Gotowa bibliografia na temat „SQLIVS”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SQLIVS”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "SQLIVS"

1

Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober i Ruth McCorkle. "Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial". Journal of Clinical Oncology 29, nr 8 (10.03.2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.

Pełny tekst źródła
Streszczenie:
Purpose Although patient-reported cancer symptoms and quality-of-life issues (SQLIs) have been promoted as essential to a comprehensive assessment, efficient and efficacious methods have not been widely tested in clinical settings. The purpose of this trial was to determine the effect of the Electronic Self-Report Assessment–Cancer (ESRA-C) on the likelihood of SQLIs discussed between clinicians and patients with cancer in ambulatory clinic visits. Secondary objectives included comparison of visit duration between groups and usefulness of the ESRA-C as reported by clinicians. Patients and Methods This randomized controlled trial was conducted in 660 patients with various cancer diagnoses and stages at two institutions of a comprehensive cancer center. Patient-reported SQLIs were automatically displayed on a graphical summary and provided to the clinical team before an on-treatment visit (n = 327); in the control group, no summary was provided (n = 333). SQLIs were scored for level of severity or distress. One on-treatment clinic visit was audio recorded for each participant and then scored for discussion of each SQLI. We hypothesized that problematic SQLIs would be discussed more often when the intervention was delivered to the clinicians. Results The likelihood of SQLIs being discussed differed by randomized group and depended on whether an SQLI was first reported as problematic (P = .032). Clinic visits were similar with regard to duration between groups, and clinicians reported the summary as useful. Conclusion The ESRA-C is the first electronic self-report application to increase discussion of SQLIs in a US randomized clinical trial.
Style APA, Harvard, Vancouver, ISO itp.
2

Fu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping i Xiaodan Lv. "SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic". Electronics 12, nr 11 (30.05.2023): 2472. http://dx.doi.org/10.3390/electronics12112472.

Pełny tekst źródła
Streszczenie:
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages’ identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT’s SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
Style APA, Harvard, Vancouver, ISO itp.
3

Sun, San-Tsai, i Konstantin Beznosov. "Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks". International Journal of Secure Software Engineering 1, nr 1 (styczeń 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.

Pełny tekst źródła
Streszczenie:
This article presents an approach for retrofitting existing Web applications with run-time protection against known, as well as unseen, SQL injection attacks (SQLIAs) without the involvement of application developers. The precision of the approach is also enhanced with a method for reducing the rate of false positives in the SQLIA detection logic, via runtime discovery of the developers’ intention for individual SQL statements made by Web applications. The proposed approach is implemented in the form of protection mechanisms for J2EE, ASP.NET, and ASP applications. Named SQLPrevent, these mechanisms intercept HTTP requests and SQL statements, mark and track parameter values originating from HTTP requests, and perform SQLIA detection and prevention on the intercepted SQL statements. The AMNESIA testbed is extended to contain false-positive testing traces, and is used to evaluate SQLPrevent. In our experiments, SQLPrevent produced no false positives or false negatives, and imposed a maximum 3.6% performance overhead with 30 milliseconds response time for the tested applications.
Style APA, Harvard, Vancouver, ISO itp.
4

Ablahd, Ann, i Suhair Dawwod. "Using Flask for SQLIA Detection and Protection". Tikrit Journal of Engineering Sciences 27, nr 2 (15.05.2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.

Pełny tekst źródła
Streszczenie:
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.
Style APA, Harvard, Vancouver, ISO itp.
5

Gaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy i Jignesh M. Patel. "SQLite". Proceedings of the VLDB Endowment 15, nr 12 (sierpień 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.

Pełny tekst źródła
Streszczenie:
In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed "the SQLite for analytics", has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite's performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.
Style APA, Harvard, Vancouver, ISO itp.
6

Ateeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani i Hazura Zulzalil. "Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities". International Journal of Engineering & Technology 7, nr 4.1 (12.09.2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.

Pełny tekst źródła
Streszczenie:
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.
Style APA, Harvard, Vancouver, ISO itp.
7

Adinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari i Ketut Dita Ari Sutrisna. "Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole". Informatik : Jurnal Ilmu Komputer 18, nr 3 (28.12.2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.

