Results (26)
Search Parameters:
Keyword: DatabasesRelational Databases Versus HBase: An Experimental Evaluation
Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…
Read MoreOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read MoreForensic Analysis of “WhatsApp” Artifacts in Android without Root
WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve…
Read MoreIntermediation in Technology Transfer Processes in Agro-Industrial Innovation Systems: State of Art
Considering the importance of addressing innovation issues that impact the development of economic sectors, this document presents the research work aimed at establishing a state of the art related to technology transfer and intermediation issues, which can be adopted in the innovation systems. In this case, the agro-industrial innovation system is taken as a reference…
Read MoreHiding Information in DNA Sequence Data using Open Reading Frame Guided Splicing
Encouraged by the huge publicly available genomic databases, research in the field of steganography was recently extended to utilize DNA sequence data to conceal secret information. As an extension of the work presented earlier by the author, this paper proposes an approach for a secure data communication channel between two parties. At one side of…
Read MoreIntegration Information Systems Design of Material Planning in the Manufacturing Industry using Service Oriented Architecture
PT XYZ has an Enterprise Resource Planning application that is used by the Planning Department to view stocks and plan production materials. Currently calculation of production materials takes more than 30 seconds just to export to Excel then a few minutes to adjust the data format to the planning form and the data used is…
Read MoreA New Video Based Emotions Analysis System (VEMOS): An Efficient Solution Compared to iMotions Affectiva Analysis Software
The Micro-facial expression is the most effective way to display human emotional state. But it needs an expert coder to be decoded. Recently, new computer vision technologies have emerged to automatically extract facial expressions from human faces. In this study, a video-based emotion analysis system is implemented to detect human faces and recognize their emotions…
Read MoreSurvey of Agent-Based Simulations for Modelling COVID-19 Pandemic
On the 11th of March 2020, the World Health Organization (WHO) declared COVID-19 as a pandemic. Part of controlling measures of the pandemic is to understand the disease’s trajectories. There are several possible interventions that can prevent and control its spread. Determining an optimal strategy is critical for policymakers to understand the impact of different…
Read MoreTexture Based Image Retrieval Using Semivariogram and Various Distance Measures
In a content-based image retrieval system(CBIR) feature classification,identification, and ex- traction play an important role. The retrieval of images using a single feature is a challenging task in CBIR systems. The high retrieval rates are reported based on combining multiple features, multiple algorithms and preprocessing steps, feature classification, and segmentation because the image retrieval are…
Read MoreThe Impact of eLearning as a Knowledge Management Tool in Organizational Performance
This paper aims to understand the impact of eLearning capabilities on organizational performance. It also addresses the obstacles of organizational learning using eLearning methods and highlighting some emerging trends and technologies that will impact the eLearning experience in organizations. It examines a brief history of knowledge management and how it is related to learning, organizational…
Read MoreThe Design of a Hybrid Model-Based Journal Recommendation System
There is currently an overload of information on the internet, and this makes information search a challenging task. Researchers spend a lot of man-hour searching for journals related to their areas of research interest that can publish their research output on time. In, this study, a recommender system that can assist researchers access relevant journals…
Read MoreTechnology Adoption in Education: A Systematic Literature Review
Technology is advancing faster today than ever before with evidence of its impact in all facets of our lives. With the spread of the novel COVID-19 pandemic across the world, schools were closed as part of lockdown measures to contain the virus thereby disrupting academic curricula. Academic institutions leveraged ICTs to virtually engage students and…
Read MoreThe COVID-19 Effect in Mexican SMEs
This article presents a literature review on how the COVID-19 pandemic changed the way of managing risks in the supply chains of Mexican SMEs. Research was carried out in the most important scientific research databases. The spread of the pandemic in 2020 has affected public health and the world´s companies, including micro, small and medium…
Read MoreAn Overview on CryptDb and Word2vec Approaches
Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…
Read MoreISR Data Processing in Military Operations
This paper provides an overview of Intelligence, Surveillance, and Reconnaissance (ISR) data with respect on NATO standards and recommendations; further presents methods, tools, and experiences in ISR data processing in military operations. The steps of the Intelligence cycle and disciplines Business Intelligence (BI), Data Warehousing, Data Mining, and Big Data are presented in the introduction.…
Read MoreSupervised Machine Learning Based Medical Diagnosis Support System for Prediction of Patients with Heart Disease
Application in the field of medical development has always been one of the most important research areas. One of these medical applications is the early prediction system for heart diseases especially; coronary artery disease (CAD) also called atherosclerosis. The need for a medical diagnosis support system is to detect atherosclerosis at the earlier stages to…
Read MoreModeling and Transformation from Temporal Object Relational Database into Mongodb: Rules
With such a big volume of data growing tremendously every day, and the storage of important volume of data becoming increasingly more flexible, NoSQL(Not only SQL or Non-Relational ) database are designed to store a large amount of information and are growing for big data systems in web analytics. It an approach does not require…
Read MoreThe Role of KM in Enhancing AI Algorithms and Systems
Knowledge Management processes present a vital role in improving AI systems and algorithms. Many studies and reviews were carried out to examine the relationship between KM processes and AI systems. However, studies were focusing on specific methods and the impact on some AI algorithms, neglecting the role of other KM processes and how it may…
Read MoreMachine Learning Model to Identify the Optimum Database Query Execution Platform on GPU Assisted Database
With the current amount of data nowadays, the need for processing power has vastly grown. By relying on CPU processing power, current processing power is depending on the frequency and parallelism of the current CPU device. This means this method will lead to increased power consumption. Current research has shown that by utilize the power…
Read MoreSpiral Curve for Revocable Touchless Fingerprint Template Securisation
Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…
Read MoreApplication of Fractal Algorithms to Identify Cardiovascular Diseases in ECG Signals
The aim of this article was the identification of cardiovascular diseases, after applying Katz and Higuchi fractal algorithms on 4 databases of ECG signals downloaded from the Physionet website: heart failure (HF), hypertension (H), ischemic heart disease (IHD) and normal sinus rhythm (NSR). For this purpose, initially the ECG signals passed through a filtering stage…
Read MoreStudy and Implementation of Various Image De-Noising Methods for Traffic Sign Board Recognition
The problem of recognizing traffic sign boards in a correct fashion is one of the major challenges since there is an alarming rate of increase in the number of road accidents happening because of incorrect interpretation of traffic sign boards in bad weather conditions. In this paper, a comparative analysis of various noise removal techniques…
Read MoreFeature Selection for Musical Genre Classification Using a Genetic Algorithm
Music genre classification is an important multimedia research domain, including aspects of music piece representation, distances between genres, and categorization of music databases. The objective of this study was to develop a model for automatic classification of musical genres from audio data by using features from low-level time and frequency domains. These features can highlight…
Read MoreWeight Parameters and Green Tea Effect; A Review
The objective was to review and add literature whether green tea is helpful for weight reduction. Reviewing the randomized, double-blind, placebo-controlled trials to compare green tea extracts for weight loss from various online sources including Ovid MEDLINE, PubMed, and Cochrane databases studies published in 2006, 2007 and 2008 in English language were considered. In each…
Read MoreInnovative Research on the Development of Game-based Tourism Information Services Using Component-based Software Engineering
In recent years, a number of studies have been conducted exploring the potential of digital tour guides, that is, multimedia components (e.g., 2D graphic, 3D models, and sound effects) that can be integrated into digital storytelling with location-based services. This study uses component-based software engineering to develop the content of game-based tourism information services. The…
Read More
