Showing 21 - 40 results of 139 for search 'sql (server OR observer)', query time: 0.05s Refine Results
  1. 21

    Aplikasi Mobile Perpustakaan Berbasis Android (Studi Kasus Perpustakaan STMIK Palangka Raya) by M. Haris Qamaruzzaman, Ferdiyani Haris

    Published 2017-03-01
    “…The system is made using Eclipse, the Java programming language, PHP and MySQL as a media server that is accessed using the application The methods in this study includes data collection method (observation, literature, and interviews) and analyzed using analysis systems PIECES. …”
    Get full text
    Article
  2. 22

    Implementasi Cloud Computing Menggunakan Metode Pengembangan Sistem Agile by Much Aziz Muslim, Nur Astri Retno

    Published 2014-05-01
    “…Hasil dari implementasi cloud computing menggunakan metode pengembangan sistem agile adalah terbentuknya sebuah sistem cloud hosting provider dengan menggunakan Windows Azure Pack dan SQL Server 2012 sebagai sistem utama dan pengelolaan database menggunakan Microsoft SQL Server Management…”
    Get full text
    Article
  3. 23

    IMPLEMENTASI INDEX MYSQL DAN SERVER-SIDE DATATABLES UNTUK OPTIMALISASI PEMROSESAN DATA SISTEM MBKM FIK BERBASIS CODEIGNITER 4 by Renjiro Azhar Pramono, Filmada Ocky Saputra, Gustina Alfa Trisnapradika

    Published 2024-01-01
    “…Berdasarkan temuan penelitian, dapat disimpulkan bahwa penerapan Index MySQL dan Server-side DataTables efektif dalam meningkatkan performa sistem MBKM FIK UDINUS. …”
    Get full text
    Article
  4. 24

    RESEARCH OF ACID TRANSACTION IMPLEMENTATION METHODS FOR DISTRIBUTED DATABASES USING REPLICATION TECHNOLOGY by Oksana Mazurova, Artem Naboka, Mariya Shirokopetleva

    Published 2021-06-01
    “…To solve business problems in such conditions, databases are scaled, often horizontally on several physical servers using replication technology. At the same time, many business operations require the implementation of transactional compliance with ACID properties. …”
    Get full text
    Article
  5. 25
  6. 26

    Satellite imagery, big data, IoT and deep learning techniques for wheat yield prediction in Morocco by Abdelouafi Boukhris, Antari Jilali, Abderrahmane Sadiq

    Published 2024-12-01
    “…All data collected are then stored into a NoSQL server to be analysed and processed. Several machine learning and deep learning algorithms have been used for the processing of crop recommendation system, such as logistic regression, KNN, decision tree, support vector machine, LSTM, and Bi-LSTM through the collected dataset. …”
    Get full text
    Article
  7. 27
  8. 28

    Architecture and implementation of online testing to check solutions to Olympiad programming problems by E. V. Shagilova

    Published 2018-07-01
    “…The architecture and operation of the server part of the check system of performing the Olympiad programming tasks is described. …”
    Get full text
    Article
  9. 29

    Models and scenarios of implementation of threats for internet resources by S. A. Lesko

    Published 2020-12-01
    “…At the same time, XSS attacks, unlike SQL injections, harm only the client side leaving the application server operational. …”
    Get full text
    Article
  10. 30

    Research of cloud disk system construction in campus network by Jun LI, Feng-dan LAO, Ren-ming ZOU

    Published 2013-09-01
    “…According to the significance and demand of cloud disk system in campus network,a solution of combining the miniyun open source project,LVS(Linux virtual server) load balancing,Moosefs distribute file system and MySQL master-slaver replication read/write splitting was proposed to construct high availability cloud disk system.A cloud disk system was built and put into practice based on this solution in China agricultural vnirersity.The application results shows that it meets the demand for cloud disk in campus network with characteristics of low cost,dynamic scalable and high availability.…”
    Get full text
    Article
  11. 31

    DORA: Dionaea Observation and Data Collection Analysis for Real-Time Cyberattack Surveillance and Threat Intelligence by Hartinah Hartinah, Andi Syarwani, Ardiansyah Ardiansyah, Irfan Syamsuddin

    Published 2025-08-01
    “…The project will look into how Dionaea honeypots, when combined with external analysis services such as VirusTotal, might provide more thorough insights into cyberattack tactics and improve proactive cybersecurity defence mechanisms.Methods: The Dionaea honeypot was used to identify a range of attacks on vulnerable services including Telnet (Port 23), SMB (Port 445), and MySQL (Port 3306). Over a seven-day observation period, 32,395 attack connections from 6,276 distinct IP addresses were detected, yielding 2,892 malware samples. …”
    Get full text
    Article
  12. 32
  13. 33

    Airline Ticket Reservation System For Kampala Executive Aviation. by Magezi, David

    Published 2024
    “…The project was designed in PHP technology and consists of an SQL server that acts as the database for the project. …”
    Get full text
    Thesis
  14. 34

    Performance analysis of databases created in virtualized and containerized environment by Zygmunt Łata, Maria Skublewska-Paszkowska

    Published 2023-09-01
    “…The second one assumed that the Oracle is the most efficient database regardless of which environment it was run on. MySQL, PostgreSQL, Microsoft SQL Server and Oracle databases were tested. …”
    Get full text
    Article
  15. 35

    Design a Software Engineering CASE Tool (ERToOracle10g) to transform a graphical Entity Relationship model (ER model) to Oracle10g by Nada Saleem, Saad Th.

    Published 2011-12-01
    “…Hence it is used to construct a data modeling using ER Model, then transforming the graphical model to (Oracle 10g) SQL instructions and executing it automatically inside an (Oracle 10g) server. …”
    Get full text
    Article
  16. 36

    Integrating Digital Resources into a Traditional University Research Library by Fiona C. Coutinho, Caroline Merriam Eastman, Christopher B. Hare, Robert F. Skinder

    Published 1999-08-01
    “…This implementation is being replaced by a database system using SQL Server and Active Server Pages. Future plans are briefly discussed. …”
    Get full text
    Article
  17. 37

    Design and Application of a Digital System for Information Management and Synchronous Analysis in a Foundation Pit Group by Zheng-Liang Xu, Xiong Wang, Ming-Guang Li, Zhong-Jie Zhang, Fan-Yun Zeng, Jin-Jian Chen

    Published 2021-01-01
    “…The SQL Server software is capable to facilitate data classification and standardization management. …”
    Get full text
    Article
  18. 38

    Design and Performance Simulation of Computer Control System for Automatic Monitoring of Upper Computer Communication Operation State by Li Yang, Huitao Zhang

    Published 2021-01-01
    “…In addition, since the default database of Kingview is access, considering that the Microsoft Access database can store up to 2G of content, in order to upgrade and expand the subsequent system, SQL Server database is selected for data query, backup, and saving. …”
    Get full text
    Article
  19. 39

    Aplikasi Website dan Media Sosial Telegram Untuk Sistem Pemantauan Daya Pada Beban Listrik DC Berbasis Raspberry Pi 3 by Eka Maulana, Adharul Muttaqin, Muhammad Anwar Sanusi

    Published 2022-08-01
    “…Sistem monitoring ini membutuhkan sensor ACS712 dan sensor tegangan yang berfungsi untuk membaca nilai arus dan tegangan, ESP32 yang berfungsi untuk mengolah data nilai pembacaan sensor dan mengirim data tersebut menuju server serta sebuah web server yang dijalankan oleh Raspberry Pi 3 yang berfungsi untuk menerima data dari tiap node dan akan disimpan pada database MySQL. …”
    Get full text
    Article
  20. 40

    Designing of electronic records for patients admitted to the women ward of Imam Hossein Hospital (Phase I) by F farzaneh, M kiandost, G Noghabaei, M Hosseini

    Published 2017-12-01
    “…It was designed by examining the system requirements, as well as considering the volume and amount of data recorded in the SQL Server database software. Database communication methods, access control and security systems were also designed. …”
    Get full text
    Article