Pełny tekst źródła
Streszczenie:
Penggunaan SQL injection merupakan sebuah ancaman yang sering terjadi di Internet. Karena penggunaan internet untuk berbagai layanan online meningkat, sama halnya dengan ancaman keamanan yang dimiliki web meningkat. Dikarenakan serangan injeksi SQL merupakan salah satu kerentanan keamanan yang paling serius dalam Web, Oleh karena itu penulis ingin membandingkan beberapa tools dari SQL Injection seperti SQLMap, SQLus, dan The Mole. Tools ini merupakan aplikasi dari sistem operasi Kali Linux, dalam aplikasi ini berguna dalam melakukan injeksi data – data yang ada pada suatu web khususnya database pada web dengan menggunakan fitur – fitur yang tersedia pada aplikasi ini. Dalam paper ini, kami telah menyajikan sebuah perbandingan penggunaan tools seperti SQLMap, SQLSus, dan The Mole dengan membandingkan 3 parameter seperti Cross Program, Functionality, Usability, perbandingan dimulai dari proses injeksi hingga aplikasi itu bekerja sampai dengan proses kita bisa mendapatkan database dari sebuah web yang sudah terinjeksi dan tanpa diketahui oleh korban.
Style APA, Harvard, Vancouver, ISO itp.
8

Lee, Eunji. "Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning". International Journal of Environmental Research and Public Health 16, nr 17 (26.08.2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.

Pełny tekst źródła
Streszczenie:
This article explores the performance optimizations of an embedded database memory management system to ensure high responsiveness of real-time healthcare data frameworks. SQLite is a popular embedded database engine extensively used in medical and healthcare data storage systems. However, SQLite is essentially built around lightweight applications in mobile devices, and it significantly deteriorates when a large transaction is issued such as high resolution medical images or massive health dataset, which is unlikely to occur in embedded systems but is quite common in other systems. Such transactions do not fit in the in-memory buffer of SQLite, and SQLite enforces memory reclamation as they are processed. The problem is that the current SQLite buffer management scheme does not effectively manage these cases, and the naïve reclamation scheme used significantly increases the user-perceived latency. Motivated by this limitation, this paper identifies the causes of high latency during processing of a large transaction, and overcomes the limitation via proactive and coarse-grained memory cleaning in SQLite.The proposed memory reclamation scheme was implemented in SQLite 3.29, and measurement studies with a prototype implementation demonstrated that the SQLite operation latency decreases by 13% on an average and up to 17.3% with our memory reclamation scheme as compared to that of the original version.
Style APA, Harvard, Vancouver, ISO itp.
9

Dharmalingam, Jeya Mala, i M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, nr 3 (lipiec 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Pełny tekst źródła
Streszczenie:
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.
Style APA, Harvard, Vancouver, ISO itp.
10

Nidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V i Neethu Prabhakaran P. "SQLIAD – A Hazard to Web Applications". International Journal of Computer Trends and Technology 29, nr 1 (25.11.2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "SQLIVS"

1

Пуха, Є. В. "Моделювання баз даних SQLite мовою Python". Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/73818.

Pełny tekst źródła
Streszczenie:
Розробка програмного додатку, який допоможе студенту або працівнику в сфері IT більш детально розібратися з можливостями роботи баз даних, навчитися застосовувати методологію, методику та інструментарій моделювання в теоретичних та практичних дослідженнях.
Style APA, Harvard, Vancouver, ISO itp.
2

Johansson, Marcus. "SQLite Carving och Analys : En jämförelse av metoder". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32716.

Pełny tekst źródła
Streszczenie:
SQLite filer används av ett flertal olika program för att spara viktig information.Information som kan vara viktig för forensiska utredningar, behovet att kunnaåterskapa SQLite filer är då ett växande bekymmer. Problemet med att återskapa SQLitefiler är att, till skillnad från andra filer så har SQLite filer inget definerat slut eller någonmarkör som visar var filen slutar. Detta arbete presenterar en ny metod att bestämmaslutet på SQLite filer och jämför denna metod mot den metod som används idag tillmesta del för att återskapa SQLite filer. För att jämföra dessa metoder utvecklades tvåprogram stpextr och blkextr. Blkextr är den metod som utvecklades under detta arbete.Stpextr visade sig vara snabbare och använda mindre arbetsminne än blkextr. Men ivissa sammanhang så kommer information gå förlorad när stpextr körs till skillnad från blkextr.
Style APA, Harvard, Vancouver, ISO itp.
3

Long, Shitian. "Database syncrhonization between devices : A new synchronization protocol for SQLite databases". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-46712.

