With the popularity of smartphones and mobile devices, mobile application (a.k.a. “app”) markets have been growing exponentially in terms of the number of users and downloads. To increase user satisfaction, app developers invest a lot of work into gathering and utilizing user input. This paper presents an analysis of the mobile app market through the development of a mobile app. The app provides users with an o...
Home servers are popular among computer enthusiasts for hosting various applications, including Linux OS with web servers, database solutions, and private cloud services, as well as for VPN, torrent, file-sharing, and streaming. Single Board Computers (SBCs), once used for small projects, have now evolved and can be used to control multiple devices in the IoT space. SBCs have become more powerful and can run ma...
Waste collection is a traditional process that involves a driver collecting waste from a set of designated deposits based on a pre-determined route. The authors present a new approach that utilizes Artificial Intelligence to define the route based on the occupancy volume of the deposits. The new process involves the use of a mobile application to assist the driver during the journey. The application communicate...
NoSQL databases were created with the primary goal of addressing the shortcomings in the efficiency of relational databases, and can be of four types: document, column, key-value, and graph databases. Graph databases can store data and relationships efficiently, and have a flexible and easy-to-understand data schema. In this paper, we perform an experimental evaluation of the four most popular graph databases: ...
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually compromised/infected computers controlled by the attackers. There are several variations of this kind of attack, and torrent index p...
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually compromised/infected computers controlled by the attackers. There are several variations of this kind of attack, and torrent index p...
Due to the SARS-COV-2 pandemic, educational institutions are immediately faced with a new challenge to adapt, forcing the transition from face-to-face teaching to distance learning in a short period. Distance education supported by technology is a challenge for educational institutions based on binomial technology/teaching. This paper presents a proposal for an e-learning technology structure, supported by a cl...
Background: Relational databases have been a prevalent technology for decades, using SQL (Structured Query Language) to manage data. However, the emergence of new technologies, such as the web and the cloud, has brought the requirement to handle more complex data. NewSQL is the latest technology that incorporates the ability to scale and ensures the availability of NoSQL (Not Only SQL) without losing the ACID p...
More and more people are dependent on technology. They increasingly use electronic services for day-to-day routines, and user loyalty to the software is essential, being defined by the excellence of the SW. The fewer flaws it has, the greater the likelihood of being able to retain the user’s loyalty. For this situation to be possible, tests are crucial in the development stage since they have the main purpose o...