To see the other types of publications on this topic, follow the link: SQLIVS.

Journal articles on the topic 'SQLIVS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'SQLIVS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober, and Ruth McCorkle. "Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial." Journal of Clinical Oncology 29, no. 8 (March 10, 2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.

Full text
Abstract:
Purpose Although patient-reported cancer symptoms and quality-of-life issues (SQLIs) have been promoted as essential to a comprehensive assessment, efficient and efficacious methods have not been widely tested in clinical settings. The purpose of this trial was to determine the effect of the Electronic Self-Report Assessment–Cancer (ESRA-C) on the likelihood of SQLIs discussed between clinicians and patients with cancer in ambulatory clinic visits. Secondary objectives included comparison of visit duration between groups and usefulness of the ESRA-C as reported by clinicians. Patients and Methods This randomized controlled trial was conducted in 660 patients with various cancer diagnoses and stages at two institutions of a comprehensive cancer center. Patient-reported SQLIs were automatically displayed on a graphical summary and provided to the clinical team before an on-treatment visit (n = 327); in the control group, no summary was provided (n = 333). SQLIs were scored for level of severity or distress. One on-treatment clinic visit was audio recorded for each participant and then scored for discussion of each SQLI. We hypothesized that problematic SQLIs would be discussed more often when the intervention was delivered to the clinicians. Results The likelihood of SQLIs being discussed differed by randomized group and depended on whether an SQLI was first reported as problematic (P = .032). Clinic visits were similar with regard to duration between groups, and clinicians reported the summary as useful. Conclusion The ESRA-C is the first electronic self-report application to increase discussion of SQLIs in a US randomized clinical trial.
APA, Harvard, Vancouver, ISO, and other styles
2

Fu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping, and Xiaodan Lv. "SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic." Electronics 12, no. 11 (May 30, 2023): 2472. http://dx.doi.org/10.3390/electronics12112472.

Full text
Abstract:
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages’ identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT’s SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, San-Tsai, and Konstantin Beznosov. "Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks." International Journal of Secure Software Engineering 1, no. 1 (January 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.

Full text
Abstract:
This article presents an approach for retrofitting existing Web applications with run-time protection against known, as well as unseen, SQL injection attacks (SQLIAs) without the involvement of application developers. The precision of the approach is also enhanced with a method for reducing the rate of false positives in the SQLIA detection logic, via runtime discovery of the developers’ intention for individual SQL statements made by Web applications. The proposed approach is implemented in the form of protection mechanisms for J2EE, ASP.NET, and ASP applications. Named SQLPrevent, these mechanisms intercept HTTP requests and SQL statements, mark and track parameter values originating from HTTP requests, and perform SQLIA detection and prevention on the intercepted SQL statements. The AMNESIA testbed is extended to contain false-positive testing traces, and is used to evaluate SQLPrevent. In our experiments, SQLPrevent produced no false positives or false negatives, and imposed a maximum 3.6% performance overhead with 30 milliseconds response time for the tested applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Ablahd, Ann, and Suhair Dawwod. "Using Flask for SQLIA Detection and Protection." Tikrit Journal of Engineering Sciences 27, no. 2 (May 15, 2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.

Full text
Abstract:
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.
APA, Harvard, Vancouver, ISO, and other styles
5

Gaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy, and Jignesh M. Patel. "SQLite." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.

Full text
Abstract:
In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed "the SQLite for analytics", has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite's performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.
APA, Harvard, Vancouver, ISO, and other styles
6

Ateeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani, and Hazura Zulzalil. "Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities." International Journal of Engineering & Technology 7, no. 4.1 (September 12, 2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.

Full text
Abstract:
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.
APA, Harvard, Vancouver, ISO, and other styles
7

Adinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari, and Ketut Dita Ari Sutrisna. "Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole." Informatik : Jurnal Ilmu Komputer 18, no. 3 (December 28, 2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.

Full text
Abstract:
Penggunaan SQL injection merupakan sebuah ancaman yang sering terjadi di Internet. Karena penggunaan internet untuk berbagai layanan online meningkat, sama halnya dengan ancaman keamanan yang dimiliki web meningkat. Dikarenakan serangan injeksi SQL merupakan salah satu kerentanan keamanan yang paling serius dalam Web, Oleh karena itu penulis ingin membandingkan beberapa tools dari SQL Injection seperti SQLMap, SQLus, dan The Mole. Tools ini merupakan aplikasi dari sistem operasi Kali Linux, dalam aplikasi ini berguna dalam melakukan injeksi data – data yang ada pada suatu web khususnya database pada web dengan menggunakan fitur – fitur yang tersedia pada aplikasi ini. Dalam paper ini, kami telah menyajikan sebuah perbandingan penggunaan tools seperti SQLMap, SQLSus, dan The Mole dengan membandingkan 3 parameter seperti Cross Program, Functionality, Usability, perbandingan dimulai dari proses injeksi hingga aplikasi itu bekerja sampai dengan proses kita bisa mendapatkan database dari sebuah web yang sudah terinjeksi dan tanpa diketahui oleh korban.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Eunji. "Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning." International Journal of Environmental Research and Public Health 16, no. 17 (August 26, 2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.

Full text
Abstract:
This article explores the performance optimizations of an embedded database memory management system to ensure high responsiveness of real-time healthcare data frameworks. SQLite is a popular embedded database engine extensively used in medical and healthcare data storage systems. However, SQLite is essentially built around lightweight applications in mobile devices, and it significantly deteriorates when a large transaction is issued such as high resolution medical images or massive health dataset, which is unlikely to occur in embedded systems but is quite common in other systems. Such transactions do not fit in the in-memory buffer of SQLite, and SQLite enforces memory reclamation as they are processed. The problem is that the current SQLite buffer management scheme does not effectively manage these cases, and the naïve reclamation scheme used significantly increases the user-perceived latency. Motivated by this limitation, this paper identifies the causes of high latency during processing of a large transaction, and overcomes the limitation via proactive and coarse-grained memory cleaning in SQLite.The proposed memory reclamation scheme was implemented in SQLite 3.29, and measurement studies with a prototype implementation demonstrated that the SQLite operation latency decreases by 13% on an average and up to 17.3% with our memory reclamation scheme as compared to that of the original version.
APA, Harvard, Vancouver, ISO, and other styles
9

Dharmalingam, Jeya Mala, and M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks." International Journal of Intelligent Information Technologies 14, no. 3 (July 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Full text
Abstract:
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.
APA, Harvard, Vancouver, ISO, and other styles
10

Nidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V, and Neethu Prabhakaran P. "SQLIAD – A Hazard to Web Applications." International Journal of Computer Trends and Technology 29, no. 1 (November 25, 2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Yongzhi, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu, and Xuewen Dong. "CryptSQLite: SQLite With High Data Security." IEEE Transactions on Computers 69, no. 5 (May 1, 2020): 666–78. http://dx.doi.org/10.1109/tc.2019.2963303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Winslett, Marianne, and Vanessa Braganholo. "Richard Hipp Speaks Out on SQLite." ACM SIGMOD Record 48, no. 2 (December 19, 2019): 39–46. http://dx.doi.org/10.1145/3377330.3377338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Li, Jian Wei, Hong Guo, and Yu Bin Xu. "Research on Optimization of SQLite Indexing Mechanism Based on Red-Black Tree." Applied Mechanics and Materials 220-223 (November 2012): 2711–15. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2711.

Full text
Abstract:
SQLite has been widely applied in embedded system because of its open source and less resource consumption. A novel optimization method with Red-black tree replacing B tree in indexing mechanism in order to solve the low efficiency and large energy consumption problem when inserting and deleting data in SQLite database was proposed in the paper. The contrast test of efficiency of between red-black tree and B tree while inserting and deleting data shows that this method can effectively improve the SQLite insertion and deletion operation efficiency and reduce the energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
14

Sebastian, Anu, Richa Kuriakose, and Surekha Mariam Varghese. "NEO4J, SQLITE and MYSQL for Hospital Localization." Advanced Computing: An International Journal 7, no. 3 (May 30, 2016): 29–36. http://dx.doi.org/10.5121/acij.2016.7303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Nemetz, Sebastian, Sven Schmitt, and Felix Freiling. "A standardized corpus for SQLite database forensics." Digital Investigation 24 (March 2018): S121—S130. http://dx.doi.org/10.1016/j.diin.2018.01.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Li, Shengang Hao, and Quanxin Zhang. "Recovering SQLite data from fragmented flash pages." Annals of Telecommunications 74, no. 7-8 (February 20, 2019): 451–60. http://dx.doi.org/10.1007/s12243-019-00707-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Jun Lin, and Qi Yuan Sun. "Information Processing Based on SQLite for Target Tracking System." Applied Mechanics and Materials 278-280 (January 2013): 2065–68. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.2065.

Full text
Abstract:
As for the digital visual surveillance system, the traditional database and hardware platform can not be good at processing vast quantities of information. Combined with ActiveX Data Objects (ADO) technology, the information processing system was built by using SQLite database with embedded dual-core platform. The embedded database SQLite is implanted in the existing embedded hardware platform DM6446. And processing modules and operating interface were designed based on SQLite and the embedded hardware platform. The designed system can play a role as the core of data processing. The experiments show that the system can meet the requirements of the visual information processing such as data mining, online system analysis, data post-processing and so on.
APA, Harvard, Vancouver, ISO, and other styles
18

Lashkaripour, Zeinab, and Abbas Ghaemi Bafghi. "A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)." International Journal of Security and Its Applications 7, no. 5 (September 30, 2013): 53–66. http://dx.doi.org/10.14257/ijsia.2013.7.5.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Zhu, Alex, and Wei Qi Yan. "Exploring Defense of SQL Injection Attack in Penetration Testing." International Journal of Digital Crime and Forensics 9, no. 4 (October 2017): 62–71. http://dx.doi.org/10.4018/ijdcf.2017100106.

Full text
Abstract:
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is that hackers maliciously turn down a website and make network resources unavailable to web users. It is extremely difficult to effectively detect and prevent SQLIA because hackers adopt various evading SQLIA Intrusion Detection System techniques. Victims may not be even aware of that their confidential data has been compromised for a long time. In this paper, our contribution is that we evaluate several most popular open source SQLIA tools and SQLIA prevention tools with both qualitative and quantitative assessments.
APA, Harvard, Vancouver, ISO, and other styles
20

Datsko, Oleh, and Elżbieta Miłosz. "Performance comparison between Xamarin and Java database operations." Journal of Computer Sciences Institute 7 (September 30, 2018): 168–71. http://dx.doi.org/10.35784/jcsi.672.

Full text
Abstract:
Work with database is one of base things in developing an application. Every technology/language uses own ways to work with database. In the case of Android the SQLite relational database management system is used. Analysis applies the read, write and delete of items from the table. SQLite is like a minimized version of desktop database management system so for every experiment very limited elements count is used.
APA, Harvard, Vancouver, ISO, and other styles
21

Kar, Debabrata, Suvasini Panigrahi, and Srikanth Sundararajan. "SQLiDDS: SQL injection detection using document similarity measure." Journal of Computer Security 24, no. 4 (August 16, 2016): 507–39. http://dx.doi.org/10.3233/jcs-160554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Nana Mbinkeu, Rodrigue Carlos, and Bernabé Batchakui. "Reducing Disk Storage with SQLite into BitCoin Architecture." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, no. 2 (May 12, 2015): 10. http://dx.doi.org/10.3991/ijes.v3i2.4490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Bharadwaj, Y. V. Sai, Sai Bhageerath Yarrapatruni, and Dr Prasada Rao YVSSSV. "SQLite Database and its Application on Embedded Platform." International Journal of Computer Trends and Technology 67, no. 2 (February 25, 2019): 1–6. http://dx.doi.org/10.14445/22312803/ijctt-v67i2p101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Park, Jong-Hyeok, Gihwan Oh, and Sang-Won Lee. "SQL statement logging for making SQLite truly lite." Proceedings of the VLDB Endowment 11, no. 4 (December 2017): 513–25. http://dx.doi.org/10.1145/3186728.3164146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Winasis, Persis Haryo, Raga Maulana, and Yodi Susanto. "Designing Application For Defect Recording and Handover Of Property Based On Mobile Application by Applying SQLite Technology." CCIT Journal 13, no. 2 (August 27, 2020): 185–95. http://dx.doi.org/10.33050/ccit.v13i2.990.

Full text
Abstract:
Property development companies that produce housing products, high rise dwellings, and office buildings generally have data on the quality of buildings, one of which is obtained during the defect inspection process between developers and consumers before handing over units. Recording data is generally still done manually using a form on a paper. For these conditions, researchers tried to build an application based on mobile apps to digitally record the defect checklist of the dwelling so that the data collected can be processed for the needs of analysis and development strategies. Difficulties encountered during the unit handover process using digital methods on the newly completed property, one of which is the quality of data and internet signals. Mobile apps certainly require a data signal connection to send data to the server. This Android-based mobile apps will implement SQLite technology which allows the recording of transactions to be done locally first, which can then be synchronized into the database server after getting the required internet data connection. SQLite was chosen because it has a relatively small library code unlike relational DBMS in general. SQLite is also easy to use without complex configurations. With the support of the ease of function of SQLite it also allows applications to be integrated with the property sales application system.
APA, Harvard, Vancouver, ISO, and other styles
26

Shin, Jiho, and Jung-Taek Seo. "Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger." Sustainability 14, no. 20 (October 15, 2022): 13281. http://dx.doi.org/10.3390/su142013281.

Full text
Abstract:
With the diffusion of mobile devices and Internet hyperconnectivity technology, all daily living records of individuals are being recorded on mobile devices in real time. However, from the user’s point of view, the reliability of privacy protection, that is, whether the user’s data on the mobile device completely disappears when it is deleted, is critical. This is because, for the sustainability of social growth, it is necessary to control the digitalization and technology that heightens the risks of the future society. Therefore, this study aims to check the traces of the SQLite database to see if instant messenger messages deleted by the user can be recovered. When the SQLite database record is deleted, if the database shrink function or other application-level deletion does not work, it is possible to recover the deleted record. We chose two iOS-based instant messengers, WhatsApp and WeChat, and analyzed the SQLite DB file and Table Schema where messages are stored. As a result of the experiment in this study, it was verified that the area where the deleted message was stored in the SQLite DB file was overwritten with 0 × 00 or updated with a NULL value, making it impossible to recover the deleted message. This process operates at the app level, and user data is safely protected.
APA, Harvard, Vancouver, ISO, and other styles
27

HARIANI, HARIANI. "EKSPLORASI WEB BROWSER DALAM PENCARIAN BUKTI DIGITAL MENGGUNAKAN SQLITE." Jurnal INSTEK (Informatika Sains dan Teknologi) 6, no. 1 (January 6, 2021): 66. http://dx.doi.org/10.24252/instek.v6i1.18638.

Full text
Abstract:
Penggunaan Internet yang meningkat membuat semakin maraknya pengguna web browser. Hal ini bisa memberikan dampak pada meningkatnya kejahatan dunia maya menggunakan media tersebut misalnya menyebarkan hoax, penipuan Email dan lain-lain. Penelitian ini bertujuan untuk mengetahui pentingnya melihat aktivitas pada web browser baik terhadap korban maupun pelaku. Hal ini bisa menentukan pola kejahatan pada suatu kasus dan membantu penyidik dalam menganalisis bukti digital yang tersimpan pada WEB Browser sehingga kasus bisa di selesaikan dengan baik dan tepat. Penelitian ini menunjukkan lokasi history pencarian pada cookie, cache, history download dan melihat password yang tersimpan di web browser safari, maxthon dan comodo dragon menggunakan SQLite. Hasil analisis menunjukkan bahwa banyak Informasi yang di peroleh dari bukti digital web browser menggunakan SQLite sehingga metode ini dapat di terapkan untuk mendapatkan bukti digital jika di perlukan sebagai pembuktian sebuah kasus.Kata kunci – Web Browser, SQLite, Bukti Digital
APA, Harvard, Vancouver, ISO, and other styles
28

Petráš, Václav. "Implementation of SQLite database support in program gama-local." Geoinformatics FCE CTU 7 (December 29, 2011): 73–84. http://dx.doi.org/10.14311/gi.7.6.

Full text
Abstract:
The program gama-local is a part of GNU Gama project and allows adjustment of local geodetic networks. Before realization of this project the program gama-local supported only XML as an input. I designed and implemented support for the SQLite database and thanks to this extension gama-local can read input data from the SQLite database. This article is focused on the specifics of the use of callback functions in C++ using the native SQLite C/C++ Application Programming Interface. The article provides solution to safe calling of callback functions written in C++. Callback functions are called from C library and C library itself is used by C++ program. Provided solution combines several programing techniques which are described in detail, so this article can serve as a cookbook even for beginner programmers. This project was accomplished within my bachelor thesis.
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Gang, and Ming Yu Zhao. "Study and Optimization of Database on Android Platform." Applied Mechanics and Materials 263-266 (December 2012): 1754–58. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1754.

Full text
Abstract:
Due to the poor database performance situation on Android operating system, put forward a methods of database access performance optimization. The paper first analyze the Android database access principle, architecture of SQLite and Berkeley DB, and methods of Berkeley DB in concurrent access, then put forward a method of porting Berkeley DB to Android to replace SQLite to enhance the database access performance. Finally a series of practical benchmark results shows that the porting brings performance improvement effect.
APA, Harvard, Vancouver, ISO, and other styles
30

Putra, Raden Bagus Dimas, Eko Setia Budi, and Abdul Rahman Kadafi. "Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android." JURIKOM (Jurnal Riset Komputer) 7, no. 3 (June 14, 2020): 376. http://dx.doi.org/10.30865/jurikom.v7i3.2161.

Full text
Abstract:
Android is one of the largest mobile operating system platforms today. Amid the ever-increasing needs of users, Android programmers are still lacking to meet the current market needs. One of the problems that causes this is the difficulty of creating an internal database, so many people give up to learn to make Android applications. Android's internal database is hard to create because the entire data structure on that database should be built with the query executed in the created program code. Some of the common internal databases currently used are SQLiTe and Room. Both databases are quite difficult to learn where SQLite should build everything from scratch while Room should study the structure and systematics of of the library. Therefore, in this article, the author proposes library and template named "Relational Database Library and Template" which will be referred to as RBDLiTe which can create an internal database for Android applications easily which will also be compared with SQLiTe and Room in its use.
APA, Harvard, Vancouver, ISO, and other styles
31

Feng, Xing Li, Zhi Hai Suo, Yao Tang Wei, and Mo Xu. "The Financial Management System Based on Android and SQLite." Applied Mechanics and Materials 462-463 (November 2013): 974–77. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.974.

Full text
Abstract:
SQLite is a lightweight database which is widely used in most of embedded devices becauseof its advantages such as open source, zero configuration, self-contained, server less, highly concurrent, etc. The Android application in this paper uses SQLiteOpenHelper to initialize the database and store many kinds of data types such as text, date, time, image into database. GalleryAdapter extended from BaseAdapter is used to write the image taken by camera and stored in SD card into the database table. The design of user interface is aesthetic and convenient. The user experience is favorable. It is a good choice for family financial management.
APA, Harvard, Vancouver, ISO, and other styles
32

Imam Farisi, Mukhaimy Gazali, and Rudy Anshari. "SQLite Sebagai Pengganti Lucene.Net pada Pencarian Produk Toko Online." Jurnal CoSciTech (Computer Science and Information Technology) 1, no. 2 (October 31, 2020): 36–43. http://dx.doi.org/10.37859/coscitech.v1i2.2204.

Full text
Abstract:
A business institution can promote their products in its online shop. With the promotion of online stores, consumers can find out which products are sold at the store. Consumers who are looking for a product can search based on various attributes of goods that are scattered in various fields in the database table, and can even be spread across different tables. All attributes that point to an item are collected in one document which will be searched using the Full Text Search system. Two alternatives to the Full Text Search system were selected; Lucene.Net and Sqlite Full Text Search. Before actually being used, these two search system alternatives were tested first. In document storage size, Lucene.Net is superior by 6.78 times. The speed of writing Sqlite search documents is superior by between 1,875 times to 5,197 times. In terms of key search speed, Lucene.Net was superior by between 1,169 and 1,698 times. Based on the consideration of the speed and development of Lucene.Net Core which is still in beta stage, Sqlite Full Text Search is suitable for use in the product search process in the Online Store.
APA, Harvard, Vancouver, ISO, and other styles
33

Kabakuş, Abdullah Talha. "Pratik Açıdan SQLite ve Firebase Veritabanlarının Bir Performans Karşılaştırması." Düzce Üniversitesi Bilim ve Teknoloji Dergisi 7, no. 1 (January 31, 2019): 314–25. http://dx.doi.org/10.29130/dubited.441672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Oh, Gihwan, Sangchul Kim, Sang-Won Lee, and Bongki Moon. "SQLite optimization with phase change memory for mobile applications." Proceedings of the VLDB Endowment 8, no. 12 (August 2015): 1454–65. http://dx.doi.org/10.14778/2824032.2824044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Borovskoy, I. G., E. A. Shelmina, and N. V. Zarikovskaya. "Text Data Storage Method Modification for SQLite Relational Database." Journal of Physics: Conference Series 803 (January 2017): 012025. http://dx.doi.org/10.1088/1742-6596/803/1/012025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jeon, Sangjun, Jewan Bang, Keunduck Byun, and Sangjin Lee. "A recovery method of deleted record for SQLite database." Personal and Ubiquitous Computing 16, no. 6 (July 24, 2011): 707–15. http://dx.doi.org/10.1007/s00779-011-0428-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Choi, Jin-oh. "Implementation and Experiment for Search Performance Analysis of SQLite Mobile Database." Journal of the Korea Institute of Information and Communication Engineering 21, no. 2 (February 28, 2017): 333–38. http://dx.doi.org/10.6109/jkiice.2017.21.2.333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Abogaa, Jennifer Bagulaya. "e-recognition of Motorbike License Plate using Python and SQLite." Indian Journal Of Science And Technology 15, no. 48 (December 27, 2022): 2757–64. http://dx.doi.org/10.17485/ijst/v15i48.1673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Zhou, Bing. "Analysis of the Security Mechanism of Android and Countermeasures." Applied Mechanics and Materials 687-691 (November 2014): 2948–51. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2948.

Full text
Abstract:
Now, as the security threats for the Android phone increasing, the security problem about the smart mobile-phone has become a focus of the topic. In this paper, we take the security problems on Android operating system as the study object .Our contribution in this paper is two-fold. First, SQLite database is the mainly way for data storage on Android, but no security mechanism was provided in SQLite, we implement data encryption technique refer to the common database security mechanism. Second, in order to solve the security threats existing in the traditional phone, we also give a design and implementation of multi-function mobile phone firewall.
APA, Harvard, Vancouver, ISO, and other styles
40

Qin, Lu, Jeffrey Xu Yu, and Lijun Chang. "Ten thousand SQLs." Proceedings of the VLDB Endowment 3, no. 1-2 (September 2010): 58–69. http://dx.doi.org/10.14778/1920841.1920854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bhagat, Siddhesh, R. R. Sedamkar, and Prachi Janrao. "Preventing SQLIA using ORM Tool with HQL." International Journal of Applied Information Systems 11, no. 4 (September 6, 2016): 44–47. http://dx.doi.org/10.5120/ijais2016451600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kumar, Pankaj, and C. P. Katti. "A Parallel-SQLIA Detector for Web Security." International Journal of Information Engineering and Electronic Business 8, no. 2 (March 8, 2016): 66–75. http://dx.doi.org/10.5815/ijieeb.2016.02.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Libkin, Leonid. "SQL’s Three-Valued Logic and Certain Answers." ACM Transactions on Database Systems 41, no. 1 (April 7, 2016): 1–28. http://dx.doi.org/10.1145/2877206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Xie, Cong, and Shao Jian Song. "Design of Door Monitoring Interface Based on Qt4 and SQLite." Applied Mechanics and Materials 556-562 (May 2014): 1592–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1592.

Full text
Abstract:
With the number of private cars increasing, the problems such as the shortage of parking spaces, the disorder and congestion of parking are becoming serious, especially in a flourishing business street. So we do the research based on an underground parking lot at a commercial district. In this paper, we design a monitoring interface based on embedded cross-platform GUI system-Qt4 and embedded SQLite combining RFID and Zigbee technology on computer, and then transplant it to Intel PXA270 based on ARM-Linux. The designed system can realize automatic identification, charging of vehicles and displaying parking spaces. It can improve the efficiency of parking.
APA, Harvard, Vancouver, ISO, and other styles
45

Суворов, Александр Павлович, and Сергей Петрович Зоткин. "Применение программы DB Browser for SQLite для создания баз данных." Естественные и Технические Науки, no. 09 (2020): 108–11. http://dx.doi.org/10.37882/2223-2966.2020.09.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lokhande, Sharayu, and Vaishali Ganganwar. "Accessing and Modifying Sqlite Remotely for Catering Multi Client Access." International Journal of Science and Engineering Applications 4, no. 6 (November 19, 2015): 350–52. http://dx.doi.org/10.7753/ijsea0406.1003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yamamoto, Moriki, and Hisao Koizumi. "An Experimental Evaluation using SQLite for Real-Time Stream Processing." Journal of International Council on Electrical Engineering 3, no. 1 (January 2013): 68–72. http://dx.doi.org/10.5370/jicee.2013.3.1.068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Rigin, A. M., and S. A. Shershakov. "SQLite RDBMS Extension for Data Indexing Using B-tree Modifications." Proceedings of the Institute for System Programming of the RAS 31, no. 3 (2019): 203–16. http://dx.doi.org/10.15514/ispras-2019-31(3)-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Khwaldeh, Ali, Amani Tahat, Jordi Marti, and Mofleh Tahat. "Atomic Data Mining Numerical Methods, Source Code SQlite with Python." Procedia - Social and Behavioral Sciences 73 (February 2013): 232–39. http://dx.doi.org/10.1016/j.sbspro.2013.02.046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Chen Chen. "Research of Embedded Image Processing Based on ARM11 and SQLite." Applied Mechanics and Materials 373-375 (August 2013): 1603–6. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1603.

Full text
Abstract:
According to the fact that the embedded system is not efficient enough to access and manipulate image data, this paper put forward a research program of image JPEG compression algorithm and being stored in a combination based on the ARM11 and SQLite embedded database image processing system. Comparative Researches on the system without data prove that the program can make the embedded systems more reasonable to store image data and realize the localized efficient management of the image data, which has certain practical value.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography