Academic literature on the topic 'SQL*PLUS (Computer program language)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SQL*PLUS (Computer program language).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SQL*PLUS (Computer program language)"

1

Karn, Helen E., and MacEnglish. "Pronunciation Plus (Computer Program)." TESOL Quarterly 30, no. 1 (1996): 176. http://dx.doi.org/10.2307/3587618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Xiao Bin, and De Rong Jiang. "Study on CAPP System Based on Rough Set Theory." Advanced Materials Research 219-220 (March 2011): 1060–63. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1060.

Full text
Abstract:
As a significant technology of Computer Integrated Manufacturing System (CIMS), Computer Aided Process Planning (CAPP) is the bridge between Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM). Meanwhile, it is a momentous foundation for building the overall information model of manufacturing of engineering product. By using of which along with the theory of rough set in rule reduction of expert system, the development of CAPP system framework is basis of .net platform, utilizing Visual Studio 2003 to design the system interface and associated structured query language (SQL) all
APA, Harvard, Vancouver, ISO, and other styles
3

MITROFANOV, MIKHAIL V., ALEXANDER M. KRIBEL, ALEXEY S. FROLENKOV, and OLEG L. SPITSYN. "THE METHOD OF DETECTING ATTACKS, SUCH AS SQL-INJECTION BASED ON ARTIFICIAL INTELLIGENCE ALGORITHMS, BY THE METHOD OF THE CLASSIFICATION PROBLEM." H&ES Research 13, no. 5 (2021): 96–102. http://dx.doi.org/10.36724/2409-5419-2021-13-5-96-102.

Full text
Abstract:
Introduction: computerization of the vital activity system of modern society is gaining more and more large-scale boundaries every day. In this regard, the risk of loss and theft of confidential information in various ways, including through various attacks, also increases. Purpose: the aim of the study is to develop an optimal method for detecting attacks, using the example of SQL-Injection attacks, based on a given algorithm of artificial intelligence. Methods: a training system for artificial intelligence based on a given algorithm of artificial intelligence is proposed Results: as a result
APA, Harvard, Vancouver, ISO, and other styles
4

Dadashzadeh, Mohammad, and Sara Dadashzadeh. "The Match: A Case Study In Algorithm Analysis Of The National Resident Matching Program." Journal of Business Case Studies (JBCS) 11, no. 4 (2015): 141–50. http://dx.doi.org/10.19030/jbcs.v11i4.9443.

Full text
Abstract:
There are rare opportunities when solving an easily-understood problem can bring together application of skills taught in diverse courses in a Computer Science (CS) or Management Information Systems (MIS) program. This paper presents such an opportunity in the typical database management systems course taught at the junior or senior level. Specifically, we describe the case study of solving the classical Hospitals/Residents problem in Microsoft Access. The solution, based on classical Gale-Shapely algorithm for the Stable Marriage problem, offers pedagogical opportunities in data modeling, alg
APA, Harvard, Vancouver, ISO, and other styles
5

Kaziuchyts, V. O., S. M. Borovikov, and E. N. Shneiderov. "Model for Prediction of Testing Time of a Computer Program for Automated Reliability Evaluation of Semiconductor Devices." Doklady BGUIR 20, no. 7 (2022): 72–80. http://dx.doi.org/10.35596/1729-7648-2022-20-7-72-80.

Full text
Abstract:
The KLASS computer program planned for development is designed to work as a part of the ARION-plus software package and allows you to perform an automated assessment of the reliability of electronic products, including semiconductor devices. At the stage of work planning on the creation of the KLASS program, as a module of the ARION-plus complex, the question arose about the working time allotted for the procedure for testing a computer program. The approaches described in the scientific literature used to assess the operational reliability of computer programs, taking into account their testi
APA, Harvard, Vancouver, ISO, and other styles
6

Manhal Mohammad Basher Hasan Aga and luay abdulwahid shihab. "Reduce the effort and time in calculating the absenteeism percentage of students using Internet of Thing (IOT) technology." World Journal of Advanced Research and Reviews 15, no. 2 (2022): 346–51. http://dx.doi.org/10.30574/wjarr.2022.15.2.0801.

Full text
Abstract:
This study started from some of the problems that took from our institution a lot of time to solve, this study included two parts, and the first part is Image discrimination problems are usually difficult to solve using unprocessed data. to improve the discrimination process Characteristic extraction is often needed to represent data in a space of distinction. Pattern recognition aims to find or recognize specific patterns or structures in digital images (signal). To identify a pattern or an object in an image, you must first obtaining direct preliminary and statistical information about the i
APA, Harvard, Vancouver, ISO, and other styles
7

Jalbani, Khuda Bux, Muhammad Yousaf, Muhammad Shahzad Sarfraz, Rozita Jamili Oskouei, Akhtar Hussain, and Zojan Memon. "Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors." Security and Communication Networks 2021 (May 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/5523806.

Full text
Abstract:
As the SQL injection attack is still at the top of the list at Open Web Application Security Project (OWASP) for more than one decade, this type of attack created too many types of issues for a web application, sensors, or any similar type of applications, such as leakage of user private data and organization intellectual property, or may cause Distributed Denial of Service (DDoS) attacks. This paper focused on the poor coding or invalidated input field which is a big cause of services unavailability for web applications. Secondly, it focused on the selection of program created issues for the
APA, Harvard, Vancouver, ISO, and other styles
8

Kofnov, O. V. "Visualization of multidimensional feasible values areas in the management problems of complex objects." Informatization and communication 5 (December 2020): 29–33. http://dx.doi.org/10.34219/2078-8320-2020-11-5-29-33.

Full text
Abstract:
Goal. The goal of this study is the development of a convenient method for visualizing multidimensional data by projecting onto two-dimensional planes. According to the projections obtained in this way, the expert can assess the entire range of permissible values for the subsequent management decision-making. Materials and methods. This goal is achieved by using standard database management tools and the declarative SQL language. The results can be presented in the form of digital images using both standard charting tools and a developed original computer program. Results. An algorithm for pre
APA, Harvard, Vancouver, ISO, and other styles
9

J, Junaidi. "Working process of TU 3a CNC frais machine using software system." International Journal of Engineering & Technology 9, no. 3 (2020): 658. http://dx.doi.org/10.14419/ijet.v9i3.29682.

Full text
Abstract:
This workpiece process is: to find out how to transfer images from Auto CAD software to the Q plus CELL Milling Cnc software, and to find out how to transfer programs from the CNC Milling QELL KELLER software to the TU 3A CNC milling machine. The making of this workpiece uses three main media, namely Auto CAD 2000 software, CNC Milling KELLER Q plus software, and TU 3A CNC milling machine. The process of making the workpiece starts from making the workpiece design in Auto CAD software which is then stored on the CDR via DFX data. The design of the workpiece contained in the CDR is then transfe
APA, Harvard, Vancouver, ISO, and other styles
10

Ward, A. C., and W. P. Seering. "Quantitative Inference in a Mechanical Design ‘Compiler’." Journal of Mechanical Design 115, no. 1 (1993): 29–35. http://dx.doi.org/10.1115/1.2919320.

Full text
Abstract:
This paper presents the ideas underlying a computer program that takes as input a schematic of a mechanical or hydraulic power transmission system, plus specifications and a utility function, and returns catalog numbers from predefined catalogs for the optimal selection of components implementing the design. Unlike programs for designing single components or systems, this program provides the designer with a high level “language” in which to compose new designs. It then performs some of the detailed design process for him. The process of “compilation,” or transformation from a high to a low le
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SQL*PLUS (Computer program language)"

1

Lukalapu, Sushma. "Billing and receivables database application." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/1618.

Full text
Abstract:
The purpose of this project is to design, build, and implement an information retrieval database system for the Accounting Department at CSUSB. The database will focus on the financial details of the student accounts maintained by the accounting personnel. It offers detailed information pertinent to tuition, parking, housing, boarding, etc.
APA, Harvard, Vancouver, ISO, and other styles
2

Minout, Mohammed. "Modélisation des aspects temporels dans les bases de données spatiales." Doctoral thesis, Universite Libre de Bruxelles, 2007. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210672.

Full text
Abstract:
L'introduction du temps dans les bases de données classiques et spatiales apparaît de plus en plus, aujourd'hui, comme une nécessité pour une gestion optimale de l'historicité. En effet, les applications de bases de données spatio-temporelles sont présentes dans un grand nombre d'applications. Le besoin, par exemple, est de sauvegarder l'historique des géométries des parcelles dans le système d'information d'un plan cadastral, la prévention d'incendie dans le système de gestion forestière, le système de navigation des véhicules, etc. Cet historique des phénomènes permet de mieux comprendre ce
APA, Harvard, Vancouver, ISO, and other styles
3

Hasan, Waqar. "Optimization of SQL queries for parallel machines /." Berlin [u.a.] : Springer, 1996. http://www.loc.gov/catdir/enhancements/fy0815/96039704-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lodico, Marc Richard. "SQLSDM : a SQL front-end semantic data model /." Online version of thesis, 1989. http://hdl.handle.net/1850/10620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Winner-Leoni, Melissa D. "An Investigation of the Security Designs of a Structured Query Language (SQL) Database and its Middleware Application and their Secure Implementation within Thinclient Environments." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/MWinnerLeoni2008.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jandhyala, Sandeep. "An automated XPATH to SQL transformation methodology for XML data." unrestricted, 2006. http://etd.gsu.edu/theses/available/etd-04012006-121218/.

Full text
Abstract:
Thesis (M.S.)--Georgia State University, 2006.<br>Rajshekhar Sunderraman, committee chair; Sushil Prasad, Alex Zelikovsky, committee members. Electronic text (58 p.) : digital, PDF file. Description based on contents viewed Aug. 13, 2007. Includes bibliographical references (p. 58).
APA, Harvard, Vancouver, ISO, and other styles
7

Beasley, Johnita. "A graphical alternative to direct SQL based querying." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-12162009-020050/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rackliffe, Vincent B. "Advanced structured query language instruction for engineers of the Office of Information Technology at Brigham Young University /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1137.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Escalante, Osuna Carlos. "Estimating the cost of GraphLog queries." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0002/NQ32743.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Widjaja, Hendra. "Visor++ : a software visualisation tool for task-parallel object-orientated programs." Title page, abstract and contents only, 1998. http://web4.library.adelaide.edu.au/theses/09AS/09asw639.pdf.

Full text
Abstract:
Bibliography: leaves 173-184. This thesis describes Visor++, a tool for visualising programs written in CC++, a task-parallel, object-orientated language derived from C++. Visor++ provides a framework of visualising task-parallel object-orientated programs in the absence of language support for visualisation, i.e. for programs such as CC++ which are written in languages which are not "visualisation-conscious". The development of techniques using a wide selection of language features are described and the effectiveness testified by experimentation.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SQL*PLUS (Computer program language)"

1

Mogens, Nørgaard, ed. Mastering Oracle SQL and SQL*plus. Apress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oracle SQL*Plus: Pocket Reference. O'Reilly, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oracle SQL*Plus: Pocket Reference. 3rd ed. O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sayles, Jonathan. How to use Oracle SQL*Plus. QED Information Sciences, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oracle SQL*Plus: The Definitive Guide. 2nd ed. O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oracle SQL*Plus: The Definitive Guide. O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Beginning Oracle SQL. Apress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Urman, Scott. Oracle PL/SQL programming. Osborne McGraw-Hill, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Urman, Scott. Oracle PL/SQL programming. Osborne McGraw-Hill, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cassidy, Pete. Pete Cassidy's Oracle cookbook for SQL Plus. [Chef Pierre], 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SQL*PLUS (Computer program language)"

1

Zhao, Zhangjie, Lin Zhang, Xing Zhang, Ying Wang, and Yi Qin. "CMPD: Context-Based Malicious Parameter Detection for APIs." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_7.

Full text
Abstract:
AbstractThe Application Program Interface (API) plays an important role as the channel for data interaction between programs, while the widespread use of APIs has brought security risks that cannot be ignored. The adversary can perform various Web attacks, including SQL Injection and Cross-Site Scripting (XSS), by tampering with the parameters of API. Efficient detection of parameter tampering attacks for API is critical to ensure the system is running in the expected condition, further avoiding data leakage and property loss. Previous works always utilize the rule-based method or simple learning-based method to detect parameter tampering attacks. However, they ignore the contextual information of the API tokens and thus have a poor performance. In this paper, we propose the Context-based Malicious Parameter Detection (CMPD) framework to detect the parameter tampering attacks for APIs. We use a neural network language model to learn the distribution of the parameters, parameter names, and URLs and then use a tree model to detect the malicious query based on the high dimensional API embedding. Experiments show that CMPD outperforms all baseline, including rule-based method, Support Vector Machine (SVM), and Autoencoder, on CSIC 2010 dataset with $$F_1$$ F 1 value reaching 0.971. CMPD can also achieve a 0.895 $$F_1$$ F 1 value when training data is reduced to 20% and can achieve a 0.910 $$F_1$$ F 1 value when negative examples are reduced to 1%.
APA, Harvard, Vancouver, ISO, and other styles
2

Con Díaz, Gerardo. "The Long History of Software Patenting in the United States." In The Battle over Patents. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197576151.003.0008.

Full text
Abstract:
The patent protections available to computer programs are almost as old as modern electronic computing. In the late 1940s and early 1950s, when a computer’s programming was as tangible as the machine’s circuits, there was nothing unusual about the idea that a patent could protect a program. The main problem was not whether programs were patent-eligible but how to draft patent applications for them that could bypass well-established doctrinal obstacles. As programs increased in complexity and programming languages enabled their creation through texts, inventors and their lawyers relied on the means-plus claim structure—a claim that discloses a machine as the means to perform a given collection of functions—as a shorthand to disclose the kinds of physicality that their predecessors would have spelled out. Successful patent applications combined means-plus language with very specific descriptions of interconnected electronic components to secure patent protections for the computer programs at their core.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SQL*PLUS (Computer program language)"

1

Kilkis, Birol, and S. Selçuk Sager. "Computer Aided Design of Bucket Type Elevators and Belt Conveyors." In ASME 1992 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/cie1992-0020.

Full text
Abstract:
Abstract One of the most effective transportation systems especially for bulk materials is continuous conveyors. They enable to transport materials quickly, economically and with rather simple means of handling. On the other hand for transportation needs involving steep grades and elevations, bucket type elevators are suitable especially for granular materials. In this study a computer program has been developed in order to provide a computer aided design tool for both bucket type elevators and belt conveyors. Operation of the program is interactive. Thus, some critical decisions during the de
APA, Harvard, Vancouver, ISO, and other styles
2

Ward, A. C., and W. P. Seering. "Quantitative Inference in a Mechanical Design “Compiler”." In ASME 1989 Design Technical Conferences. American Society of Mechanical Engineers, 1989. http://dx.doi.org/10.1115/detc1989-0011.

Full text
Abstract:
Abstract This paper introduces the theory underlying a computer program that takes as input a schematic of a mechanical or hydraulic power transmission system, plus specifications and a utility function, and returns catalog numbers from predefined catalogs for the optimal selection of components implementing the design. Unlike programs for designing single components or systems, this program provides the designer with a high level “language“ in which to compose new designs. It then performs much of the detailed design process. The process of “compilation”, or transformation from a high to a lo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!