Research of Information Extraction from SQL Server Based on SQL-DMO

被引:0
|
作者
Zheng, Wei [1 ]
Wu, Yaping [2 ]
Chen, Yaofei [3 ]
机构
[1] Zhejiang Radio & Tv Univ, Hangzhou 310030, Zhejiang, Peoples R China
[2] Shaoxing Univ, Shaoxing, Peoples R China
[3] Jinhua Polytechn, Jinhua 321007, Peoples R China
来源
关键词
Information Extraction; SQL-DMO; SQL Server; Skill Assessment;
D O I
10.4028/www.scientific.net/AMR.468-471.278
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article describes the SQL Server object model SQL-DMO. Through the object model all information of SQL Server's internal objects can be obtained, including databases, data tables, stored procedures and triggers and so on. Analysis the method of the object's information extraction. Get the child object by analyzing the parent object's collection property and get internal information by analyzing the object's properties. A visual basic procedure is designed to achieve the table's structure information for all user tables in specified SQL Server database. This method is more complete and simple than the method based on system table.
引用
收藏
页码:2878 / +
页数:2
相关论文
共 50 条
  • [41] Constitution of database on data sets for prediction of protein secondary structures based on SQL server
    College of Life Science, Nankai University, Tianjin 300071, China
    Gaojishu Tongxin, 2006, 6 (619-623):
  • [42] Scalable Micro-Service based Approach to FHIR Server with Golang and No-SQL
    Shoumik, Fahim Shariar
    Talukder, Md. Ibna Masum Millar
    Jami, Ahmed Imtiaz
    Protik, Neeaz Wahed
    Hoque, Md. Moinul
    2017 20TH INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2017,
  • [43] Low-cost Micro Condition Monitoring System Based on LabVIEW and SQL Server
    Jia, Zhizhou
    Guo, Yu
    Fan, Yajun
    FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2013, 8784
  • [44] Research and Implementation of SQL Injection Prevention Method Based on ISR
    Chen Ping
    Wang Jinshuang
    Pan Lin
    Yu Han
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1153 - 1156
  • [45] Research on SQL Injection Defense Technology Based on Deep Learning
    Shi, Weiyu
    Liu, Xiaoqian
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 538 - 549
  • [46] The Research of Detecting SQL Injection Based on the Connectivity with Its Behavior
    Wang, Hao
    Wang, Jinsong
    Zhang, Jian
    Lin, Sheng
    Xia, Chengyi
    FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 501 - 508
  • [47] Research on penetration test of the SQL injection based on the formalization model
    Chen Ping
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, NETWORK AND COMPUTER ENGINEERING (ICENCE 2016), 2016, 67 : 670 - 673
  • [48] Information Extraction for SQL Query Generation in the Conversation-Based Interfaces to Relational Databases (C-BIRD)
    Owda, Majdi
    Bandar, Zuhair
    Crockett, Keeley
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, 2011, 6682 : 44 - 53
  • [49] SQL server everywhere: Just another database? Developer focused from start to finish
    Jewett, Mark
    Lasker, Steve
    Swigart, Scott
    DR DOBBS JOURNAL, 2006, 31 (12): : 24 - +
  • [50] Investigating the Suitability of a .NET/SQL Server Approach for Developing a Remotely Accessible Information System for Vehicle Inspectors
    Kumar, Justin
    Chaczko, Zenon
    Moulton, Bruce
    Mahadevan, Venkatesh
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 136 - 140