scholarly journals Benchmarking MySQL and NoSQL Databases on Egovbench Application

2019 ◽  
Vol 2 (1) ◽  
pp. 18
Author(s):  
Nur Aini Rakhmawati ◽  
Muhammad Zuhri ◽  
Radityo Prasetianto Wibowo ◽  
Anwar Romadhon ◽  
Herdy Ardiansyah ◽  
...  

E-Government is a result of technological advances in the government field. E-government assessment is needed to encourage the development of e-government in a better direction. The e-Government assessment can be measured using the Egovbench application. Egovbench performs crawling to obtain information from related websites or social media. The process of crawling done by Egovbench produces extensive data, which reduced performance in data processing. Therefore, there is a need for a database solution that has the best performance such as high processing speed and small database size. This study examined the comparison between relational databases and non-relational databases based on selected metrics to obtain the most suitable database solution for Egovbench. The results show that the MySQL database has the advantage of complex query processing and the use of the database with the smallest storage space. MongoDB database has the advantage of low data transfer volumes. Couchbase database has the advantage of short and straightforward query processing with a high number. The evaluation results show that MySQL is more suitable for Egovbench needs, which is the best response time and query per second. MySQL outperformed the other two databases on backup and storage file sizes testing.

Author(s):  
Marwan Majeed Nayyef ◽  
Ali Makki Sagheer

With the rapid development of cloud computing, which has become a key aspect to maintain the security of user information that may be highly confidential and maintained during transport and storage process. The reliance on traditional algorithms that are used to encrypt data are not secure enough because we cannot process the data only after decrypt. In this article is proposed the use of homomorphic encryption to solve this problem because it can deal with encrypted data without the decryption, which can lead to ensuring confidentiality of the data. A number of public-key algorithms are explained, which is based on the concept of homomorphic encryption. In this article an algorithm is proposed based on HE and it is similar to Menesez-EC but with one digit as a secret key according to its advantage, whereby reducing the cost of communication, and storage and provides high processing speed when compared with other algorithms. This algorithm provides enough security for a bank's customer information and then compared with ECC, each of RSA and Piallier algorithms as evaluated.


2019 ◽  
Vol 13 (2) ◽  
pp. 67-85
Author(s):  
Marwan Majeed Nayyef ◽  
Ali Makki Sagheer

With the rapid development of cloud computing, which has become a key aspect to maintain the security of user information that may be highly confidential and maintained during transport and storage process. The reliance on traditional algorithms that are used to encrypt data are not secure enough because we cannot process the data only after decrypt. In this article is proposed the use of homomorphic encryption to solve this problem because it can deal with encrypted data without the decryption, which can lead to ensuring confidentiality of the data. A number of public-key algorithms are explained, which is based on the concept of homomorphic encryption. In this article an algorithm is proposed based on HE and it is similar to Menesez-EC but with one digit as a secret key according to its advantage, whereby reducing the cost of communication, and storage and provides high processing speed when compared with other algorithms. This algorithm provides enough security for a bank's customer information and then compared with ECC, each of RSA and Piallier algorithms as evaluated.


2016 ◽  
Vol 26 ◽  
pp. 7-83 ◽  
Author(s):  
Bryan J. Found ◽  
Carolyne Bird

Overview:   This document provides a summary of a practical method that can be used to compare handwriting (whether text-based or signatures) in the forensic environment. It is intended to serve as an approach to forensic handwriting examination for practitioners actively involved in casework, or for those interested in investigating general aspects of the practice of forensic handwriting examination (for example researchers, academics and legal professionals). The method proposed does not cover in detail all aspects of the examination of handwriting. It does, however, form the framework of forensic handwriting methodology in the government environment in Australia and New Zealand as represented by the Document Examination Specialist Advisory Group (DocSAG). It is noted from the outset that handwriting is examined using complex human perceptual and cognitive processes that can be difficult to accurately and validly describe in written form since, for the most part, these processes are hidden. What is presented here is the agreed general approach that DocSAG practitioners use in the majority of the comparisons that they carry out. The method is based around a flow diagram which structures the comparison process and provides the reader with a guide as to the significant landmark stages commonly worked through in practical handwriting examinations. Where decision points occur within the course of the method flow diagram a series of modules have been developed which describe the nature of the decision under consideration and address relevant theoretical and practical issues. Each module is, as far as is practical, independent of other modules in the method. This assists in facilitating changes in the process over time that may result from theoretical, practical or technological advances in the field. Purchase Volume 26 - Special Issue - $40


Author(s):  
Anderson Chaves Carniel ◽  
Aried de Aguiar Sa ◽  
Vinicius Henrique Porto Brisighello ◽  
Marcela Xavier Ribeiro ◽  
Renato Bueno ◽  
...  

2021 ◽  
Author(s):  
Naveen Kunnathuvalappil Hariharan

Financial data volumes are increasing, and this appears to be a long-term trend, implying that data managementdevelopment will be crucial over the next few decades. Because financial data is sometimes real-time data, itis constantly generated, resulting in a massive amount of financial data produced in a short period of time.The volume, diversity, and velocity of Big Financial Data are highlighting the significant limitations oftraditional Data Warehouses (DWs). Their rigid relational model, high scalability costs, and sometimesinefficient performance pave the way for new methods and technologies. The majority of the technologiesused in background processing and storage research were previously the subject of research in their earlystages. The Apache Foundation and Google are the two most important initiatives. For dealing with largefinancial data, three techniques outperform relational databases and traditional ETL processing: NoSQL andNewSQL storage, and MapReduce processing.


2020 ◽  
Vol 12 (2-2) ◽  
Author(s):  
Muhamad Hafidz Mohd Yusof ◽  
Mahyuddin Arsat ◽  
Nor Fadila Amin ◽  
Adibah Abdul Latif

Based on demand for professional labor and the growing economy, the Technical and Vocational Education (TVET) system has been transformed into a system that works to develop and equip individuals with current technical skills based on industry demand. The government has undertaken various efforts to strengthen the field of Technical and Vocational Education. Among the efforts undertaken was the transformation of the Technical and Vocational Education and Training (TVET) system. Kurikulum Standard Kolej Vokasional (KSKV) syllabus has been introduced to guide the teaching process at Vocational College. The KSKV was developed based on the latest industry requirements under the National Occupational Skill Standard (NOSS). Jabatan Pembangunan Kemahiran (JPK) is responsible for ensuring that the skills provided to students meet NOSS standards. However, there are issues and challenges faced in implementing the transformation, which is the level of knowledge and technical skills proficiency that lecturers have that is an important aspect of enabling educators to cope with growing technology. In line with the latest technological advances and industry demands, the issue that has begun among lecturers is the preparation of lecturers in terms of knowledge and technical skills related to the latest technologies updated in KSKV. This will further impact the quality of teaching delivery delivered by lecturers at Vocational College. Finally, the latest technical skills are essential to enable the teaching process delivered by the lecturers to be mastered by the students and thus produce qualified Vocational College graduates according to the latest industry employment standards.


Author(s):  
Ivan Mozghovyi ◽  
Anatoliy Sergiyenko ◽  
Roman Yershov

Increasing requirements for data transfer and storage is one of the crucial questions now. There are several ways of high-speed data transmission, but they meet limited requirements applied to their narrowly focused specific target. The data compression approach gives the solution to the problems of high-speed transfer and low-volume data storage. This paper is devoted to the compression of GIF images, using a modified LZW algorithm with a tree-based dictionary. It has led to a decrease in lookup time and an increase in the speed of data compression, and in turn, allows developing the method of constructing a hardware compression accelerator during the future research.


Sign in / Sign up

Export Citation Format

Share Document