963 resultados para SQL extension


Relevância:

20.00% 20.00%

Publicador:

Resumo:

[…] Les objectifs de cette étude sont doubles: d’une part, l'auteur s’efforcera de développer un cadre théorique permettant de replacer le problème de la transférabilité du message dans son contexte, c'est-à-dire un processus de communication inter-culturel. D’autre part, l'auteur tentera de comparer expérimentalement l'efficacité d'un message transféré d'un environnement culturel donné (A) vers un autre environnement culturel (B), et celle d'un message adapté à l'environnement culturel (B). Le problème de la sélection des media, qui fait partie intégrante de la définition d'une campagne publicitaire sera volontairement laissé de côté. […]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we extend recent results of Fiorini et al. on the extension complexity of the cut polytope and related polyhedra. We first describe a lifting argument to show exponential extension complexity for a number of NP-complete problems including subset-sum and three dimensional matching. We then obtain a relationship between the extension complexity of the cut polytope of a graph and that of its graph minors. Using this we are able to show exponential extension complexity for the cut polytope of a large number of graphs, including those used in quantum information and suspensions of cubic planar graphs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The CQ Cotton Regional Extension project has been a key to the delivery of emerging, cutting edge research information and knowledge to the Central Queensland cotton industry. The direct relevance of southern research to cotton production under the conditions experienced in CQ always has been an issue which could be addressed through regional assessment and adaptation. The project links the national research to the region through development and extension, with a strong focus on the major industry production issues including but not limited to disease, Integrated Pest Management (IPM), soils, nutrition and integrated weed management. Susan Mass has supported the implementation of national industry-wide programs particularly the industry Best Management Practices program (myBMP). This project has successfully transitioned to a focus on delivering national outcomes in target lead areas as part of National Development and Delivery Team established by Cotton CRC, CRDC and Cotton Australia, while maintaining a regional extension presence for Central Queensland cotton & grain farming systems. Susan Mass has very effectively merged and integrated strong regional extension support to cotton growers in Central Queensland with delivery of industry extension priorities across the entire industry in the Development and Delivery Team model. Susan is the target lead for disease and farm hygiene. Recognising the challenges of having regionally relevant research in Central Queensland, this project has facilitated locally based research including boll rot, Bt cotton resistance management, and mealybug biology through strong collaborations. This collaborative approach has included linkage to Department of Environment and Resource Managmeent (DERM) groups and myBMP programs resulting in a high uptake in CQ.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The handling and processing of fish in Uganda has until recently been carried out exclusively by the artisanal fishermen and fish processors. Their operations have left much to be desired as the product is often of low quality 'and its keeping time is limited. The handling of fresh fish has been without refrigeration but with the recent establishment of commercial fish processing plants a cold chain of fish distribution is being set up for domestic and export markets. Some of the fishermen are beginning to ice their catch immediately after reaching the shore. It is hoped that fishmongers will increasingly find it more profitable to market their products iced. This will make fish available to a large sector of the population and in the process there will be reduced post-harvest losses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ce document présente le processus de mise en oeuvre du plan d'aménagement du quartier Parc Extension à Montréal auquel j'ai activement participé. Initiée et planifiée en 2000, la démarche sera couronnée en 2003. L'objectif de cette initiative est de procurer aux intervenants publics, communautaires et privés un outil servant de cadre de référence afin de mieux cerner les priorités et enjeux locaux. Nous croyons qu'un tel outil suscitera l'avènement de partenariats intéressants à court, moyen et long termes, au bénéfice des résidents et résidentes du quartier. Dans un premier temps nous soulignons les caractéristiques spécifiques de Parc Extension afin de mieux saisir l'état de la situation locale. Cette compréhension devrait ensuite être facilitée par la présentation du profil des acteurs du milieu. Ces deux sections permettent au lecteur de se familiariser avec la dynamique présente. Dans un deuxième temps, nous présentons la démarche globale de l'élaboration du plan d'aménagement. Nous verrons tout d'abord l'historique et la description du processus, puis quels sont les objectifs poursuivis. Enfin nous pourrons lire le résumé-synthèse du plan, qui demeure temporaire puisqu'il s'agit d'un document de travail à ce jour. Dans la section suivante, nous approfondissons la démonstration des retombées d'un tel plan en prenant le cas de l'habitation. En effet, nous y verrons quel est le portrait de la situation, quelles instances s'activent en la matière, ce qui se fait présentement et ce qui est proposé pour l'avenir. Le thème de l'habitation illustre concrètement la pertinence d'une concertation dans l'identification des priorités. L'expression de cette concertation se traduit par des consensus menant à des actions et projets sur le terrain. Des résultats intéressants sont obtenus. Nous poursuivons alors avec les aspects théoriques. A cette étape, nous abordons la question de l'évaluation ultérieure dans le futur par la proposition d'indicateurs. Ceux-ci permettraient de mieux cerner les résultats et impacts dans quelques armées. Nous analysons également le potentiel de transférabilité de l'expérience envers d'autres milieux. Finalement, sur une note plus personnelle, je décris mes savoirs faire et savoirs être développés au cours de ce projet. Je tente une auto-analyse de mes points forts et à améliorer. Un résumé critique de l'ensemble de l'expérience vient compléter l'essai. En conclusion, nous rappelons les avantages du plan d'aménagement et un bilan des avancées franchies à ce jour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent to compromise the security of an organisation’s confidential data stored at the back-end database. The database is the most valuable data source, and thus, intruders are unrelenting in constantly evolving new techniques to bypass the signature’s solutions currently provided in Web Application Firewalls (WAF) to mitigate SQLIA. There is therefore a need for an automated scalable methodology in the pre-processing of SQLIA features fit for a supervised learning model. However, obtaining a ready-made scalable dataset that is feature engineered with numerical attributes dataset items to train Artificial Neural Network (ANN) and Machine Leaning (ML) models is a known issue in applying artificial intelligence to effectively address ever evolving novel SQLIA signatures. This proposed approach applies numerical attributes encoding ontology to encode features (both legitimate web requests and SQLIA) to numerical data items as to extract scalable dataset for input to a supervised learning model in moving towards a ML SQLIA detection and prevention model. In numerical attributes encoding of features, the proposed model explores a hybrid of static and dynamic pattern matching by implementing a Non-Deterministic Finite Automaton (NFA). This combined with proxy and SQL parser Application Programming Interface (API) to intercept and parse web requests in transition to the back-end database. In developing a solution to address SQLIA, this model allows processed web requests at the proxy deemed to contain injected query string to be excluded from reaching the target back-end database. This paper is intended for evaluating the performance metrics of a dataset obtained by numerical encoding of features ontology in Microsoft Azure Machine Learning (MAML) studio using Two-Class Support Vector Machines (TCSVM) binary classifier. This methodology then forms the subject of the empirical evaluation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SQL injection is a common attack method used to leverage infor-mation out of a database or to compromise a company’s network. This paper investigates four injection attacks that can be conducted against the PL/SQL engine of Oracle databases, comparing two recent releases (10g, 11g) of Oracle. The results of the experiments showed that both releases of Oracle were vulner-able to injection but that the injection technique often differed in the packages that it could be conducted in.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several synkinesis syndromes have been reported in the literature. Synkinesis syndromes are rare and are most commonly congenital or follow post-traumatic reinnervation. We describe a novel synkinesis syndrome that developed several months after cervical spinal cord infarction due to a herniated disc in a 29-year-old woman. When the patient overstretched the extensor muscles of the right hand, the right upper eyelid raised automatically and nasal congestion developed. We hypothesize that aberrant reinnervation of the intermediolateral columns of the spinal cord at level C8–T2 by motor neurons of the extensor muscles of the hand occurred.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection combined with increasing volumes of web traffic from the Internet of Things (IoT), cloud-hosted and on-premise business applications have made it evident that the existing approaches of mostly static signature lack the ability to cope with novel signatures. A SQLIA detection and prevention solution can be achieved through exploring an alternative bio-inspired supervised learning approach that uses input of labelled dataset of numerical attributes in classifying true positives and negatives. We present in this paper a Numerical Encoding to Tame SQLIA (NETSQLIA) that implements a proof of concept for scalable numerical encoding of features to a dataset attributes with labelled class obtained from deep web traffic analysis. In the numerical attributes encoding: the model leverages proxy in the interception and decryption of web traffic. The intercepted web requests are then assembled for front-end SQL parsing and pattern matching by applying traditional Non-Deterministic Finite Automaton (NFA). This paper is intended for a technique of numerical attributes extraction of any size primed as an input dataset to an Artificial Neural Network (ANN) and statistical Machine Learning (ML) algorithms implemented using Two-Class Averaged Perceptron (TCAP) and Two-Class Logistic Regression (TCLR) respectively. This methodology then forms the subject of the empirical evaluation of the suitability of this model in the accurate classification of both legitimate web requests and SQLIA payloads.