database manipulation
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 8)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Prof. Mrunal Pathak ◽  
Amol Suradkar ◽  
Ajinkya Kadam ◽  
Akansha Ghodeswar ◽  
Prashant Parde

Increasingly digital technology in the present helped many people lives. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, there is one organization that manages it. Some of the problems that can occur in traditional electoral systems is with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities. Blockchain technology is one of solutions, because it embraces a decentralized system and the entire database are owned by many users. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. This research discusses the recording of voting result using blockchain algorithm from every place of election. Unlike Bitcoin with its Proof of Work, this thesis proposed a method based on a predetermined turn on the system for each node in the built of blockchain


Author(s):  
Maxime Gobert ◽  
Csaba Nagy ◽  
Henrique Rocha ◽  
Serge Demeyer ◽  
Anthony Cleve

2020 ◽  
Vol 4 (2) ◽  
pp. 87-95
Author(s):  
Hero Wintolo ◽  
Nurcahyani Dewi Retnowati ◽  
Andi Ahmad Iswar Ibrahim

Penelitian ini memiliki tujuan untuk menyediakan layanan dalam  bentuk aplikasi untuk melakukan kegiatan Database Manipulation Language (DML) yang  diterapkan dalam bentuk cloud computing . Sebanyak tiga buah computer dimanfaatkan untuk memberikan layanan pemrosesan dan penyimpanan database tanpa menggunakan perintah yang ada pada Structure Query Language (SQL) dan satu buah computer digunakan sebagai server yang melayani pengguna untuk melakukan kegiatan DML tanpa menggunakan perintah SQL .  Dengan menggunakan teknologi cloud  pengelolaan database berbasis SQL yang biasanya menggunakan perintah berbasis command line dapat dilakukan dengan cara yang lebih mudah. Layanan yang diberikan oleh cloud untuk mengelola database berbasis SQL khususnya fungsi DML. Hasil dari implementasi layanan pada jaringan internet, Wireless lan, dan LAN dapat berjalan dengan baik dengan kasus pengujian fungsi pada ketiga media jaringan tersebut. Dengan demikian para pengguna yang sama sekali tidak mengerti bahasa SQL dapat menggunakan layanan ini dengan mudah untuk mengolah database SQL secara mandiri.


2020 ◽  
Vol 18 (1) ◽  
pp. 56
Author(s):  
Ajib Susanto

<p>The increasing of digital technology today has helped many people to fulfill their needs. But the election system, still conventionally using paper in its implementation. Elections in general still use a centralized system, where there is an organization that manages it. Some of the problems that may occur in traditional electoral systems are that there are organizations that have full control over the database and system, so the possibility of hacking the database is quite a big opportunity.</p>Blockchain innovation is one arrangement that can be utilized in light of the fact that it has a decentralized framework and the whole database is duplicated by all clients. Blockchain itself has been used by Bitcoin and Ethereum cryptocurrency which is known as a decentralized system. By using the blockchain in database recording on an e-voting system can reduce one source of fraud that is database manipulation. This study discusses the recording of voting data using blockchain technology. The implementation of Smart Contracts contained in the Ethereum Blockchain will be implemented to create this voting system


JURNAL PETIK ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 7-17
Author(s):  
Sindi Raharjo Tanjung ◽  
Dedi Suhendro

Abstact — The Tirtauli Pematangsiantar Regional Water Company (PDAM) is classified as a state-owned company that has operational objectives to meet the needs of the community. Revenues at the Tirtauli Regional Water Company (PDAM) are divided into two, namely water revenues and non-water revenues. Regional income recapitulation Tirtauli Pematangsaiantar still uses Microsoft Excel application where the application is still often an error in revenue recapitulation. Based on this, the authors designed a recapitulation income accounting system application program using Microsoft Basic Net and MySQL database to produce applications better than those running. Application of income recapitulation accounting system using Microsoft Visual Basic Net is designed to produce a better application using a MySQL database designed to perform database manipulation processes with various facilities. The purpose of the authors designed the application to facilitate the User in recapitulation of income with the Visual Basic Net application system so that it can help or simplify the process of inputing income recapitulation.Keywords : Application, Revenue Recapitulation, Microsoft Visual Basic Net, MySQL Database.Abstrak — Perusahaan Daerah Air Minum (PDAM) Tirtauli Pematangsiantar digolongkan sebagai perusahaan negara yang memiliki tujuan operasional untuk memenuhi kebutuhan masyarakat. Pendapatan pada Perusahaan Daerah Air Minum (PDAM) Tirtauli terbagi menjadi dua, yaitu penerimaan air dan pendapatan non-air. Rekapitulasi pendapatan perusahaan Daerah Air Minum (PDAM) Tirtauli Pematangsaiantar masih menggunakan aplikasi Microsoft Excel di mana aplikasi masih sering kesalahan dalam rekapitulasi pendapatan. Berdasarkan hal ini, penulis merancang program aplikasi sistem akuntansi pendapatan rekapitulasi dengan menggunakan Microsoft Basic Net dan database MySQL untuk menghasilkan aplikasi lebih baik yang sedang berjalan. Aplikasi sistem akuntansi rekapitulasi  pendapatan menggunakan Microsoft Visual Basic Net dirancang untuk menghasilkan suatu aplikasi yang lebih baik dengan menggunakan database MySQL yang didesain untuk melakukan proses manipulasi database dengan berbagai fasilitas. Tujuan penulis merancang aplikasi untuk mempermudah User dalam melakukan rekapitulasi pendapatan dengan sistem aplikasi Visual Basic Net sehingga dapat membantu atau mempermudah proses penginputan rekapitulasi pendapatan.Kata Kunci : Aplikasi, Rekapitulasi Pendapatan, Microsoft Visual Basic Net, Database MySQL.


The security and accountability issues are a challenge to the traditional structure from still widespread elections. General e-voting system use a centralized system, where one organization manages overall system. These organisations have full control over the database and system, allowing manipulation of the database. There should be no e-voting system to secure data and potential attacks should be able to withstand. Blockchain technology should solve certain voting problems. In this paper we are implementing an ethereum blockchain based electronic voting system. Ethereum blockchain networks are used to transfer money and store data. Networks are organized by one or more machines. Every node is a machine that running an ethereum client. The eligible one can run the node. By adopting blockchain in e-voting system database distribution, one of the cheating sources of database manipulation and data loss can be reduced. This can be a better solution for the currently existing issues over rigging the electronic voting machines to win elections by the political parties in our government


Author(s):  
Somchai Prakancharoen

The objective of this research was to suggest some simple solution to increase database manipulation security. Based on advantage of Homomorphic encryption, user’s data in database is always encrypted by Homomorphic encryption algorithm such as Paillier. User’s data is manipulated or processed on many times such as addition, subtraction, multiplication and division. By the advantage of Homomorphic encryption algorithm, user’s data were no need to decrypt while it was manipulated therefore secrecy of data was still reserved. Unfortunately, Paillier’s Homomorphic encryption is normally coverage only addition and multiplication mathematical data operation. This paper suggests simple technique to enhance Pailler’s encryption algorithm to perform data operation as well in subtraction and division operation. Evaluation in suggested data base manipulation, DSM-PHE, indicates that its operation tasks was five operation times more than ordinary data base manipulation operation tasks, without any encryption. Therefore DSM-PHE should be especially used in more sensitive data.


Author(s):  
Vyacheslav Kozlov ◽  
Elena Alontseva ◽  
Alexander Guryanov

The article discusses the use of the student's cumulative assessment system of academic progress as a valid element of e-learning in universities. Today, online learning is becoming mainstream. Training on online platforms is convenient and interesting, however, it is not acceptable for all students due to the need to conclude network contracts or lack of regulations on how to recalculate the results of online training at the university, etc. Using the cumulative system becomes the mechanism that solves the issue of e-learning at universities, including using distance learning technologies, without cooperating with the online platforms. The suggested approach is a new one. The purpose of the article is to study the electronic information and educational environment of the university to monitor the students’ progress. The recommended assessment means the cumulative assessment, which reflects the consistency of knowledge of the student as a participant in the training process. The recommended assessment is suggested by the information system and is calculated using a mathematical model that considers all types of student work. The assessment becomes the main one and should be considered during an interim assessment. The study of the recommended assessment formation uses the methods of mathematical statistics, data grouping, associative data sets, data verification, database manipulation. The authors also give an optimal strategy for storing large amounts of data based on minimizing their volume while maintaining the necessary access speed. 


Sign in / Sign up

Export Citation Format

Share Document