Littérature scientifique sur le sujet « SQLIVS »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « SQLIVS ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "SQLIVS"

1

Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober et Ruth McCorkle. « Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer : A Randomized Trial ». Journal of Clinical Oncology 29, no 8 (10 mars 2011) : 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.

Texte intégral
Résumé :
Purpose Although patient-reported cancer symptoms and quality-of-life issues (SQLIs) have been promoted as essential to a comprehensive assessment, efficient and efficacious methods have not been widely tested in clinical settings. The purpose of this trial was to determine the effect of the Electronic Self-Report Assessment–Cancer (ESRA-C) on the likelihood of SQLIs discussed between clinicians and patients with cancer in ambulatory clinic visits. Secondary objectives included comparison of visit duration between groups and usefulness of the ESRA-C as reported by clinicians. Patients and Methods This randomized controlled trial was conducted in 660 patients with various cancer diagnoses and stages at two institutions of a comprehensive cancer center. Patient-reported SQLIs were automatically displayed on a graphical summary and provided to the clinical team before an on-treatment visit (n = 327); in the control group, no summary was provided (n = 333). SQLIs were scored for level of severity or distress. One on-treatment clinic visit was audio recorded for each participant and then scored for discussion of each SQLI. We hypothesized that problematic SQLIs would be discussed more often when the intervention was delivered to the clinicians. Results The likelihood of SQLIs being discussed differed by randomized group and depended on whether an SQLI was first reported as problematic (P = .032). Clinic visits were similar with regard to duration between groups, and clinicians reported the summary as useful. Conclusion The ESRA-C is the first electronic self-report application to increase discussion of SQLIs in a US randomized clinical trial.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Fu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping et Xiaodan Lv. « SDSIOT : An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic ». Electronics 12, no 11 (30 mai 2023) : 2472. http://dx.doi.org/10.3390/electronics12112472.

Texte intégral
Résumé :
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages’ identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT’s SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Sun, San-Tsai, et Konstantin Beznosov. « Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks ». International Journal of Secure Software Engineering 1, no 1 (janvier 2010) : 20–40. http://dx.doi.org/10.4018/jsse.2010102002.

Texte intégral
Résumé :
This article presents an approach for retrofitting existing Web applications with run-time protection against known, as well as unseen, SQL injection attacks (SQLIAs) without the involvement of application developers. The precision of the approach is also enhanced with a method for reducing the rate of false positives in the SQLIA detection logic, via runtime discovery of the developers’ intention for individual SQL statements made by Web applications. The proposed approach is implemented in the form of protection mechanisms for J2EE, ASP.NET, and ASP applications. Named SQLPrevent, these mechanisms intercept HTTP requests and SQL statements, mark and track parameter values originating from HTTP requests, and perform SQLIA detection and prevention on the intercepted SQL statements. The AMNESIA testbed is extended to contain false-positive testing traces, and is used to evaluate SQLPrevent. In our experiments, SQLPrevent produced no false positives or false negatives, and imposed a maximum 3.6% performance overhead with 30 milliseconds response time for the tested applications.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ablahd, Ann, et Suhair Dawwod. « Using Flask for SQLIA Detection and Protection ». Tikrit Journal of Engineering Sciences 27, no 2 (15 mai 2020) : 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.

Texte intégral
Résumé :
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy et Jignesh M. Patel. « SQLite ». Proceedings of the VLDB Endowment 15, no 12 (août 2022) : 3535–47. http://dx.doi.org/10.14778/3554821.3554842.

Texte intégral
Résumé :
In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed "the SQLite for analytics", has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite's performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ateeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani et Hazura Zulzalil. « Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities ». International Journal of Engineering & ; Technology 7, no 4.1 (12 septembre 2018) : 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.

Texte intégral
Résumé :
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Adinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari et Ketut Dita Ari Sutrisna. « Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole ». Informatik : Jurnal Ilmu Komputer 18, no 3 (28 décembre 2022) : 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.

Texte intégral
Résumé :
Penggunaan SQL injection merupakan sebuah ancaman yang sering terjadi di Internet. Karena penggunaan internet untuk berbagai layanan online meningkat, sama halnya dengan ancaman keamanan yang dimiliki web meningkat. Dikarenakan serangan injeksi SQL merupakan salah satu kerentanan keamanan yang paling serius dalam Web, Oleh karena itu penulis ingin membandingkan beberapa tools dari SQL Injection seperti SQLMap, SQLus, dan The Mole. Tools ini merupakan aplikasi dari sistem operasi Kali Linux, dalam aplikasi ini berguna dalam melakukan injeksi data – data yang ada pada suatu web khususnya database pada web dengan menggunakan fitur – fitur yang tersedia pada aplikasi ini. Dalam paper ini, kami telah menyajikan sebuah perbandingan penggunaan tools seperti SQLMap, SQLSus, dan The Mole dengan membandingkan 3 parameter seperti Cross Program, Functionality, Usability, perbandingan dimulai dari proses injeksi hingga aplikasi itu bekerja sampai dengan proses kita bisa mendapatkan database dari sebuah web yang sudah terinjeksi dan tanpa diketahui oleh korban.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Lee, Eunji. « Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning ». International Journal of Environmental Research and Public Health 16, no 17 (26 août 2019) : 3096. http://dx.doi.org/10.3390/ijerph16173096.

Texte intégral
Résumé :
This article explores the performance optimizations of an embedded database memory management system to ensure high responsiveness of real-time healthcare data frameworks. SQLite is a popular embedded database engine extensively used in medical and healthcare data storage systems. However, SQLite is essentially built around lightweight applications in mobile devices, and it significantly deteriorates when a large transaction is issued such as high resolution medical images or massive health dataset, which is unlikely to occur in embedded systems but is quite common in other systems. Such transactions do not fit in the in-memory buffer of SQLite, and SQLite enforces memory reclamation as they are processed. The problem is that the current SQLite buffer management scheme does not effectively manage these cases, and the naïve reclamation scheme used significantly increases the user-perceived latency. Motivated by this limitation, this paper identifies the causes of high latency during processing of a large transaction, and overcomes the limitation via proactive and coarse-grained memory cleaning in SQLite.The proposed memory reclamation scheme was implemented in SQLite 3.29, and measurement studies with a prototype implementation demonstrated that the SQLite operation latency decreases by 13% on an average and up to 17.3% with our memory reclamation scheme as compared to that of the original version.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Dharmalingam, Jeya Mala, et M. Eswaran. « An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks ». International Journal of Intelligent Information Technologies 14, no 3 (juillet 2018) : 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Texte intégral
Résumé :
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Nidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V et Neethu Prabhakaran P. « SQLIAD – A Hazard to Web Applications ». International Journal of Computer Trends and Technology 29, no 1 (25 novembre 2015) : 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "SQLIVS"

1

Пуха, Є. В. « Моделювання баз даних SQLite мовою Python ». Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/73818.

Texte intégral
Résumé :
Розробка програмного додатку, який допоможе студенту або працівнику в сфері IT більш детально розібратися з можливостями роботи баз даних, навчитися застосовувати методологію, методику та інструментарій моделювання в теоретичних та практичних дослідженнях.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Johansson, Marcus. « SQLite Carving och Analys : En jämförelse av metoder ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32716.

Texte intégral
Résumé :
SQLite filer används av ett flertal olika program för att spara viktig information.Information som kan vara viktig för forensiska utredningar, behovet att kunnaåterskapa SQLite filer är då ett växande bekymmer. Problemet med att återskapa SQLitefiler är att, till skillnad från andra filer så har SQLite filer inget definerat slut eller någonmarkör som visar var filen slutar. Detta arbete presenterar en ny metod att bestämmaslutet på SQLite filer och jämför denna metod mot den metod som används idag tillmesta del för att återskapa SQLite filer. För att jämföra dessa metoder utvecklades tvåprogram stpextr och blkextr. Blkextr är den metod som utvecklades under detta arbete.Stpextr visade sig vara snabbare och använda mindre arbetsminne än blkextr. Men ivissa sammanhang så kommer information gå förlorad när stpextr körs till skillnad från blkextr.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Long, Shitian. « Database syncrhonization between devices : A new synchronization protocol for SQLite databases ». Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-46712.

