Journal Navigation
Published: Feb 3, 2023
DOI: 10.4018/JDM.317222
Volume 34
Pranay Sindhu, Kumkum Bharti
This study uses the approach-avoidance theory to investigate the impact of the atmospherics of a social commerce page, which comprises page aesthetics and page interaction. The study looks at how a... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Sindhu, Pranay, and Kumkum Bharti. "The Effects of Atmospherics and Influencers on Purchase Intention in Social Commerce." JDM vol.34, no.1 2023: pp.1-23. http://doi.org/10.4018/JDM.317222

APA

Sindhu, P. & Bharti, K. (2023). The Effects of Atmospherics and Influencers on Purchase Intention in Social Commerce. Journal of Database Management (JDM), 34(1), 1-23. http://doi.org/10.4018/JDM.317222

Chicago

Sindhu, Pranay, and Kumkum Bharti. "The Effects of Atmospherics and Influencers on Purchase Intention in Social Commerce," Journal of Database Management (JDM) 34, no.1: 1-23. http://doi.org/10.4018/JDM.317222

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/JDM.318450
Volume 34
Jun Lu, Wenhe Xu, Kailong Zhou, Zhicong Guo
Aiming at the speed of frequent itemset mining, a new frequent itemset mining algorithm based on a linear table is proposed. The linear table can store more shared information and reduce the number... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Lu, Jun, et al. "Frequent Itemset Mining Algorithm Based on Linear Table." JDM vol.34, no.1 2023: pp.1-21. http://doi.org/10.4018/JDM.318450

APA

Lu, J., Xu, W., Zhou, K., & Guo, Z. (2023). Frequent Itemset Mining Algorithm Based on Linear Table. Journal of Database Management (JDM), 34(1), 1-21. http://doi.org/10.4018/JDM.318450

Chicago

Lu, Jun, et al. "Frequent Itemset Mining Algorithm Based on Linear Table," Journal of Database Management (JDM) 34, no.1: 1-21. http://doi.org/10.4018/JDM.318450

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/JDM.318451
Volume 34
Junfeng Man, Longqian Zhao, Bowen Xu, Cheng Peng, Junjie Jiang, Yi Liu
Large-scale manufacturing enterprises have complex business processes in their production workshops, and the edge-edge collaborative business model cannot adapt to the traditional computation... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Man, Junfeng, et al. "Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode." JDM vol.34, no.1 2023: pp.1-29. http://doi.org/10.4018/JDM.318451

APA

Man, J., Zhao, L., Xu, B., Peng, C., Jiang, J., & Liu, Y. (2023). Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode. Journal of Database Management (JDM), 34(1), 1-29. http://doi.org/10.4018/JDM.318451

Chicago

Man, Junfeng, et al. "Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode," Journal of Database Management (JDM) 34, no.1: 1-29. http://doi.org/10.4018/JDM.318451

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/JDM.318452
Volume 34
Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu
In 2013, a lightweight block cipher SIMON is proposed by NSA. This paper tries to investigate this design criterion in terms of resisting against impossible differential cryptanalysis. On one hand... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhang, Kai, et al. "Selecting Rotation Constants on SIMON-Type Ciphers." JDM vol.34, no.1 2023: pp.1-23. http://doi.org/10.4018/JDM.318452

APA

Zhang, K., Lai, X., Guan, J., & Hu, B. (2023). Selecting Rotation Constants on SIMON-Type Ciphers. Journal of Database Management (JDM), 34(1), 1-23. http://doi.org/10.4018/JDM.318452

Chicago

Zhang, Kai, et al. "Selecting Rotation Constants on SIMON-Type Ciphers," Journal of Database Management (JDM) 34, no.1: 1-23. http://doi.org/10.4018/JDM.318452

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/JDM.318453
Volume 34
Gongqing Wu, Zhuochun Miao, Shengjie Hu, Yinghuan Wang, Zan Zhang, Xianyu Bao
Supervised Meta-event extraction suffers from two limitations: (1) The extracted meta-events only contain local semantic information and do not present the core content of the text; (2) model... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wu, Gongqing, et al. "Semi-Supervised Event Extraction Incorporated With Topic Event Frame." JDM vol.34, no.1 2023: pp.1-26. http://doi.org/10.4018/JDM.318453

APA

Wu, G., Miao, Z., Hu, S., Wang, Y., Zhang, Z., & Bao, X. (2023). Semi-Supervised Event Extraction Incorporated With Topic Event Frame. Journal of Database Management (JDM), 34(1), 1-26. http://doi.org/10.4018/JDM.318453

Chicago

Wu, Gongqing, et al. "Semi-Supervised Event Extraction Incorporated With Topic Event Frame," Journal of Database Management (JDM) 34, no.1: 1-26. http://doi.org/10.4018/JDM.318453

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/JDM.318454
Volume 34
Junhua Fang, Zonglei Zhang
LBS-RT (location-based service in a real-time manner) has become popular because it can provide quick and timely services. Range query is often used in LBS-RT, which finds objects in a specified... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Fang, Junhua, and Zonglei Zhang. "A Distributed Spatial Index With High Update Efficiency for Location-Based Real-Time Services." JDM vol.34, no.1 2023: pp.1-28. http://doi.org/10.4018/JDM.318454

