• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 187
  • 149
  • 112
  • 30
  • 25
  • 12
  • 10
  • 8
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 591
  • 192
  • 149
  • 139
  • 127
  • 103
  • 86
  • 80
  • 76
  • 74
  • 72
  • 68
  • 64
  • 63
  • 60
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Informacijos valdymo uždaviniai Microsoft SQL 2005 serverio terpėje / Information control tasks in the SQL server 2005 environment

Paliušis, Juozas Andrius, Paliušis, Andrius Juozas 24 September 2008 (has links)
Darbe analizuojamas SQL 2005 sistemoje duomenų saugojimo XML formatu efektyvumas, bei bandoma numatyti, kur būtų galima pritaikyti konkrečius variantus sukurtų duomenų struktūrų, kad būtų galima pritaikyti tai realiam uždavinių sprendimui. Tyrime buvo naudojama VISUAL BASIC 2005 (VB 2005) programavimo kalba, bei įvairūs XML apdorojimo metodai. Tyrimas buvo atliekamas sukūrus kelis skirtingus hierarchinės duomenų basės modelius, dažnai naudojamus sudarant sąmatas. / The purpose of this paperwork is to analyse the storing hierarchical structure data, in the SQL 2005 database. The main concern is to implement data retrieval from server using as fast methods as possible of retrieving hierarchical structure data. To achieve that purposes here comes XML data structures and it native support in SQL 2005. In conjunction with this technology we are also adapting other new server side technologies, and client side technologies VB 2005. The investigation has been made using data hierarchical database samples and different numbers of recordings.
62

xBase komandų pakeitimo SQL užklausomis tyrimas / Research of replacement of Xbase commands with SQL queries

Kasiulevičius, Darius 24 August 2009 (has links)
Darbe analizuojama xBase komandų transformavimo į SQL užklausas problema. Pateikiamas konceptualus transformavimo problemos sprendimas, kurį sudaro dvi dalys: transformavimo algoritmas ir transformavimo taisyklių saugykla. Pagal pasiūlytą modelį sukurta programinė įranga, kuri leidžia atlikti xBase komandų transformavimą į SQL užklausas. Taip pat sukurtoje programinėje įrangoje įdiegtas ir papildomas funkcionalumas: duomenų bazės lentelių duomenų peržiūra, koregavimas, duomenų perkėlimas iš senų *.dbf lentelių į serverinės duomenų bazės lenteles. Sukurtas sprendimas palengvina sistemos perkėlimą iš navigacinės duomenų bazių sistemos į šiuolaikines kliento serverio architektūros sistemas veikiančias serverinių dbvs pagrindu. / The conversion problem of xBase commands into SQL queries is analysed in this work. Solution to conversion problem was proposed. It consists of two parts: conversion algorithm and conversion rules storage. A software for conversion of xBase commands into SQL queries was developed using the proposed model. Additional functionality was implemented in the software: viewer and editor of database tables, loader of *.dbf tables into servers database tables. A solution to facilitate migration from ISAM database to modern client-server DBMS systems was developed.
63

Interaktyvios saugos sistemos prototipas apsaugai nuo injekcinių atakų / Interactive security system prototype to protect against injections attacks

Žukas, Mantas 05 November 2013 (has links)
Darbas apie apsisaugojimo metodiką nuo injekcinių atakų naudojant Bekaus ir Nauro formą. Pasirinkta įvesties patikros strategija (blacklist), realizuotas reguliarių išraiškų transformacijos algoritmas. Sukurtas pradinis injekcinių atakų aprašas. Transformuojant aprašo sematiką į reguliarių išraiškų masyvus yra suformuojamos tikrinimo taisyklės. Pagal suformuotas taisyklės yra nustatoma, ar sistemos įvesties parametrai atitinka injekcinių atakų aprašą. Sukurtas saugos sistemos prototipas apsaugai nuo injekcinių atakų. / In this research the injection attack prevention method is introduced. Also the interactive security system prototype to protect against injections attacks is proposed. Security system prototype is using blacklist input validation strategy for checking input parameters. Each list item consists of a single type of injection attack description. Descriptions are written in Backus–Naur form.
64

SQL užklausų rašymo gebėjimų vertinimo sistema / System to Evaluate Students Ability to Write SQL Queries

Ruzgys, Mindaugas 16 July 2014 (has links)
Faktiškai kiekviena šiuolaikinė IS naudoja duomenų bazes, kad saugoti informaciją. Šiuo metu populiariausios reliacinės duomenų bazių valdymo sistemos, kur užklausos rašomos SQL kalba. Todėl kiekvienas programuotojas privalo gebėti rašyti SQL užklausas Rinkoje labai mažai sistemų, skirtų MySQL žinių testavimui, kurios atitinka visus keliamus reikalavimus ir yra nemokamos. / Most of bigger web solutions use databases for data storage.This is why all programmers must be familiar with SQL and its usage in relational databases. However the evaluation of SQL knowledge can be difficult in study process as the same result can be achieved by writing different SQL queries. This is why the evaluation of students’ answers can be time consuming in non automated systems and incorrect in match finding automated systems. This prototype was validated by using it in Database study course and compared with more traditional ways to evaluate students’ MySQL knowledge.
65

SQL front-end for the JRelix relational-programming system

Khaya, Ibrahima. January 1900 (has links)
Thesis (M.Sc.). / Written for the School of Computer Science. Title from title page of PDF (viewed 2009/06/25). Includes bibliographical references.
66

Método de filtragem fuzzy para avaliação de bases de dados relacionais / Fuzzy filtering method for evaluation of relational databases

Fernanda Bessani Leite Penteado 02 October 2009 (has links)
As informações imprecisas e vagas, comumente encontradas na modelagem de problemas do mundo real, muitas vezes não são manipuladas de forma adequada por meio das consultas convencionais aos bancos de dados. Alternativamente, a teoria de conjuntos fuzzy tem sido considerada uma ferramenta bem promissora para tratamento destas informações consideradas imprecisas e, em determinados casos, até mesmo ambíguas. Esse trabalho utiliza a linguagem SQL padrão para apresentar uma abordagem fuzzy de consultas a bancos de dados relacionais. Estudos de casos referentes à aplicabilidade do método desenvolvido são apresentados a fim de mostrar as suas potencialidades em relação aos métodos tradicionais de consultas. / Often, the imprecise and vague information, commonly found in the modeling of real world problems, are not dealt in an appropriate way through conventional queries used in databases. Alternatively, the fuzzy set theory has been considered a very promising tool to treat imprecise and ambiguous information. This work uses the standard SQL language and fuzzy set theory to develop a fuzzy query method for relational databases. Simulation examples are presented to illustrate its potentialities in relation to the traditional query methods.
67

Konvertering och modifiering av ett DOS-baserat administrationsprogram till ett Windows-baserat program

Frost, Fredrik January 2012 (has links)
Mindre företag i Sverige använder även i dag äldre DOS-baserade (Disk Operating System) program för att hantera sina administrationsbehov. I takt med övergången till fönsterbaserade applikationer har även behovet av hanteringen av övergången ökat. I detta examensarbete har företaget ifråga haft behov av en uppdatering av dess befintliga DOS-baserade administrationsprogram. Uppgiften har varit att ta fram ett motsvarande Windows-baserat administrationsprogram med stöd för alla de funktioner som det ursprungliga programmet hade men med utökad funktionalitet. För att lösa denna uppgift har första steget i samråd med företagets representant varit att analysera hur användarna använder det befintliga systemet för att ta reda på de funktioner som behövdes för att skapa ett väl fungerande program. Det andra steget har varit att konstruera en server- och en klientapplikation som utgjorde programmets två delar. I det tredje steget har en utvärdering utförts av det färdiga programmet av företagets representant efter en tids användning i form av ett frågeformulär designat för ändamålet. Projektet har resulterat i ett Windows-baserat administrationsprogram skrivet i Java med stöd för alla de funktioner som företaget eftersträvade. Användare av systemet kan söka och lagra kunder, artiklar, leverantörer, skapa och skriva ut fakturor och följesedlar, lägga beställningar, hantera betalningar och grundläggande bokföring för tidigare nämnda transaktioner. Företagets representant ansåg efter användning och utvärdering att applikationen uppfyllde de ställda kraven. / Small companies in Sweden even today use older DOS-based (Disk Operating System) programs to manage their administration requirements. As the transition to windows-based applications continues, there is an increased need for this transition to be managed successfully. In this thesis the company in question required its existing DOS-based administration program to be updated. The task has been to develop an equivalent Windows-based administration program with support for all the features of the original program but with extended functionality. To solve this task, the first step involved consulting with the company's representative to analyze how users use the existing system in order to determine the necessary features so as to create a well-functioning program. The second step was to construct a server- and a client application which formed the two parts of the program. After the program had been used for a given amount of time, an evaluation was performed by the company's representative as a third step which involved the use of a questionnaire designed for the purpose. The project resulted in a Windows-based administration program written in Java with support for all the features desired by the company. Users of the system can search and store customers, articles and supplier data, create and print invoices and packing slips, place orders, process payments and handle basic accounting for the aforementioned transactions. After both the use and evaluation of the application, the company's representative considered that it had met the required criteria.
68

MC.d.o.t : Motion capture data och dess tillgänglighet / Motion capture : Data and its availability

Larsson, Albin January 2014 (has links)
Hårdvara kan bli gammal, program kan sluta utvecklas, filer som skapats från sådan hårdvara respektive mjukvara kan bli oanvändbara med tiden. Samt att hålla ordning på många individuella filer kan i längden bli jobbigt för användare. Med en databasorienterad lagrinsgslösning kan olika API:er användas för att göra data kompatibel med flera olika verktyg och program, samt att det kan användas för att skapa en centraliserad lösning för att enkelt hålla ordning på information. Bland databaser finns det två primära grupperingar: SQL och NoSQL. Detta arbete ämnar undersöka vilken typ som passar för att hantera motion capture data. Tester har utförts på SQLs MySQL och NoSQLs Neo4j. Neo4j som är specialiserad för att hantera data som motion capture data. Resultatet från testningarna är förvånande nog att MySQL hanterar motion capture data bättre än Neo4j. Ytterligare arbeten för att undersöka fler varianter av databaser för en mer komplett bild föreslås.
69

Technika SQL injection - její metody a způsoby ochrany / SQL Injection Technique - its Methods and Methods of Protection

Bahureková, Beáta January 2020 (has links)
SQL injection is a technique directed against web applications using an SQL database, which can pose a huge security risk. It involves inserting code into an SQL database, and this attack exploits vulnerabilities in the database or application layer. The main goal of my thesis is to get acquainted with the essence of SQL injection, to understand the various methods of this attack technique and to show ways to defend against it. The work can be divided into these main parts, which I will discuss as follows.In the introductory part of the work I mention the theoretical basis concerning SQL injection issues. The next chapter is focused on individual methods of this technique. The analytical part is devoted to mapping the current state of test subjects, scanning tools, which form the basis for optimal research and testing of individual SQL methods, which are discussed in this part from a practical point of view along with the analysis of commands. In the last part I will implement SQL methods on selected subjects and based on the outputs I will create a universal design solution how to defend against such attacks.
70

Návrh systému pro objednávání obědů / Design of an Information System for Ordering Lunch

Pech, Martin January 2013 (has links)
The Master’s thesis deals with design, realization and implementation of web application for ordering lunch. Theoretical basis for creating web applications, methods used for the proposal and technologies used in the realization and implementation are described in the first part. The second part of the thesis presents an analysis of the current state. The last part contains the actual design, realization and implementation of the web application for ordering lunches.

Page generated in 0.0479 seconds