Academic literature on the topic 'SQLIVS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SQLIVS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SQLIVS"

1

Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober, and Ruth McCorkle. "Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial." Journal of Clinical Oncology 29, no. 8 (March 10, 2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.

Full text
Abstract:
Purpose Although patient-reported cancer symptoms and quality-of-life issues (SQLIs) have been promoted as essential to a comprehensive assessment, efficient and efficacious methods have not been widely tested in clinical settings. The purpose of this trial was to determine the effect of the Electronic Self-Report Assessment–Cancer (ESRA-C) on the likelihood of SQLIs discussed between clinicians and patients with cancer in ambulatory clinic visits. Secondary objectives included comparison of visit duration between groups and usefulness of the ESRA-C as reported by clinicians. Patients and Methods This randomized controlled trial was conducted in 660 patients with various cancer diagnoses and stages at two institutions of a comprehensive cancer center. Patient-reported SQLIs were automatically displayed on a graphical summary and provided to the clinical team before an on-treatment visit (n = 327); in the control group, no summary was provided (n = 333). SQLIs were scored for level of severity or distress. One on-treatment clinic visit was audio recorded for each participant and then scored for discussion of each SQLI. We hypothesized that problematic SQLIs would be discussed more often when the intervention was delivered to the clinicians. Results The likelihood of SQLIs being discussed differed by randomized group and depended on whether an SQLI was first reported as problematic (P = .032). Clinic visits were similar with regard to duration between groups, and clinicians reported the summary as useful. Conclusion The ESRA-C is the first electronic self-report application to increase discussion of SQLIs in a US randomized clinical trial.
APA, Harvard, Vancouver, ISO, and other styles
2

Fu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping, and Xiaodan Lv. "SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic." Electronics 12, no. 11 (May 30, 2023): 2472. http://dx.doi.org/10.3390/electronics12112472.

Full text
Abstract:
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages’ identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT’s SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, San-Tsai, and Konstantin Beznosov. "Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks." International Journal of Secure Software Engineering 1, no. 1 (January 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.

Full text
Abstract:
This article presents an approach for retrofitting existing Web applications with run-time protection against known, as well as unseen, SQL injection attacks (SQLIAs) without the involvement of application developers. The precision of the approach is also enhanced with a method for reducing the rate of false positives in the SQLIA detection logic, via runtime discovery of the developers’ intention for individual SQL statements made by Web applications. The proposed approach is implemented in the form of protection mechanisms for J2EE, ASP.NET, and ASP applications. Named SQLPrevent, these mechanisms intercept HTTP requests and SQL statements, mark and track parameter values originating from HTTP requests, and perform SQLIA detection and prevention on the intercepted SQL statements. The AMNESIA testbed is extended to contain false-positive testing traces, and is used to evaluate SQLPrevent. In our experiments, SQLPrevent produced no false positives or false negatives, and imposed a maximum 3.6% performance overhead with 30 milliseconds response time for the tested applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Ablahd, Ann, and Suhair Dawwod. "Using Flask for SQLIA Detection and Protection." Tikrit Journal of Engineering Sciences 27, no. 2 (May 15, 2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.

Full text
Abstract:
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.
APA, Harvard, Vancouver, ISO, and other styles
5

Gaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy, and Jignesh M. Patel. "SQLite." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.

Full text
Abstract:
In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed "the SQLite for analytics", has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite's performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.
APA, Harvard, Vancouver, ISO, and other styles
6

Ateeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani, and Hazura Zulzalil. "Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities." International Journal of Engineering & Technology 7, no. 4.1 (September 12, 2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.

Full text
Abstract:
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.
APA, Harvard, Vancouver, ISO, and other styles
7

Adinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari, and Ketut Dita Ari Sutrisna. "Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole." Informatik : Jurnal Ilmu Komputer 18, no. 3 (December 28, 2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.