Pełny tekst źródła
Streszczenie:
Today people have multiple personal computers, personal digital assistants and smart phones. Today's advanced handheld devices have powerful processors, with a process frequency of up to 1 GHz, huge storage capacities, flash storage capacities up to 32 GB, a large (multi) touch screen, and a user-friendly user interface. Additionally, the device may have various input and output devices, thus leading to people utilizing different devices for different use cases. In order to provide the latest information to the users via any of their devices, data synchronization becomes a requirement for users. There are many data synchronization solutions for synchronizing database records and files. In the current database synchronization solutions, there is no clear source and target. For example, consider the case where a PDA synchronizes with a PC; the record could have been edited (changed) on both the PDA and PC. In this case it is not clear which should be synchronized with what should be the source for the value. In contrast, a files synchronization system has a clearly specified synchronizatiom sourse and destination structure. In this case the client Synchronizes their files with that of the server. In a version control system the client synchronize files with a repository acting as a version control server. There are many synchronizing protocols and each has been designed for different purpose. Protocols for synchronizing database records often provide continuous synchronization, leading to a lot of data being exchanging during the synchronization process, as a result the synchronization process takes a longer period of time, but maintains the semantics of the database updates (either a complete transaction completes or it must be rolled back). On the other hand, protocols for synchronizing files may require a short synchronization time, as the whole file transferred and replaces the previous version of the file at the destination. Note file synchronization may also transfer only the differences between the files, with a local transformation of an existing file copy of the by applying these differences as updates to the files. Sending only the updates to a file enables large files with a small number of changes to be quickly updated. However, file based updated does not efficiently support record level updates of a database. In this thesis we designed a new synchronization protocol for synchronizing two SQLite databases. This synchronization protocol borrows from (and hence offers the advantages of) a version control system in order to rapidly perform SQLite database synchronization. Moreover, this solution brings SQLite database additional functions, for example supporting multiple-user, transaction logs, and data roll-back.
Style APA, Harvard, Vancouver, ISO itp.
4

Kibildis, Martynas. "Universalus duomenų bazių valdymo sistemų valdymo įrankis". Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140716_111850-13322.

Pełny tekst źródła
Streszczenie:
"Universalus duomenų bazių valdymo sistemų valdymo įrankis" yra atviro kodo programinės įrangos projektas, skirtas DBVS administravimui. Su šiuo įrankiu galima vienu metu administruoti kelias skirtingas DBVS. Kol kas yra palaikomos MySQL ir SQLite3 DBVS, tačiau sistema buvo sukurta taip, kad galima nesunkiai ją pritaikyti ir kitoms DBVS. Darbe taip pat trumpai apžvelgiama DBVS vystymosi istorija bei pateikiamas panašių įrankių palyginimas.
„Universal Tool for Management of Database Management Systems“ is open-source software project designed for new and experienced users to control their favorite DBMS. With this software it is possible to work with several databases at one time. Currently MySQL and SQLite3 DBMS are supported, but system is universal in that way, that it is easy to add new DBMS support, if needed. In this work, you will also find brief history of DBMS and comparison of similar software. The system has only one user group – database administrator. Database administrator can create databases, tables, do the search in table records and do many other things, which are permitted in DBMS.
Style APA, Harvard, Vancouver, ISO itp.
5

Henzely, Július. "Multiplatformní přehrávač zvukových signálů". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220586.

Pełny tekst źródła
Streszczenie:
This master's thesis focuses on problematic of creating applications based on multiplatform framework. This thesis also includes fundamental theoretical knowledge about relational database system SQLite, which has been used in a practical part of the thesis. Programing of multiplatform audio player which could be used in speech-language pathology clinic is essential portion of the practical part. Player was enhanced with the database of patients and ability to generate XML files.
Style APA, Harvard, Vancouver, ISO itp.
6

Delight, Björn. "Optimizing the executiontime o fSQLite on an ABB robot controller". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-22372.

Pełny tekst źródła
Streszczenie:
The purpose of this thesis is to generate a set of general guidelines to improve performance of the SQLite database management system for use as a component in the main computer of ABB industrial robots. This was accomplished by measuring the factors that affect query execution time and comparing SQLite features to systems it could potentially replace: chiefly ABB’s configuration storage system and real-time logging system. Results show that SQlite is slower than ABBs current configuration system and real-time logger. A series of tests were carried out that give a rough description of SQLites performance. Read and update become significantly faster when used with an index, write becomes a bit slower. In an indexed database the number of rows is not important; in a database without an index they cause significant slowing. Surprisingly, increasing the number of threads concurrently accessing a database had only a mild effect on timing.
Style APA, Harvard, Vancouver, ISO itp.
7

Шевченко, А. В. "Розробка Telegram бота з корисними функціями для студентів". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23084.

Pełny tekst źródła
Streszczenie:
Шевченко, А. В. Розробка Telegram бота з корисними функціями для студентів : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / А. В. Шевченко ; керівник роботи В. А. Бичко ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 50 с.
Об’єктом розробки був telegram чат-бот з корисними функція для студентів. Метою дипломного проекту є створення чат-бота, для зручності та економії часу студентів. Завдяки ньому можна буде додати розклад занять та дзвінків та більше не витрачати час на те, щоб відрити браузер потім зайти на сайт університету, знайти розклад, знайти свою групу. Можна однією кнопкою переглянути розклад парного чи непарного тижня та при необхідності розклад дзвінків . Результатом роботи є реалізація таких функцій чат-бота: - Занесення розкладу занять; - Завантаження фота з розкладом дзвінків; - Перегляд розкладу парного, непарного тижня; - Перегляд розкладу дзвінків;
The purpose of the diploma project is to create a chatbot, for the convenience and time savings of students. Thanks to it, you can add a schedule of classes and calls and no longer spend time to open the browser and then go to the university website, find a schedule, find your group. You can view the even or odd week schedule and, if necessary, the call schedule with one button. The result is the implementation of the following functions of the chatbot: - Entering a class schedule; - Upload a photo with a call schedule; - View the schedule of even, odd week; - View call schedule;
Style APA, Harvard, Vancouver, ISO itp.
8

Салуян, М. В. "Android-застосування для читання RSS". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23070.

Pełny tekst źródła
Streszczenie:
Салуян, М. В. Android-застосування для читання RSS : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / М. В. Салуян ; керівник роботи О. А. Пріла ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 54 с.
Метою кваліфікаційної роботи є розробка мобільного додатку для вивчення мови програмування Kotlin і вдосконалення навичків розробки Androidзастосувань. Об’єктом дослідження є технологія RSS, як найкращий спосіб автоматичного отримання оновлень з веб-сайтів. Предметом дослідження є Android-застосування для читання RSS. Для створення застосування використовувалися: інтегроване середовище розробки Android Studio, мова програмування Kotlin та реляційна система керування базами даних SQLite. Результатом роботи є RSS-агрегатор для Android-пристроїв, що виконує функції отримання оновлень з веб-сайтів та їх перегляду. Подальша реалізація застосування можлива шляхом додавання додаткових функцій керування отриманими оновленнями з веб-сайтів та збільшення можливостей налаштування інтерфейсу користувача.
The purpose of the qualification work is to learn the programming language Kotlin and improve skills in developing Android applications. The object of research is RSS technology as the best way to automatically receive updates from websites. The subject of the study is an RSS reader Android application. The following resources were used to create the application: Android Studio integrated development environment, Kotlin programming language and SQLite relational database management system. The result of the qualification work is an RSS aggregator for Android devices, which performs the functions of receiving updates from websites and viewing them. Further implementation of the application is possible by adding additional functions to manage updates received from websites and by increasing the ability to customize the user interface.
Style APA, Harvard, Vancouver, ISO itp.
9

Бирченко, А. В. "Telegram бот для пошуку найближчих заходів у містах України". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86794.

Pełny tekst źródła
Streszczenie:
Кваліфікаційну роботу магістра присвячено розробці Telegram бота для пошуку найближчих заходів у містах України. В роботі проведено аналіз предметної області з аналізом продуктів аналогів, визначення мети проекту, засобів реалізації, планування роботи. Представлена поетапна розробка чат-бота та демонстрація його роботи. Результатом проведеної роботи є Telegram бот для пошуку найближчих заходів у містах України.
Style APA, Harvard, Vancouver, ISO itp.
10

Olsson, Johannes. "Utveckling av ett inkassohanteringssystem". Thesis, Karlstad University, Division for Information Technology, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-56.

Pełny tekst źródła
Streszczenie:

Denna uppsats beskriver arbetet med att utveckla ett inkassohanteringsprogram. Arbetet är utfört åt inkassobyrån Exactor International Debt Collection från Mariestad. Bakgrunden till projektet är att Exactor behöver en programvara för att hålla ordning på de inkassoärenden som de har. En programvara som passar deras sätt att arbeta.

I programmet finns det möjlighet för användaren att registrera ärenden som var och en innehåller en klient, en eller flera betalningsskyldiga (gäldenärer) och en eller flera fakturor. Vidare finns det möjlighet att söka och redigera de olika delarna i ett ärende.

Uppsatsen beskriver hur programmet är konstruerat och hur det fungerar. Den beskriver också grundligt hur det kommer sig att ett ärende kommer till inkassoförfarandet. Detta för att lättare få förståelse kring resterande del av uppsatsen. Vidare beskrivs databasens design samt hur information lagras i den.


This paper describes the work of developing a debt collection management program. The work was carried out as an assignment from Exactor, an international debt collection company in Mariestad. The motivation was that Exactor needed a program to manage the debt collection errands they have. The program would have to fit their way of working.

In the program, it is possible for the user to register errands that each contains a client, one or more that is liable for payment (debtors), and one or more invoices. The program also implements a feature for searching and editing the different parts of an errand.

The paper describes how the program is designed and how it works. The paper also describes the basic process from the beginning of a debt to the debt collection procedures. This description is for understanding the rest of the paper. Furthermore, the database design and how information is stored in the database is described.

Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "SQLIVS"

1

SQLite. Indianapolis, Ind: Sams, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Newman, Chris. SQLite. Upper Saddle River: Pearson Education, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Taylor, Allen. Creating a Database with SQLite. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-3899-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Feiler, Jesse. Introducing SQLite for Mobile Developers. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Allen, Grant, i Mike Owens. The Definitive Guide to SQLite. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Allen, Grant. The Definitive Guide to SQLite. Berkeley, CA: Apress, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Languedoc, Kevin. Build iOS Database Apps with Swift and SQLite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Litovski, Ivan. Inside the Symbian SQL: A mobile developer's guide to SQLite. Hoboken, NJ: John Wiley & Sons, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Litovski, Ivan. Inside the Symbian SQL: A mobile developer's guide to SQLite. Hoboken, NJ: John Wiley & Sons, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Litovski, Ivan. Inside the Symbian SQL: A mobile developer's guide to SQLite. Hoboken, NJ: John Wiley & Sons, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "SQLIVS"

1

Pawlaszczyk, Dirk. "SQLite". W Mobile Forensics – The File Format Handbook, 129–55. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98467-0_5.

Pełny tekst źródła
Streszczenie:
AbstractSQLite is, without doubt, the most widely used database systemworldwide at the moment. The single file database system is used, among other things, in operating systems for cell phones, such as Android, iOS or Symbian OS. On a typical smartphone, we usually find several hundred SQLite databases used by a wide variety of apps. Due to its widespread use, the database format is of particular importance in mobile forensics. It is not uncommon for the suspect to try to cover his tracks by deleting database content. Recovering deleted records from a database presents a special challenge. In this chapter, the on-disk database format of the SQLite database system is highlighted. Therefore,we take a closer look at the database header as well as record structure on a binary level. We first examine the structure of the data. Recovery options for erased records are discussed as well. Special attention is paid to the slack areas within the database: unallocated space, Freelist as well as free blocks. In this context, we discuss basic techniques for carving and acquisition of deleted data artefacts. Despite the main database format and recovery options, temporary file types like write-ahead logs and rollback journals are analyzed as well.
Style APA, Harvard, Vancouver, ISO itp.
2

Allen, Grant, i Mike Owens. "Introducing SQLite". W The Definitive Guide to SQLite, 1–16. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Allen, Grant, i Mike Owens. "SQL for SQLite". W The Definitive Guide to SQLite, 47–86. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Languedoc, Kevin. "Analyzing SQLite Databases". W Build iOS Database Apps with Swift and SQLite, 187–96. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Languedoc, Kevin. "Creating SQLite Databases". W Build iOS Database Apps with Swift and SQLite, 11–24. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2232-4_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Easttom, Chuck. "SQLite Database Forensics". W An In-Depth Guide to Mobile Device Forensics, 151–63. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003118718-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Feiler, Jesse. "Understanding What SQLite Is". W Introducing SQLite for Mobile Developers, 9–14. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Feiler, Jesse. "Using SQLite with PHP". W Introducing SQLite for Mobile Developers, 45–54. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1766-5_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Allen, Grant, i Mike Owens. "Android Development with SQLite". W The Definitive Guide to SQLite, 279–301. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Allen, Grant, i Mike Owens. "Advanced SQL for SQLite". W The Definitive Guide to SQLite, 87–124. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3226-1_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "SQLIVS"

1

Li, Ling, Junxin Qi, Nan Liu, Lifang Han i Baojiang Cui. "Static-Based Test Case Dynamic Generation for SQLIVs Detection". W 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). IEEE, 2015. http://dx.doi.org/10.1109/bwcca.2015.59.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Albalawi, Samar M., i Awad M. Awadelkarim Mohamed. "Authentication Enhancement Against SQL Injection Attacks (SQLIAs)". W 2022 2nd International Conference on Computing and Information Technology (ICCIT). IEEE, 2022. http://dx.doi.org/10.1109/iccit52419.2022.9711626.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Miedema, Daphne, i George Fletcher. "SQLVis: Visual Query Representations for Supporting SQL Learners". W 2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 2021. http://dx.doi.org/10.1109/vl/hcc51201.2021.9576431.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Choi, Soyee. "SSD as SQLite Engine". W SIGMOD/PODS '18: International Conference on Management of Data. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3183713.3183720.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Mutti, Simone, Enrico Bacis i Stefano Paraboschi. "SeSQLite: Security Enhanced SQLite". W the 31st Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2818000.2818041.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Karpei, A. L., i D. A. Kormuzhanin. "DEVELOPMENT OF A WEB-APPLICATION FOR STORING INFORMATION ABOUT GRADUATE, POST-GRADUATE AND MASTER’S WORKS". W SAKHAROV READINGS 2021: ENVIRONMENTAL PROBLEMS OF THE XXI CENTURY. International Sakharov Environmental Institute of Belarusian State University, 2021. http://dx.doi.org/10.46646/sakh-2021-2-411-414.

Pełny tekst źródła
Streszczenie:
Using the Python programming language with the Django framework, a web-application has been developed that stores information about students’ theses, postgraduate and master’s theses. The web application is linked to a SQLite database and provides the ability to add, modify, and remove information from the database. To develop the application, the PyCharm development environment and the program for viewing information about the DB Browser for SQLite database were used.
Style APA, Harvard, Vancouver, ISO itp.
7

Patil, Prithviraj, Santosh Bhutkar, Nachiket Ashtaputre i Ashish Kumar. "Amanda Back-up of SQLite". W 2012 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE, 2012. http://dx.doi.org/10.1109/iccict.2012.6398203.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Junyan, Lv, Xu Shiguo i Li Yijie. "Application Research of Embedded Database SQLite". W 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.408.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Obradovic, Nikola, Aleksandar Kelec i Igor Dujlovic. "Performance analysis on Android SQLite database". W 2019 18th International Symposium INFOTEH-JAHORINA (INFOTEH). IEEE, 2019. http://dx.doi.org/10.1109/infoteh.2019.8717652.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Chen, Dai, Xudong Han i Wei Wang. "Use of SQLite on Embedded System". W 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI). IEEE, 2010. http://dx.doi.org/10.1109/icicci.2010.79.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "SQLIVS"

1

Veit, Martin, Christian Grau Sørensen, Michal Zbigniew Pomianowski, Hicham Johra i Anna Marszal-Pomianowska. A practical approach to set up a simple database architecture using SQLite and Python. Department of the Built Environment, Aalborg University, 2023. http://dx.doi.org/10.54337/aau536852902.

Pełny tekst źródła
Streszczenie:
The aim of this technical report is to describe the use of SQL databases and provide a simple entry point for people with little to no experience to store data using Python and SQL databases. This report is aimed at employees of Aalborg University, Department of the Built Environment (https://www.en.build.aau.dk/).
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii