.P. Jeevitha - 2025 - Journal of Artificial Intelligence and Cyber Security (Jaics) 9 (1):1-7.
    Road traffic accidents are one of the leading causes of death and severe injury globally, primarily due to delayed emergency responses. The time immediately following a traumatic injury, known as the "golden hour," is critical for administering medical aid, significantly enhancing survival rates. To address the urgent need for rapid response mechanisms, this paper presents an advanced Internet of Things (IoT)-based Automotive Accident Detection and Intimation (ADI) system. The proposed system leverages a combination of embedded and connected smartphone sensors to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  76
    The Advancement of Cloud Computing: From Conventional IT Infrastructure to Serverless Computing (13th edition).Choudhary Anjali - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (1):119-126. Translated by Choudhary Anjali.
    At present, numerous innovations and technologies take place continuously. Serverless computing is a paradigm switch from conventional cloud computing. The term ‘serverless’ represents that the cloud developers do not interact with servers directly, whereas they use codes and logic to do so. This feature enhanced and extended the overall performance of the serverless platform. This paper presents a comparative study of both cloud environments from conventional to platform-independent or serverless computing. Apart from this, several key aspects such as definitions benefits, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  14
    Smart Health Monitoring System with Real-Time Vital Tracking and Predictive Diagnostics.Shinde V. P. Mangrule S. A., Jamdar S. P., HalamalliS. C., Dhale M. H. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4).
    With the rising global prevalence of cardiovascular diseases and the growing need for accessible healthcare solutions, there is a critical demand for systems that can provide both continuous monitoring and early diagnosis. This project presents a Smart Health Monitoring System with Real-Time Vital Tracking and Predictive Diagnostics, a comprehensive and intelligent health management platform that combines Internet of Things (IoT) technology with machine learning- based predictive analytics. The system integrates a heartbeat sensor and DS18B20 temperature sensor connected to an ESP32 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. A System of IoT Devices to Prevent UnderLoading/Overloading of Railway Wagons.G. Balram - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-13.
    Each wagon is equipped with sensors that continuously capture and transmit weight data to the central server via Node MCUs, enabling real-time analysis through the Blynk app. By monitoring the load conditions, the system ensures wagons remain within safe weight limits, preventing overloading, which can cause damage and safety hazards, or under-loading, which reduces operational efficiency. A key feature of the system is its use of machine learning algorithms to detect patterns and anomalies related to load distribution. When potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  25
    A Load Balancing Algorithm Designed for Data Centres to Enhance the Efficiency of Cloud Computing Tasks.Gullapalli Sravani Byravarapu Prashant - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):657-667.
    Despite the extensive research conducted in the field of Cloud Computing, challenges still persist regarding workload balancing in cloud-based applications, particularly within the Infrastructure as a Service (IaaS) model. Efficient task allocation is vital in cloud computing due to the limited availability of resources and virtual machines. IaaS is a model that manages the backend infrastructure, including servers, data centres, and virtual machines. Cloud Service Providers must ensure optimal service delivery performance in these models to prevent issues like host overload (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. MEMINTA CHATBASE UNTUK MEMPELAJARI TENTANG RETRAKSI AKADEMIK.Sari Ni Putu Wulan Purnama & Aisdl Team - unknown
    Pada percobaan kedua ini, kami memperbarui data untuk chatbot yang disediakan di [1] dengan mengunggah artikel baru [2] ke server Chatbase untuk pembelajaran. Kami masih ingin mengeksplorasi keterampilan pemahaman bacaan Chatbase serta kemampuannya dalam menyampaikan konten yang diringkas atau diekstraksi secara khusus dari artikel yang disediakan [2]. Selain itu, dalam perintah yang kami berikan kepada Chatbase mengenai konten [2], kami mencoba mempelajari apakah kecerdasan buatan dapat menghubungkan konten yang dibaca dengan prinsip-prinsip yang tecantum di [3-4]. Kami menyediakan percakapan rinci (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 90