Segui questo link per vedere altri tipi di pubblicazioni sul tema: SQLIVS.

Articoli di riviste sul tema "SQLIVS"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "SQLIVS".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober e Ruth McCorkle. "Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial". Journal of Clinical Oncology 29, n. 8 (10 marzo 2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.

Testo completo
Abstract (sommario):
Purpose Although patient-reported cancer symptoms and quality-of-life issues (SQLIs) have been promoted as essential to a comprehensive assessment, efficient and efficacious methods have not been widely tested in clinical settings. The purpose of this trial was to determine the effect of the Electronic Self-Report Assessment–Cancer (ESRA-C) on the likelihood of SQLIs discussed between clinicians and patients with cancer in ambulatory clinic visits. Secondary objectives included comparison of visit duration between groups and usefulness of the ESRA-C as reported by clinicians. Patients and Methods This randomized controlled trial was conducted in 660 patients with various cancer diagnoses and stages at two institutions of a comprehensive cancer center. Patient-reported SQLIs were automatically displayed on a graphical summary and provided to the clinical team before an on-treatment visit (n = 327); in the control group, no summary was provided (n = 333). SQLIs were scored for level of severity or distress. One on-treatment clinic visit was audio recorded for each participant and then scored for discussion of each SQLI. We hypothesized that problematic SQLIs would be discussed more often when the intervention was delivered to the clinicians. Results The likelihood of SQLIs being discussed differed by randomized group and depended on whether an SQLI was first reported as problematic (P = .032). Clinic visits were similar with regard to duration between groups, and clinicians reported the summary as useful. Conclusion The ESRA-C is the first electronic self-report application to increase discussion of SQLIs in a US randomized clinical trial.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Fu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping e Xiaodan Lv. "SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic". Electronics 12, n. 11 (30 maggio 2023): 2472. http://dx.doi.org/10.3390/electronics12112472.

Testo completo
Abstract (sommario):
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages’ identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT’s SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Sun, San-Tsai, e Konstantin Beznosov. "Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks". International Journal of Secure Software Engineering 1, n. 1 (gennaio 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.

Testo completo
Abstract (sommario):
This article presents an approach for retrofitting existing Web applications with run-time protection against known, as well as unseen, SQL injection attacks (SQLIAs) without the involvement of application developers. The precision of the approach is also enhanced with a method for reducing the rate of false positives in the SQLIA detection logic, via runtime discovery of the developers’ intention for individual SQL statements made by Web applications. The proposed approach is implemented in the form of protection mechanisms for J2EE, ASP.NET, and ASP applications. Named SQLPrevent, these mechanisms intercept HTTP requests and SQL statements, mark and track parameter values originating from HTTP requests, and perform SQLIA detection and prevention on the intercepted SQL statements. The AMNESIA testbed is extended to contain false-positive testing traces, and is used to evaluate SQLPrevent. In our experiments, SQLPrevent produced no false positives or false negatives, and imposed a maximum 3.6% performance overhead with 30 milliseconds response time for the tested applications.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Ablahd, Ann, e Suhair Dawwod. "Using Flask for SQLIA Detection and Protection". Tikrit Journal of Engineering Sciences 27, n. 2 (15 maggio 2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.

Testo completo
Abstract (sommario):
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Gaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy e Jignesh M. Patel. "SQLite". Proceedings of the VLDB Endowment 15, n. 12 (agosto 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.

Testo completo
Abstract (sommario):
In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed "the SQLite for analytics", has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite's performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Ateeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani e Hazura Zulzalil. "Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities". International Journal of Engineering & Technology 7, n. 4.1 (12 settembre 2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.

Testo completo
Abstract (sommario):
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Adinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari e Ketut Dita Ari Sutrisna. "Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole". Informatik : Jurnal Ilmu Komputer 18, n. 3 (28 dicembre 2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.

Testo completo
Abstract (sommario):
Penggunaan SQL injection merupakan sebuah ancaman yang sering terjadi di Internet. Karena penggunaan internet untuk berbagai layanan online meningkat, sama halnya dengan ancaman keamanan yang dimiliki web meningkat. Dikarenakan serangan injeksi SQL merupakan salah satu kerentanan keamanan yang paling serius dalam Web, Oleh karena itu penulis ingin membandingkan beberapa tools dari SQL Injection seperti SQLMap, SQLus, dan The Mole. Tools ini merupakan aplikasi dari sistem operasi Kali Linux, dalam aplikasi ini berguna dalam melakukan injeksi data – data yang ada pada suatu web khususnya database pada web dengan menggunakan fitur – fitur yang tersedia pada aplikasi ini. Dalam paper ini, kami telah menyajikan sebuah perbandingan penggunaan tools seperti SQLMap, SQLSus, dan The Mole dengan membandingkan 3 parameter seperti Cross Program, Functionality, Usability, perbandingan dimulai dari proses injeksi hingga aplikasi itu bekerja sampai dengan proses kita bisa mendapatkan database dari sebuah web yang sudah terinjeksi dan tanpa diketahui oleh korban.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Lee, Eunji. "Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning". International Journal of Environmental Research and Public Health 16, n. 17 (26 agosto 2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.

Testo completo
Abstract (sommario):
This article explores the performance optimizations of an embedded database memory management system to ensure high responsiveness of real-time healthcare data frameworks. SQLite is a popular embedded database engine extensively used in medical and healthcare data storage systems. However, SQLite is essentially built around lightweight applications in mobile devices, and it significantly deteriorates when a large transaction is issued such as high resolution medical images or massive health dataset, which is unlikely to occur in embedded systems but is quite common in other systems. Such transactions do not fit in the in-memory buffer of SQLite, and SQLite enforces memory reclamation as they are processed. The problem is that the current SQLite buffer management scheme does not effectively manage these cases, and the naïve reclamation scheme used significantly increases the user-perceived latency. Motivated by this limitation, this paper identifies the causes of high latency during processing of a large transaction, and overcomes the limitation via proactive and coarse-grained memory cleaning in SQLite.The proposed memory reclamation scheme was implemented in SQLite 3.29, and measurement studies with a prototype implementation demonstrated that the SQLite operation latency decreases by 13% on an average and up to 17.3% with our memory reclamation scheme as compared to that of the original version.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Dharmalingam, Jeya Mala, e M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, n. 3 (luglio 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Testo completo
Abstract (sommario):
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Nidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V e Neethu Prabhakaran P. "SQLIAD – A Hazard to Web Applications". International Journal of Computer Trends and Technology 29, n. 1 (25 novembre 2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Wang, Yongzhi, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu e Xuewen Dong. "CryptSQLite: SQLite With High Data Security". IEEE Transactions on Computers 69, n. 5 (1 maggio 2020): 666–78. http://dx.doi.org/10.1109/tc.2019.2963303.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Winslett, Marianne, e Vanessa Braganholo. "Richard Hipp Speaks Out on SQLite". ACM SIGMOD Record 48, n. 2 (19 dicembre 2019): 39–46. http://dx.doi.org/10.1145/3377330.3377338.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Li, Jian Wei, Hong Guo e Yu Bin Xu. "Research on Optimization of SQLite Indexing Mechanism Based on Red-Black Tree". Applied Mechanics and Materials 220-223 (novembre 2012): 2711–15. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2711.

Testo completo
Abstract (sommario):
SQLite has been widely applied in embedded system because of its open source and less resource consumption. A novel optimization method with Red-black tree replacing B tree in indexing mechanism in order to solve the low efficiency and large energy consumption problem when inserting and deleting data in SQLite database was proposed in the paper. The contrast test of efficiency of between red-black tree and B tree while inserting and deleting data shows that this method can effectively improve the SQLite insertion and deletion operation efficiency and reduce the energy consumption.
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Sebastian, Anu, Richa Kuriakose e Surekha Mariam Varghese. "NEO4J, SQLITE and MYSQL for Hospital Localization". Advanced Computing: An International Journal 7, n. 3 (30 maggio 2016): 29–36. http://dx.doi.org/10.5121/acij.2016.7303.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Nemetz, Sebastian, Sven Schmitt e Felix Freiling. "A standardized corpus for SQLite database forensics". Digital Investigation 24 (marzo 2018): S121—S130. http://dx.doi.org/10.1016/j.diin.2018.01.015.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Zhang, Li, Shengang Hao e Quanxin Zhang. "Recovering SQLite data from fragmented flash pages". Annals of Telecommunications 74, n. 7-8 (20 febbraio 2019): 451–60. http://dx.doi.org/10.1007/s12243-019-00707-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Liu, Jun Lin, e Qi Yuan Sun. "Information Processing Based on SQLite for Target Tracking System". Applied Mechanics and Materials 278-280 (gennaio 2013): 2065–68. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.2065.

Testo completo
Abstract (sommario):
As for the digital visual surveillance system, the traditional database and hardware platform can not be good at processing vast quantities of information. Combined with ActiveX Data Objects (ADO) technology, the information processing system was built by using SQLite database with embedded dual-core platform. The embedded database SQLite is implanted in the existing embedded hardware platform DM6446. And processing modules and operating interface were designed based on SQLite and the embedded hardware platform. The designed system can play a role as the core of data processing. The experiments show that the system can meet the requirements of the visual information processing such as data mining, online system analysis, data post-processing and so on.
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Lashkaripour, Zeinab, e Abbas Ghaemi Bafghi. "A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)". International Journal of Security and Its Applications 7, n. 5 (30 settembre 2013): 53–66. http://dx.doi.org/10.14257/ijsia.2013.7.5.05.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Zhu, Alex, e Wei Qi Yan. "Exploring Defense of SQL Injection Attack in Penetration Testing". International Journal of Digital Crime and Forensics 9, n. 4 (ottobre 2017): 62–71. http://dx.doi.org/10.4018/ijdcf.2017100106.

Testo completo
Abstract (sommario):
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is that hackers maliciously turn down a website and make network resources unavailable to web users. It is extremely difficult to effectively detect and prevent SQLIA because hackers adopt various evading SQLIA Intrusion Detection System techniques. Victims may not be even aware of that their confidential data has been compromised for a long time. In this paper, our contribution is that we evaluate several most popular open source SQLIA tools and SQLIA prevention tools with both qualitative and quantitative assessments.
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Datsko, Oleh, e Elżbieta Miłosz. "Performance comparison between Xamarin and Java database operations". Journal of Computer Sciences Institute 7 (30 settembre 2018): 168–71. http://dx.doi.org/10.35784/jcsi.672.

Testo completo
Abstract (sommario):
Work with database is one of base things in developing an application. Every technology/language uses own ways to work with database. In the case of Android the SQLite relational database management system is used. Analysis applies the read, write and delete of items from the table. SQLite is like a minimized version of desktop database management system so for every experiment very limited elements count is used.
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Kar, Debabrata, Suvasini Panigrahi e Srikanth Sundararajan. "SQLiDDS: SQL injection detection using document similarity measure". Journal of Computer Security 24, n. 4 (16 agosto 2016): 507–39. http://dx.doi.org/10.3233/jcs-160554.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Nana Mbinkeu, Rodrigue Carlos, e Bernabé Batchakui. "Reducing Disk Storage with SQLite into BitCoin Architecture". International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, n. 2 (12 maggio 2015): 10. http://dx.doi.org/10.3991/ijes.v3i2.4490.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Bharadwaj, Y. V. Sai, Sai Bhageerath Yarrapatruni e Dr Prasada Rao YVSSSV. "SQLite Database and its Application on Embedded Platform". International Journal of Computer Trends and Technology 67, n. 2 (25 febbraio 2019): 1–6. http://dx.doi.org/10.14445/22312803/ijctt-v67i2p101.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Park, Jong-Hyeok, Gihwan Oh e Sang-Won Lee. "SQL statement logging for making SQLite truly lite". Proceedings of the VLDB Endowment 11, n. 4 (dicembre 2017): 513–25. http://dx.doi.org/10.1145/3186728.3164146.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Winasis, Persis Haryo, Raga Maulana e Yodi Susanto. "Designing Application For Defect Recording and Handover Of Property Based On Mobile Application by Applying SQLite Technology". CCIT Journal 13, n. 2 (27 agosto 2020): 185–95. http://dx.doi.org/10.33050/ccit.v13i2.990.

Testo completo
Abstract (sommario):
Property development companies that produce housing products, high rise dwellings, and office buildings generally have data on the quality of buildings, one of which is obtained during the defect inspection process between developers and consumers before handing over units. Recording data is generally still done manually using a form on a paper. For these conditions, researchers tried to build an application based on mobile apps to digitally record the defect checklist of the dwelling so that the data collected can be processed for the needs of analysis and development strategies. Difficulties encountered during the unit handover process using digital methods on the newly completed property, one of which is the quality of data and internet signals. Mobile apps certainly require a data signal connection to send data to the server. This Android-based mobile apps will implement SQLite technology which allows the recording of transactions to be done locally first, which can then be synchronized into the database server after getting the required internet data connection. SQLite was chosen because it has a relatively small library code unlike relational DBMS in general. SQLite is also easy to use without complex configurations. With the support of the ease of function of SQLite it also allows applications to be integrated with the property sales application system.
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Shin, Jiho, e Jung-Taek Seo. "Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger". Sustainability 14, n. 20 (15 ottobre 2022): 13281. http://dx.doi.org/10.3390/su142013281.

Testo completo
Abstract (sommario):
With the diffusion of mobile devices and Internet hyperconnectivity technology, all daily living records of individuals are being recorded on mobile devices in real time. However, from the user’s point of view, the reliability of privacy protection, that is, whether the user’s data on the mobile device completely disappears when it is deleted, is critical. This is because, for the sustainability of social growth, it is necessary to control the digitalization and technology that heightens the risks of the future society. Therefore, this study aims to check the traces of the SQLite database to see if instant messenger messages deleted by the user can be recovered. When the SQLite database record is deleted, if the database shrink function or other application-level deletion does not work, it is possible to recover the deleted record. We chose two iOS-based instant messengers, WhatsApp and WeChat, and analyzed the SQLite DB file and Table Schema where messages are stored. As a result of the experiment in this study, it was verified that the area where the deleted message was stored in the SQLite DB file was overwritten with 0 × 00 or updated with a NULL value, making it impossible to recover the deleted message. This process operates at the app level, and user data is safely protected.
Gli stili APA, Harvard, Vancouver, ISO e altri
27

HARIANI, HARIANI. "EKSPLORASI WEB BROWSER DALAM PENCARIAN BUKTI DIGITAL MENGGUNAKAN SQLITE". Jurnal INSTEK (Informatika Sains dan Teknologi) 6, n. 1 (6 gennaio 2021): 66. http://dx.doi.org/10.24252/instek.v6i1.18638.

Testo completo
Abstract (sommario):
Penggunaan Internet yang meningkat membuat semakin maraknya pengguna web browser. Hal ini bisa memberikan dampak pada meningkatnya kejahatan dunia maya menggunakan media tersebut misalnya menyebarkan hoax, penipuan Email dan lain-lain. Penelitian ini bertujuan untuk mengetahui pentingnya melihat aktivitas pada web browser baik terhadap korban maupun pelaku. Hal ini bisa menentukan pola kejahatan pada suatu kasus dan membantu penyidik dalam menganalisis bukti digital yang tersimpan pada WEB Browser sehingga kasus bisa di selesaikan dengan baik dan tepat. Penelitian ini menunjukkan lokasi history pencarian pada cookie, cache, history download dan melihat password yang tersimpan di web browser safari, maxthon dan comodo dragon menggunakan SQLite. Hasil analisis menunjukkan bahwa banyak Informasi yang di peroleh dari bukti digital web browser menggunakan SQLite sehingga metode ini dapat di terapkan untuk mendapatkan bukti digital jika di perlukan sebagai pembuktian sebuah kasus.Kata kunci – Web Browser, SQLite, Bukti Digital
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Petráš, Václav. "Implementation of SQLite database support in program gama-local". Geoinformatics FCE CTU 7 (29 dicembre 2011): 73–84. http://dx.doi.org/10.14311/gi.7.6.

Testo completo
Abstract (sommario):
The program gama-local is a part of GNU Gama project and allows adjustment of local geodetic networks. Before realization of this project the program gama-local supported only XML as an input. I designed and implemented support for the SQLite database and thanks to this extension gama-local can read input data from the SQLite database. This article is focused on the specifics of the use of callback functions in C++ using the native SQLite C/C++ Application Programming Interface. The article provides solution to safe calling of callback functions written in C++. Callback functions are called from C library and C library itself is used by C++ program. Provided solution combines several programing techniques which are described in detail, so this article can serve as a cookbook even for beginner programmers. This project was accomplished within my bachelor thesis.
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Wang, Gang, e Ming Yu Zhao. "Study and Optimization of Database on Android Platform". Applied Mechanics and Materials 263-266 (dicembre 2012): 1754–58. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1754.

Testo completo
Abstract (sommario):
Due to the poor database performance situation on Android operating system, put forward a methods of database access performance optimization. The paper first analyze the Android database access principle, architecture of SQLite and Berkeley DB, and methods of Berkeley DB in concurrent access, then put forward a method of porting Berkeley DB to Android to replace SQLite to enhance the database access performance. Finally a series of practical benchmark results shows that the porting brings performance improvement effect.
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Putra, Raden Bagus Dimas, Eko Setia Budi e Abdul Rahman Kadafi. "Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android". JURIKOM (Jurnal Riset Komputer) 7, n. 3 (14 giugno 2020): 376. http://dx.doi.org/10.30865/jurikom.v7i3.2161.

Testo completo
Abstract (sommario):
Android is one of the largest mobile operating system platforms today. Amid the ever-increasing needs of users, Android programmers are still lacking to meet the current market needs. One of the problems that causes this is the difficulty of creating an internal database, so many people give up to learn to make Android applications. Android's internal database is hard to create because the entire data structure on that database should be built with the query executed in the created program code. Some of the common internal databases currently used are SQLiTe and Room. Both databases are quite difficult to learn where SQLite should build everything from scratch while Room should study the structure and systematics of of the library. Therefore, in this article, the author proposes library and template named "Relational Database Library and Template" which will be referred to as RBDLiTe which can create an internal database for Android applications easily which will also be compared with SQLiTe and Room in its use.
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Feng, Xing Li, Zhi Hai Suo, Yao Tang Wei e Mo Xu. "The Financial Management System Based on Android and SQLite". Applied Mechanics and Materials 462-463 (novembre 2013): 974–77. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.974.

Testo completo
Abstract (sommario):
SQLite is a lightweight database which is widely used in most of embedded devices becauseof its advantages such as open source, zero configuration, self-contained, server less, highly concurrent, etc. The Android application in this paper uses SQLiteOpenHelper to initialize the database and store many kinds of data types such as text, date, time, image into database. GalleryAdapter extended from BaseAdapter is used to write the image taken by camera and stored in SD card into the database table. The design of user interface is aesthetic and convenient. The user experience is favorable. It is a good choice for family financial management.
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Imam Farisi, Mukhaimy Gazali e Rudy Anshari. "SQLite Sebagai Pengganti Lucene.Net pada Pencarian Produk Toko Online". Jurnal CoSciTech (Computer Science and Information Technology) 1, n. 2 (31 ottobre 2020): 36–43. http://dx.doi.org/10.37859/coscitech.v1i2.2204.

Testo completo
Abstract (sommario):
A business institution can promote their products in its online shop. With the promotion of online stores, consumers can find out which products are sold at the store. Consumers who are looking for a product can search based on various attributes of goods that are scattered in various fields in the database table, and can even be spread across different tables. All attributes that point to an item are collected in one document which will be searched using the Full Text Search system. Two alternatives to the Full Text Search system were selected; Lucene.Net and Sqlite Full Text Search. Before actually being used, these two search system alternatives were tested first. In document storage size, Lucene.Net is superior by 6.78 times. The speed of writing Sqlite search documents is superior by between 1,875 times to 5,197 times. In terms of key search speed, Lucene.Net was superior by between 1,169 and 1,698 times. Based on the consideration of the speed and development of Lucene.Net Core which is still in beta stage, Sqlite Full Text Search is suitable for use in the product search process in the Online Store.
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Kabakuş, Abdullah Talha. "Pratik Açıdan SQLite ve Firebase Veritabanlarının Bir Performans Karşılaştırması". Düzce Üniversitesi Bilim ve Teknoloji Dergisi 7, n. 1 (31 gennaio 2019): 314–25. http://dx.doi.org/10.29130/dubited.441672.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Oh, Gihwan, Sangchul Kim, Sang-Won Lee e Bongki Moon. "SQLite optimization with phase change memory for mobile applications". Proceedings of the VLDB Endowment 8, n. 12 (agosto 2015): 1454–65. http://dx.doi.org/10.14778/2824032.2824044.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Borovskoy, I. G., E. A. Shelmina e N. V. Zarikovskaya. "Text Data Storage Method Modification for SQLite Relational Database". Journal of Physics: Conference Series 803 (gennaio 2017): 012025. http://dx.doi.org/10.1088/1742-6596/803/1/012025.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Jeon, Sangjun, Jewan Bang, Keunduck Byun e Sangjin Lee. "A recovery method of deleted record for SQLite database". Personal and Ubiquitous Computing 16, n. 6 (24 luglio 2011): 707–15. http://dx.doi.org/10.1007/s00779-011-0428-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Choi, Jin-oh. "Implementation and Experiment for Search Performance Analysis of SQLite Mobile Database". Journal of the Korea Institute of Information and Communication Engineering 21, n. 2 (28 febbraio 2017): 333–38. http://dx.doi.org/10.6109/jkiice.2017.21.2.333.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Abogaa, Jennifer Bagulaya. "e-recognition of Motorbike License Plate using Python and SQLite". Indian Journal Of Science And Technology 15, n. 48 (27 dicembre 2022): 2757–64. http://dx.doi.org/10.17485/ijst/v15i48.1673.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Zhou, Bing. "Analysis of the Security Mechanism of Android and Countermeasures". Applied Mechanics and Materials 687-691 (novembre 2014): 2948–51. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2948.

Testo completo
Abstract (sommario):
Now, as the security threats for the Android phone increasing, the security problem about the smart mobile-phone has become a focus of the topic. In this paper, we take the security problems on Android operating system as the study object .Our contribution in this paper is two-fold. First, SQLite database is the mainly way for data storage on Android, but no security mechanism was provided in SQLite, we implement data encryption technique refer to the common database security mechanism. Second, in order to solve the security threats existing in the traditional phone, we also give a design and implementation of multi-function mobile phone firewall.
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Qin, Lu, Jeffrey Xu Yu e Lijun Chang. "Ten thousand SQLs". Proceedings of the VLDB Endowment 3, n. 1-2 (settembre 2010): 58–69. http://dx.doi.org/10.14778/1920841.1920854.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Bhagat, Siddhesh, R. R. Sedamkar e Prachi Janrao. "Preventing SQLIA using ORM Tool with HQL". International Journal of Applied Information Systems 11, n. 4 (6 settembre 2016): 44–47. http://dx.doi.org/10.5120/ijais2016451600.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Kumar, Pankaj, e C. P. Katti. "A Parallel-SQLIA Detector for Web Security". International Journal of Information Engineering and Electronic Business 8, n. 2 (8 marzo 2016): 66–75. http://dx.doi.org/10.5815/ijieeb.2016.02.08.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Libkin, Leonid. "SQL’s Three-Valued Logic and Certain Answers". ACM Transactions on Database Systems 41, n. 1 (7 aprile 2016): 1–28. http://dx.doi.org/10.1145/2877206.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Xie, Cong, e Shao Jian Song. "Design of Door Monitoring Interface Based on Qt4 and SQLite". Applied Mechanics and Materials 556-562 (maggio 2014): 1592–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1592.

Testo completo
Abstract (sommario):
With the number of private cars increasing, the problems such as the shortage of parking spaces, the disorder and congestion of parking are becoming serious, especially in a flourishing business street. So we do the research based on an underground parking lot at a commercial district. In this paper, we design a monitoring interface based on embedded cross-platform GUI system-Qt4 and embedded SQLite combining RFID and Zigbee technology on computer, and then transplant it to Intel PXA270 based on ARM-Linux. The designed system can realize automatic identification, charging of vehicles and displaying parking spaces. It can improve the efficiency of parking.
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Суворов, Александр Павлович, e Сергей Петрович Зоткин. "Применение программы DB Browser for SQLite для создания баз данных". Естественные и Технические Науки, n. 09 (2020): 108–11. http://dx.doi.org/10.37882/2223-2966.2020.09.36.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Lokhande, Sharayu, e Vaishali Ganganwar. "Accessing and Modifying Sqlite Remotely for Catering Multi Client Access". International Journal of Science and Engineering Applications 4, n. 6 (19 novembre 2015): 350–52. http://dx.doi.org/10.7753/ijsea0406.1003.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Yamamoto, Moriki, e Hisao Koizumi. "An Experimental Evaluation using SQLite for Real-Time Stream Processing". Journal of International Council on Electrical Engineering 3, n. 1 (gennaio 2013): 68–72. http://dx.doi.org/10.5370/jicee.2013.3.1.068.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Rigin, A. M., e S. A. Shershakov. "SQLite RDBMS Extension for Data Indexing Using B-tree Modifications". Proceedings of the Institute for System Programming of the RAS 31, n. 3 (2019): 203–16. http://dx.doi.org/10.15514/ispras-2019-31(3)-16.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Khwaldeh, Ali, Amani Tahat, Jordi Marti e Mofleh Tahat. "Atomic Data Mining Numerical Methods, Source Code SQlite with Python". Procedia - Social and Behavioral Sciences 73 (febbraio 2013): 232–39. http://dx.doi.org/10.1016/j.sbspro.2013.02.046.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Liu, Chen Chen. "Research of Embedded Image Processing Based on ARM11 and SQLite". Applied Mechanics and Materials 373-375 (agosto 2013): 1603–6. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1603.

Testo completo
Abstract (sommario):
According to the fact that the embedded system is not efficient enough to access and manipulate image data, this paper put forward a research program of image JPEG compression algorithm and being stored in a combination based on the ARM11 and SQLite embedded database image processing system. Comparative Researches on the system without data prove that the program can make the embedded systems more reasonable to store image data and realize the localized efficient management of the image data, which has certain practical value.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia