Showing 121 - 139 results of 139 for search 'sql (server OR observer)', query time: 0.07s Refine Results
  1. 121

    Development of a Web-Based Information System for Reporting Activities of DKI Jakarta DPRD Members by Hikmah Gusdin Putra Jaya, Verdi Yasin, Agus Sulistyanto, Anton Zulkarnain Sianipar, Ifan Junaedi, Rumadi Hartawan, Ito Riris Immasari

    Published 2025-03-01
    “…This research uses data collection methods by means of observation, interviews and literature study, namely by making direct observations on the objects under study and requesting the necessary data, as well as interviews or questions and answers with sources to complete the data and obtain the necessary information. …”
    Get full text
    Article
  2. 122

    Design of a Document Management System Application Using the Web-Based Rapid Application Development Method for Monitoring Perbal at Provincial Personnel Agencies in the Special Ca... by Rahmadika Roma Putra, Verdi Yasin, Zulhalim Zulhalim, Akmal Budi Yulianto

    Published 2025-03-01
    “…This research uses data collection methods by means of observation, interviews and literature study, namely by making direct observations on the objects under study and requesting the necessary data, as well as interviews or questions and answers with sources to complete the data and obtain the necessary information.The system designed is an information system for the activities of DKI Jakarta DPRD members which was created using PHP and MySQL. …”
    Get full text
    Article
  3. 123
  4. 124

    Pengembangan Sistem Manajemen Pengetahuan di Organisasi Asosiasi Alumni Program Beasiswa Amerika - Indonesia (ALPHA-I) by Muhammad Nurwegiono, Sri Nurdiati, Sony Hartono Wijaya

    Published 2020-05-01
    “…Hasil dari penelitian ini adalah sistem manajemen pengetahuan yang dibangun dengan framework PHP dan MySQL sebagai Relational Database Management System (RDBMS) berbasis website. …”
    Get full text
    Article
  5. 125

    A structure to support queries in object-oriented database using fuzzy XML tags by Bahareh Fahimian, Ali Harounabadi

    Published 2014-11-01
    “…In this paper, by combining sql and fuzzy XML tags, a language and independent database for storing and retrieving queries is prepared. …”
    Get full text
    Article
  6. 126

    Implementation Of Triple Exponential Smoothing Method To Predict Palm Oil Production Of PT.Lonsum Web-Based by syafhira ananda galasca, Aninda Muliani Harahap

    Published 2025-05-01
    “…Research instruments included semi-structured interviews and participatory observations to understand the operational patterns and needs of the system in the field. …”
    Get full text
    Article
  7. 127

    Automating a Web-based Employee Management Information System using Agile Scrum by Rafi Risqullah Putra, Evi Maria (SCOPUS ID: 57093633500)

    Published 2025-07-01
    “…The Agile Scrum methodology was employed, with data collected through field observations, stakeholder interviews, and literature reviews. …”
    Get full text
    Article
  8. 128

    Big data predictions of Seasonal Fluctuations in Marine Traffic (using AIS data) by monitoring idle ships by Liliya Mileva

    Published 2024-12-01
    “…Instead, any significant delays observed are primarily attributed to an increased number of ships during certain months. …”
    Get full text
    Article
  9. 129

    Web-Based Service Status Monitoring Information System to Improve Service Efficiency: A Case Study of Kingsmith Store Sunter Repair Service by Christian Mangadil, Anton Zulkarnain Sianipar

    Published 2025-07-01
    “…Data collection techniques included observation, interviews, documentation, and literature review. …”
    Get full text
    Article
  10. 130

    Where Should a New Graduate Start? A Multi-Source Evaluation of the Banking Sector Business Analyst Signals in an Emerging Economy by Bünyamin Yasin Çakmak, Büşra Yiğit

    Published 2024-04-01
    “…Advertisements often request knowledge of SQL and Office programs and soft skills (SS). We have observed that the hard/technical skill requirements (such as Agile, Scrum, and Python) differ between employers. …”
    Get full text
    Article
  11. 131

    E-agriculture of hydroponic farming with nutrient film technique (NFT) using internet of thing by Suheri Agus, Widaningsih Sri, Awalia Uniq Fadilah

    Published 2024-01-01
    “…Additionally, the system features CCTV camera monitoring for real-time observation, as well as tools for generating harvest reports, tool usage reports, and nutritional data.…”
    Get full text
    Article
  12. 132

    MICROSERVICE ARCHITECTURE FOR BUILDING HIGH-AVAILABILITY DISTRIBUTED AUTOMATED COMPUTING SYSTEM IN A CLOUD INFRASTRUCTURE by Denis Zolotariov

    Published 2021-09-01
    “…It has been proven that when using a Kafka queue it is efficient to publish batches of results rather than one at a time, which results to significant overhead on queue servers and data latency for its clients. Recommendations are given on the implementation of the CI/CD system to build a continuous cycle of adding and improving microservices. …”
    Get full text
    Article
  13. 133

    Exploring Perspectives of Blockchain Technology and Traditional Centralized Technology in Organ Donation Management: A Comprehensive Review by Geet Bawa, Harmeet Singh, Sita Rani, Aman Kataria, Hong Min

    Published 2024-11-01
    “…<b>Results</b>: Concerns about organ trafficking, illicit trade, system distrust, and unethical allocation are highlighted, with a lack of transparency as the primary catalyst in organ donation and transplantation. It has been observed that centralized architecture-based models use technologies such as Python, Java, SQL, and Android Technology but face data storage issues. …”
    Get full text
    Article
  14. 134

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  15. 135

    Big data technologies in e-learning by Gyulara A. Mamedova, Lala A. Zeynalova, Rena T. Melikova

    Published 2018-01-01
    “…It is shown that to solve this problem it is efficient to use clustered NAS (Network Area Storage) technology, which allows storing information of educational institutions on NAS servers and sharing them with Internet. To process and personalize the Big Data in the environment of e-learning, it is proposed to use the technologies MapReduce, Hadoop, NoSQL and others. …”
    Get full text
    Article
  16. 136

    Information support for monitoring post-vaccination immunity against plague by O. M. Kudryavtseva, V. A. Kozhevnikov, Yu. I. Yashechkin, S. A. Bugorkova

    Published 2021-07-01
    “…The database included the results of a prospective cohort observational study. The database was created on the Microsoft Access 8.0 platform, an interactive software development environment for Visual Basic 6.0 with VB (Visual Basic) and / or SQL (structured query language) queries. …”
    Get full text
    Article
  17. 137

    Weather Prediction for Strawberry Cultivation Using Double Exponential Smoothing and Golden Section Optimization Methods by Herlinah Herlinah, Billy Eden William Asrul, Hafsah HS, Muhammad Faisal, Swa Lee Lee, Hamdan Gani, Zhipeng Feng

    Published 2024-12-01
    “…The system was developed by implementing the PHP programming language on the interface design as well as MySQL as a database processing. The algorithm used to predict the air temperature feature, wind speed feature, and rainfall feature was Double Exponential Smoothing, followed by the optimization of the Golden Section method to select the right smoothing value. …”
    Get full text
    Article
  18. 138

    Analyzing 6211 unique variants in the upgraded interactive FVIII web database reveals novel insights into hemophilia A by Emily H. T. Print, Anna M. Simmons, Holly J. Spencer, Christos Efthymiou, Victoria A. Harris, Stephen J. Perkins

    Published 2025-08-01
    “…Our original interactive MySQL database for FVIII in 2013 presented clinical data on 2014 unique FVIII variants in 5072 patients. …”
    Get full text
    Article
  19. 139