Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Identity column"'
Publikováno v:
Frontiers in Physics, Vol 11 (2023)
In order to address the growing demands for both enhanced security levels and increased transmission capacity, this research proposes a novel approach for free space optical (FSO) transmission. The proposed design incorporates an identity column shif
Externí odkaz:
https://doaj.org/article/6cc422e5481a4bec8e98f0bc2636a97d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ji Ho Shin
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 27:223-232
Publikováno v:
Journal of Basic & Applied Sciences. 13:481-490
Complexity, and Handling of huge data is a crucial target for all management systems. Databases are the backbone, central and core component of a computer application to store data in a logical way, which define the structure and mechanism for manipu
Publikováno v:
Journal of Emerging Technologies in Accounting. 13:195-213
This paper presents the accompanying Teaching Notes for “International AC: An Education Case on Continuous Monitoring SQL Server Data with ODBC-Linked Tables in Microsoft Access.” The purpose of these Teaching Notes is to prepare the faculty memb
Autor:
Rekha K. James, Teresa K. George
Publikováno v:
International Journal of Computer Applications. 143:46-50
injection attacks are often found within the dynamic pages of a web application that exploit the security vulnerability of the database layers of an application. In this attack category a specifically crafted SQL command is entered in the form field
Autor:
Ying Jian Lin
Publikováno v:
Applied Mechanics and Materials. :2217-2220
With the development of ASP.NET platform, ASP.NET architecture system increasingly mature and increasingly wide range of applications, ADO.NET technology to become the key technology of this system, database access, data processing and application de
Publikováno v:
2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN).
A random-like framework of the IRA-LDPC codes based on the identity column vectors (ICV) was defined and created. A new family of the IRA-LDPC codes under the constraint of the framework was investigated using algebraic and random methods. Its struct
Publikováno v:
Advanced Materials Research. :2366-2369
Database technology is one of core technology modules of the computer, mainly including the query of the database, table and database table, safety management, daily management and data transmission, user view and other operation procedures, SQL Serv