50 results on '"SQL query"'
Search Results
2. QPSEncoder: A Database Workload Encoder with Deep Learning
- Author
-
Yang, Jianwen, Zhang, Qiuhong, Yan, Jin, Ding, Zhiming, Zhu, Meiling, Lv, Xinjie, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Strauss, Christine, editor, Amagasa, Toshiyuki, editor, Manco, Giuseppe, editor, Kotsis, Gabriele, editor, Tjoa, A Min, editor, and Khalil, Ismail, editor
- Published
- 2024
- Full Text
- View/download PDF
3. Enhanced Featurization of Queries with Interval Density Encoding
- Author
-
Wang, Jiangqing, Yang, Dong, Sun, Chong, Tie, Jun, Cheng, Yong, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Wang, Wei, editor, Mu, Jiasong, editor, Liu, Xin, editor, and Na, Zhenyu Na, editor
- Published
- 2024
- Full Text
- View/download PDF
4. Design and Implementation of Enabling SQL–Query Processing for Ethereum-Based Blockchain Systems.
- Author
-
Han, Jongbeen, Seo, Yunhyeong, Lee, Sangjin, Kim, Sunggon, and Son, Yongseok
- Subjects
BLOCKCHAINS ,DATABASES ,RELATIONAL databases ,DATA structures ,SQL ,COST control ,SELF-efficacy - Abstract
A blockchain is designed to establish consistent and reliable agreements in an untrusted and decentralized environment. In addition, the blockchain enables transaction processing and the creation of smart contracts. It empowers end users to execute contracts without any intermediate entities. However, there are some issues when it comes to retrieving information, such as the state and history of smart contracts and regular transactions in the blockchain. For example, in a smart contract, user-defined data structures can be used to recall the state of the smart contract for a range query, which can decrease the general performance. In addition, an external database can be required to retrieve regular transactions for range queries, which increases management costs. To achieve this, we propose a new scheme that enables SQL query operations to retrieve a smart contract and regular transaction information within the blockchain system. To achieve this, we combine an embedded relational database with an Ethereum-based blockchain system to provide the SQL query. It enables range queries on smart contracts without requiring user-defined data structures and decreases management costs for regular transactions without any external database. We implement the proposed blockchain system on quorum, which is an Ethereum-based blockchain system. Also, we evaluate the proposed system using a synthetic benchmark. The performance of retrieving smart contract data is improved by up to approximately 22×, with low memory usage compared with the existing system. Moreover, the proposed system demonstrates a similar search performance to the existing system, even when considering external databases in regular transactions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Tuning Database Pada Sistem Penerimaan Mahasiswa Baru Menggunakan Optimasi Query dan Indexing
- Author
-
Amat Deska, Ipal Akbar, and Samidi
- Subjects
tuning ,index ,optimasi database ,sql query ,Information technology ,T58.5-58.64 - Abstract
Dalam pengoperasian database MaraiaDB diperlukan aplikasi berupa server localhost yang memiliki response waktu untuk menjalankan sebuah query agar dapat mendapatkan waktu yang efisiensi. Pada penelitian ini mengukur perfoma query dalam bentuk SELECT pada database MariaDB yang sudah di install pada komputer atau laptop dengan menggunakan aplikasi yang bernama Xammp dengan jumlah record data kurang lebih sebanyak 12.000 data, tapi pada penelitian ini hanya memakai sekitar 5000 data. Data tersebut nantinya akan dilakukan optimasi query dan indexing. Permasalahan yang terjadi adalah lamanya proses pengambilan data yang membutuhkan waktu sehingga membutuhkan suatu cara agar dapat mempercepat proses pengambilan data. Metode optimasi database yang difokuskan pada pengujian ini adalah dengan melakukan perbandingan dari berbagai efektivitas sub query serta penggunaan indexing pada tabel. Pada Query yang diuji adalah fungsi yang bernama LEFT JOIN, WHERE, ON, GROUP BY, ORDER BY dan DML (Data Manipulation Language), yaitu QUERY SELECT yang akan di lakukan pada aplikasi Xammp. Pada penelitian ini hasil yang di harapkan berupa pengambilan data yang akan menjadi lebih cepat atau efisien untuk meningkatkan kinerja pada database setelah melakukan Optimasi SQL Query dan Table Indexing.
- Published
- 2023
- Full Text
- View/download PDF
6. Preliminary study on SQLearn : Sql Query Learning Tool Using Close Ended Drag and Drop Approach
- Author
-
Arhandi, Putra Prima, Firdausi, Annisa Taufika, Andoko, Banni Satria, Khairy, Muhammad Shulhan, Adhim, Muhammad Ilham, Supianto, Ahmad Afif, Chan, Albert P. C., Series Editor, Hong, Wei-Chiang, Series Editor, Mellal, Mohamed Arezki, Series Editor, Narayanan, Ramadas, Series Editor, Nguyen, Quang Ngoc, Series Editor, Ong, Hwai Chyuan, Series Editor, Sachsenmeier, Peter, Series Editor, Sun, Zaicheng, Series Editor, Ullah, Sharif, Series Editor, Wu, Junwei, Series Editor, Zhang, Wei, Series Editor, Asmara, Rosa Andrie, editor, Syulistyo, Arie Rachmad, editor, Wijayaningrum, Vivi Nur, editor, Khairy, Muhmmad Shulhan, editor, Siradjuddin, Indrazno, editor, and Sukmana, Septian Enggar, editor
- Published
- 2022
- Full Text
- View/download PDF
7. Tuning Database Pada Sistem Penerimaan Mahasiswa Baru Menggunakan Optimasi Query dan Indexing.
- Author
-
Deska, Amat, Akbar, Ipal, and Samidi
- Subjects
INFORMATION retrieval ,DATABASES ,ELECTRONIC data processing ,LAPTOP computers ,SQL ,INDEXING - Abstract
Copyright of Techno.com is the property of Universitas Dian Nuswantoro, Fakultas Ilmu Komputer and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
8. The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modification Algorithm
- Author
-
Wei, Ya, Cai, Rongyan, Zhang, Lan, Guo, Qian, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Tian, Yuan, editor, Ma, Tinghuai, editor, and Khan, Muhammad Khurram, editor
- Published
- 2021
- Full Text
- View/download PDF
9. SQL Query from Portuguese Language Using Natural Language Processing
- Author
-
da Silva, Carlos Fernando Mulessiua, Jindal, Rajni, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Garg, Deepak, editor, Wong, Kit, editor, Sarangapani, Jagannathan, editor, and Gupta, Suneet Kumar, editor
- Published
- 2021
- Full Text
- View/download PDF
10. Multi-Tenant Intrusion Detection Framework as a Service for SaaS.
- Author
-
Yassin, Mohamed, Ould-Slimane, Hakima, Talhi, Chamseddine, and Boucheneb, Hanifa
- Abstract
Information technology (IT) service providers are nowadays moving toward cloud computing. Software-as-a-service (SaaS) refers to cloud service-oriented web applications. As a result of computation outsourcing, a customer (tenant) can subscribe to a self-service SaaS and use it on a pay-per-use basis. To reduce resource costs, a single instance of SaaS serves multiple tenants (multi-tenancy). However, outsourcing and multi-tenancy bring about new security issues. Indeed, tenants lose control over the source code, databases and infrastructure and cannot deploy their own intrusion detection system (IDS). In this context, the provider must not only integrate their preferred IDS into a public cloud, but also protect the tenants according to their individual security requirements. We put forth a multi-tenant intrusion detection framework as a service for SaaS (MTIDaaS) to allow the provider to undertake such integration. Our MTIDaaS has been integrated and tested in a real public cloud environment. It provides security-as-a-service (SecaaS) for both provider and tenant with high levels of portability, flexibility and cost-effectiveness. The experimental results demonstrate that our MTIDaaS offers easy integration of IDS with little virtualization overhead and insignificant impact on HTTP response time. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. The Web Penetration Based SQL Injection
- Author
-
Zhang, Guofang, Wu, Hengyu, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Hung, Jason C., editor, Yen, Neil Y., editor, and Chang, Jia-Wei, editor
- Published
- 2020
- Full Text
- View/download PDF
12. An Approach for Generating SQL Query Using Natural Language Processing
- Author
-
More, Priyanka, Kudale, Bharti, Deshmukh, Pranali, Biswas, Indira N., More, Neha J., Gomes, Francisco S., Xhafa, Fatos, Series Editor, Balaji, S., editor, Rocha, Álvaro, editor, and Chung, Yi-Nan, editor
- Published
- 2020
- Full Text
- View/download PDF
13. Interactively discovering and ranking desired tuples by data exploration.
- Author
-
Qin, Xuedi, Chai, Chengliang, Luo, Yuyu, Zhao, Tianyu, Tang, Nan, Li, Guoliang, Feng, Jianhua, Yu, Xiang, and Ouzzani, Mourad
- Abstract
Data exploration—the problem of extracting knowledge from database even if we do not know exactly what we are looking for —is important for data discovery and analysis. However, precisely specifying SQL queries is not always practical, such as "finding and ranking off-road cars based on a combination of Price, Make, Model, Age, Mileage, etc"—not only due to the query complexity (e.g.,the queries may have many if-then-else, and, or and not logic), but also because the user typically does not have the knowledge of all data instances (and their variants). We propose DExPlorer, a system for interactive data exploration. From the user perspective, we propose a simple and user-friendly interface, which allows to: (1) confirm whether a tuple is desired or not, and (2) decide whether a tuple is more preferred than another. Behind the scenes, we jointly use multiple ML models to learn from the above two types of user feedback. Moreover, in order to effectively involve human-in-the-loop, we need to select a set of tuples for each user interaction so as to solicit feedback. Therefore, we devise question selection algorithms, which consider not only the estimated benefit of each tuple, but also the possible partial orders between any two suggested tuples. Experiments on real-world datasets show that DExPlorer outperforms existing approaches in effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. Learning Classifier Systems for Adaptive Learning of Intrusion Detection System
- Author
-
Lee, Chang Seok, Cho, Sung Bae, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Pérez García, Hilde, editor, Alfonso-Cendón, Javier, editor, Sánchez González, Lidia, editor, Quintián, Héctor, editor, and Corchado, Emilio, editor
- Published
- 2018
- Full Text
- View/download PDF
15. Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey.
- Author
-
Zhang, Bo, Dong, Boxiang, and Wang, Wendy Hui
- Subjects
- *
SQL , *DATABASE management , *CLOUD computing , *DATA integrity , *DATABASES , *DATA management - Abstract
Spurred by the development of cloud computing, there has been considerable recent interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or computational resources can outsource their data and database management needs to a third-party service provider. Outsourcing, however, raises an important issue of result integrity: how can the client verify with lightweight overhead that the query results returned by the service provider are correct (i.e., the same as the results of query execution locally)? This survey focuses on categorizing and reviewing the progress on the current approaches for result integrity of SQL query evaluation in the DaaS model. The survey also includes some potential future research directions for result integrity verification of the outsourced computations. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
16. DATABASE SEMANTIC MODEL APPLICATION IN NATURAL LANGUAGE USER INTERFACE DEVELOPMENT PROCESS
- Author
-
R. V. Posevkin
- Subjects
user interface ,natural language text ,database ,semantic mode ,SQL query ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Subject of Research.The paper considers common natural language processing stages such as morphological, syntactic and semantic analysis. We describe connections between query parts, semantic model and internal database representation. Method. A method is proposed for the database semantic model application as a part of the natural language user database interface. There is a description of the semantic model data transforms to intermediate Q-representation of the user query. The next step is transforming of Q-representation to database SQL query based on substitution to predefined query template. Main Results. We give an account of the semantic model application as a part of natural language user interface. An example is provided of the transformation of both simple and nested natural language user queries to the database SQL query. The paper presents experimental research results of the proposed method of the semantic model application as a part of the natural language user database interface. Practical Relevance. Implementation of the proposed approach gives the possibility to resolve the problem of extracting information from the database based on user’s natural language query. This method also improves the process of resolving the ambiguity during natural language processing. The presence of information about internal database structure makes it possible to create more accurate database SQL query.
- Published
- 2018
- Full Text
- View/download PDF
17. SQL UŽKLAUSŲ OPTIMIZAVIMO TYRIMAS = SQL QUERY OPTIMIZATION RESEARCH
- Author
-
Jurgita Lieponienė
- Subjects
sql query ,database index ,normalization of the database ,denormalization of the database ,Social sciences (General) ,H1-99 - Abstract
Although scientific literature studies different aspects of SQL query optimization the major part of researches is limited to the theoretical analysis of problems. There is a lack of researches that ground the effectiveness of SQL query optimization methods on the results of experimental testing. In light of this the aim of the current research is to assess the importance of SQL code optimization, data base indexes and structure in the creation of optimized SQL queries by means of experimental testing. The results of this research are important for the programmers of information systems, databases and other IT specialist who create information systems and analyze the data of databases. The results of experimental research can be used in high schools teaching databases. Research object is SQL query optimization. Research objective is to perform the research of SQL query optimization optimizing SQL code, using data base indexes and denormalizing data base structure. Research tasks: To assess the impact of SQL code on the effectiveness of SQL query. To ascertain how data base indexes influence the duration of SQL query execution. To assess the impact of data base denormalization on the effectiveness of SQL queries. Research methods: the impact of SQL code, data base indexes and data base denormalization on the effectiveness of SQL queries was assessed my means of experimental testing. The experimental testing was implemented in Oracle XE data base management system conducting tests in various in size databases, indexing them and denormalizing. The conducted research is important both in theoretical and practical aspects. Research results are important for data base programmers and other IT specialists who execute SQL queries. The results of the conducted research can be integrated into the data base subject teaching in higher schools grounding the importance of SQL query optimization and defining good practice of SQL code writing. The presented research method can be also used assessing the effectiveness of queries in NoSQL databases. Conclusions: During the assessment of the impact of SQL code on the effectiveness of query it was established that properly written SQL code reduces the duration SQL query execution by 85,0 percent. The duration of query execution is negatively influenced by internal queries, phrase HAVING and use of operator The designation of query field in SELECT phrase can reduce the duration of query execution by 27,0 percent. The conducted experimental research showed that the indexing of query fields used in calculations has negative impact on the duration of query execution. The indexing of query fields that form selection criteria is effective only when selection query returns less than 10,0 percent of data base records. The conducted experimental research showed that the denormalization of data base has positive impact on the effectiveness of SQL queries. Denormalizing data base on purpose to avoid connections in SQL query use it is possible to reduce the time of query execution by 89,0 percent.
- Published
- 2017
18. Mining SQL Queries to Detect Anomalous Database Access using Random Forest and PCA
- Author
-
Ronao, Charissa Ann, Cho, Sung-Bae, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Ali, Moonis, editor, Kwon, Young Sig, editor, Lee, Chang-Hwan, editor, Kim, Juntae, editor, and Kim, Yongdai, editor
- Published
- 2015
- Full Text
- View/download PDF
19. A New Approach for Fuzzy Classification in Relational Databases
- Author
-
Tajiri, Ricardo Hideyuki, Marques, Eduardo Zanoni, Zarpelão, Bruno Bogaz, de Souza Mendes, Leonardo, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Hameurlain, Abdelkader, editor, Liddle, Stephen W., editor, Schewe, Klaus-Dieter, editor, and Zhou, Xiaofang, editor
- Published
- 2011
- Full Text
- View/download PDF
20. Optimization of Investment Options Using SQL
- Author
-
Torres-Jimenez, Jose, Avila-George, Himer, Rangel-Valdez, Nelson, Martinez-Pena, Jorge, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, editor, Siekmann, Jörg, editor, Wahlster, Wolfgang, editor, Kuri-Morales, Angel, editor, and Simari, Guillermo R., editor
- Published
- 2010
- Full Text
- View/download PDF
21. QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing.
- Author
-
Guoxiu Liu, Geng Yang, Haiwei Wang, Hua Dai, and Qiang Zhou
- Subjects
DATA encryption ,DATABASES ,CLOUD computing ,CLOUD computing security measures ,DATA security - Abstract
With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost. However, it has become a challenging work to provide security to database as service model in cloud computing, because adversaries may try to gain access to sensitive data, and curious or malicious administrators may capture and leak data. In order to realize privacy preservation, sensitive data should be encrypted before outsourcing. In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations. The proposed system can store and process the floating point numbers without compromising the security of data. To balance tradeoff between data privacy protection and query processing efficiency, QSDB utilizes three different encryption models to encrypt data. Our strategy is to process as much queries as possible at the cloud server. Encryption of queries and decryption of encrypted queries results are performed at client. Experiments on the real-world data sets were conducted to demonstrate the efficiency and practicality of the proposed system. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
22. Conflicts between encapsulation and query optimization through UML for airline reservation system
- Author
-
Sihint, Deep Mala
- Published
- 2012
23. Empirical advances with text mining of electronic health records.
- Author
-
Delespierre, T., Denormandie, P., Bar-Hen, A., and Josseran, L.
- Subjects
- *
MEDICAL records , *DATA mining , *MACHINE learning , *ONLINE data processing , *BIG data , *COMPARATIVE studies , *RESEARCH methodology , *MEDICAL quality control , *MEDICAL cooperation , *NURSING care facilities , *PHYSICAL therapy , *RESEARCH , *EVALUATION research - Abstract
Background: Korian is a private group specializing in medical accommodations for elderly and dependent people. A professional data warehouse (DWH) established in 2010 hosts all of the residents' data. Inside this information system (IS), clinical narratives (CNs) were used only by medical staff as a residents' care linking tool. The objective of this study was to show that, through qualitative and quantitative textual analysis of a relatively small physiotherapy and well-defined CN sample, it was possible to build a physiotherapy corpus and, through this process, generate a new body of knowledge by adding relevant information to describe the residents' care and lives.Methods: Meaningful words were extracted through Standard Query Language (SQL) with the LIKE function and wildcards to perform pattern matching, followed by text mining and a word cloud using R® packages. Another step involved principal components and multiple correspondence analyses, plus clustering on the same residents' sample as well as on other health data using a health model measuring the residents' care level needs.Results: By combining these techniques, physiotherapy treatments could be characterized by a list of constructed keywords, and the residents' health characteristics were built. Feeding defects or health outlier groups could be detected, physiotherapy residents' data and their health data were matched, and differences in health situations showed qualitative and quantitative differences in physiotherapy narratives.Conclusions: This textual experiment using a textual process in two stages showed that text mining and data mining techniques provide convenient tools to improve residents' health and quality of care by adding new, simple, useable data to the electronic health record (EHR). When used with a normalized physiotherapy problem list, text mining through information extraction (IE), named entity recognition (NER) and data mining (DM) can provide a real advantage to describe health care, adding new medical material and helping to integrate the EHR system into the health staff work environment. [ABSTRACT FROM AUTHOR]- Published
- 2017
- Full Text
- View/download PDF
24. POSSIBILITY OF OBTAINING FUNCTIONAL DEPENDENCES FROM DATABASE STRUCTURE.
- Author
-
Grishin, S. I. and Timoshenko, L. N.
- Subjects
- *
FUNCTIONAL dependencies , *DATA structures , *SQL - Abstract
We study the possibility of obtaining functional dependencies from the scheme of the existing database, as well as the data contained in it. Statistical methods for finding dependencies between data were used to generate probability dependencies. Software implementation of the developed algorithm for generating dependencies provides connection to various data providers. Application testing showed that the correct results can be obtained with a sufficiently large amount of data in the source. [ABSTRACT FROM AUTHOR]
- Published
- 2017
25. A study of SQL query processing using soft computing techniques: a hybrid vague logic approach
- Author
-
Yadav, Ramjeet Singh
- Published
- 2019
- Full Text
- View/download PDF
26. Diseño de un procedimiento analítico para el estudio de una línea de productos dentro de una plataforma de comercio electrónico
- Author
-
Vicedo Paya, Pau, Díaz-Madroñero Boluda, Francisco Manuel, Universitat Politècnica de València. Departamento de Organización de Empresas - Departament d'Organització d'Empreses, Universitat Politècnica de València. Escuela Politécnica Superior de Alcoy - Escola Politècnica Superior d'Alcoi, Santamaría Pavlova, Karina, Vicedo Paya, Pau, Díaz-Madroñero Boluda, Francisco Manuel, Universitat Politècnica de València. Departamento de Organización de Empresas - Departament d'Organització d'Empreses, Universitat Politècnica de València. Escuela Politécnica Superior de Alcoy - Escola Politècnica Superior d'Alcoi, and Santamaría Pavlova, Karina
- Abstract
[ES] El uso de herramientas de análisis de datos en sectores como el e-commerce genera un punto de apoyo dentro del planteamiento de estrategias en todas las esferas del negocio. Son muchas las formas de aplicar el Big Data y una de ellas es analizar en profundidad los productos que se ofrecen en una plataforma de comercio electrónico. En este trabajo se realiza una consulta SQL a la base de datos de un comercio y se extrae aquella información necesaria para analizar una línea de productos desde el punto de vista del ciclo de vida del producto y la matriz de BCG (Boston Consulting Group). Se utilizan herramientas analíticas, estadísticas y de visualización de datos con el objetivo de estudiar en profundidad el comportamiento del producto a lo largo del tiempo y conocer en qué punto se encuentra en la actualidad. El propósito del diseño de este método es facilitar la toma de decisiones referentes a estrategias de producto como descatalogar referencias específicas, plantear ofertas o lanzar nuevos productos y también estrategias de operaciones como aprovisionamiento de stocks o selección de proveedores., [EN] The use of data analysis tools in sectors such as e-commerce generates a point of support within the approach of strategies in all spheres of the business. There are many ways to apply Big Data and one of them is to analyse in depth the products offered on an e-commerce platform. In order to set up an analysis procedure, an SQL query is performed on a retailer's database and the necessary information is extracted to analyse a product line from the point of view of the product life cycle and the BCG (Boston Consulting Group) matrix. Analytical, statistical and data visualisation tools are used in order to study in depth the behaviour of the product over time and to find out where it is at the moment. The purpose of the design of this method is to help in the decision making process regarding product strategies such as discontinuing specific references, proposing offers or launching new products; and also operations strategies such as stock procurement or supplier selection.
- Published
- 2021
27. Integration of LADM and CityGML for 3D Cadastre of Turkey
- Author
-
Gürsoy Sürmeneli, Hicret (author), Koeva, Mila (author), Alkan, Mehmet (author), Gürsoy Sürmeneli, Hicret (author), Koeva, Mila (author), and Alkan, Mehmet (author)
- Abstract
Representation of Right, Restriction, and Responsibility (RRR) in the 2D cadastral system falls short due to rapid urbanization causing complex infrastructures. Turkish cadastre, as in many other countries, faces difficulties in the daily recording of property transactions such as sales, donations among others. Therefore, it is highly recommended to represent the RRR in 3D Cadastre. The study elaborates on the current RRR in the cadastral system (2D) in Turkey and is proposing a new integrated data model using international standards as Land Administration Domain Model (LADM) and CityGML v2.0 (City Geography Markup Language). We propose an Application Domain Extension (ADE) that extends the LADM and CityGML data model's integration with the legal and administrative concepts defined in Turkish law for cadastral objects. To show the developed model operability, the data was managed in an open-source PostgreSQL database. This paper provides a detailed overview of the Turkish legal cadastral system with the newly developed integrated LADM and CityGML model providing both visualization and standardization within the scope of 3D cadastre and a proposal for its physical realization based on international standards.
- Published
- 2021
28. Processing SQL queries over encrypted data in the cloud
- Author
-
Rendulić, Josipa and Baranović, Mirta
- Subjects
Database-as-a-service ,Encrypted data ,TEHNIČKE ZNANOSTI. Računarstvo ,cloud computing ,homomorphic encryption ,user defined functions ,Paillierov algoritam ,SQL query ,homomorfno šifriranje ,SQL upit ,TECHNICAL SCIENCES. Computing ,šifriranje sa očuvanjem poretka ,order-preserving encryption ,Paillier algorithm ,CryptDB ,Sigurni sustavi baze podataka ,korisnički definirane funkcije ,šifrirani podatci ,Secure Database Systems ,računarstvo u oblaku - Abstract
Sa sve većim porastom računarstva u oblaku raste i potreba za sigurnim skladištenjem podataka. Postoje mnoga rješenja koja pokušavaju osigurati povjerljivost podataka u oblaku, a jedno od njih je CryptDB. CryptDB je programsko rješenje koje pruža dokazivu i praktičnu privatnost u slučaju kompromitiranog servera baze podataka ili znatiželjnih administratora. Za to koristi šifriranu bazu, posredničkog poslužitelja i korisnički definirane funkcije. U ovom radu obrađena su rješenja koja pokušavaju rješiti isti problem. Zatim je detaljno objašnjen CryptDB i njegove funkcionalnosti, kao i kriptografski algoritmi korišteni za njegovu implementaciju. Za praktični dio rada implementirano je rješenje po uzoru na CryptDB, te su objašnjene glavne značajke rješenja, kao i razlike u odnosu na CryptDB. The constant growth of cloud computing services is also the reason for rising need for safety of the data that is resting there. There are many solutions that try to provide confidentiality of the data in the cloud, one of them being CryptDB. CryptDB is a software solution that gives provides provable and practical privacy in the face of a compromised database server or curious database administrators. The encrypted database, proxy server and user defined functions are characteristics of the solution. This thesis covers related work, then goes in depth on features and cryptographic algorithms in CryptDB. In the practical part solution is implemented inspired by CryptDB. Its main features are explained, as well as main differences with CryptDB.
- Published
- 2021
29. Diseño de un procedimiento analítico para el estudio de una línea de productos dentro de una plataforma de comercio electrónico
- Author
-
Santamaría Pavlova, Karina
- Subjects
Big Data ,Ciclo de vida de un producto ,Consulta SQL ,Análisis de datos ,Data analysis ,Visualización de datos ,Product strategy ,Análisis estadístico ,SQL Query ,Matriz BCG ,Estrategia de operaciones ,Statistical analysis ,Product life cycle ,ORGANIZACION DE EMPRESAS ,BCG matrix ,Operations strategy ,Estrategia de producto ,Máster Universitario en Dirección de Empresas (MBA)-Master Universitario en Dirección de Empresas (MBA) ,Data visualisation - Abstract
[ES] El uso de herramientas de análisis de datos en sectores como el e-commerce genera un punto de apoyo dentro del planteamiento de estrategias en todas las esferas del negocio. Son muchas las formas de aplicar el Big Data y una de ellas es analizar en profundidad los productos que se ofrecen en una plataforma de comercio electrónico. En este trabajo se realiza una consulta SQL a la base de datos de un comercio y se extrae aquella información necesaria para analizar una línea de productos desde el punto de vista del ciclo de vida del producto y la matriz de BCG (Boston Consulting Group). Se utilizan herramientas analíticas, estadísticas y de visualización de datos con el objetivo de estudiar en profundidad el comportamiento del producto a lo largo del tiempo y conocer en qué punto se encuentra en la actualidad. El propósito del diseño de este método es facilitar la toma de decisiones referentes a estrategias de producto como descatalogar referencias específicas, plantear ofertas o lanzar nuevos productos y también estrategias de operaciones como aprovisionamiento de stocks o selección de proveedores., [EN] The use of data analysis tools in sectors such as e-commerce generates a point of support within the approach of strategies in all spheres of the business. There are many ways to apply Big Data and one of them is to analyse in depth the products offered on an e-commerce platform. In order to set up an analysis procedure, an SQL query is performed on a retailer's database and the necessary information is extracted to analyse a product line from the point of view of the product life cycle and the BCG (Boston Consulting Group) matrix. Analytical, statistical and data visualisation tools are used in order to study in depth the behaviour of the product over time and to find out where it is at the moment. The purpose of the design of this method is to help in the decision making process regarding product strategies such as discontinuing specific references, proposing offers or launching new products; and also operations strategies such as stock procurement or supplier selection.
- Published
- 2021
30. Research and analysis of the effectiveness of funds optimize SQL queries in PostgreSQL DBMS
- Subjects
sql запÑоÑÑ ,postgresql ,databases ,опÑимизаÑÐ¸Ñ Ð·Ð°Ð¿ÑоÑов ,меÑÐ¾Ð´Ñ Ð¾Ð¿ÑимизаÑии ,optimization methods ,Ð±Ð°Ð·Ñ Ð´Ð°Ð½Ð½ÑÑ ,sql query ,query optimization - Abstract
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐÑÑледование и анализ ÑÑÑекÑивноÑÑи ÑÑедÑÑв опÑимизаÑии SQL запÑоÑов в СУÐÐ PostgreSQL». Рданной ÑабоÑе бÑли ÑаÑÑмоÑÑÐµÐ½Ñ ÑазлиÑнÑе ÑÑедÑÑва опÑимизаÑии SQL запÑоÑов и обоÑнование Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ÑÑи пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¼ÐµÑодов опÑимизаÑии. Ð ÑезÑлÑÑаÑе иÑÑледований доÑÑÑпнÑÑ Ð¼ÐµÑодов опÑимизаÑии, ÑÑоÑмÑлиÑÐ¾Ð²Ð°Ð½Ñ Ð¸Ñ Ð´Ð¾ÑÑоинÑÑв и недоÑÑаÑки. Ðа оÑнове иÑÑледований клаÑÑиÑеÑÐºÐ¸Ñ Ð¼ÐµÑодов опÑимизаÑии бÑли пÑÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ñ Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ Ð¾Ð¿ÑимизаÑии. ÐÑл пÑоведен анализ Ð¸Ñ ÑÑÑекÑивноÑÑи по ÑÑÐ°Ð²Ð½ÐµÐ½Ð¸Ñ Ñ ÐºÐ»Ð°ÑÑиÑеÑкими меÑодами опÑимизаÑии на пÑимеÑе демо-веÑÑии баз даннÑÑ Ð°Ð²Ð¸Ð°Ð¿ÐµÑевозок. Ðа оÑнове полÑÑеннÑÑ ÑезÑлÑÑаÑов бÑла пÑедложена меÑодика по опÑимизаÑии SQL запÑоÑов в СУÐÐ PostgreSQL., The subject of the final qualification work: "Research and analysis of the effectiveness of optimization tools for SQL queries in PostgreSQL DBMS". In this paper, various tools for optimizing SQL queries were considered and the rationale for the need to apply optimization methods. As a result of studies of available optimization methods, their advantages and disadvantages are formulated. On the basis of studies of classical optimization methods, paired optimization methods were proposed. An analysis of their effectiveness was carried out in comparison with classical optimization methods using the example of a demo version of air transportation databases. Based on the results obtained, a technique was proposed for optimizing SQL queries in the PostgreSQL DBMS.
- Published
- 2021
- Full Text
- View/download PDF
31. A new tool for ETL process.
- Author
-
Chen, Zuyi and Zhao, Taixiang
- Abstract
The data warehouse has increasingly become a focus of the database industry. A data warehouse is a collection of data from different sources that supports analytical querying. It constitutes the background to enable business intelligence solutions. In order to supply a decisional database, meta-data is needed to enable the communication between various function areas of the warehouse and an ETL (Extraction, Transformation, and Load) tool is needed to define the warehousing process. In this paper, we will use a model to create an active ETL tool. In our approach, we use queries to achieve the warehousing process. SQL queries will be used to represent the mapping between the source and the target data. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
32. Employing finite-state machines in data integrity problems
- Author
-
Malikov Andrey, Voronkin Vladimir, and Shiryaev Nikolay
- Subjects
database ,integrity ,finite-state machine ,finite-state automaton ,directed graph ,SQL query ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
This paper explores the issue of group integrity of tuple subsets regarding corporate integrity constraints in relational databases. A solution may be found by applying the finite-state machine theory to guarantee group integrity of data. We present a practical guide to coding such an automaton. After creating SQL queries to manipulate data and control its integrity for real data domains, we study the issue of query performance, determine the level of transaction isolation, and generate query plans.
- Published
- 2016
- Full Text
- View/download PDF
33. Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks.
- Author
-
Natarajan, Kanchana and Subramani, Sarala
- Subjects
SQL ,COMPUTER algorithms ,CYBERTERRORISM ,COMPUTER security ,DATABASES ,WEB-based user interfaces - Abstract
Abstract: Security and privacy of database-driven web applications are extremely multifaceted against web intruders. One of the most dangerous cyber attacks is the SQL-injection attack, which simply creates huge loss to commercial vendors. Research deliberates to provide SQL-injection free (SQL-IF) secure algorithm to detect and prevent SQL-injection attacks (SQLIAs). In this paper, we have re-addressed several detection methods to conflict against the proposed SQL-IF secure algorithm. The generated algorithm has been integrated into the runtime environment while the implementation has been done through Java. The algorithm describes the method that how we follow the procedures for preventing SQL-injection attacks. We presented the SQL-IF secure algorithm and logic of the generated code. Comparison of similar types of attack along with different features is performed. The empirical results and its evaluation prove that the algorithm works efficiently to detect the SQLIAs. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
34. Salary Management System for Small and Medium-sized Enterprises.
- Author
-
Hao, Zhang, Guangli, Xu, Yuhuan, Zhang, and Yilong, Lei
- Subjects
SMALL business ,WAGES ,DATA analysis ,DATABASE management ,PERSONNEL management ,SYSTEM analysis - Abstract
Abstract: Small and Medium-sized Enterprises (SMEs) in the process of wage entry, calculation, the total number are needed to be done manually in the past, the data volume is quite large, processing speed is low, and it is easy to make error, which is resulting in low efficiency. The main purpose of writing this paper is to present the basis of salary management system, establish a scientific database, the computer payroll system, using the computer instead of a lot of past manual work in order to reduce duplication of staff labor, it will improve working efficiency.This system combines the actual needs of SMEs, through in-depth study and practice of the C/S mode, PowerBuilder10.0 development tools, databases and SQL language, Completed a payroll system needs analysis, database design, application design and development work. Wages, departments, units and personnel database file are included in this system, and have data management, department management, personnel management and other functions, through the control and management of the database query, add, delete, modify, and other functions can be realized. This system is reasonable design, a more complete function, stable operation has been tested to meet the basic needs of the work. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
35. A novel method for SQL injection attack detection based on removing SQL query attribute values
- Author
-
Lee, Inyong, Jeong, Soonki, Yeo, Sangsoo, and Moon, Jongsub
- Subjects
- *
SQL , *CYBERTERRORISM , *QUERYING (Computer science) , *WEBSITES , *DATABASE security , *INFORMATION technology security - Abstract
Abstract: SQL injection or SQL insertion attack is a code injection technique that exploits a security vulnerability occurring in the database layer of an application and a service. This is most often found within web pages with dynamic content. This paper proposes a very simple and effective detection method for SQL injection attacks. The method removes the value of an SQL query attribute of web pages when parameters are submitted and then compares it with a predetermined one. This method uses combined static and dynamic analysis. The experiments show that the proposed method is very effective and simple than any other methods. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
36. Empirical advances with text mining of electronic health records
- Author
-
Avner Bar-Hen, Loïc Josseran, Tiba Delespierre, and P. Denormandie
- Subjects
Male ,SQL ,020205 medical informatics ,Information extraction ,Text mining ,Computer science ,Problem list ,Principal component analysis ,Nursing homes ,Health Informatics ,02 engineering and technology ,computer.software_genre ,Health informatics ,Hierarchical clustering ,Body of knowledge ,03 medical and health sciences ,0302 clinical medicine ,Multiple component analysis ,Health care ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Data Mining ,Electronic Health Records ,Humans ,030212 general & internal medicine ,Word cloud ,Physical Therapy Modalities ,computer.programming_language ,Quality of Health Care ,Aged, 80 and over ,business.industry ,Health Policy ,SQL query ,Data science ,Data warehouse ,Computer Science Applications ,Named entity recognition ,Female ,business ,computer ,Research Article - Abstract
Background Korian is a private group specializing in medical accommodations for elderly and dependent people. A professional data warehouse (DWH) established in 2010 hosts all of the residents’ data. Inside this information system (IS), clinical narratives (CNs) were used only by medical staff as a residents’ care linking tool. The objective of this study was to show that, through qualitative and quantitative textual analysis of a relatively small physiotherapy and well-defined CN sample, it was possible to build a physiotherapy corpus and, through this process, generate a new body of knowledge by adding relevant information to describe the residents’ care and lives. Methods Meaningful words were extracted through Standard Query Language (SQL) with the LIKE function and wildcards to perform pattern matching, followed by text mining and a word cloud using R® packages. Another step involved principal components and multiple correspondence analyses, plus clustering on the same residents’ sample as well as on other health data using a health model measuring the residents’ care level needs. Results By combining these techniques, physiotherapy treatments could be characterized by a list of constructed keywords, and the residents’ health characteristics were built. Feeding defects or health outlier groups could be detected, physiotherapy residents’ data and their health data were matched, and differences in health situations showed qualitative and quantitative differences in physiotherapy narratives. Conclusions This textual experiment using a textual process in two stages showed that text mining and data mining techniques provide convenient tools to improve residents’ health and quality of care by adding new, simple, useable data to the electronic health record (EHR). When used with a normalized physiotherapy problem list, text mining through information extraction (IE), named entity recognition (NER) and data mining (DM) can provide a real advantage to describe health care, adding new medical material and helping to integrate the EHR system into the health staff work environment. Electronic supplementary material The online version of this article (doi:10.1186/s12911-017-0519-0) contains supplementary material, which is available to authorized users.
- Published
- 2017
37. SPATE: Compacting and exploring telco big data
- Author
-
Costa, Constantinos, Chatzimilioudis, Georgios, Zeinalipour-Yazdi, Constantinos D., Mokbel, M. F., and Zeinalipour-Yazdi, Constantinos D. [0000-0002-8388-1549]
- Subjects
SQL ,Database ,business.industry ,Computer science ,Digital storage ,Data exploration ,Storage structures ,Full resolutions ,Big data ,Search engine indexing ,Lossless data compression ,SQL query ,computer.software_genre ,Visual modes ,Spatio-temporal data ,Visualization ,Information engineering ,Schema (psychology) ,business ,Storage spaces ,computer ,computer.programming_language - Abstract
In this demonstration paper, we present SPATE, an innovative telco big data exploration framework whose objectives are two-fold: (i) minimizing the storage space needed to incrementally retain data over time and (ii) minimizing the response time for spatiotemporal data exploration queries over stored data. Our framework deploys lossless data compression to ingest streams of telco big data in the most compact manner retaining full resolution for data exploration tasks. We augment our storage structures with decaying principles that lead to the progressive loss of detail as information gets older. Our framework also includes visual and declarative interfaces for a variety of telco-specific data exploration tasks. We demonstrate SPATE in two modes: (i) Visual Mode, where attendees will be able to interactively explore synthetic telco traces we will provide and (ii) SQL Mode, where attendees can submit custom SQL queries based on a provided schema. © 2017 IEEE. 1419 1420 Sponsors: Conference code: 127836
- Published
- 2017
38. Usage of open source database Firebird
- Author
-
Hrovat, Blaž and Verber, Domen
- Subjects
Database ,podatkovna baza ,udc:004.65:004.451(043.2) ,SQL poizvedba ,Optimizer ,SQL query ,optimizator ,Firebird - Abstract
Pogosto nam je za hranjenje podatkov tako v poslovnem kot zasebnem prostoru težko nameniti nekaj denarja za podatkovno bazo. Ker je sedaj čedalje več vsebin dostopnih preko interneta zastonj, si želimo, da bi bilo tako tudi pri hranjenju podatkov. Pri svojem delu sem se tako osredotočil na odprtokodno podatkovno bazo Firebird. Preučili smo povezljivost s podatkovno bazo Firebird, jo primerjali z zastonjskimi podatkovnimi bazami MS SQL Express in PostgreSQL. Opisali specifične lastnosti podatkovne baze Firebird, kot so čiščenje podatkovne baze in dodeljevanje prostora delo s podatki. Prikazali smo tudi optimizacijo podatkovne baze Firebird. It is often difficult for people to invest money into database for the purpose of saving data, whether it is for business or private purposes. There is a lot of free software available on the internet nowadays, and people would like to have the same for saving data. This thesis will examine the open source Firebird database. The compatibility with Firebird database has been examined, and compared to free databases MS SQL Express and PostgreSQL. The thesis provides a description of specific characteristics of Firebird database, such as database cleansing and allocating the space for data processing. The thesis also explains the optimization of Firebird database.
- Published
- 2016
39. Employing finite-state machines in data integrity problems
- Author
-
Andrey Malikov, Vladimir Voronkin, and Nikolay Shiryaev
- Subjects
SQL ,Theoretical computer science ,Finite-state machine ,Relational database ,Computer science ,Data domain ,finite-state automaton ,InformationSystems_DATABASEMANAGEMENT ,SQL query ,computer.software_genre ,Query optimization ,directed graph ,lcsh:TA1-2040 ,Data integrity ,integrity ,finite-state machine ,Sargable ,Query by Example ,Data mining ,lcsh:Engineering (General). Civil engineering (General) ,computer ,database ,computer.programming_language - Abstract
This paper explores the issue of group integrity of tuple subsets regarding corporate integrity constraints in relational databases. A solution may be found by applying the finite-state machine theory to guarantee group integrity of data. We present a practical guide to coding such an automaton. After creating SQL queries to manipulate data and control its integrity for real data domains, we study the issue of query performance, determine the level of transaction isolation, and generate query plans.
- Published
- 2016
40. Salary Management System for Small and Medium-sized Enterprises
- Author
-
Zhang Hao, Zhang Yuhuan, Xu Guangli, and Lei Yilong
- Subjects
SQL ,Computer science ,business.industry ,Data management ,Control (management) ,Physics and Astronomy(all) ,SQL query ,payroll ,Database design ,Engineering management ,Powerbuilder ,Payroll ,Human resource management ,Management system ,C/S mode ,Salary ,business ,computer ,computer.programming_language - Abstract
Small and Medium-sized Enterprises (SMEs) in the process of wage entry, calculation, the total number are needed to be done manually in the past, the data volume is quite large, processing speed is low, and it is easy to make error, which is resulting in low efficiency. The main purpose of writing this paper is to present the basis of salary management system, establish a scientific database, the computer payroll system, using the computer instead of a lot of past manual work in order to reduce duplication of staff labor, it will improve working efficiency.This system combines the actual needs of SMEs, through in-depth study and practice of the C/S mode, PowerBuilder10.0 development tools, databases and SQL language, Completed a payroll system needs analysis, database design, application design and development work. Wages, departments, units and personnel database file are included in this system, and have data management, department management, personnel management and other functions, through the control and management of the database query, add, delete, modify, and other functions can be realized. This system is reasonable design, a more complete function, stable operation has been tested to meet the basic needs of the work.
- Published
- 2012
41. Primerjava hitrosti delovanja sistemov za upravljanje podatkovnih baz
- Author
-
Maleš, Uroš and Rupnik, Rok
- Subjects
računalništvo ,visokošolski strokovni študij ,SUPB ,computer science ,SQL query ,MSSQL ,Windows server 2008 ,PostgreSQL ,diploma ,diplomske naloge ,udc:004.65(043.2) ,MySQL ,IBM DB2 ,RDBMS ,Oracle ,poizvedbe SQL - Published
- 2014
42. RECOMMENDATIONS FOR WRITING SQL QUERIES
- Author
-
Janc, Petra and Welzer-Družovec, Tatjana
- Subjects
SQL povpraševanje ,SQL clauses ,SQL Query optimization ,udc:004.65(043.2) ,optimizacija SQL povpraševanj ,SQL Query ,SQL stavki - Abstract
Diplomsko delo opisuje SQL povpraševanja, oziroma napotke, kako ta povpraševanja približati optimizaciji. Bralca vodi od začetka pisanja in predstavitve posameznih SQL stavkov vse do pisanja optimiziranih SQL povpraševanj. Ob tem bralcu predstavi priporočila in metode za dosego le-teh, poleg tega pa mu predstavi še proces same optimizacije. Prav tako mu prikaže posamezne korake optimizacije povpraševanj, tako da jih bralec lahko tudi sam zapiše. Z diplomskim delom želimo ugotoviti, kaj je bistveno pri pisanju SQL povpraševanj za dosego hitro se izvajajočega povpraševanja, ki porabi čim manj vira podatkov. This thesis describes SQL Queries and advices how to optimized them. The reader is guided through from the beginning of writing SQL clauses to writing optimized SQL queries. By this the reader learn the recommendations and methods to make them optimized. He is also introduced into the steps of SQL query optimization and he can try to write them by himself. The objective of this thesis is to learn what is important to make SQL queries execute faster and use as few data as possible.
- Published
- 2012
43. SQL mokymosi sistema
- Author
-
Čebanauskas, Saulius, Drąsutis, Sigitas, Butleris, Rimantas, Žilevičius, Vilius, Lenkevičius, Antanas, Matickas, Jonas Kazimieras, Paradauskas, Bronius, Rėklaitis, Vytautas, Rubliauskas, Dalius, Rutkauskienė, Danguolė, Mamčenko, Jelena, Targamadzė, Aleksandras, and Kaunas University of Technology
- Subjects
Informatics ,SQL vykdymo algoritmai ,SQL užklausos ,InformationSystems_DATABASEMANAGEMENT ,SQL mokymosi sistema ,SQL query ,Algorythm of SQL query executing ,SQL learning system - Abstract
Šiais laikais, kai praktiškai visų sričių „popieriniai“ duomenys jau baigia išnykti, didelę dalį IT visuomenėje sudaro vienokio ar kitokio tipo duomenų bazės. Paprastam vartotojui, kuris naudojasi tik vartojamojo tipo programomis, SQL užklausų mokėjimas nėra reikalingas, tačiau bet kuris programuotojas, kuris dirba su duomenimis, savo darbo ko gero nebeįsivaizduoja be duomenų bazių ir SQL užklausų. SQL užklausa (SQL Query) – tai užklausa, atliekama SQL kalbos komandų pagalba. SQL (Structured Query Language) kalba – struktūrizuota užklausų kalba, skirta duomenų, esančių duomenų bazėje apdorojimui. SQL kalba dirba tik su reliacinėmis DB. Vartotojas SQL pagalba kreipiasi į DBVS, kuri apdoroja užklausą, randa reikalingus duomenis ir pateikia juos vartotojui. SQL nėra nei DBVS, nei atskiras programinis produktas, tai yra neatsiejama DBVS dalis, instrumentas, kurio pagalba realizuojamas vartotojo ryšys su DBVS. SQL kalbos lankstumas ir nepriklausomumas nuo kompiuterinių technologijų specifikos, o taip pat jos palaikymas pagrindiniais lyderiais reliacinių duomenų bazių technologijų srityje padarė SQL kalbą pagrindine standartine duomenų bazių programavimo kalba [1]. SQL užklausos yra naudojamos visose dabartinėse duomenų bazėse, tokiose kaip MsSQL, MySQL, Firebird ir kitose. SQL sakiniai gali būti įterpiami į programas, sudaromas bazine programavimo kalba. Taigi SQL užklausos yra naudojamos visur, kur yra naudojamos ir duomenų bazės. Tą pačią SQL užklausą... [toliau žr. visą tekstą] Nowadays, when “paper” data practically from all the scopes is on the edge of extinction, big part of IT society is made of one or another type of databases. SQL queries are used to work with database information. SQL (Structured Query Language) is designed for database information processing. For fast systems, related with databases operation, it is necessary to correctly write and optimize SQL queries. To learn write SQL queries correctly and optimize them, only the theoretical knowledge is not enough, it is necessary to do a lot of practical tasks. When learning to write SQL queries, basic problem is poor choice of practical tasks, and non-existence of good testing system, which allows writing SQL queries easily. On the job the existent SQL learning systems and learning materials analysis were performed, all found systems has its own problems, full freedom to write SQL queries for user is not granted. During designing, methods allowing for learner easily write various types of queries, view executed queries results and get the result if a written query is correct, were designed. Designed methods were used in remote SQL queries learning system design and implementation. Aim: The algorithms which are developed and implemented allows to test sql queries based on simple syntax and allows to execute queries of the different types. The object of research: Execution of various SQL queries.
- Published
- 2010
44. Návrh a realizace projektu pro podporu výzkumného grantu: Dopravní obslužnost a technologie ve vztahu k regionálnímu rozvoji
- Author
-
Urban, Jiří and Urban, Jiří
- Abstract
Cílem této práce je vytvořit databázi pro aplikaci zobrazující na mapě intenzitu autobusové dopravy ve Zlínském kraji. Teoretická část práce vysvětluje základní pojmy z oblasti data-báze a jazyka SQL. Dále se tato část zabývá SQL Serverem na kterém je vystavěna databá-ze. Praktická část popisuje strukturu databáze a jednotlivý význam tabulek v ní umístěných. Popsány jsou zde SQL algoritmy, které jsou základem pro získávání dat z databáze., The aim of this work is to create a database for application showing the bus traffic intensity on the map of Zlin locality. The theoretic part explains basic notation of databases and SQL language. Furthemore, it contains SQL server, where the complete database is built. The practical part explains the structure of the database and the meaning of the tables placed in this database. The SQL algorithms, which are crucial for a data acquisition, are described., Ústav aplikované informatiky, obhájeno
- Published
- 2010
45. Army Non-Programmer System for Working Encyclopedia Request (ANSWER)
- Author
-
ARMY INST FOR RESEARCH IN MANAGEMENT INFORMATION COMMUNICATIONS AND COMPUTER SCIENCES ATLANTA GA, Richardson, Jim, ARMY INST FOR RESEARCH IN MANAGEMENT INFORMATION COMMUNICATIONS AND COMPUTER SCIENCES ATLANTA GA, and Richardson, Jim
- Abstract
This report details the research efforts into the access of distributed heterogeneous database through an encyclopedia facility. Specifically, several data management tools have been prototyped and are described.... Heterogeneous Databases, Distributed Processing, SQL Query, Data Management, Schema Integration
- Published
- 1992
46. Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks
- Author
-
Kanchana Natarajan and Sarala Subramani
- Subjects
Java ,Computer science ,business.industry ,Data_MISCELLANEOUS ,Runtime environment ,SQL-injection attack ,SQL query ,Computer security ,computer.software_genre ,SQL injection ,Dynamic method ,Code (cryptography) ,General Earth and Planetary Sciences ,Web application ,business ,SQL-injection free algorithm ,Algorithm ,computer ,AND gate ,General Environmental Science ,computer.programming_language - Abstract
Security and privacy of database-driven web applications are extremely multifaceted against web intruders. One of the most dangerous cyber attacks is the SQL-injection attack, which simply creates huge loss to commercial vendors. Research deliberates to provide SQL-injection free (SQL-IF) secure algorithm to detect and prevent SQL-injection attacks (SQLIAs). In this paper, we have re-addressed several detection methods to conflict against the proposed SQL-IF secure algorithm. The generated algorithm has been integrated into the runtime environment while the implementation has been done through Java. The algorithm describes the method that how we follow the procedures for preventing SQL-injection attacks. We presented the SQL-IF secure algorithm and logic of the generated code. Comparison of similar types of attack along with different features is performed. The empirical results and its evaluation prove that the algorithm works efficiently to detect the SQLIAs.
- Full Text
- View/download PDF
47. Optimalizace strukturovaných dotazů nad rozsáhlými databázemi
- Author
-
Burget, Radek, Šebek, Michal, Janeček, Jiří, Burget, Radek, Šebek, Michal, and Janeček, Jiří
- Abstract
Tato diplomová práce se zabývá optimalizací strukturovaných dotazů nad rozsáhlými databázemi. Principy těchto optimalizací jsou později využity při tvorbě aplikace, která umožňuje vyhledávání nad jednou konkrétní rozsáhlou databází. Současně tato práce porovnává efektivitu nově navržených konstrukcí SQL v porovnání s konstrukcemi neoptimalizovanými., This master's thesis deals with optimization of structured queries on large databases. Principles of these optimizations are used during creation of application, which allows finding over one specific large database. At the same time this thesis compares efficiency between the new designed SQL constructions and the not optimized SQL constructions.
48. Optimalizace strukturovaných dotazů nad rozsáhlými databázemi
- Author
-
Burget, Radek, Šebek, Michal, Burget, Radek, and Šebek, Michal
- Abstract
Tato diplomová práce se zabývá optimalizací strukturovaných dotazů nad rozsáhlými databázemi. Principy těchto optimalizací jsou později využity při tvorbě aplikace, která umožňuje vyhledávání nad jednou konkrétní rozsáhlou databází. Současně tato práce porovnává efektivitu nově navržených konstrukcí SQL v porovnání s konstrukcemi neoptimalizovanými., This master's thesis deals with optimization of structured queries on large databases. Principles of these optimizations are used during creation of application, which allows finding over one specific large database. At the same time this thesis compares efficiency between the new designed SQL constructions and the not optimized SQL constructions.
49. Optimalizace strukturovaných dotazů nad rozsáhlými databázemi
- Author
-
Burget, Radek, Šebek, Michal, Burget, Radek, and Šebek, Michal
- Abstract
Tato diplomová práce se zabývá optimalizací strukturovaných dotazů nad rozsáhlými databázemi. Principy těchto optimalizací jsou později využity při tvorbě aplikace, která umožňuje vyhledávání nad jednou konkrétní rozsáhlou databází. Současně tato práce porovnává efektivitu nově navržených konstrukcí SQL v porovnání s konstrukcemi neoptimalizovanými., This master's thesis deals with optimization of structured queries on large databases. Principles of these optimizations are used during creation of application, which allows finding over one specific large database. At the same time this thesis compares efficiency between the new designed SQL constructions and the not optimized SQL constructions.
50. Optimalizace strukturovaných dotazů nad rozsáhlými databázemi
- Author
-
Burget, Radek, Šebek, Michal, Burget, Radek, and Šebek, Michal
- Abstract
Tato diplomová práce se zabývá optimalizací strukturovaných dotazů nad rozsáhlými databázemi. Principy těchto optimalizací jsou později využity při tvorbě aplikace, která umožňuje vyhledávání nad jednou konkrétní rozsáhlou databází. Současně tato práce porovnává efektivitu nově navržených konstrukcí SQL v porovnání s konstrukcemi neoptimalizovanými., This master's thesis deals with optimization of structured queries on large databases. Principles of these optimizations are used during creation of application, which allows finding over one specific large database. At the same time this thesis compares efficiency between the new designed SQL constructions and the not optimized SQL constructions.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.