Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (146)
  • Open Access

    REVIEW

    A Systematic Review of Automated Classification for Simple and Complex Query SQL on NoSQL Database

    Nurhadi, Rabiah Abdul Kadir*, Ely Salwana Mat Surin, Mahidur R. Sarker*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1405-1435, 2024, DOI:10.32604/csse.2024.051851 - 22 November 2024

    Abstract A data lake (DL), abbreviated as DL, denotes a vast reservoir or repository of data. It accumulates substantial volumes of data and employs advanced analytics to correlate data from diverse origins containing various forms of semi-structured, structured, and unstructured information. These systems use a flat architecture and run different types of data analytics. NoSQL databases are nontabular and store data in a different manner than the relational table. NoSQL databases come in various forms, including key-value pairs, documents, wide columns, and graphs, each based on its data model. They offer simpler scalability and generally outperform… More >

  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

  • Open Access

    ARTICLE

    Carbon Abatement Cost-Sharing Strategy for Electric Power Sector Based on Incentive and Subsidy Mechanisms

    Hui Wang, Wen Wang*, Wenhui Zhao

    Energy Engineering, Vol.121, No.10, pp. 2907-2935, 2024, DOI:10.32604/ee.2024.052665 - 11 September 2024

    Abstract The green and low carbon transition and development of the electricity industry is the most crucial task in realizing the “dual-carbon target”, and it is urgent to explore the incentive and subsidy mechanism to promote green electricity consumption and the cost-sharing strategy of carbon reduction, to alleviate the pressure of carbon abatement cost of each subject of the electricity supply chain. Against this background, this paper takes into account the low-carbon subsidies provided by the government and the incentive subsidies for users, and studies the optimal decision-making of each subject in the electricity supply chain,… More >

  • Open Access

    ARTICLE

    Enhancing AI System Privacy: An Automatic Tool for Achieving GDPR Compliance in NoSQL Databases

    Yifei Zhao, Zhaohui Li, Siyi Lv*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 217-234, 2024, DOI:10.32604/cmc.2024.052310 - 18 July 2024

    Abstract The EU’s Artificial Intelligence Act (AI Act) imposes requirements for the privacy compliance of AI systems. AI systems must comply with privacy laws such as the GDPR when providing services. These laws provide users with the right to issue a Data Subject Access Request (DSAR). Responding to such requests requires database administrators to identify information related to an individual accurately. However, manual compliance poses significant challenges and is error-prone. Database administrators need to write queries through time-consuming labor. The demand for large amounts of data by AI systems has driven the development of NoSQL databases.… More >

  • Open Access

    ARTICLE

    Abaca Fiber as a Potential Reinforcer for Acoustic Absorption Material at Middle-High Frequencies

    Susilo Indrawati*, Lila Yuwana, Suyatno, Mochamad Zainuri, Darminto*

    Journal of Renewable Materials, Vol.12, No.5, pp. 909-921, 2024, DOI:10.32604/jrm.2024.048452 - 17 July 2024

    Abstract Recently, abaca fibers have become the focus of specialized research due to their intriguing characteristics, with their outstanding mechanical properties being a particularly notable. In the conducted study, the abaca fibers underwent a preliminary treatment process involving an alkaline solution, which was composed of 0.5% sodium hydroxide (NaOH) and 50% acetic acid (CHCOOH). This process entailed immersing each fiber in the solution for a period of one hour. This treatment led to a 52.36% reduction in lignin content compared to the levels before treatment, resulting in a dramatic decrease in the full width at half… More > Graphic Abstract

    Abaca Fiber as a Potential Reinforcer for Acoustic Absorption Material at Middle-High Frequencies

  • Open Access

    ARTICLE

    Distributed Graph Database Load Balancing Method Based on Deep Reinforcement Learning

    Shuming Sha1,2, Naiwang Guo3, Wang Luo1,2, Yong Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5105-5124, 2024, DOI:10.32604/cmc.2024.049584 - 20 June 2024

    Abstract This paper focuses on the scheduling problem of workflow tasks that exhibit interdependencies. Unlike independent batch tasks, workflows typically consist of multiple subtasks with intrinsic correlations and dependencies. It necessitates the distribution of various computational tasks to appropriate computing node resources in accordance with task dependencies to ensure the smooth completion of the entire workflow. Workflow scheduling must consider an array of factors, including task dependencies, availability of computational resources, and the schedulability of tasks. Therefore, this paper delves into the distributed graph database workflow task scheduling problem and proposes a workflow scheduling methodology based… More >

  • Open Access

    ARTICLE

    Research on Enhanced Contraband Dataset ACXray Based on ETL

    Xueping Song1,*, Jianming Yang1, Shuyu Zhang1, Jicun Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4551-4572, 2024, DOI:10.32604/cmc.2024.049446 - 20 June 2024

    Abstract To address the shortage of public datasets for customs X-ray images of contraband and the difficulties in deploying trained models in engineering applications, a method has been proposed that employs the Extract-Transform-Load (ETL) approach to create an X-ray dataset of contraband items. Initially, X-ray scatter image data is collected and cleaned. Using Kafka message queues and the Elasticsearch (ES) distributed search engine, the data is transmitted in real-time to cloud servers. Subsequently, contraband data is annotated using a combination of neural networks and manual methods to improve annotation efficiency and implemented mean hash algorithm for… More >

  • Open Access

    REVIEW

    Computational and bioinformatics tools for understanding disease mechanisms

    MOHD ATHAR1,*, ANU MANHAS2, NISARG RANA2, AHMAD IRFAN3

    BIOCELL, Vol.48, No.6, pp. 935-944, 2024, DOI:10.32604/biocell.2024.049891 - 10 June 2024

    Abstract Computational methods have significantly transformed biomedical research, offering a comprehensive exploration of disease mechanisms and molecular protein functions. This article reviews a spectrum of computational tools and network analysis databases that play a crucial role in identifying potential interactions and signaling networks contributing to the onset of disease states. The utilization of protein/gene interaction and genetic variation databases, coupled with pathway analysis can facilitate the identification of potential drug targets. By bridging the gap between molecular-level information and disease understanding, this review contributes insights into the impactful utilization of computational methods, paving the way for More >

  • Open Access

    ARTICLE

    Profiles of the Headspace Volatile Organic and Essential Oil Compounds from the Tunisian Cardaria draba (L.) Desv. and Its Leaf and Stem Epidermal Micromorphology

    Wissal Saadellaoui1, Samiha Kahlaoui1, Kheiria Hcini1, Abir Haddada1, Noomene Sleimi2,*, Roberta Ascrizzi3, Guido Flamini3, Fethia Harzallah-Skhiri4, Sondes Stambouli-Essassi1

    Phyton-International Journal of Experimental Botany, Vol.93, No.4, pp. 725-744, 2024, DOI:10.32604/phyton.2024.048110 - 29 April 2024

    Abstract In this work, we investigated aroma volatiles emanated by dry roots, stems, leaves, flowers, and fruits of Cardaria draba (L.) Desv. growing wild in Tunisia and its aerial part essential oils (EOs) composition. A total of 37 volatile organic compounds (96.7%–98.9%) were identified; 4 esters, 4 alcohols, 7 hydrocarbons, 12 aldehydes, 5 ketones, 1 lactone, 1 organosulfur compound, 2 organonitrogen compounds, and 1 acid. The hydrocarbons form the main group, representing 49.5%–84.6% of the total detected volatiles. The main constituent was 2,2,4,6,6-pentamethylheptane (44.5%–76.2%) reaching the highest relative percentages. Forty-two compounds were determined in the two fractions… More >

  • Open Access

    ARTICLE

    A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information

    Hao Jiang1, Yuerong Liao1, Dongdong Zhao2, Wenjian Luo3, Xingyi Zhang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1045-1075, 2024, DOI:10.32604/cmes.2024.048653 - 16 April 2024

    Abstract Due to the presence of a large amount of personal sensitive information in social networks, privacy preservation issues in social networks have attracted the attention of many scholars. Inspired by the self-nonself discrimination paradigm in the biological immune system, the negative representation of information indicates features such as simplicity and efficiency, which is very suitable for preserving social network privacy. Therefore, we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks, called AttNetNRI. Specifically, a negative survey-based method is developed to disturb the relationship between nodes in the… More >

Displaying 1-10 on page 1 of 146. Per Page