Full text
Abstract:
Penggunaan SQL injection merupakan sebuah ancaman yang sering terjadi di Internet. Karena penggunaan internet untuk berbagai layanan online meningkat, sama halnya dengan ancaman keamanan yang dimiliki web meningkat. Dikarenakan serangan injeksi SQL merupakan salah satu kerentanan keamanan yang paling serius dalam Web, Oleh karena itu penulis ingin membandingkan beberapa tools dari SQL Injection seperti SQLMap, SQLus, dan The Mole. Tools ini merupakan aplikasi dari sistem operasi Kali Linux, dalam aplikasi ini berguna dalam melakukan injeksi data – data yang ada pada suatu web khususnya database pada web dengan menggunakan fitur – fitur yang tersedia pada aplikasi ini. Dalam paper ini, kami telah menyajikan sebuah perbandingan penggunaan tools seperti SQLMap, SQLSus, dan The Mole dengan membandingkan 3 parameter seperti Cross Program, Functionality, Usability, perbandingan dimulai dari proses injeksi hingga aplikasi itu bekerja sampai dengan proses kita bisa mendapatkan database dari sebuah web yang sudah terinjeksi dan tanpa diketahui oleh korban.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Eunji. "Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning." International Journal of Environmental Research and Public Health 16, no. 17 (August 26, 2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.

Full text
Abstract:
This article explores the performance optimizations of an embedded database memory management system to ensure high responsiveness of real-time healthcare data frameworks. SQLite is a popular embedded database engine extensively used in medical and healthcare data storage systems. However, SQLite is essentially built around lightweight applications in mobile devices, and it significantly deteriorates when a large transaction is issued such as high resolution medical images or massive health dataset, which is unlikely to occur in embedded systems but is quite common in other systems. Such transactions do not fit in the in-memory buffer of SQLite, and SQLite enforces memory reclamation as they are processed. The problem is that the current SQLite buffer management scheme does not effectively manage these cases, and the naïve reclamation scheme used significantly increases the user-perceived latency. Motivated by this limitation, this paper identifies the causes of high latency during processing of a large transaction, and overcomes the limitation via proactive and coarse-grained memory cleaning in SQLite.The proposed memory reclamation scheme was implemented in SQLite 3.29, and measurement studies with a prototype implementation demonstrated that the SQLite operation latency decreases by 13% on an average and up to 17.3% with our memory reclamation scheme as compared to that of the original version.
APA, Harvard, Vancouver, ISO, and other styles
9

Dharmalingam, Jeya Mala, and M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks." International Journal of Intelligent Information Technologies 14, no. 3 (July 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Full text
Abstract:
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.
APA, Harvard, Vancouver, ISO, and other styles
10

Nidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V, and Neethu Prabhakaran P. "SQLIAD – A Hazard to Web Applications." International Journal of Computer Trends and Technology 29, no. 1 (November 25, 2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SQLIVS"

1

Пуха, Є. В. "Моделювання баз даних SQLite мовою Python." Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/73818.

Full text
Abstract:
Розробка програмного додатку, який допоможе студенту або працівнику в сфері IT більш детально розібратися з можливостями роботи баз даних, навчитися застосовувати методологію, методику та інструментарій моделювання в теоретичних та практичних дослідженнях.
APA, Harvard, Vancouver, ISO, and other styles
2

Johansson, Marcus. "SQLite Carving och Analys : En jämförelse av metoder." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32716.

Full text
Abstract:
SQLite filer används av ett flertal olika program för att spara viktig information.Information som kan vara viktig för forensiska utredningar, behovet att kunnaåterskapa SQLite filer är då ett växande bekymmer. Problemet med att återskapa SQLitefiler är att, till skillnad från andra filer så har SQLite filer inget definerat slut eller någonmarkör som visar var filen slutar. Detta arbete presenterar en ny metod att bestämmaslutet på SQLite filer och jämför denna metod mot den metod som används idag tillmesta del för att återskapa SQLite filer. För att jämföra dessa metoder utvecklades tvåprogram stpextr och blkextr. Blkextr är den metod som utvecklades under detta arbete.Stpextr visade sig vara snabbare och använda mindre arbetsminne än blkextr. Men ivissa sammanhang så kommer information gå förlorad när stpextr körs till skillnad från blkextr.
APA, Harvard, Vancouver, ISO, and other styles
3

Long, Shitian. "Database syncrhonization between devices : A new synchronization protocol for SQLite databases." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-46712.

Full text
Abstract:
Today people have multiple personal computers, personal digital assistants and smart phones. Today's advanced handheld devices have powerful processors, with a process frequency of up to 1 GHz, huge storage capacities, flash storage capacities up to 32 GB, a large (multi) touch screen, and a user-friendly user interface. Additionally, the device may have various input and output devices, thus leading to people utilizing different devices for different use cases. In order to provide the latest information to the users via any of their devices, data synchronization becomes a requirement for users. There are many data synchronization solutions for synchronizing database records and files. In the current database synchronization solutions, there is no clear source and target. For example, consider the case where a PDA synchronizes with a PC; the record could have been edited (changed) on both the PDA and PC. In this case it is not clear which should be synchronized with what should be the source for the value. In contrast, a files synchronization system has a clearly specified synchronizatiom sourse and destination structure. In this case the client Synchronizes their files with that of the server. In a version control system the client synchronize files with a repository acting as a version control server. There are many synchronizing protocols and each has been designed for different purpose. Protocols for synchronizing database records often provide continuous synchronization, leading to a lot of data being exchanging during the synchronization process, as a result the synchronization process takes a longer period of time, but maintains the semantics of the database updates (either a complete transaction completes or it must be rolled back). On the other hand, protocols for synchronizing files may require a short synchronization time, as the whole file transferred and replaces the previous version of the file at the destination. Note file synchronization may also transfer only the differences between the files, with a local transformation of an existing file copy of the by applying these differences as updates to the files. Sending only the updates to a file enables large files with a small number of changes to be quickly updated. However, file based updated does not efficiently support record level updates of a database. In this thesis we designed a new synchronization protocol for synchronizing two SQLite databases. This synchronization protocol borrows from (and hence offers the advantages of) a version control system in order to rapidly perform SQLite database synchronization. Moreover, this solution brings SQLite database additional functions, for example supporting multiple-user, transaction logs, and data roll-back.
APA, Harvard, Vancouver, ISO, and other styles
4

Kibildis, Martynas. "Universalus duomenų bazių valdymo sistemų valdymo įrankis." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140716_111850-13322.

Full text
Abstract:
"Universalus duomenų bazių valdymo sistemų valdymo įrankis" yra atviro kodo programinės įrangos projektas, skirtas DBVS administravimui. Su šiuo įrankiu galima vienu metu administruoti kelias skirtingas DBVS. Kol kas yra palaikomos MySQL ir SQLite3 DBVS, tačiau sistema buvo sukurta taip, kad galima nesunkiai ją pritaikyti ir kitoms DBVS. Darbe taip pat trumpai apžvelgiama DBVS vystymosi istorija bei pateikiamas panašių įrankių palyginimas.
„Universal Tool for Management of Database Management Systems“ is open-source software project designed for new and experienced users to control their favorite DBMS. With this software it is possible to work with several databases at one time. Currently MySQL and SQLite3 DBMS are supported, but system is universal in that way, that it is easy to add new DBMS support, if needed. In this work, you will also find brief history of DBMS and comparison of similar software. The system has only one user group – database administrator. Database administrator can create databases, tables, do the search in table records and do many other things, which are permitted in DBMS.
APA, Harvard, Vancouver, ISO, and other styles
5

Henzely, Július. "Multiplatformní přehrávač zvukových signálů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220586.

Full text
Abstract:
This master's thesis focuses on problematic of creating applications based on multiplatform framework. This thesis also includes fundamental theoretical knowledge about relational database system SQLite, which has been used in a practical part of the thesis. Programing of multiplatform audio player which could be used in speech-language pathology clinic is essential portion of the practical part. Player was enhanced with the database of patients and ability to generate XML files.
APA, Harvard, Vancouver, ISO, and other styles
6

Delight, Björn. "Optimizing the executiontime o fSQLite on an ABB robot controller." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-22372.

Full text
Abstract:
The purpose of this thesis is to generate a set of general guidelines to improve performance of the SQLite database management system for use as a component in the main computer of ABB industrial robots. This was accomplished by measuring the factors that affect query execution time and comparing SQLite features to systems it could potentially replace: chiefly ABB’s configuration storage system and real-time logging system. Results show that SQlite is slower than ABBs current configuration system and real-time logger. A series of tests were carried out that give a rough description of SQLites performance. Read and update become significantly faster when used with an index, write becomes a bit slower. In an indexed database the number of rows is not important; in a database without an index they cause significant slowing. Surprisingly, increasing the number of threads concurrently accessing a database had only a mild effect on timing.
APA, Harvard, Vancouver, ISO, and other styles
7

Шевченко, А. В. "Розробка Telegram бота з корисними функціями для студентів." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23084.

Full text
Abstract:
Шевченко, А. В. Розробка Telegram бота з корисними функціями для студентів : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / А. В. Шевченко ; керівник роботи В. А. Бичко ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 50 с.
Об’єктом розробки був telegram чат-бот з корисними функція для студентів. Метою дипломного проекту є створення чат-бота, для зручності та економії часу студентів. Завдяки ньому можна буде додати розклад занять та дзвінків та більше не витрачати час на те, щоб відрити браузер потім зайти на сайт університету, знайти розклад, знайти свою групу. Можна однією кнопкою переглянути розклад парного чи непарного тижня та при необхідності розклад дзвінків . Результатом роботи є реалізація таких функцій чат-бота: - Занесення розкладу занять; - Завантаження фота з розкладом дзвінків; - Перегляд розкладу парного, непарного тижня; - Перегляд розкладу дзвінків;
The purpose of the diploma project is to create a chatbot, for the convenience and time savings of students. Thanks to it, you can add a schedule of classes and calls and no longer spend time to open the browser and then go to the university website, find a schedule, find your group. You can view the even or odd week schedule and, if necessary, the call schedule with one button. The result is the implementation of the following functions of the chatbot: - Entering a class schedule; - Upload a photo with a call schedule; - View the schedule of even, odd week; - View call schedule;
APA, Harvard, Vancouver, ISO, and other styles
8

Салуян, М. В. "Android-застосування для читання RSS." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23070.

Full text
Abstract:
Салуян, М. В. Android-застосування для читання RSS : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / М. В. Салуян ; керівник роботи О. А. Пріла ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 54 с.
Метою кваліфікаційної роботи є розробка мобільного додатку для вивчення мови програмування Kotlin і вдосконалення навичків розробки Androidзастосувань. Об’єктом дослідження є технологія RSS, як найкращий спосіб автоматичного отримання оновлень з веб-сайтів. Предметом дослідження є Android-застосування для читання RSS. Для створення застосування використовувалися: інтегроване середовище розробки Android Studio, мова програмування Kotlin та реляційна система керування базами даних SQLite. Результатом роботи є RSS-агрегатор для Android-пристроїв, що виконує функції отримання оновлень з веб-сайтів та їх перегляду. Подальша реалізація застосування можлива шляхом додавання додаткових функцій керування отриманими оновленнями з веб-сайтів та збільшення можливостей налаштування інтерфейсу користувача.
The purpose of the qualification work is to learn the programming language Kotlin and improve skills in developing Android applications. The object of research is RSS technology as the best way to automatically receive updates from websites. The subject of the study is an RSS reader Android application. The following resources were used to create the application: Android Studio integrated development environment, Kotlin programming language and SQLite relational database management system. The result of the qualification work is an RSS aggregator for Android devices, which performs the functions of receiving updates from websites and viewing them. Further implementation of the application is possible by adding additional functions to manage updates received from websites and by increasing the ability to customize the user interface.
APA, Harvard, Vancouver, ISO, and other styles
9

Бирченко, А. В. "Telegram бот для пошуку найближчих заходів у містах України." Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86794.

Full text
Abstract:
Кваліфікаційну роботу магістра присвячено розробці Telegram бота для пошуку найближчих заходів у містах України. В роботі проведено аналіз предметної області з аналізом продуктів аналогів, визначення мети проекту, засобів реалізації, планування роботи. Представлена поетапна розробка чат-бота та демонстрація його роботи. Результатом проведеної роботи є Telegram бот для пошуку найближчих заходів у містах України.
APA, Harvard, Vancouver, ISO, and other styles
10

Olsson, Johannes. "Utveckling av ett inkassohanteringssystem." Thesis, Karlstad University, Division for Information Technology, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-56.