Texte intégral
Résumé :
Today people have multiple personal computers, personal digital assistants and smart phones. Today's advanced handheld devices have powerful processors, with a process frequency of up to 1 GHz, huge storage capacities, flash storage capacities up to 32 GB, a large (multi) touch screen, and a user-friendly user interface. Additionally, the device may have various input and output devices, thus leading to people utilizing different devices for different use cases. In order to provide the latest information to the users via any of their devices, data synchronization becomes a requirement for users. There are many data synchronization solutions for synchronizing database records and files. In the current database synchronization solutions, there is no clear source and target. For example, consider the case where a PDA synchronizes with a PC; the record could have been edited (changed) on both the PDA and PC. In this case it is not clear which should be synchronized with what should be the source for the value. In contrast, a files synchronization system has a clearly specified synchronizatiom sourse and destination structure. In this case the client Synchronizes their files with that of the server. In a version control system the client synchronize files with a repository acting as a version control server. There are many synchronizing protocols and each has been designed for different purpose. Protocols for synchronizing database records often provide continuous synchronization, leading to a lot of data being exchanging during the synchronization process, as a result the synchronization process takes a longer period of time, but maintains the semantics of the database updates (either a complete transaction completes or it must be rolled back). On the other hand, protocols for synchronizing files may require a short synchronization time, as the whole file transferred and replaces the previous version of the file at the destination. Note file synchronization may also transfer only the differences between the files, with a local transformation of an existing file copy of the by applying these differences as updates to the files. Sending only the updates to a file enables large files with a small number of changes to be quickly updated. However, file based updated does not efficiently support record level updates of a database. In this thesis we designed a new synchronization protocol for synchronizing two SQLite databases. This synchronization protocol borrows from (and hence offers the advantages of) a version control system in order to rapidly perform SQLite database synchronization. Moreover, this solution brings SQLite database additional functions, for example supporting multiple-user, transaction logs, and data roll-back.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kibildis, Martynas. « Universalus duomenų bazių valdymo sistemų valdymo įrankis ». Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140716_111850-13322.

Texte intégral
Résumé :
"Universalus duomenų bazių valdymo sistemų valdymo įrankis" yra atviro kodo programinės įrangos projektas, skirtas DBVS administravimui. Su šiuo įrankiu galima vienu metu administruoti kelias skirtingas DBVS. Kol kas yra palaikomos MySQL ir SQLite3 DBVS, tačiau sistema buvo sukurta taip, kad galima nesunkiai ją pritaikyti ir kitoms DBVS. Darbe taip pat trumpai apžvelgiama DBVS vystymosi istorija bei pateikiamas panašių įrankių palyginimas.
„Universal Tool for Management of Database Management Systems“ is open-source software project designed for new and experienced users to control their favorite DBMS. With this software it is possible to work with several databases at one time. Currently MySQL and SQLite3 DBMS are supported, but system is universal in that way, that it is easy to add new DBMS support, if needed. In this work, you will also find brief history of DBMS and comparison of similar software. The system has only one user group – database administrator. Database administrator can create databases, tables, do the search in table records and do many other things, which are permitted in DBMS.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Henzely, Július. « Multiplatformní přehrávač zvukových signálů ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220586.

Texte intégral
Résumé :
This master's thesis focuses on problematic of creating applications based on multiplatform framework. This thesis also includes fundamental theoretical knowledge about relational database system SQLite, which has been used in a practical part of the thesis. Programing of multiplatform audio player which could be used in speech-language pathology clinic is essential portion of the practical part. Player was enhanced with the database of patients and ability to generate XML files.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Delight, Björn. « Optimizing the executiontime o fSQLite on an ABB robot controller ». Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-22372.

Texte intégral
Résumé :
The purpose of this thesis is to generate a set of general guidelines to improve performance of the SQLite database management system for use as a component in the main computer of ABB industrial robots. This was accomplished by measuring the factors that affect query execution time and comparing SQLite features to systems it could potentially replace: chiefly ABB’s configuration storage system and real-time logging system. Results show that SQlite is slower than ABBs current configuration system and real-time logger. A series of tests were carried out that give a rough description of SQLites performance. Read and update become significantly faster when used with an index, write becomes a bit slower. In an indexed database the number of rows is not important; in a database without an index they cause significant slowing. Surprisingly, increasing the number of threads concurrently accessing a database had only a mild effect on timing.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Шевченко, А. В. « Розробка Telegram бота з корисними функціями для студентів ». Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23084.

Texte intégral
Résumé :
Шевченко, А. В. Розробка Telegram бота з корисними функціями для студентів : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / А. В. Шевченко ; керівник роботи В. А. Бичко ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 50 с.
Об’єктом розробки був telegram чат-бот з корисними функція для студентів. Метою дипломного проекту є створення чат-бота, для зручності та економії часу студентів. Завдяки ньому можна буде додати розклад занять та дзвінків та більше не витрачати час на те, щоб відрити браузер потім зайти на сайт університету, знайти розклад, знайти свою групу. Можна однією кнопкою переглянути розклад парного чи непарного тижня та при необхідності розклад дзвінків . Результатом роботи є реалізація таких функцій чат-бота: - Занесення розкладу занять; - Завантаження фота з розкладом дзвінків; - Перегляд розкладу парного, непарного тижня; - Перегляд розкладу дзвінків;
The purpose of the diploma project is to create a chatbot, for the convenience and time savings of students. Thanks to it, you can add a schedule of classes and calls and no longer spend time to open the browser and then go to the university website, find a schedule, find your group. You can view the even or odd week schedule and, if necessary, the call schedule with one button. The result is the implementation of the following functions of the chatbot: - Entering a class schedule; - Upload a photo with a call schedule; - View the schedule of even, odd week; - View call schedule;
Styles APA, Harvard, Vancouver, ISO, etc.
8

Салуян, М. В. « Android-застосування для читання RSS ». Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23070.

Texte intégral
Résumé :
Салуян, М. В. Android-застосування для читання RSS : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / М. В. Салуян ; керівник роботи О. А. Пріла ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 54 с.
Метою кваліфікаційної роботи є розробка мобільного додатку для вивчення мови програмування Kotlin і вдосконалення навичків розробки Androidзастосувань. Об’єктом дослідження є технологія RSS, як найкращий спосіб автоматичного отримання оновлень з веб-сайтів. Предметом дослідження є Android-застосування для читання RSS. Для створення застосування використовувалися: інтегроване середовище розробки Android Studio, мова програмування Kotlin та реляційна система керування базами даних SQLite. Результатом роботи є RSS-агрегатор для Android-пристроїв, що виконує функції отримання оновлень з веб-сайтів та їх перегляду. Подальша реалізація застосування можлива шляхом додавання додаткових функцій керування отриманими оновленнями з веб-сайтів та збільшення можливостей налаштування інтерфейсу користувача.
The purpose of the qualification work is to learn the programming language Kotlin and improve skills in developing Android applications. The object of research is RSS technology as the best way to automatically receive updates from websites. The subject of the study is an RSS reader Android application. The following resources were used to create the application: Android Studio integrated development environment, Kotlin programming language and SQLite relational database management system. The result of the qualification work is an RSS aggregator for Android devices, which performs the functions of receiving updates from websites and viewing them. Further implementation of the application is possible by adding additional functions to manage updates received from websites and by increasing the ability to customize the user interface.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Бирченко, А. В. « Telegram бот для пошуку найближчих заходів у містах України ». Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86794.

Texte intégral
Résumé :
Кваліфікаційну роботу магістра присвячено розробці Telegram бота для пошуку найближчих заходів у містах України. В роботі проведено аналіз предметної області з аналізом продуктів аналогів, визначення мети проекту, засобів реалізації, планування роботи. Представлена поетапна розробка чат-бота та демонстрація його роботи. Результатом проведеної роботи є Telegram бот для пошуку найближчих заходів у містах України.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Olsson, Johannes. « Utveckling av ett inkassohanteringssystem ». Thesis, Karlstad University, Division for Information Technology, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-56.

Texte intégral
Résumé :

Denna uppsats beskriver arbetet med att utveckla ett inkassohanteringsprogram. Arbetet är utfört åt inkassobyrån Exactor International Debt Collection från Mariestad. Bakgrunden till projektet är att Exactor behöver en programvara för att hålla ordning på de inkassoärenden som de har. En programvara som passar deras sätt att arbeta.

I programmet finns det möjlighet för användaren att registrera ärenden som var och en innehåller en klient, en eller flera betalningsskyldiga (gäldenärer) och en eller flera fakturor. Vidare finns det möjlighet att söka och redigera de olika delarna i ett ärende.

Uppsatsen beskriver hur programmet är konstruerat och hur det fungerar. Den beskriver också grundligt hur det kommer sig att ett ärende kommer till inkassoförfarandet. Detta för att lättare få förståelse kring resterande del av uppsatsen. Vidare beskrivs databasens design samt hur information lagras i den.


This paper describes the work of developing a debt collection management program. The work was carried out as an assignment from Exactor, an international debt collection company in Mariestad. The motivation was that Exactor needed a program to manage the debt collection errands they have. The program would have to fit their way of working.

In the program, it is possible for the user to register errands that each contains a client, one or more that is liable for payment (debtors), and one or more invoices. The program also implements a feature for searching and editing the different parts of an errand.

The paper describes how the program is designed and how it works. The paper also describes the basic process from the beginning of a debt to the debt collection procedures. This description is for understanding the rest of the paper. Furthermore, the database design and how information is stored in the database is described.

Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "SQLIVS"

1

SQLite. Indianapolis, Ind : Sams, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Newman, Chris. SQLite. Upper Saddle River : Pearson Education, 2004.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Taylor, Allen. Creating a Database with SQLite. Berkeley, CA : Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-3899-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Feiler, Jesse. Introducing SQLite for Mobile Developers. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Allen, Grant, et Mike Owens. The Definitive Guide to SQLite. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Allen, Grant. The Definitive Guide to SQLite. Berkeley, CA : Apress, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Languedoc, Kevin. Build iOS Database Apps with Swift and SQLite. Berkeley, CA : Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Litovski, Ivan. Inside the Symbian SQL : A mobile developer's guide to SQLite. Hoboken, NJ : John Wiley & Sons, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Litovski, Ivan. Inside the Symbian SQL : A mobile developer's guide to SQLite. Hoboken, NJ : John Wiley & Sons, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Litovski, Ivan. Inside the Symbian SQL : A mobile developer's guide to SQLite. Hoboken, NJ : John Wiley & Sons, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "SQLIVS"

1

Pawlaszczyk, Dirk. « SQLite ». Dans Mobile Forensics – The File Format Handbook, 129–55. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_5.

Texte intégral
Résumé :
AbstractSQLite is, without doubt, the most widely used database systemworldwide at the moment. The single file database system is used, among other things, in operating systems for cell phones, such as Android, iOS or Symbian OS. On a typical smartphone, we usually find several hundred SQLite databases used by a wide variety of apps. Due to its widespread use, the database format is of particular importance in mobile forensics. It is not uncommon for the suspect to try to cover his tracks by deleting database content. Recovering deleted records from a database presents a special challenge. In this chapter, the on-disk database format of the SQLite database system is highlighted. Therefore,we take a closer look at the database header as well as record structure on a binary level. We first examine the structure of the data. Recovery options for erased records are discussed as well. Special attention is paid to the slack areas within the database: unallocated space, Freelist as well as free blocks. In this context, we discuss basic techniques for carving and acquisition of deleted data artefacts. Despite the main database format and recovery options, temporary file types like write-ahead logs and rollback journals are analyzed as well.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Allen, Grant, et Mike Owens. « Introducing SQLite ». Dans The Definitive Guide to SQLite, 1–16. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Allen, Grant, et Mike Owens. « SQL for SQLite ». Dans The Definitive Guide to SQLite, 47–86. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Languedoc, Kevin. « Analyzing SQLite Databases ». Dans Build iOS Database Apps with Swift and SQLite, 187–96. Berkeley, CA : Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Languedoc, Kevin. « Creating SQLite Databases ». Dans Build iOS Database Apps with Swift and SQLite, 11–24. Berkeley, CA : Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Easttom, Chuck. « SQLite Database Forensics ». Dans An In-Depth Guide to Mobile Device Forensics, 151–63. Boca Raton : CRC Press, 2021. http://dx.doi.org/10.1201/9781003118718-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Feiler, Jesse. « Understanding What SQLite Is ». Dans Introducing SQLite for Mobile Developers, 9–14. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Feiler, Jesse. « Using SQLite with PHP ». Dans Introducing SQLite for Mobile Developers, 45–54. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Allen, Grant, et Mike Owens. « Android Development with SQLite ». Dans The Definitive Guide to SQLite, 279–301. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Allen, Grant, et Mike Owens. « Advanced SQL for SQLite ». Dans The Definitive Guide to SQLite, 87–124. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "SQLIVS"

1

Li, Ling, Junxin Qi, Nan Liu, Lifang Han et Baojiang Cui. « Static-Based Test Case Dynamic Generation for SQLIVs Detection ». Dans 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). IEEE, 2015. http://dx.doi.org/10.1109/bwcca.2015.59.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Albalawi, Samar M., et Awad M. Awadelkarim Mohamed. « Authentication Enhancement Against SQL Injection Attacks (SQLIAs) ». Dans 2022 2nd International Conference on Computing and Information Technology (ICCIT). IEEE, 2022. http://dx.doi.org/10.1109/iccit52419.2022.9711626.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Miedema, Daphne, et George Fletcher. « SQLVis : Visual Query Representations for Supporting SQL Learners ». Dans 2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 2021. http://dx.doi.org/10.1109/vl/hcc51201.2021.9576431.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Choi, Soyee. « SSD as SQLite Engine ». Dans SIGMOD/PODS '18 : International Conference on Management of Data. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3183713.3183720.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mutti, Simone, Enrico Bacis et Stefano Paraboschi. « SeSQLite : Security Enhanced SQLite ». Dans the 31st Annual Computer Security Applications Conference. New York, New York, USA : ACM Press, 2015. http://dx.doi.org/10.1145/2818000.2818041.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Karpei, A. L., et D. A. Kormuzhanin. « DEVELOPMENT OF A WEB-APPLICATION FOR STORING INFORMATION ABOUT GRADUATE, POST-GRADUATE AND MASTER’S WORKS ». Dans SAKHAROV READINGS 2021 : ENVIRONMENTAL PROBLEMS OF THE XXI CENTURY. International Sakharov Environmental Institute of Belarusian State University, 2021. http://dx.doi.org/10.46646/sakh-2021-2-411-414.

Texte intégral
Résumé :
Using the Python programming language with the Django framework, a web-application has been developed that stores information about students’ theses, postgraduate and master’s theses. The web application is linked to a SQLite database and provides the ability to add, modify, and remove information from the database. To develop the application, the PyCharm development environment and the program for viewing information about the DB Browser for SQLite database were used.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Patil, Prithviraj, Santosh Bhutkar, Nachiket Ashtaputre et Ashish Kumar. « Amanda Back-up of SQLite ». Dans 2012 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE, 2012. http://dx.doi.org/10.1109/iccict.2012.6398203.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Junyan, Lv, Xu Shiguo et Li Yijie. « Application Research of Embedded Database SQLite ». Dans 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.408.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Obradovic, Nikola, Aleksandar Kelec et Igor Dujlovic. « Performance analysis on Android SQLite database ». Dans 2019 18th International Symposium INFOTEH-JAHORINA (INFOTEH). IEEE, 2019. http://dx.doi.org/10.1109/infoteh.2019.8717652.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chen, Dai, Xudong Han et Wei Wang. « Use of SQLite on Embedded System ». Dans 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI). IEEE, 2010. http://dx.doi.org/10.1109/icicci.2010.79.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "SQLIVS"

1

Veit, Martin, Christian Grau Sørensen, Michal Zbigniew Pomianowski, Hicham Johra et Anna Marszal-Pomianowska. A practical approach to set up a simple database architecture using SQLite and Python. Department of the Built Environment, Aalborg University, 2023. http://dx.doi.org/10.54337/aau536852902.

Texte intégral
Résumé :
The aim of this technical report is to describe the use of SQL databases and provide a simple entry point for people with little to no experience to store data using Python and SQL databases. This report is aimed at employees of Aalborg University, Department of the Built Environment (https://www.en.build.aau.dk/).
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie