Results 131 to 140 of about 243,074 (259)
Development of a relational database management system
The studies of Relational Data Base Management Systems and Databases constitute nowadays a main tren of investigation in large businesses and universities of the entire world.
Anabel Natalia Ruiz +2 more
doaj
GEMMA-SQL: A Novel Text-to-SQL Model Based on Large Language Models
Text-to-SQL systems enable users to interact with structured databases using natural language, eliminating the need for specialized programming knowledge.
Hari Mohan Pandey +5 more
doaj +1 more source
Forensic detection of medical image manipulation using PACS and DICOM artifacts
Abstract With the digitization of medical information, illegal activities such as medical crimes and insurance fraud through tampering have increased. Medical images are particularly vulnerable due to their nature as soft copies and their transmission over networks.
Sojung Oh +5 more
wiley +1 more source
This study found that 3xTg‐AD mice exhibited lifelong reductions in circulating choline. Female 3xTg‐AD mice showed greater AD‐like pathology, whereas males displayed higher mortality, impulsivity, and water‐seeking behavior. These sex‐specific differences suggest distinct metabolic and behavioral vulnerabilities contributing to AD progression in this ...
Jessica M. Judd +5 more
wiley +1 more source
Practical Graph Structures in SQL Server and Azure SQL [PDF]
Louis Davidson
openalex +1 more source
ABSTRACT Background Efforts to identify barriers and improve access to kidney transplantation in the United States are limited by a lack of population‐level data on early steps in the transplant evaluation process. Methods We used a rule‐based natural language processing (NLP) approach with clinical notes in the US Veterans Affairs Healthcare System ...
Hannah Eyre +9 more
wiley +1 more source
Penetration test method using blind SQL injection based on second-order fragment and reassembly
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL ...
De-guang LE +4 more
doaj +2 more sources
A General System Design and Implementation of SQL Injection Precaution [PDF]
Xin Fang, Wei Zhi Fang
openalex +1 more source
Dr.Spider: A Diagnostic Evaluation Benchmark towards Text-to-SQL Robustness [PDF]
Shuaichen Chang +15 more
openalex +1 more source
ABSTRACT The article describes and reflects the development of a coherent interdisciplinary collection database management system of a large natural history museum. The internal and external requirements were analyzed and informed the technical development of the database. In parallel, staff skills increased and work routines were optimized.
Katrin Vohland
wiley +1 more source