APA

Fang, J. & Zhang, Z. (2023). A Distributed Spatial Index With High Update Efficiency for Location-Based Real-Time Services. Journal of Database Management (JDM), 34(1), 1-28. http://doi.org/10.4018/JDM.318454

Chicago

Fang, Junhua, and Zonglei Zhang. "A Distributed Spatial Index With High Update Efficiency for Location-Based Real-Time Services," Journal of Database Management (JDM) 34, no.1: 1-28. http://doi.org/10.4018/JDM.318454

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/JDM.318455
Volume 34
Gang Peng, Rahul Bhaskar
Job automation is a critical decision that has brought about profound changes in the workplace. However, the question of what drives job automation remains unclear. This study conducts an... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Peng, Gang, and Rahul Bhaskar. "Artificial Intelligence and Machine Learning for Job Automation: A Review and Integration." JDM vol.34, no.1 2023: pp.1-12. http://doi.org/10.4018/JDM.318455

APA

Peng, G. & Bhaskar, R. (2023). Artificial Intelligence and Machine Learning for Job Automation: A Review and Integration. Journal of Database Management (JDM), 34(1), 1-12. http://doi.org/10.4018/JDM.318455

Chicago

Peng, Gang, and Rahul Bhaskar. "Artificial Intelligence and Machine Learning for Job Automation: A Review and Integration," Journal of Database Management (JDM) 34, no.1: 1-12. http://doi.org/10.4018/JDM.318455

Export Reference

Mendeley
Published: Feb 16, 2023
DOI: 10.4018/JDM.318456
Volume 34
Taiyu Ban, Xiangyu Wang, Xin Wang, Jiarun Zhu, Lvzhou Chen, Yizhan Fan
National standards for natural resources (NSNR) plays an important role in promoting efficient use of China's natural resources, which sets standards for many domains such as marine and land... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Ban, Taiyu, et al. "Knowledge Extraction From National Standards for Natural Resources: A Method for Multi-Domain Texts." JDM vol.34, no.1 2023: pp.1-23. http://doi.org/10.4018/JDM.318456

APA

Ban, T., Wang, X., Wang, X., Zhu, J., Chen, L., & Fan, Y. (2023). Knowledge Extraction From National Standards for Natural Resources: A Method for Multi-Domain Texts. Journal of Database Management (JDM), 34(1), 1-23. http://doi.org/10.4018/JDM.318456

Chicago

Ban, Taiyu, et al. "Knowledge Extraction From National Standards for Natural Resources: A Method for Multi-Domain Texts," Journal of Database Management (JDM) 34, no.1: 1-23. http://doi.org/10.4018/JDM.318456

Export Reference

Mendeley
Published: Apr 21, 2023
DOI: 10.4018/JDM.321739
Volume 34
Huosong Xia, Wuyue An, Zuopeng (Justin) Zhang
Outlier detection is currently applied in many fields, where existing research focuses on improving imbalanced data or enhancing classification accuracy. In the financial area, financial fraud... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Xia, Huosong, et al. "Credit Risk Models for Financial Fraud Detection: A New Outlier Feature Analysis Method of XGBoost With SMOTE." JDM vol.34, no.1 2023: pp.1-20. http://doi.org/10.4018/JDM.321739

APA

Xia, H., An, W., & Zuopeng (Justin) Zhang. (2023). Credit Risk Models for Financial Fraud Detection: A New Outlier Feature Analysis Method of XGBoost With SMOTE. Journal of Database Management (JDM), 34(1), 1-20. http://doi.org/10.4018/JDM.321739

Chicago

Xia, Huosong, Wuyue An, and Zuopeng (Justin) Zhang. "Credit Risk Models for Financial Fraud Detection: A New Outlier Feature Analysis Method of XGBoost With SMOTE," Journal of Database Management (JDM) 34, no.1: 1-20. http://doi.org/10.4018/JDM.321739

Export Reference

Mendeley
Published: Apr 20, 2023
DOI: 10.4018/JDM.321740
Volume 34
Yifei Xue, Jian Wang, Weipeng Jing
Numerous web services with the same function but different service qualities are constantly emerging on the network. Optimizing web service composition based on multiple candidate services sets an... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Xue, Yifei, et al. "An Enhanced Energy-Efficient Web Service Composition Algorithm Based on the Firefly Algorithm." JDM vol.34, no.1 2023: pp.1-19. http://doi.org/10.4018/JDM.321740

APA

Xue, Y., Wang, J., & Jing, W. (2023). An Enhanced Energy-Efficient Web Service Composition Algorithm Based on the Firefly Algorithm. Journal of Database Management (JDM), 34(1), 1-19. http://doi.org/10.4018/JDM.321740

Chicago

Xue, Yifei, Jian Wang, and Weipeng Jing. "An Enhanced Energy-Efficient Web Service Composition Algorithm Based on the Firefly Algorithm," Journal of Database Management (JDM) 34, no.1: 1-19. http://doi.org/10.4018/JDM.321740

Export Reference

Mendeley
Published: Apr 20, 2023
DOI: 10.4018/JDM.321757
Volume 34
Mehmet Demir, Ozgur Turetken, Alexander Ferworn, Mehdi Kargar
Climate-related catastrophes leave people in dire need of aid. A major obstacle in providing help to people is the lack of trust in the aid process. Charity organizations want to ensure that funds... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Demir, Mehmet, et al. "A Blockchain-Based System for Aid Delivery: Concept Development, Data Modeling, and Validation." JDM vol.34, no.1 2023: pp.1-35. http://doi.org/10.4018/JDM.321757

APA

Demir, M., Turetken, O., Ferworn, A., & Kargar, M. (2023). A Blockchain-Based System for Aid Delivery: Concept Development, Data Modeling, and Validation. Journal of Database Management (JDM), 34(1), 1-35. http://doi.org/10.4018/JDM.321757

Chicago

Demir, Mehmet, et al. "A Blockchain-Based System for Aid Delivery: Concept Development, Data Modeling, and Validation," Journal of Database Management (JDM) 34, no.1: 1-35. http://doi.org/10.4018/JDM.321757

Export Reference

Mendeley
Published: Apr 21, 2023
DOI: 10.4018/JDM.321758
Volume 34
Jeng-Shyang Pan, Pei Hu, Tien-Szu Pan, Shu-Chuan Chu
Meta-heuristic algorithms have been widely used in deep learning. A hybrid algorithm EO-GWO is proposed to train the parameters of long short-term memory (LSTM), which greatly balances the abilities... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Pan, Jeng-Shyang, et al. "Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction." JDM vol.34, no.1 2023: pp.1-20. http://doi.org/10.4018/JDM.321758

APA

Pan, J., Hu, P., Pan, T., & Chu, S. (2023). Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction. Journal of Database Management (JDM), 34(1), 1-20. http://doi.org/10.4018/JDM.321758

Chicago

Pan, Jeng-Shyang, et al. "Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction," Journal of Database Management (JDM) 34, no.1: 1-20. http://doi.org/10.4018/JDM.321758

Export Reference

Mendeley
Published: Apr 20, 2023
DOI: 10.4018/JDM.322019
Volume 34
Nan Feng, Yuguang Wang, Zhiguo Chen, Tingting Song
The advent of the era of big data not only enables us to have more information that we can use, but also creates conditions for us to create and disseminate information in a timely manner. This... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Feng, Nan, et al. "The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis." JDM vol.34, no.1 2023: pp.1-23. http://doi.org/10.4018/JDM.322019

APA

Feng, N., Wang, Y., Chen, Z., & Song, T. (2023). The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis. Journal of Database Management (JDM), 34(1), 1-23. http://doi.org/10.4018/JDM.322019

Chicago

Feng, Nan, et al. "The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis," Journal of Database Management (JDM) 34, no.1: 1-23. http://doi.org/10.4018/JDM.322019

Export Reference

Mendeley
Published: Apr 20, 2023
DOI: 10.4018/JDM.322020
Volume 34
Prajwal Eachempati, Praveen Ranjan Srivastava
Automation of financial data collection, generation, accumulation, and interpretation for decision making may reduce volatility in the stock market and increase liquidity occasionally. Thus, future... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Eachempati, Prajwal, and Praveen Ranjan Srivastava. "Prediction of the Stock Market From Linguistic Phrases: A Deep Neural Network Approach." JDM vol.34, no.1 2023: pp.1-22. http://doi.org/10.4018/JDM.322020

APA

Eachempati, P. & Srivastava, P. R. (2023). Prediction of the Stock Market From Linguistic Phrases: A Deep Neural Network Approach. Journal of Database Management (JDM), 34(1), 1-22. http://doi.org/10.4018/JDM.322020

Chicago

Eachempati, Prajwal, and Praveen Ranjan Srivastava. "Prediction of the Stock Market From Linguistic Phrases: A Deep Neural Network Approach," Journal of Database Management (JDM) 34, no.1: 1-22. http://doi.org/10.4018/JDM.322020

Export Reference

Mendeley
Published: Apr 21, 2023
DOI: 10.4018/JDM.322086
Volume 34
Rankang Li, Shanxiong Chen, Fujia Zhao, Xiaogang Qiu
This article introduces a text detection model for historical documents images. The handwritten characters in historical documents are always difficult to detect because they contain fuzzy or... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Li, Rankang, et al. "Text Detection Model for Historical Documents Using CNN and MSER." JDM vol.34, no.1 2023: pp.1-23. http://doi.org/10.4018/JDM.322086

APA

Li, R., Chen, S., Zhao, F., & Qiu, X. (2023). Text Detection Model for Historical Documents Using CNN and MSER. Journal of Database Management (JDM), 34(1), 1-23. http://doi.org/10.4018/JDM.322086

Chicago

Li, Rankang, et al. "Text Detection Model for Historical Documents Using CNN and MSER," Journal of Database Management (JDM) 34, no.1: 1-23. http://doi.org/10.4018/JDM.322086

Export Reference

Mendeley
Published: Apr 21, 2023
DOI: 10.4018/JDM.322087
Volume 34
Yanwei Zheng, Zichun Zhang, Qi Luo, Zhenzhen Xie, Dongxiao Yu
The study of graph kernels has been an important area of graph analysis, which is widely used to solve the similarity problems between graphs. Most of the existing graph kernels consider either... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zheng, Yanwei, et al. "A Truss-Based Framework for Graph Similarity Computation." JDM vol.34, no.1 2023: pp.1-18. http://doi.org/10.4018/JDM.322087

APA

Zheng, Y., Zhang, Z., Luo, Q., Xie, Z., & Yu, D. (2023). A Truss-Based Framework for Graph Similarity Computation. Journal of Database Management (JDM), 34(1), 1-18. http://doi.org/10.4018/JDM.322087

Chicago

Zheng, Yanwei, et al. "A Truss-Based Framework for Graph Similarity Computation," Journal of Database Management (JDM) 34, no.1: 1-18. http://doi.org/10.4018/JDM.322087

Export Reference

Mendeley
Published: May 18, 2023
DOI: 10.4018/JDM.323436
Volume 34
Fangwan Huang, Shijie Zhuang, Zhiyong Yu, Yuzhong Chen, Kun Guo
In order to provide more efficient and reliable power services than the traditional grid, it is necessary for the smart grid to accurately predict the electric load. Recently, recurrent neural... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Huang, Fangwan, et al. "Adaptive Modularized Recurrent Neural Networks for Electric Load Forecasting." JDM vol.34, no.1 2023: pp.1-18. http://doi.org/10.4018/JDM.323436

APA

Huang, F., Zhuang, S., Yu, Z., Chen, Y., & Guo, K. (2023). Adaptive Modularized Recurrent Neural Networks for Electric Load Forecasting. Journal of Database Management (JDM), 34(1), 1-18. http://doi.org/10.4018/JDM.323436

Chicago

Huang, Fangwan, et al. "Adaptive Modularized Recurrent Neural Networks for Electric Load Forecasting," Journal of Database Management (JDM) 34, no.1: 1-18. http://doi.org/10.4018/JDM.323436

Export Reference

Mendeley
Published: Jul 10, 2023
DOI: 10.4018/JDM.325351
Volume 34
Haiyan Wang, Jun Hong, Kaixiang You, Jian Luo
With the massive growth of edge devices, how to provide users with video recommendation services in a mobile edge environment has become a research hotspot. Most traditional video recommendation... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wang, Haiyan, et al. "Multi-Feature Video Recommendation Based on Hypergraph Convolution for Mobile Edge Environment." JDM vol.34, no.1 2023: pp.1-18. http://doi.org/10.4018/JDM.325351

APA

Wang, H., Hong, J., You, K., & Luo, J. (2023). Multi-Feature Video Recommendation Based on Hypergraph Convolution for Mobile Edge Environment. Journal of Database Management (JDM), 34(1), 1-18. http://doi.org/10.4018/JDM.325351

Chicago

Wang, Haiyan, et al. "Multi-Feature Video Recommendation Based on Hypergraph Convolution for Mobile Edge Environment," Journal of Database Management (JDM) 34, no.1: 1-18. http://doi.org/10.4018/JDM.325351

Export Reference

Mendeley
Published: Jul 11, 2023
DOI: 10.4018/JDM.325352
Volume 34
Harish Kumar, Rameshwar Shivadas Ture, M. P. Gupta, R. S. Sharma
Digital transformation of enterprises is driving the need for a digital identity to recognize people for delivering services. The implementation of digital identity is complex, requiring several... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Kumar, Harish, et al. "Technological Solutions for Digital Identity: A Computer Vision-Based Approach to Mitigate Imaging Errors." JDM vol.34, no.1 2023: pp.1-17. http://doi.org/10.4018/JDM.325352

APA

Kumar, H., Ture, R. S., Gupta, M. P., & Sharma, R. S. (2023). Technological Solutions for Digital Identity: A Computer Vision-Based Approach to Mitigate Imaging Errors. Journal of Database Management (JDM), 34(1), 1-17. http://doi.org/10.4018/JDM.325352

Chicago

Kumar, Harish, et al. "Technological Solutions for Digital Identity: A Computer Vision-Based Approach to Mitigate Imaging Errors," Journal of Database Management (JDM) 34, no.1: 1-17. http://doi.org/10.4018/JDM.325352

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/JDM.318413
Volume 34
Monu Singh, Amit Kumar Singh
Today, in the era of big data, an increasingly serious problem is the security of digital media in the healthcare domain. Encryption is a popular technique to resolve the security concern of medical... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Singh, Monu, and Amit Kumar Singh. "Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE." JDM vol.34, no.2 2023: pp.1-20. http://doi.org/10.4018/JDM.318413

APA

Singh, M. & Singh, A. K. (2023). Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE. Journal of Database Management (JDM), 34(2), 1-20. http://doi.org/10.4018/JDM.318413

Chicago

Singh, Monu, and Amit Kumar Singh. "Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE," Journal of Database Management (JDM) 34, no.2: 1-20. http://doi.org/10.4018/JDM.318413

Export Reference

Mendeley
Published: Feb 16, 2023
DOI: 10.4018/JDM.318414
Volume 34
Farhan Ullah, Xiaochun Cheng, Leonardo Mostarda, Sohail Jabbar
Currently, malware attacks pose a high risk to compromise the security of Android-IoT apps. These threats have the potential to steal critical information, causing economic, social, and financial... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Ullah, Farhan, et al. "Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis." JDM vol.34, no.2 2023: pp.1-26. http://doi.org/10.4018/JDM.318414

APA

Ullah, F., Cheng, X., Mostarda, L., & Jabbar, S. (2023). Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis. Journal of Database Management (JDM), 34(2), 1-26. http://doi.org/10.4018/JDM.318414

Chicago

Ullah, Farhan, et al. "Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis," Journal of Database Management (JDM) 34, no.2: 1-26. http://doi.org/10.4018/JDM.318414

Export Reference

Mendeley
Published: Feb 16, 2023
DOI: 10.4018/JDM.318415
Volume 34
Maryam Bukhari, Sadaf Yasmin, Saira Gillani, Muazzam Maqsood, Seungmin Rho, Sang Soo Yeo
Currently, the internet of everything (IoE) enabled smart surveillance systems are widely used in various fields to prevent various forms of abnormal behaviors. The authors assess the vulnerability... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Bukhari, Maryam, et al. "Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks." JDM vol.34, no.2 2023: pp.1-25. http://doi.org/10.4018/JDM.318415

APA

Bukhari, M., Yasmin, S., Gillani, S., Maqsood, M., Rho, S., & Yeo, S. S. (2023). Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks. Journal of Database Management (JDM), 34(2), 1-25. http://doi.org/10.4018/JDM.318415

Chicago

Bukhari, Maryam, et al. "Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks," Journal of Database Management (JDM) 34, no.2: 1-25. http://doi.org/10.4018/JDM.318415

Export Reference

Mendeley
Published: Apr 14, 2023
DOI: 10.4018/JDM.321465
Volume 34
Parul Lakhotia, Rinky Dwivedi, Deepak Kumar Sharma, Nonita Sharma
Internet of everything (IoE) has the power of reforming the healthcare sector - various medical devices, hardware, and software applications that are interconnected, tendering a massive volume of... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Lakhotia, Parul, et al. "Intrusion Detection System for IoE-Based Medical Networks." JDM vol.34, no.2 2023: pp.1-18. http://doi.org/10.4018/JDM.321465

APA

Lakhotia, P., Dwivedi, R., Sharma, D. K., & Sharma, N. (2023). Intrusion Detection System for IoE-Based Medical Networks. Journal of Database Management (JDM), 34(2), 1-18. http://doi.org/10.4018/JDM.321465

Chicago

Lakhotia, Parul, et al. "Intrusion Detection System for IoE-Based Medical Networks," Journal of Database Management (JDM) 34, no.2: 1-18. http://doi.org/10.4018/JDM.321465

Export Reference

Mendeley
Published: Jun 1, 2023
DOI: 10.4018/JDM.324076
Volume 34
R. Gurunath, Debabrata Samanta
The primary concern of every individual and organization is the security of sensitive information generated via authorized activities; nonetheless, illicit data drawing and extraction by attackers... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Gurunath, R., and Debabrata Samanta. "A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography." JDM vol.34, no.2 2023: pp.1-22. http://doi.org/10.4018/JDM.324076

APA

Gurunath, R. & Samanta, D. (2023). A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography. Journal of Database Management (JDM), 34(2), 1-22. http://doi.org/10.4018/JDM.324076

Chicago

Gurunath, R., and Debabrata Samanta. "A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography," Journal of Database Management (JDM) 34, no.2: 1-22. http://doi.org/10.4018/JDM.324076

Export Reference

Mendeley
Published: Jun 8, 2023
DOI: 10.4018/JDM.324099
Volume 34
Erukala Suresh Babu, Bhukya Padma, Soumya Ranjan Nayak, Nazeeruddin Mohammad, Uttam Ghosh
Internet of everything (IoET) is one of the key integrators in Industry 4.0, which contributes to large-scale deployment of low-power and lossy (LLN) networks to connecting people, processes, data... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Babu, Erukala Suresh, et al. "Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything." JDM vol.34, no.2 2023: pp.1-33. http://doi.org/10.4018/JDM.324099

APA

Babu, E. S., Padma, B., Nayak, S. R., Mohammad, N., & Ghosh, U. (2023). Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything. Journal of Database Management (JDM), 34(2), 1-33. http://doi.org/10.4018/JDM.324099

Chicago

Babu, Erukala Suresh, et al. "Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything," Journal of Database Management (JDM) 34, no.2: 1-33. http://doi.org/10.4018/JDM.324099

Export Reference

Mendeley
Published: Apr 14, 2023
DOI: 10.4018/JDM.321196
Volume 34
Haiyi Liu, Ying Jiang, Yongquan Chen
While mobile application (app) software is becoming increasingly important in people's daily lives, researchers have the limitation of understanding the details of user operations inside the app.... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Haiyi, et al. "Completion of Parallel app Software User Operation Sequences Based on Temporal Context." JDM vol.34, no.3 2023: pp.1-17. http://doi.org/10.4018/JDM.321196

APA

Liu, H., Jiang, Y., & Chen, Y. (2023). Completion of Parallel app Software User Operation Sequences Based on Temporal Context. Journal of Database Management (JDM), 34(3), 1-17. http://doi.org/10.4018/JDM.321196

Chicago

Liu, Haiyi, Ying Jiang, and Yongquan Chen. "Completion of Parallel app Software User Operation Sequences Based on Temporal Context," Journal of Database Management (JDM) 34, no.3: 1-17. http://doi.org/10.4018/JDM.321196

Export Reference

Mendeley
Published: Apr 21, 2023
DOI: 10.4018/JDM.321543
Volume 34
Hongjie Wan, Junchen Ma, Qiumei Yu, Guozi Sun, Hansen He, Huakang Li
With the development of China's economy, the urban floating population is also increasing, resulting in a sharp increase in the amount of urban waste. How to recycle and dispose of municipal waste... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wan, Hongjie, et al. "Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window." JDM vol.34, no.3 2023: pp.1-16. http://doi.org/10.4018/JDM.321543

APA

Wan, H., Ma, J., Yu, Q., Sun, G., He, H., & Li, H. (2023). Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window. Journal of Database Management (JDM), 34(3), 1-16. http://doi.org/10.4018/JDM.321543

Chicago

Wan, Hongjie, et al. "Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window," Journal of Database Management (JDM) 34, no.3: 1-16. http://doi.org/10.4018/JDM.321543

Export Reference

Mendeley
Published: Apr 13, 2023
DOI: 10.4018/JDM.321544
Volume 34
Zhihua Zhong, Guanlin Chen, Rui Wang, Yuchi Huo
As the demand for high quality and high resolution in real-time rendering grows, superresolution is on its way to becoming a necessary component in modern real-time rendering applications (e.g.... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhong, Zhihua, et al. "Neural Super-Resolution in Real-Time Rendering Using Auxiliary Feature Enhancement." JDM vol.34, no.3 2023: pp.1-13. http://doi.org/10.4018/JDM.321544

APA

Zhong, Z., Chen, G., Wang, R., & Huo, Y. (2023). Neural Super-Resolution in Real-Time Rendering Using Auxiliary Feature Enhancement. Journal of Database Management (JDM), 34(3), 1-13. http://doi.org/10.4018/JDM.321544

Chicago

Zhong, Zhihua, et al. "Neural Super-Resolution in Real-Time Rendering Using Auxiliary Feature Enhancement," Journal of Database Management (JDM) 34, no.3: 1-13. http://doi.org/10.4018/JDM.321544

Export Reference

Mendeley
Published: Apr 14, 2023
DOI: 10.4018/JDM.321545
Volume 34
Yikai Liu, Fenglan Ju, Qunwei Zhang, Meng Zhang, Zezhong Ma, Mingduo Li, Aimin Yang, Fengchun Liu
The Internet of Things provides convenience to health systems, especially for remote monitoring of patient physical indicators. While providing convenience, there may be more security... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Yikai, et al. "Overview of Internet of Medical Things Security Based on Blockchain Access Control." JDM vol.34, no.3 2023: pp.1-20. http://doi.org/10.4018/JDM.321545

APA

Liu, Y., Ju, F., Zhang, Q., Zhang, M., Ma, Z., Li, M., Yang, A., & Liu, F. (2023). Overview of Internet of Medical Things Security Based on Blockchain Access Control. Journal of Database Management (JDM), 34(3), 1-20. http://doi.org/10.4018/JDM.321545

Chicago

Liu, Yikai, et al. "Overview of Internet of Medical Things Security Based on Blockchain Access Control," Journal of Database Management (JDM) 34, no.3: 1-20. http://doi.org/10.4018/JDM.321545

Export Reference

Mendeley
Published: Apr 21, 2023
DOI: 10.4018/JDM.321546
Volume 34
Yalan Feng, Huabin Wang, Dailei Zhang, Jiahao Li, Liang Tao
The existing one-factor cancellable biometrics algorithms generally require random sequences to reorder the biometrics, which reduces the discrimination of the transformed biometrics. Some... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Feng, Yalan, et al. "One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding." JDM vol.34, no.3 2023: pp.1-18. http://doi.org/10.4018/JDM.321546

APA

Feng, Y., Wang, H., Zhang, D., Li, J., & Tao, L. (2023). One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding. Journal of Database Management (JDM), 34(3), 1-18. http://doi.org/10.4018/JDM.321546

Chicago

Feng, Yalan, et al. "One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding," Journal of Database Management (JDM) 34, no.3: 1-18. http://doi.org/10.4018/JDM.321546

Export Reference

Mendeley
Published: Apr 14, 2023
DOI: 10.4018/JDM.321547
Volume 34
Min Li, Huabin Wang, Leqian Li, Dailei Zhang, Liang Tao
Traditional methods of extracting finger vein texture changes and orientation features are susceptible to illumination, translation, noise, and rotation, and the process has difficulty directly... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Li, Min, et al. "Finger Vein Recognition Based on a Histogram of Competitive Gabor Directional Binary Statistics." JDM vol.34, no.3 2023: pp.1-19. http://doi.org/10.4018/JDM.321547

APA

Li, M., Wang, H., Li, L., Zhang, D., & Tao, L. (2023). Finger Vein Recognition Based on a Histogram of Competitive Gabor Directional Binary Statistics. Journal of Database Management (JDM), 34(3), 1-19. http://doi.org/10.4018/JDM.321547

Chicago

Li, Min, et al. "Finger Vein Recognition Based on a Histogram of Competitive Gabor Directional Binary Statistics," Journal of Database Management (JDM) 34, no.3: 1-19. http://doi.org/10.4018/JDM.321547

Export Reference

Mendeley
Published: Apr 28, 2023
DOI: 10.4018/JDM.321549
Volume 34
Liqun Liu, Renyuan Gu, Jiuyuan Huo, Yubo Zhou
Shuffled frog leaping algorithm is a biological swarm intelligent optimization algorithm and improved into capacity-limited vehicle routing problem. However, the optimization performance is limited... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Liqun, et al. "Origin-Oriented Shuffled Frog Leaping Vehicle Routing Multiobjective Optimization Algorithm." JDM vol.34, no.3 2023: pp.1-24. http://doi.org/10.4018/JDM.321549

APA

Liu, L., Gu, R., Huo, J., & Zhou, Y. (2023). Origin-Oriented Shuffled Frog Leaping Vehicle Routing Multiobjective Optimization Algorithm. Journal of Database Management (JDM), 34(3), 1-24. http://doi.org/10.4018/JDM.321549

Chicago

Liu, Liqun, et al. "Origin-Oriented Shuffled Frog Leaping Vehicle Routing Multiobjective Optimization Algorithm," Journal of Database Management (JDM) 34, no.3: 1-24. http://doi.org/10.4018/JDM.321549

Export Reference

Mendeley
Published: Apr 20, 2023
DOI: 10.4018/JDM.321553
Volume 34
Yongdong Li, Liang Qu, Guiyan Cai, Guoan Cheng, Long Qian, Yuling Dou, Fengqin Yao, Shengke Wang
The critical challenge of video object counting is to avoid counting the same object multiple times in different frames. By comparing the appearance and motion feature information of the detection... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Li, Yongdong, et al. "Video Object Counting With Scene-Aware Multi-Object Tracking." JDM vol.34, no.3 2023: pp.1-13. http://doi.org/10.4018/JDM.321553

APA

Li, Y., Qu, L., Cai, G., Cheng, G., Qian, L., Dou, Y., Yao, F., & Wang, S. (2023). Video Object Counting With Scene-Aware Multi-Object Tracking. Journal of Database Management (JDM), 34(3), 1-13. http://doi.org/10.4018/JDM.321553

Chicago

Li, Yongdong, et al. "Video Object Counting With Scene-Aware Multi-Object Tracking," Journal of Database Management (JDM) 34, no.3: 1-13. http://doi.org/10.4018/JDM.321553

Export Reference

Mendeley
Published: Apr 20, 2023
DOI: 10.4018/JDM.321554
Volume 34
Tian Zhang
The images of motion states are time-varying, and when actually detecting their internal motion targets, the formed detection frames overlap, resulting in small confidence values for the detection... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhang, Tian. "Target Detection for Motion Images Using the Improved YOLO Algorithm." JDM vol.34, no.3 2023: pp.1-17. http://doi.org/10.4018/JDM.321554

APA

Zhang, T. (2023). Target Detection for Motion Images Using the Improved YOLO Algorithm. Journal of Database Management (JDM), 34(3), 1-17. http://doi.org/10.4018/JDM.321554

Chicago

Zhang, Tian. "Target Detection for Motion Images Using the Improved YOLO Algorithm," Journal of Database Management (JDM) 34, no.3: 1-17. http://doi.org/10.4018/JDM.321554

Export Reference

Mendeley
Published: Apr 28, 2023
DOI: 10.4018/JDM.321636
Volume 34
Peng Chen, Shuang Liu, Niko Lukač
How to extract a collection of trajectories for different vessels from the raw AIS data to discover vessel meeting knowledge is a heavily studied focus. Here, the AIS database is created based on... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Chen, Peng, et al. "CNN-Based Vessel Meeting Knowledge Discovery From AIS Vessel Trajectories." JDM vol.34, no.3 2023: pp.1-38. http://doi.org/10.4018/JDM.321636

APA

Chen, P., Liu, S., & Lukač, N. (2023). CNN-Based Vessel Meeting Knowledge Discovery From AIS Vessel Trajectories. Journal of Database Management (JDM), 34(3), 1-38. http://doi.org/10.4018/JDM.321636

Chicago

Chen, Peng, Shuang Liu, and Niko Lukač. "CNN-Based Vessel Meeting Knowledge Discovery From AIS Vessel Trajectories," Journal of Database Management (JDM) 34, no.3: 1-38. http://doi.org/10.4018/JDM.321636

Export Reference

Mendeley
Published: Apr 20, 2023
DOI: 10.4018/JDM.321756
Volume 34
Feng Ye, Xinjun Sheng, Nadia Nedjah, Jun Sun, Peng Zhang
As the need for handling data from various sources becomes crucial for making optimal decisions, managing multi-model data has become a key area of research. Currently, it is challenging to strike a... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Ye, Feng, et al. "A Benchmark for Performance Evaluation of a Multi-Model Database vs. Polyglot Persistence." JDM vol.34, no.3 2023: pp.1-20. http://doi.org/10.4018/JDM.321756

APA

Ye, F., Sheng, X., Nedjah, N., Sun, J., & Zhang, P. (2023). A Benchmark for Performance Evaluation of a Multi-Model Database vs. Polyglot Persistence. Journal of Database Management (JDM), 34(3), 1-20. http://doi.org/10.4018/JDM.321756

Chicago

Ye, Feng, et al. "A Benchmark for Performance Evaluation of a Multi-Model Database vs. Polyglot Persistence," Journal of Database Management (JDM) 34, no.3: 1-20. http://doi.org/10.4018/JDM.321756

Export Reference

Mendeley
Published: Apr 21, 2023
DOI: 10.4018/JDM.322097
Volume 34
Wenjie Liu, Sai Chen, Guoyao Huang, Lingfeng Lu, Huakang Li, Guozi Sun
Many real-world applications require prediction that takes the most advantage of data. Classic data mining mechanisms tend to feed a prediction model pivotal data to achieve a promising result... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Wenjie, et al. "Incorporating I Ching Knowledge Into Prediction Task via Data Mining." JDM vol.34, no.3 2023: pp.1-16. http://doi.org/10.4018/JDM.322097

APA

Liu, W., Chen, S., Huang, G., Lu, L., Li, H., & Sun, G. (2023). Incorporating I Ching Knowledge Into Prediction Task via Data Mining. Journal of Database Management (JDM), 34(3), 1-16. http://doi.org/10.4018/JDM.322097

Chicago

Liu, Wenjie, et al. "Incorporating I Ching Knowledge Into Prediction Task via Data Mining," Journal of Database Management (JDM) 34, no.3: 1-16. http://doi.org/10.4018/JDM.322097

Export Reference

Mendeley
Published: Jun 9, 2023
DOI: 10.4018/JDM.324075
Volume 34
Hui Li, Yifei Zhu
The world is facing one of the greatest public health threats in modern history. Various techniques based on contact tracing have been developed to support non-pharmaceutical interventions. The... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Li, Hui, and Yifei Zhu. "Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease." JDM vol.34, no.3 2023: pp.1-17. http://doi.org/10.4018/JDM.324075

APA

Li, H. & Zhu, Y. (2023). Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease. Journal of Database Management (JDM), 34(3), 1-17. http://doi.org/10.4018/JDM.324075

Chicago

Li, Hui, and Yifei Zhu. "Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease," Journal of Database Management (JDM) 34, no.3: 1-17. http://doi.org/10.4018/JDM.324075

Export Reference

Mendeley
Published: Jul 10, 2023
DOI: 10.4018/JDM.325353
Volume 34
Xintong Song, Donghua Yang, Yutong Wang, Hongzhi Wang, Jinbao Wang, Bo Zheng
In recent years, the problem of traffic congestion has become a hot topic. Accurate traffic flow prediction methods have received extensive attention from many researchers all over the world.... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Song, Xintong, et al. "TransFusion Model Fusion Mechanism Based on Transformer for Traffic Flow Prediction." JDM vol.34, no.3 2023: pp.1-14. http://doi.org/10.4018/JDM.325353

APA

Song, X., Yang, D., Wang, Y., Wang, H., Wang, J., & Zheng, B. (2023). TransFusion Model Fusion Mechanism Based on Transformer for Traffic Flow Prediction. Journal of Database Management (JDM), 34(3), 1-14. http://doi.org/10.4018/JDM.325353

Chicago

Song, Xintong, et al. "TransFusion Model Fusion Mechanism Based on Transformer for Traffic Flow Prediction," Journal of Database Management (JDM) 34, no.3: 1-14. http://doi.org/10.4018/JDM.325353

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Submission-Related Inquiries
Professor Keng Siau, PhD
Head of the Department of Information Systems
Chair Professor of Information Systems
City University of Hong Kong
E-mail: isjofdm@cityu.edu.hk

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100