Results (104)
Search Parameters:
Keyword: DatabaseModeling and Transformation from Temporal Object Relational Database into Mongodb: Rules
With such a big volume of data growing tremendously every day, and the storage of important volume of data becoming increasingly more flexible, NoSQL(Not only SQL or Non-Relational ) database are designed to store a large amount of information and are growing for big data systems in web analytics. It an approach does not require…
Read MoreMachine Learning Model to Identify the Optimum Database Query Execution Platform on GPU Assisted Database
With the current amount of data nowadays, the need for processing power has vastly grown. By relying on CPU processing power, current processing power is depending on the frequency and parallelism of the current CPU device. This means this method will lead to increased power consumption. Current research has shown that by utilize the power…
Read MoreTransfer Learning and Fine Tuning in Breast Mammogram Abnormalities Classification on CBIS-DDSM Database
Breast cancer has an important incidence in women mortality worldwide. Currently, mam- mography is considered the gold standard for breast abnormalities screening examinations, since it aids in the early detection and diagnosis of the illness. However, both identification of mass lesions and its malignancy classification is a challenging problem for artificial intelligence. In this work,…
Read MoreNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read MoreDesigning and Using a MySQL Database for Human Resource Management
In this paper, we would like to discuss the methods and ideologies used to create a database to be used for Human Resource purposes. Because we want this database to be accessible anywhere at any time, it is safe to conclude that an internet-based (web-based) database would work best, therefore we chose MySQL as the…
Read MoreRelational Databases Versus HBase: An Experimental Evaluation
Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…
Read MoreExperimental Investigation of Human Gait Recognition Database using Wearable Sensors
In this research human gait database is collected using different possible methods such as Wearable sensors, Smartphone and Cameras. For a gait recognition accelerometer data from wearable shimmer modules and smartphone are used. Data from different sensors location is compared to know which sensor location have better recognition rate. Different walking scenarios like slow, normal…
Read MoreA Relational Database Model and Tools for Environmental Sound Recognition
Environmental sound recognition (ESR) has become a hot topic in recent years. ESR is mainly based on machine learning (ML) and ML algorithms require first a training database. This database must comprise the sounds to be recognized and other related sounds. An ESR system needs the database during training, testing and in the production stage.…
Read MoreDesign of Cognitive Radio Database using Terrain Maps and Validated Propagation Models
Cognitive Radio (CR) encompasses a number of technologies which enable adaptive self-programing of systems at different levels to provide more effective use of the increasingly congested radio spectrum. CRs have potential to use spectrum allocated to TV services, which is not used by the primary user (TV), without causing disruptive interference to licensed users by…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreSpatial Distribution Patterns of the Royal Development Projects Initiated by King Rama 9th of Thailand
The study aimed to create a chronological overview of the royal development projects initiated by King Rama IX and to analyze their spatial distribution patterns. The research used a mixed-methods approach, combining quantitative and qualitative data collection methods such as obtaining data from relevant offices, internet research, and field observations. Data analysis involved descriptive statistics…
Read MoreDouble-Enhanced Convolutional Neural Network for Multi-Stage Classification of Alzheimer’s Disease
Being known as an irreversible neurodegenerative disease which has no cure to date, detection and classification of Alzheimer’s disease (AD) in its early stages is significant so that the deterioration process can be slowed down. Generally, AD can be classified into three major stages, ranging from the “normal control” stage with no symptoms shown, the…
Read MoreA Secure Medical History Card Powered by Blockchain Technology
A reliable healthcare system ensures that the population has access to top-notch medical ser- vices, ultimately enhancing their overall health most efficiently. At times, data are not secured or handled appropriately. Addressing these concerns, blockchain technology is projected to bring about a substantial revolution in the medical industry by assuring the confidentiality of electronic health…
Read MoreCondition Assessment of Medium Voltage Assets: A Review
Condition assessment of medium voltage assets is essential to ensure reliability and cost-effective operation of power distribution networks. This article presents a literature review of condition assessment of medium voltage assets related to a distribution system in a non-interconnected zone in Colombia, namely, power transformers, photovoltaic systems, switchgear, lines and cables, and instrument transformers. Advanced…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreForensic Analysis of “WhatsApp” Artifacts in Android without Root
WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve…
Read MoreIntermediation in Technology Transfer Processes in Agro-Industrial Innovation Systems: State of Art
Considering the importance of addressing innovation issues that impact the development of economic sectors, this document presents the research work aimed at establishing a state of the art related to technology transfer and intermediation issues, which can be adopted in the innovation systems. In this case, the agro-industrial innovation system is taken as a reference…
Read MoreProblems of Increasing the Intelligence of Algorithms for Optimal Distribution of the Current Load on the Combined Heat and Power Plant and Ways to Solve Them
The problem of optimal distribution of the current load of a combined heat and power plant with a complex composition of equipment is considered. A multi-criteria approach is proposed for parts of graphs with a constant load in time, considering the factors of economy, reliability and ecology. For sections of the graph with a time-variable…
Read MoreA Monthly Rainfall Forecasting from Sea Surface Temperature Spatial Pattern
The ocean surface temperatures or sea surface temperatures have a significant influence on local and global weather. The change in sea surface temperatures will lead to the change in rainfall patterns. In this paper, the long-term rainfall forecasting is developed for planning and decision making in water resource management. The similarity of sea surface temperature…
Read MoreAn Alternative Approach for Thai Automatic Speech Recognition Based on the CNN-based Keyword Spotting with Real-World Application
An automatic speech recognition (ASR) is a key technology for preventing an ongoing global coronavirus epidemic. Due to the limited corpus database and the morphological diversity of the Thai language, Thai speech recognition is still difficult. In this research, the automatic speech recognition model was built differently from the traditional Thai NLP systems by using…
Read MoreKamphaeng Saen Beef Cattle Identification Approach using Muzzle Print Image
Identification of Kamphaeng Saen beef cattle is important of the registration and traceability purposes. For a traditional identification methods, Hot Branding, Freeze Branding, Paint Branding, and RFID Systems can be replaced by genius human. This paper proposed a Kamphaeng Saen beef cattle identification approach using muzzle print images as an Animal Biometric approach. There are…
Read MoreWeb-based Remote Lab System for Instrumentation and Electronic Learning
Lab sessions in Engineering Education are designed to reinforce theoretical concepts. However, there is usually not enough time to reinforce all of them. Remote and virtual labs give students more time to reinforce those concepts. In particular, with remote labs, this can be done interacting with real lab instruments and specific configurations. This work proposes…
Read More