Full text
Abstract:

Denna uppsats beskriver arbetet med att utveckla ett inkassohanteringsprogram. Arbetet är utfört åt inkassobyrån Exactor International Debt Collection från Mariestad. Bakgrunden till projektet är att Exactor behöver en programvara för att hålla ordning på de inkassoärenden som de har. En programvara som passar deras sätt att arbeta.

I programmet finns det möjlighet för användaren att registrera ärenden som var och en innehåller en klient, en eller flera betalningsskyldiga (gäldenärer) och en eller flera fakturor. Vidare finns det möjlighet att söka och redigera de olika delarna i ett ärende.

Uppsatsen beskriver hur programmet är konstruerat och hur det fungerar. Den beskriver också grundligt hur det kommer sig att ett ärende kommer till inkassoförfarandet. Detta för att lättare få förståelse kring resterande del av uppsatsen. Vidare beskrivs databasens design samt hur information lagras i den.


This paper describes the work of developing a debt collection management program. The work was carried out as an assignment from Exactor, an international debt collection company in Mariestad. The motivation was that Exactor needed a program to manage the debt collection errands they have. The program would have to fit their way of working.

In the program, it is possible for the user to register errands that each contains a client, one or more that is liable for payment (debtors), and one or more invoices. The program also implements a feature for searching and editing the different parts of an errand.

The paper describes how the program is designed and how it works. The paper also describes the basic process from the beginning of a debt to the debt collection procedures. This description is for understanding the rest of the paper. Furthermore, the database design and how information is stored in the database is described.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SQLIVS"

1

SQLite. Indianapolis, Ind: Sams, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Newman, Chris. SQLite. Upper Saddle River: Pearson Education, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Taylor, Allen. Creating a Database with SQLite. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-3899-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Feiler, Jesse. Introducing SQLite for Mobile Developers. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Allen, Grant, and Mike Owens. The Definitive Guide to SQLite. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Allen, Grant. The Definitive Guide to SQLite. Berkeley, CA: Apress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Languedoc, Kevin. Build iOS Database Apps with Swift and SQLite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Litovski, Ivan. Inside the Symbian SQL: A mobile developer's guide to SQLite. Hoboken, NJ: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Litovski, Ivan. Inside the Symbian SQL: A mobile developer's guide to SQLite. Hoboken, NJ: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Litovski, Ivan. Inside the Symbian SQL: A mobile developer's guide to SQLite. Hoboken, NJ: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SQLIVS"

1

Pawlaszczyk, Dirk. "SQLite." In Mobile Forensics – The File Format Handbook, 129–55. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_5.

Full text
Abstract:
AbstractSQLite is, without doubt, the most widely used database systemworldwide at the moment. The single file database system is used, among other things, in operating systems for cell phones, such as Android, iOS or Symbian OS. On a typical smartphone, we usually find several hundred SQLite databases used by a wide variety of apps. Due to its widespread use, the database format is of particular importance in mobile forensics. It is not uncommon for the suspect to try to cover his tracks by deleting database content. Recovering deleted records from a database presents a special challenge. In this chapter, the on-disk database format of the SQLite database system is highlighted. Therefore,we take a closer look at the database header as well as record structure on a binary level. We first examine the structure of the data. Recovery options for erased records are discussed as well. Special attention is paid to the slack areas within the database: unallocated space, Freelist as well as free blocks. In this context, we discuss basic techniques for carving and acquisition of deleted data artefacts. Despite the main database format and recovery options, temporary file types like write-ahead logs and rollback journals are analyzed as well.
APA, Harvard, Vancouver, ISO, and other styles
2

Allen, Grant, and Mike Owens. "Introducing SQLite." In The Definitive Guide to SQLite, 1–16. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Allen, Grant, and Mike Owens. "SQL for SQLite." In The Definitive Guide to SQLite, 47–86. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Languedoc, Kevin. "Analyzing SQLite Databases." In Build iOS Database Apps with Swift and SQLite, 187–96. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Languedoc, Kevin. "Creating SQLite Databases." In Build iOS Database Apps with Swift and SQLite, 11–24. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Easttom, Chuck. "SQLite Database Forensics." In An In-Depth Guide to Mobile Device Forensics, 151–63. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003118718-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Feiler, Jesse. "Understanding What SQLite Is." In Introducing SQLite for Mobile Developers, 9–14. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Feiler, Jesse. "Using SQLite with PHP." In Introducing SQLite for Mobile Developers, 45–54. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Allen, Grant, and Mike Owens. "Android Development with SQLite." In The Definitive Guide to SQLite, 279–301. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Allen, Grant, and Mike Owens. "Advanced SQL for SQLite." In The Definitive Guide to SQLite, 87–124. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SQLIVS"

1

Li, Ling, Junxin Qi, Nan Liu, Lifang Han, and Baojiang Cui. "Static-Based Test Case Dynamic Generation for SQLIVs Detection." In 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). IEEE, 2015. http://dx.doi.org/10.1109/bwcca.2015.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Albalawi, Samar M., and Awad M. Awadelkarim Mohamed. "Authentication Enhancement Against SQL Injection Attacks (SQLIAs)." In 2022 2nd International Conference on Computing and Information Technology (ICCIT). IEEE, 2022. http://dx.doi.org/10.1109/iccit52419.2022.9711626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Miedema, Daphne, and George Fletcher. "SQLVis: Visual Query Representations for Supporting SQL Learners." In 2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 2021. http://dx.doi.org/10.1109/vl/hcc51201.2021.9576431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Choi, Soyee. "SSD as SQLite Engine." In SIGMOD/PODS '18: International Conference on Management of Data. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3183713.3183720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mutti, Simone, Enrico Bacis, and Stefano Paraboschi. "SeSQLite: Security Enhanced SQLite." In the 31st Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2818000.2818041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karpei, A. L., and D. A. Kormuzhanin. "DEVELOPMENT OF A WEB-APPLICATION FOR STORING INFORMATION ABOUT GRADUATE, POST-GRADUATE AND MASTER’S WORKS." In SAKHAROV READINGS 2021: ENVIRONMENTAL PROBLEMS OF THE XXI CENTURY. International Sakharov Environmental Institute of Belarusian State University, 2021. http://dx.doi.org/10.46646/sakh-2021-2-411-414.

Full text
Abstract:
Using the Python programming language with the Django framework, a web-application has been developed that stores information about students’ theses, postgraduate and master’s theses. The web application is linked to a SQLite database and provides the ability to add, modify, and remove information from the database. To develop the application, the PyCharm development environment and the program for viewing information about the DB Browser for SQLite database were used.
APA, Harvard, Vancouver, ISO, and other styles
7

Patil, Prithviraj, Santosh Bhutkar, Nachiket Ashtaputre, and Ashish Kumar. "Amanda Back-up of SQLite." In 2012 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE, 2012. http://dx.doi.org/10.1109/iccict.2012.6398203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Junyan, Lv, Xu Shiguo, and Li Yijie. "Application Research of Embedded Database SQLite." In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Obradovic, Nikola, Aleksandar Kelec, and Igor Dujlovic. "Performance analysis on Android SQLite database." In 2019 18th International Symposium INFOTEH-JAHORINA (INFOTEH). IEEE, 2019. http://dx.doi.org/10.1109/infoteh.2019.8717652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Dai, Xudong Han, and Wei Wang. "Use of SQLite on Embedded System." In 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI). IEEE, 2010. http://dx.doi.org/10.1109/icicci.2010.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SQLIVS"

1

Veit, Martin, Christian Grau Sørensen, Michal Zbigniew Pomianowski, Hicham Johra, and Anna Marszal-Pomianowska. A practical approach to set up a simple database architecture using SQLite and Python. Department of the Built Environment, Aalborg University, 2023. http://dx.doi.org/10.54337/aau536852902.

Full text
Abstract:
The aim of this technical report is to describe the use of SQL databases and provide a simple entry point for people with little to no experience to store data using Python and SQL databases. This report is aimed at employees of Aalborg University, Department of the Built Environment (https://www.en.build.aau.dk/).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography