Artículos de revistas sobre el tema "SQLIVS"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: SQLIVS.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "SQLIVS".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober y Ruth McCorkle. "Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial". Journal of Clinical Oncology 29, n.º 8 (10 de marzo de 2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.

Texto completo
Resumen
Purpose Although patient-reported cancer symptoms and quality-of-life issues (SQLIs) have been promoted as essential to a comprehensive assessment, efficient and efficacious methods have not been widely tested in clinical settings. The purpose of this trial was to determine the effect of the Electronic Self-Report Assessment–Cancer (ESRA-C) on the likelihood of SQLIs discussed between clinicians and patients with cancer in ambulatory clinic visits. Secondary objectives included comparison of visit duration between groups and usefulness of the ESRA-C as reported by clinicians. Patients and Methods This randomized controlled trial was conducted in 660 patients with various cancer diagnoses and stages at two institutions of a comprehensive cancer center. Patient-reported SQLIs were automatically displayed on a graphical summary and provided to the clinical team before an on-treatment visit (n = 327); in the control group, no summary was provided (n = 333). SQLIs were scored for level of severity or distress. One on-treatment clinic visit was audio recorded for each participant and then scored for discussion of each SQLI. We hypothesized that problematic SQLIs would be discussed more often when the intervention was delivered to the clinicians. Results The likelihood of SQLIs being discussed differed by randomized group and depended on whether an SQLI was first reported as problematic (P = .032). Clinic visits were similar with regard to duration between groups, and clinicians reported the summary as useful. Conclusion The ESRA-C is the first electronic self-report application to increase discussion of SQLIs in a US randomized clinical trial.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Fu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping y Xiaodan Lv. "SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic". Electronics 12, n.º 11 (30 de mayo de 2023): 2472. http://dx.doi.org/10.3390/electronics12112472.

Texto completo
Resumen
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages’ identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT’s SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Sun, San-Tsai y Konstantin Beznosov. "Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks". International Journal of Secure Software Engineering 1, n.º 1 (enero de 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.

Texto completo
Resumen
This article presents an approach for retrofitting existing Web applications with run-time protection against known, as well as unseen, SQL injection attacks (SQLIAs) without the involvement of application developers. The precision of the approach is also enhanced with a method for reducing the rate of false positives in the SQLIA detection logic, via runtime discovery of the developers’ intention for individual SQL statements made by Web applications. The proposed approach is implemented in the form of protection mechanisms for J2EE, ASP.NET, and ASP applications. Named SQLPrevent, these mechanisms intercept HTTP requests and SQL statements, mark and track parameter values originating from HTTP requests, and perform SQLIA detection and prevention on the intercepted SQL statements. The AMNESIA testbed is extended to contain false-positive testing traces, and is used to evaluate SQLPrevent. In our experiments, SQLPrevent produced no false positives or false negatives, and imposed a maximum 3.6% performance overhead with 30 milliseconds response time for the tested applications.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Ablahd, Ann y Suhair Dawwod. "Using Flask for SQLIA Detection and Protection". Tikrit Journal of Engineering Sciences 27, n.º 2 (15 de mayo de 2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.

Texto completo
Resumen
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Gaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy y Jignesh M. Patel. "SQLite". Proceedings of the VLDB Endowment 15, n.º 12 (agosto de 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.

Texto completo
Resumen
In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed "the SQLite for analytics", has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite's performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ateeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani y Hazura Zulzalil. "Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities". International Journal of Engineering & Technology 7, n.º 4.1 (12 de septiembre de 2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.

Texto completo
Resumen
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Adinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari y Ketut Dita Ari Sutrisna. "Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole". Informatik : Jurnal Ilmu Komputer 18, n.º 3 (28 de diciembre de 2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.

Texto completo
Resumen
Penggunaan SQL injection merupakan sebuah ancaman yang sering terjadi di Internet. Karena penggunaan internet untuk berbagai layanan online meningkat, sama halnya dengan ancaman keamanan yang dimiliki web meningkat. Dikarenakan serangan injeksi SQL merupakan salah satu kerentanan keamanan yang paling serius dalam Web, Oleh karena itu penulis ingin membandingkan beberapa tools dari SQL Injection seperti SQLMap, SQLus, dan The Mole. Tools ini merupakan aplikasi dari sistem operasi Kali Linux, dalam aplikasi ini berguna dalam melakukan injeksi data – data yang ada pada suatu web khususnya database pada web dengan menggunakan fitur – fitur yang tersedia pada aplikasi ini. Dalam paper ini, kami telah menyajikan sebuah perbandingan penggunaan tools seperti SQLMap, SQLSus, dan The Mole dengan membandingkan 3 parameter seperti Cross Program, Functionality, Usability, perbandingan dimulai dari proses injeksi hingga aplikasi itu bekerja sampai dengan proses kita bisa mendapatkan database dari sebuah web yang sudah terinjeksi dan tanpa diketahui oleh korban.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Lee, Eunji. "Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning". International Journal of Environmental Research and Public Health 16, n.º 17 (26 de agosto de 2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.

Texto completo
Resumen
This article explores the performance optimizations of an embedded database memory management system to ensure high responsiveness of real-time healthcare data frameworks. SQLite is a popular embedded database engine extensively used in medical and healthcare data storage systems. However, SQLite is essentially built around lightweight applications in mobile devices, and it significantly deteriorates when a large transaction is issued such as high resolution medical images or massive health dataset, which is unlikely to occur in embedded systems but is quite common in other systems. Such transactions do not fit in the in-memory buffer of SQLite, and SQLite enforces memory reclamation as they are processed. The problem is that the current SQLite buffer management scheme does not effectively manage these cases, and the naïve reclamation scheme used significantly increases the user-perceived latency. Motivated by this limitation, this paper identifies the causes of high latency during processing of a large transaction, and overcomes the limitation via proactive and coarse-grained memory cleaning in SQLite.The proposed memory reclamation scheme was implemented in SQLite 3.29, and measurement studies with a prototype implementation demonstrated that the SQLite operation latency decreases by 13% on an average and up to 17.3% with our memory reclamation scheme as compared to that of the original version.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Dharmalingam, Jeya Mala y M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, n.º 3 (julio de 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Texto completo
Resumen
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Nidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V y Neethu Prabhakaran P. "SQLIAD – A Hazard to Web Applications". International Journal of Computer Trends and Technology 29, n.º 1 (25 de noviembre de 2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Wang, Yongzhi, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu y Xuewen Dong. "CryptSQLite: SQLite With High Data Security". IEEE Transactions on Computers 69, n.º 5 (1 de mayo de 2020): 666–78. http://dx.doi.org/10.1109/tc.2019.2963303.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Winslett, Marianne y Vanessa Braganholo. "Richard Hipp Speaks Out on SQLite". ACM SIGMOD Record 48, n.º 2 (19 de diciembre de 2019): 39–46. http://dx.doi.org/10.1145/3377330.3377338.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Li, Jian Wei, Hong Guo y Yu Bin Xu. "Research on Optimization of SQLite Indexing Mechanism Based on Red-Black Tree". Applied Mechanics and Materials 220-223 (noviembre de 2012): 2711–15. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2711.

Texto completo
Resumen
SQLite has been widely applied in embedded system because of its open source and less resource consumption. A novel optimization method with Red-black tree replacing B tree in indexing mechanism in order to solve the low efficiency and large energy consumption problem when inserting and deleting data in SQLite database was proposed in the paper. The contrast test of efficiency of between red-black tree and B tree while inserting and deleting data shows that this method can effectively improve the SQLite insertion and deletion operation efficiency and reduce the energy consumption.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Sebastian, Anu, Richa Kuriakose y Surekha Mariam Varghese. "NEO4J, SQLITE and MYSQL for Hospital Localization". Advanced Computing: An International Journal 7, n.º 3 (30 de mayo de 2016): 29–36. http://dx.doi.org/10.5121/acij.2016.7303.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Nemetz, Sebastian, Sven Schmitt y Felix Freiling. "A standardized corpus for SQLite database forensics". Digital Investigation 24 (marzo de 2018): S121—S130. http://dx.doi.org/10.1016/j.diin.2018.01.015.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Zhang, Li, Shengang Hao y Quanxin Zhang. "Recovering SQLite data from fragmented flash pages". Annals of Telecommunications 74, n.º 7-8 (20 de febrero de 2019): 451–60. http://dx.doi.org/10.1007/s12243-019-00707-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Liu, Jun Lin y Qi Yuan Sun. "Information Processing Based on SQLite for Target Tracking System". Applied Mechanics and Materials 278-280 (enero de 2013): 2065–68. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.2065.

Texto completo
Resumen
As for the digital visual surveillance system, the traditional database and hardware platform can not be good at processing vast quantities of information. Combined with ActiveX Data Objects (ADO) technology, the information processing system was built by using SQLite database with embedded dual-core platform. The embedded database SQLite is implanted in the existing embedded hardware platform DM6446. And processing modules and operating interface were designed based on SQLite and the embedded hardware platform. The designed system can play a role as the core of data processing. The experiments show that the system can meet the requirements of the visual information processing such as data mining, online system analysis, data post-processing and so on.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Lashkaripour, Zeinab y Abbas Ghaemi Bafghi. "A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)". International Journal of Security and Its Applications 7, n.º 5 (30 de septiembre de 2013): 53–66. http://dx.doi.org/10.14257/ijsia.2013.7.5.05.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Zhu, Alex y Wei Qi Yan. "Exploring Defense of SQL Injection Attack in Penetration Testing". International Journal of Digital Crime and Forensics 9, n.º 4 (octubre de 2017): 62–71. http://dx.doi.org/10.4018/ijdcf.2017100106.

Texto completo
Resumen
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is that hackers maliciously turn down a website and make network resources unavailable to web users. It is extremely difficult to effectively detect and prevent SQLIA because hackers adopt various evading SQLIA Intrusion Detection System techniques. Victims may not be even aware of that their confidential data has been compromised for a long time. In this paper, our contribution is that we evaluate several most popular open source SQLIA tools and SQLIA prevention tools with both qualitative and quantitative assessments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Datsko, Oleh y Elżbieta Miłosz. "Performance comparison between Xamarin and Java database operations". Journal of Computer Sciences Institute 7 (30 de septiembre de 2018): 168–71. http://dx.doi.org/10.35784/jcsi.672.

Texto completo
Resumen
Work with database is one of base things in developing an application. Every technology/language uses own ways to work with database. In the case of Android the SQLite relational database management system is used. Analysis applies the read, write and delete of items from the table. SQLite is like a minimized version of desktop database management system so for every experiment very limited elements count is used.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Kar, Debabrata, Suvasini Panigrahi y Srikanth Sundararajan. "SQLiDDS: SQL injection detection using document similarity measure". Journal of Computer Security 24, n.º 4 (16 de agosto de 2016): 507–39. http://dx.doi.org/10.3233/jcs-160554.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Nana Mbinkeu, Rodrigue Carlos y Bernabé Batchakui. "Reducing Disk Storage with SQLite into BitCoin Architecture". International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, n.º 2 (12 de mayo de 2015): 10. http://dx.doi.org/10.3991/ijes.v3i2.4490.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Bharadwaj, Y. V. Sai, Sai Bhageerath Yarrapatruni y Dr Prasada Rao YVSSSV. "SQLite Database and its Application on Embedded Platform". International Journal of Computer Trends and Technology 67, n.º 2 (25 de febrero de 2019): 1–6. http://dx.doi.org/10.14445/22312803/ijctt-v67i2p101.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Park, Jong-Hyeok, Gihwan Oh y Sang-Won Lee. "SQL statement logging for making SQLite truly lite". Proceedings of the VLDB Endowment 11, n.º 4 (diciembre de 2017): 513–25. http://dx.doi.org/10.1145/3186728.3164146.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Winasis, Persis Haryo, Raga Maulana y Yodi Susanto. "Designing Application For Defect Recording and Handover Of Property Based On Mobile Application by Applying SQLite Technology". CCIT Journal 13, n.º 2 (27 de agosto de 2020): 185–95. http://dx.doi.org/10.33050/ccit.v13i2.990.

Texto completo
Resumen
Property development companies that produce housing products, high rise dwellings, and office buildings generally have data on the quality of buildings, one of which is obtained during the defect inspection process between developers and consumers before handing over units. Recording data is generally still done manually using a form on a paper. For these conditions, researchers tried to build an application based on mobile apps to digitally record the defect checklist of the dwelling so that the data collected can be processed for the needs of analysis and development strategies. Difficulties encountered during the unit handover process using digital methods on the newly completed property, one of which is the quality of data and internet signals. Mobile apps certainly require a data signal connection to send data to the server. This Android-based mobile apps will implement SQLite technology which allows the recording of transactions to be done locally first, which can then be synchronized into the database server after getting the required internet data connection. SQLite was chosen because it has a relatively small library code unlike relational DBMS in general. SQLite is also easy to use without complex configurations. With the support of the ease of function of SQLite it also allows applications to be integrated with the property sales application system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Shin, Jiho y Jung-Taek Seo. "Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger". Sustainability 14, n.º 20 (15 de octubre de 2022): 13281. http://dx.doi.org/10.3390/su142013281.

Texto completo
Resumen
With the diffusion of mobile devices and Internet hyperconnectivity technology, all daily living records of individuals are being recorded on mobile devices in real time. However, from the user’s point of view, the reliability of privacy protection, that is, whether the user’s data on the mobile device completely disappears when it is deleted, is critical. This is because, for the sustainability of social growth, it is necessary to control the digitalization and technology that heightens the risks of the future society. Therefore, this study aims to check the traces of the SQLite database to see if instant messenger messages deleted by the user can be recovered. When the SQLite database record is deleted, if the database shrink function or other application-level deletion does not work, it is possible to recover the deleted record. We chose two iOS-based instant messengers, WhatsApp and WeChat, and analyzed the SQLite DB file and Table Schema where messages are stored. As a result of the experiment in this study, it was verified that the area where the deleted message was stored in the SQLite DB file was overwritten with 0 × 00 or updated with a NULL value, making it impossible to recover the deleted message. This process operates at the app level, and user data is safely protected.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

HARIANI, HARIANI. "EKSPLORASI WEB BROWSER DALAM PENCARIAN BUKTI DIGITAL MENGGUNAKAN SQLITE". Jurnal INSTEK (Informatika Sains dan Teknologi) 6, n.º 1 (6 de enero de 2021): 66. http://dx.doi.org/10.24252/instek.v6i1.18638.

Texto completo
Resumen
Penggunaan Internet yang meningkat membuat semakin maraknya pengguna web browser. Hal ini bisa memberikan dampak pada meningkatnya kejahatan dunia maya menggunakan media tersebut misalnya menyebarkan hoax, penipuan Email dan lain-lain. Penelitian ini bertujuan untuk mengetahui pentingnya melihat aktivitas pada web browser baik terhadap korban maupun pelaku. Hal ini bisa menentukan pola kejahatan pada suatu kasus dan membantu penyidik dalam menganalisis bukti digital yang tersimpan pada WEB Browser sehingga kasus bisa di selesaikan dengan baik dan tepat. Penelitian ini menunjukkan lokasi history pencarian pada cookie, cache, history download dan melihat password yang tersimpan di web browser safari, maxthon dan comodo dragon menggunakan SQLite. Hasil analisis menunjukkan bahwa banyak Informasi yang di peroleh dari bukti digital web browser menggunakan SQLite sehingga metode ini dapat di terapkan untuk mendapatkan bukti digital jika di perlukan sebagai pembuktian sebuah kasus.Kata kunci – Web Browser, SQLite, Bukti Digital
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Petráš, Václav. "Implementation of SQLite database support in program gama-local". Geoinformatics FCE CTU 7 (29 de diciembre de 2011): 73–84. http://dx.doi.org/10.14311/gi.7.6.

Texto completo
Resumen
The program gama-local is a part of GNU Gama project and allows adjustment of local geodetic networks. Before realization of this project the program gama-local supported only XML as an input. I designed and implemented support for the SQLite database and thanks to this extension gama-local can read input data from the SQLite database. This article is focused on the specifics of the use of callback functions in C++ using the native SQLite C/C++ Application Programming Interface. The article provides solution to safe calling of callback functions written in C++. Callback functions are called from C library and C library itself is used by C++ program. Provided solution combines several programing techniques which are described in detail, so this article can serve as a cookbook even for beginner programmers. This project was accomplished within my bachelor thesis.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Wang, Gang y Ming Yu Zhao. "Study and Optimization of Database on Android Platform". Applied Mechanics and Materials 263-266 (diciembre de 2012): 1754–58. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1754.

Texto completo
Resumen
Due to the poor database performance situation on Android operating system, put forward a methods of database access performance optimization. The paper first analyze the Android database access principle, architecture of SQLite and Berkeley DB, and methods of Berkeley DB in concurrent access, then put forward a method of porting Berkeley DB to Android to replace SQLite to enhance the database access performance. Finally a series of practical benchmark results shows that the porting brings performance improvement effect.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Putra, Raden Bagus Dimas, Eko Setia Budi y Abdul Rahman Kadafi. "Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android". JURIKOM (Jurnal Riset Komputer) 7, n.º 3 (14 de junio de 2020): 376. http://dx.doi.org/10.30865/jurikom.v7i3.2161.

Texto completo
Resumen
Android is one of the largest mobile operating system platforms today. Amid the ever-increasing needs of users, Android programmers are still lacking to meet the current market needs. One of the problems that causes this is the difficulty of creating an internal database, so many people give up to learn to make Android applications. Android's internal database is hard to create because the entire data structure on that database should be built with the query executed in the created program code. Some of the common internal databases currently used are SQLiTe and Room. Both databases are quite difficult to learn where SQLite should build everything from scratch while Room should study the structure and systematics of of the library. Therefore, in this article, the author proposes library and template named "Relational Database Library and Template" which will be referred to as RBDLiTe which can create an internal database for Android applications easily which will also be compared with SQLiTe and Room in its use.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Feng, Xing Li, Zhi Hai Suo, Yao Tang Wei y Mo Xu. "The Financial Management System Based on Android and SQLite". Applied Mechanics and Materials 462-463 (noviembre de 2013): 974–77. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.974.

Texto completo
Resumen
SQLite is a lightweight database which is widely used in most of embedded devices becauseof its advantages such as open source, zero configuration, self-contained, server less, highly concurrent, etc. The Android application in this paper uses SQLiteOpenHelper to initialize the database and store many kinds of data types such as text, date, time, image into database. GalleryAdapter extended from BaseAdapter is used to write the image taken by camera and stored in SD card into the database table. The design of user interface is aesthetic and convenient. The user experience is favorable. It is a good choice for family financial management.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Imam Farisi, Mukhaimy Gazali y Rudy Anshari. "SQLite Sebagai Pengganti Lucene.Net pada Pencarian Produk Toko Online". Jurnal CoSciTech (Computer Science and Information Technology) 1, n.º 2 (31 de octubre de 2020): 36–43. http://dx.doi.org/10.37859/coscitech.v1i2.2204.

Texto completo
Resumen
A business institution can promote their products in its online shop. With the promotion of online stores, consumers can find out which products are sold at the store. Consumers who are looking for a product can search based on various attributes of goods that are scattered in various fields in the database table, and can even be spread across different tables. All attributes that point to an item are collected in one document which will be searched using the Full Text Search system. Two alternatives to the Full Text Search system were selected; Lucene.Net and Sqlite Full Text Search. Before actually being used, these two search system alternatives were tested first. In document storage size, Lucene.Net is superior by 6.78 times. The speed of writing Sqlite search documents is superior by between 1,875 times to 5,197 times. In terms of key search speed, Lucene.Net was superior by between 1,169 and 1,698 times. Based on the consideration of the speed and development of Lucene.Net Core which is still in beta stage, Sqlite Full Text Search is suitable for use in the product search process in the Online Store.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Kabakuş, Abdullah Talha. "Pratik Açıdan SQLite ve Firebase Veritabanlarının Bir Performans Karşılaştırması". Düzce Üniversitesi Bilim ve Teknoloji Dergisi 7, n.º 1 (31 de enero de 2019): 314–25. http://dx.doi.org/10.29130/dubited.441672.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Oh, Gihwan, Sangchul Kim, Sang-Won Lee y Bongki Moon. "SQLite optimization with phase change memory for mobile applications". Proceedings of the VLDB Endowment 8, n.º 12 (agosto de 2015): 1454–65. http://dx.doi.org/10.14778/2824032.2824044.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Borovskoy, I. G., E. A. Shelmina y N. V. Zarikovskaya. "Text Data Storage Method Modification for SQLite Relational Database". Journal of Physics: Conference Series 803 (enero de 2017): 012025. http://dx.doi.org/10.1088/1742-6596/803/1/012025.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Jeon, Sangjun, Jewan Bang, Keunduck Byun y Sangjin Lee. "A recovery method of deleted record for SQLite database". Personal and Ubiquitous Computing 16, n.º 6 (24 de julio de 2011): 707–15. http://dx.doi.org/10.1007/s00779-011-0428-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Choi, Jin-oh. "Implementation and Experiment for Search Performance Analysis of SQLite Mobile Database". Journal of the Korea Institute of Information and Communication Engineering 21, n.º 2 (28 de febrero de 2017): 333–38. http://dx.doi.org/10.6109/jkiice.2017.21.2.333.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Abogaa, Jennifer Bagulaya. "e-recognition of Motorbike License Plate using Python and SQLite". Indian Journal Of Science And Technology 15, n.º 48 (27 de diciembre de 2022): 2757–64. http://dx.doi.org/10.17485/ijst/v15i48.1673.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Zhou, Bing. "Analysis of the Security Mechanism of Android and Countermeasures". Applied Mechanics and Materials 687-691 (noviembre de 2014): 2948–51. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2948.

Texto completo
Resumen
Now, as the security threats for the Android phone increasing, the security problem about the smart mobile-phone has become a focus of the topic. In this paper, we take the security problems on Android operating system as the study object .Our contribution in this paper is two-fold. First, SQLite database is the mainly way for data storage on Android, but no security mechanism was provided in SQLite, we implement data encryption technique refer to the common database security mechanism. Second, in order to solve the security threats existing in the traditional phone, we also give a design and implementation of multi-function mobile phone firewall.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Qin, Lu, Jeffrey Xu Yu y Lijun Chang. "Ten thousand SQLs". Proceedings of the VLDB Endowment 3, n.º 1-2 (septiembre de 2010): 58–69. http://dx.doi.org/10.14778/1920841.1920854.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Bhagat, Siddhesh, R. R. Sedamkar y Prachi Janrao. "Preventing SQLIA using ORM Tool with HQL". International Journal of Applied Information Systems 11, n.º 4 (6 de septiembre de 2016): 44–47. http://dx.doi.org/10.5120/ijais2016451600.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Kumar, Pankaj y C. P. Katti. "A Parallel-SQLIA Detector for Web Security". International Journal of Information Engineering and Electronic Business 8, n.º 2 (8 de marzo de 2016): 66–75. http://dx.doi.org/10.5815/ijieeb.2016.02.08.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Libkin, Leonid. "SQL’s Three-Valued Logic and Certain Answers". ACM Transactions on Database Systems 41, n.º 1 (7 de abril de 2016): 1–28. http://dx.doi.org/10.1145/2877206.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Xie, Cong y Shao Jian Song. "Design of Door Monitoring Interface Based on Qt4 and SQLite". Applied Mechanics and Materials 556-562 (mayo de 2014): 1592–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1592.

Texto completo
Resumen
With the number of private cars increasing, the problems such as the shortage of parking spaces, the disorder and congestion of parking are becoming serious, especially in a flourishing business street. So we do the research based on an underground parking lot at a commercial district. In this paper, we design a monitoring interface based on embedded cross-platform GUI system-Qt4 and embedded SQLite combining RFID and Zigbee technology on computer, and then transplant it to Intel PXA270 based on ARM-Linux. The designed system can realize automatic identification, charging of vehicles and displaying parking spaces. It can improve the efficiency of parking.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Суворов, Александр Павлович y Сергей Петрович Зоткин. "Применение программы DB Browser for SQLite для создания баз данных". Естественные и Технические Науки, n.º 09 (2020): 108–11. http://dx.doi.org/10.37882/2223-2966.2020.09.36.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Lokhande, Sharayu y Vaishali Ganganwar. "Accessing and Modifying Sqlite Remotely for Catering Multi Client Access". International Journal of Science and Engineering Applications 4, n.º 6 (19 de noviembre de 2015): 350–52. http://dx.doi.org/10.7753/ijsea0406.1003.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Yamamoto, Moriki y Hisao Koizumi. "An Experimental Evaluation using SQLite for Real-Time Stream Processing". Journal of International Council on Electrical Engineering 3, n.º 1 (enero de 2013): 68–72. http://dx.doi.org/10.5370/jicee.2013.3.1.068.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Rigin, A. M. y S. A. Shershakov. "SQLite RDBMS Extension for Data Indexing Using B-tree Modifications". Proceedings of the Institute for System Programming of the RAS 31, n.º 3 (2019): 203–16. http://dx.doi.org/10.15514/ispras-2019-31(3)-16.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Khwaldeh, Ali, Amani Tahat, Jordi Marti y Mofleh Tahat. "Atomic Data Mining Numerical Methods, Source Code SQlite with Python". Procedia - Social and Behavioral Sciences 73 (febrero de 2013): 232–39. http://dx.doi.org/10.1016/j.sbspro.2013.02.046.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Liu, Chen Chen. "Research of Embedded Image Processing Based on ARM11 and SQLite". Applied Mechanics and Materials 373-375 (agosto de 2013): 1603–6. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1603.

Texto completo
Resumen
According to the fact that the embedded system is not efficient enough to access and manipulate image data, this paper put forward a research program of image JPEG compression algorithm and being stored in a combination based on the ARM11 and SQLite embedded database image processing system. Comparative Researches on the system without data prove that the program can make the embedded systems more reasonable to store image data and realize the localized efficient management of the image data, which has certain practical value.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía