Showing 21 - 27 results of 27 for search 'sql observer', query time: 0.05s Refine Results
  1. 21
  2. 22

    Exploring Perspectives of Blockchain Technology and Traditional Centralized Technology in Organ Donation Management: A Comprehensive Review by Geet Bawa, Harmeet Singh, Sita Rani, Aman Kataria, Hong Min

    Published 2024-11-01
    “…<b>Results</b>: Concerns about organ trafficking, illicit trade, system distrust, and unethical allocation are highlighted, with a lack of transparency as the primary catalyst in organ donation and transplantation. It has been observed that centralized architecture-based models use technologies such as Python, Java, SQL, and Android Technology but face data storage issues. …”
    Get full text
    Article
  3. 23

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  4. 24

    Information support for monitoring post-vaccination immunity against plague by O. M. Kudryavtseva, V. A. Kozhevnikov, Yu. I. Yashechkin, S. A. Bugorkova

    Published 2021-07-01
    “…The database included the results of a prospective cohort observational study. The database was created on the Microsoft Access 8.0 platform, an interactive software development environment for Visual Basic 6.0 with VB (Visual Basic) and / or SQL (structured query language) queries. …”
    Get full text
    Article
  5. 25

    Weather Prediction for Strawberry Cultivation Using Double Exponential Smoothing and Golden Section Optimization Methods by Herlinah Herlinah, Billy Eden William Asrul, Hafsah HS, Muhammad Faisal, Swa Lee Lee, Hamdan Gani, Zhipeng Feng

    Published 2024-12-01
    “…The system was developed by implementing the PHP programming language on the interface design as well as MySQL as a database processing. The algorithm used to predict the air temperature feature, wind speed feature, and rainfall feature was Double Exponential Smoothing, followed by the optimization of the Golden Section method to select the right smoothing value. …”
    Get full text
    Article
  6. 26

    Analyzing 6211 unique variants in the upgraded interactive FVIII web database reveals novel insights into hemophilia A by Emily H. T. Print, Anna M. Simmons, Holly J. Spencer, Christos Efthymiou, Victoria A. Harris, Stephen J. Perkins

    Published 2025-08-01
    “…Our original interactive MySQL database for FVIII in 2013 presented clinical data on 2014 unique FVIII variants in 5072 patients. …”
    Get full text
    Article
  7. 27

    Digital Translation Platform (Translatly) to Overcome Communication Barriers in Clinical Care: Pilot Study by Victor Olsavszky, Mutaz Bazari, Taieb Ben Dai, Ana Olsavszky, Fabian Finkelmeier, Mireen Friedrich-Rust, Stefan Zeuzem, Eva Herrmann, Jan Leipe, Florian Alexander Michael, Hans von Westernhagen, Olivier Ballo

    Published 2025-03-01
    “…MethodsThe study included ethnographic interviews with health care professionals and an observational pilot to assess the use of the Translatly platform in clinical practice. …”
    Get full text
    Article