Specifying Database Updates Using A Subschema

Size: px
Start display at page:

Download "Specifying Database Updates Using A Subschema"

Transcription

1 Specfyng Database Updates Usng A Subschema Sona Rstć, Pavle Mogn 2, Ivan Luovć 3 Busness College, V. Perća 4, 2000 Nov Sad, Yugoslava sdrstc@uns.ns.ac.yu 2 Vctora Unversty of Wellngton, School of Mathematcal and Computng Scences, P.O. Box 600, Wellngton, New Zealand pmogn@mcs.vuw.ac.nz 3 Unversty of Nov Sad, Faculty of Techncal Scences, Trg D. Obradovća 6, 2000 Nov Sad, Yugoslava van@s.ns.ac.yu Abstract. The noton of a subschema, as a formal and abstract defnton of data, constrants, and database update actvtes that are needed to mae a transacton program, s ntroduced n the paper. Subschema s a component of a transacton program specfcaton. It s desgned usng a user request and an exstng relatonal database schema. The prncples of a database update usng subschema concepts are ntroduced at the abstracton level of nstances to express the fact that a subschema and the correspondng database schema must satsfy certan condtons to allow safe database updates usng a program made n accordance wth subschema concepts. The condtons of the formal subschema and database schema consstency are ntroduced at the schema abstracton level, as well. It s shown that formal consstency mples database update prncples, whch leads to the concluson that a subschema desgn process should adhere to formal consstency condtons f t s to consttute a component of a transacton program specfcaton.. Introducton Specfyng transacton programs s an mportant and tme-consumng methodologcal tas n the process of nformaton system desgn. The desgn specfcaton of a transacton program s a formalzed descrpton of that program. It s amed at supportng the mplementaton of an end user busness tas that s defned by means of a user request. It s usually assumed that the transacton programs wll be executed aganst a database. Accordngly, the basc structural components of a transacton program specfcaton are: A specfcaton of the human-computer nterface; A data defnton; and A formal descrpton of a data processng procedure. In ths paper, the data defnton part of the transacton program specfcaton s called a subschema. A subschema s a formal and abstract defnton of data, constrants, and database update actvtes that are needed to mae a transacton program. A subschema s desgned wth respect to a user request and an exstng relatonal database schema. Accordngly, a subschema descrbes data of a relatvely small part of a database, and conssts of a set of relaton schemes and a set of nterrelaton constrants. Each relaton scheme of a subschema conssts of a set of attrbutes and a set of local constrants. A role and a set of modfable attrbutes, defnng possble database update actvtes, are also assgned to each relaton scheme. Each relaton scheme of a subschema may be consdered as a vew on a sngle base relaton scheme. Subschema nstances are not materalzed. To allow safe database updates usng a program made n accordance wth a subschema, the subschema has to be consstent wth the correspondng database schema n a formal sense. Ths consstency s based on the prncples of a database update usng subschema concepts that are ntroduced n the paper, as well. From an end user pont of vew, usng a transacton program means applyng a sequence of update actvtes on a subschema nstance. The fact that a subschema nstance does not physcally exst has two consequences. These are: A subschema nstance has to be magned as the result of applyng approprate on, select and proect operatons on a database nstance; and The only way to execute a transacton program s to transform the sequence of update actvtes defned over the subschema concepts nto a correspondng sequence of update actvtes defned over the database schema concepts and then apply them on the database nstance.

2 Normally, ths update changes only that part of the database nstance that s related to subschema concepts. An ntutve expectaton s that applyng the on, select and proect operatons on the updated database nstance should produce the same subschema nstance that would be obtaned by drect updatng the ntal subschema nstance. The am of ths paper s to show that t s possble to formulate condtons at schema level of abstracton, by means of whch ths expectaton wll be preserved. We have chosen the concepts of the relatonal data model to defne: the noton of a subschema, the database update prncples, and the formal schema and subschema consstency, snce we needed ts powerful mathematcal formalsm to express our deas and solutons n a precse way. But we beleve that our results may be appled to other data models, too. The noton of the formal consstency s defned n the paper. It s shown that the formal consstency mples database update prncples. Ths result leads to the concluson that a subschema desgn process should adhere to formal consstency condtons f ths subschema s ntended to consttute a component of a transacton program specfcaton. The standard noton of a database SQL vew s n some sense related to the noton of the subschema as ntroduced n the paper. Both of them represent an nterface between a user (or program) and the database. Ths nterface provdes a user wth a specfc way of loong at the data n the database. Apart from that, a subschema s as a structure over the smple vews, and that structure contans nformaton about database constrants and allowable database operatons. Addtonally, a subschema s a component of a program specfcaton, and ths specfcaton may be mplemented n many dfferent ways, under many, even technologcally dfferent, programmng systems. The ssues of relatonal database update usng vews are consdered n [6, 7, 8, 9]. The conclusons of consderatons n [6] are formulated as recommendatons for the vendors of RDBMS. Some of the contemporary RDBMS s allow database update usng a vew f the requested update actvty may be unambguously performed on the base relatons; otherwse t s reected. Ths mght lead to the concluson that t would be suffcent to use a vew nstead of a relatvely complex structure as a subschema n the transacton program specfcaton. We beleve that a vew carres nsuffcent nformaton to mae a correct database update program. In partcular, a vew hdes from a programmer nformaton about: The structure over the needed base relatons, The constrants needed to mae an user-frendly screen form control program, and The allowed operatons on the base relatons. All ths nformaton s contaned n a subschema. In [8], Dayal and Bernsten explore the problem of transformng update operatons that are defned over ether a complex or a smple vew nto correspondng update operatons over a database schema n detal. In our paper the transformng problem s smpler, snce each relaton scheme of a subschema corresponds to exactly one relaton scheme from the database schema. Some consequences of ths restrcton and possble solutons wll be brefly dscussed at the end of the paper. In [9], Banclhon and Spyratos consder the problem of vew updateablty n a very general and formal way at the level of nstance abstracton, by ntroducng the concepts of complementary vew and g-translatablty of update operatons. We see our approach to database update prncples as a specal and practcally mportant case, when a vew nstance and ts complement mae a database schema nstance. In [7], Langera also consders the problem of vew updateablty, but functonal dependences, n the presence of null values, are the only ntegrty constrants that have been taen nto consderaton. Only total proectons of database relatons as vew nstances are analyzed and the selecton operator s not consdered. Ths paper extends the results presented n [7, 8, 9] by ntroducng and emphaszng the roles of allowable operatons and modfable attrbutes n the defnton of the database update prncples. Apart from the Introducton and Concluson, the paper has four sectons. Secton two formally ntroduces the noton of a subschema. Sectons three and four descrbe the prncples of a database update usng subschema concepts, and Secton fve s concerned wth formal consstency. 2. The Subschema A relatonal database schema s a par (S, I), where S s a set of relaton schemes and I s a set of nterrelaton constrants. It s supposed n the paper that the database schema s produced usng a well-defned methodologcal approach, and no further attenton s pad to ths ssue. Each relaton scheme from S s a named trple: N(R, C, K p (R)), where N s a unque name, R s an attrbute set, and C s a specfcaton of constrants. A relaton scheme wll be often referred smply by ts name N. The specfcaton of constrants C s a trple (K, τ (N), Unq(N)), where K s a set of eys, τ (N) wll be called tuple nteg- 2

3 rty constrant, and Unq(N) s a (possble empty) set of unqueness constrants Unque(N, X ), where X s a proper subset of R, whch does not contan any ey from K. The tuple ntegrty constrant τ (N) s a par, whose frst component contans attrbute doman constrants of each attrbute A R. The second component of the par s a logcal expresson defned over the attrbutes from R and ther doman values. A unqueness constrant Unque(N, X ) means that each non null value of X must be unque n a relaton over N. More detals concernng the specfcaton of constrants C may be found n []. K p (R) K denotes the prmary ey of the relaton scheme N. The nterrelaton constrant set I may contan varous types of constrants, of whch frequently used referental ntegrty s ust one. The goal of a subschema desgn s to satsfy at least one user request. So, for a database schema there may exst at most as many subschemas as there are dentfed user requests. Formally, a subschema s a named par P (S, I ), where P s a subschema name, S s a set of relaton schemes, and I s a set of nterrelaton constrants. The set of relaton schemes of a subschema P s S = {N (R, C, K p (R ), Role(P, N ), Mod(P, N ), Sr(P, N )) {,..., n}}, where N s a scheme name, R s an attrbute set, C s a specfcaton of constrants of the form (K, τ (N ), Unq(N )), and K p (R ) s a prmary ey. Role(P, N ) s a set of relaton scheme roles n the subschema P, and Mod(P, N ) s a set of attrbutes that may be modfed. Sr(P, N ) s a functon from the set of relaton schemes S nto the set of relaton schemes S. Further explanatons of Sr(P, N ), Role(P, N ) and Mod(P, N ) follow. Sr(P, N ) assocates each relaton scheme N S wth a relaton scheme N S for whch R R holds. The relaton scheme N wll be called the correspondng relaton scheme for the relaton scheme N. A subschema desgner defnes the mappng Sr(P, N ). It s supposed that database schema and subschema desgn guarantee that for each N n any P there s at least one N S such that R R holds. Role(P, N ) determnes the operatons that may be performed on an nstance of the relaton scheme N. These operatons may be bult nto a transacton program made usng the concepts of a subschema P. A set of relaton scheme roles s a nonempty set, and Role(P, N ) {r,, m, d}, where: r stands for data readng or referencng; stands for data nsert; m stands for data modfcaton; and d stands for data deletng. A subschema P s ntended for database queryng only f ( N S )(Role(P, N ) = {r}) holds, and t s ntended for database updatng otherwse. The set Mod(P, N ) contans those attrbutes of the relaton scheme N that may be modfed. If m Role(P, N ), then Mod(P, N ) must not equal. Accordng to the defnton, a subschema s merely a desgn tool that s needed for a correct transacton program desgn. Example. Suppose a database schema (S, I) and subschemas P (S, I ), P 2 (S 2, I 2 ), P 3 (S 3, I 3 ) are gven, where: S = {ORDER(R, C,...), SHIPMENT(R 2, C 2,...), CUSTOMER(R 3, C 3,...)}; R = {OrdId, Ordate, CustId, Orgn, Total}; C = (K, τ (N ), Unq(N )) = ({{OrdId}}, τ(order), ); K p (R ) = {OrdId}; R 2 = {ShpId, OrdId, ShpDate, ShpTotal}; C 2 = (K 2, τ (N 2 ), Unq(N 2 )) = ({{ShpId}}, τ(shipment), ); K p (R 2 ) = {ShpId}; R 3 = {CustId, CustName, CustAdrr}; C 3 = (K 3, τ (N 3 ), Unq(N 3 ))= ({{CustId}}, τ(customer), ); K p (R 3 ) = {CustId}); I = {ORDER[CustId] CUSTOMER[CustId], SHIPMENT[OrdId] ORDER[OrdId], CUSTOMER[CustId] ORDER[CustId]}. S = {Dom_Shpped_Order(R, C,...), Shpment(R 2, C 2,...)}; R = {OrdId, OrDate, CustId, Orgn, Total}; C = (K, τ (N ), Unq(N ))= ({{OrdId}}, τ(dom_shpped_order), ), K p (R ) = {OrdId}; R 2 = {ShpId, OrdId, ShpDate, ShpTotal}; C 2 = (K 2, τ (N 2 ), Unq(N 2 )) = ({{ShpId}}, τ(shpment), ); 3

4 K p (R ) = {ShpId}; Role(P, Dom_Shpped_Order) = Role(P, Shpment) = {, r}; Mod(P, Dom_Shpped_Order) = Mod(P, Shpment) = ; Sr(P, Dom_Shpped_Order) = ORDER; Sr(P, Shpment) = SHIPMENT; I = {Shpment[OrdId] Dom_Shpped _Order[OrdId], Dom_Shpped_Order[OrdId] Shpment[OrdId]}; S 2 = {Order(R 2, C 2,...), Customer(R 2 2, C 2 2,...)}; R 2 = {OrdId, OrDate, CustId, Orgn, Total}; C 2 = (K 2, τ (N 2 ), Unq(N 2 )) = ({{OrdId}}, τ(order), ); K p (R 2 ) = {OrdId}; Role(P 2, Order) = {, r}; Mod(P 2, Order) = ; Sr(P 2, Order) = ORDER; R 2 2 = {CustId, CustName, CustAdrr}, C 2 2 = (K 2 2, τ (N 2 2 ), Unq(N 2 2 )) = ({{CustId}}, τ(customer), ); K p (R 2 2 ) = {CustId}); Role(P 2, Customer) = {r}; Mod(P 2, Customer) = ; Sr(P 2, Customer) = CUSTOMER; I 2 = {Order[CustId] Customer[CustId]}; S 3 = {Order(R 3, C 3,...), Shpment(R 2 3, C 2 3,...)}; R 3 = {OrdId, OrDate, CustId, Orgn, Total}; C 3 = (K 3, τ (N 3 ), Unq(N 3 )) = ({{OrdId}}, τ(order), ); K p (R 3 ) = {OrdId}; Role(P 3, Order) = {r}; Mod(P 3, Order) = ; Sr(P 3, Order) = ORDER; 2 R 3 = {ShpId, OrdId, ShpDate, ShpTotal}; C 2 3 = (K 2 3, τ (N 2 3 ), Unq(N 2 3 )) = ({{ShpId}}, τ(shpment), ); K p (R 2 3 ) = {ShpId}; Role(P 3, Shpment) = {, r}; Mod(P 3, Shpment) = ; Sr(P 3, Shpment) = SHIPMENT; I 3 = {Shpment[OrdId] Order[OrdId]}; Subschema P s amed for entry of domestc orders and shpments wthn one transacton, P 2 s amed for order entry, and P 3 s amed for entry of shpments that are ntated by orders. Subschema P s assocated wth a busness unt whose tas s to control domestc orders. In ths busness unt users are not nterested n customer data except for customer d number. The attrbute doman constrant for Orgn n subschema P s more restrctve than the correspondng constrant n the database schema, because only the orders of domestc customers are requred. Subschema P also contans the ncluson dependency Dom_Shpped_Order[OrdId] Shpment[OrdId] that forces nsertng and selectng only those order tuples from a relaton over ORDER that are referenced by some shpment tuples. Suppose all the tuple ntegrty constrants that are embedded nto relaton schemes whose name has the same meanng are the same, except the doman constrant for attrbute Orgn. The values of ths attrbute determne whether a domestc or foregn customer ssued a partcular order. In the relaton scheme Dom_Shpped_Order of the subschema P, dom(orgn) = {d} holds, whereas n the relaton scheme Order of P 2, P 3 and n the relaton scheme ORDER of the database schema, dom(orgn) = {d, f }, where d stands for domestc and f for foregn. These subschemas and database schema wll be referenced n all other examples of ths paper. A database schema and a subschema contan the followng concepts: Database schema attrbute set U = U R and subschema attrbute set U = U R ; N S N S Sets of relaton scheme attrbute sets S = {R {,..., n}} and S = {R {,..., t}}; and 4

5 n t Sets of constrants O = I ( C = ) and O = I ( C ). = The sets S and O determne the set of subschema P nstances, whereas the sets S and O determne the set of database schema (S, I) nstances. In the paper, O + wll denote the set of all logcal consequences of a set of constrants O and O + X wll denote all the constrants from O +, whch are defned usng only the attrbutes from X. 3. Database Updates Usng Subschema Concepts A transacton program ssues query and update commands that are executed by a DBMS aganst a database nstance. Let T be a transacton program based on subschema concepts, and let T be a transacton program that s equvalent to T, but based on database schema concepts. To consder database updates ntated by any transacton program T as safe updates, the structure of the subschema and database schema should provde the followng two nstance level condtons to hold:. A unque (hypothetcal) subschema nstance, called correspondng subschema nstance, may be produced by applyng approprate relatonal on, proect and select operatons on a database schema nstance; and 2. If an update of a hypothetcal subschema nstance executed by T would be successful, then T must be commtted by DBMS. If a subschema s ntended for queres only, then t must satsfy only Condton. If a subschema s ntended for updatng, then t must satsfy both condtons. In ths paper, the aforementoned condtons are called prncples of a database update usng subschema concepts. A subschema that satsfes these condtons s sad to be consstent wth the correspondng database schema. Let SAT(S, I) denote the set of all nstances over a database schema (S, I). If I =, then SAT(S) stands for SAT(S, ). Let SAT(R, C ) denote the set of all nstances over a relaton schme N (R, C, K p (R )). If C =, then SAT(R ) stands for SAT(R, ). A set s = {r(r ),..., r(r t )} where r(r ) SAT(R, C ) and t = S, s an nstance over the database schema (S, I),.e. s SAT(S, I), f I s satsfed. Suppose a transacton program s based on subschema P (S, I ) concepts, where S = {N,..., N n }, and let s be an nstance over the subschema P that s a correspondng nstance for some database nstance s. The correspondng nstance s a set of hypothetcal relatons s = {r(r ),..., r(r n )} that are produced by applyng on, select and proect operatons to some relatons from the database nstance s. The composton of operators that s used to produce a correspondng nstance s from an nstance s wll be denoted by ΠΣ ΣΠ. Thus, s = ΠΣ ΣΠ(s, P ). From an end user pont of vew, usng a transacton program based on the concepts of a subschema P means updatng a subschema nstance s, regardless of the fact that ths nstance does not physcally exst and hence s ust a vew on a database schema nstance s. Let H denote a sequence of operatons that s ntated by a transacton program, and suppose these operatons are defned usng the concepts of a subschema P. Ths sequence of operatons could be appled only to an nstance s over P. As a result, a set s up = {r,..., r n } of updated relatons would be produced, where r s an abbrevated notaton for r (R ). For the end user s s a database and s up s the result of applyng a sequence of update operatons H on s. However, a subschema nstance s not materalzed. A DBMS executes query and update commands on an nstance over a database schema. Update operatons that are ntated by a transacton program based on subschema concepts are transformed nto operatons expressed n terms of database schema concepts. Ths way, the sequence of operatons H generates a sequence of operatons CH that are expressed n terms of database schema concepts. By applyng the composton of operatons n CH on an nstance s over a database schema, a set of relatons s up = {r (R ),..., r (R t )} s generated, where s up = CH(s). The operatons from CH should alter only data that would belong to the hypothetcal subschema nstance s. Thus, the altered data belong to ΠΣ ΣΠ(s up, P ). Snce CH s made of transformed update operatons from H, t may be concluded that s up = ΠΣ ΣΠ(s up, P ) (Fg. ). From the subschema pont of vew, the effect of an nstance s update by means of CH s the same as t would be the effect of updatng the hypothetcal correspondng nstance s usng H. The same clam s also expressed by the second prncple of a database update usng subschema concepts. 5

6 s CH s up ΠΣ ΣΠ ΠΣ ΣΠ s H s up Fg.. The relatonshp between updated nstances over a subschema and a database schema 4. A Formal Defnton of Database Update Prncples In ths secton of the paper the prncples of a database update usng subschema concepts wll be formally defned at the abstracton level of nstances. Defnton. Suppose a set of relaton scheme S of a subschema P and a database schema (S, I) satsfy the followng condton: ( s SAT(S, I))(!s SAT(S ))( r s )(r = σ F (π R (r(sr(p, N ))))), () where F s a select condton, whose am s to select those tuples from r that satsfy constrants embedded n N S. Let s SAT(S, I) be an nstance over a database schema. A set of relatons s SAT(S ) satsfyng (), s a correspondng set to the nstance s wth regard to the set S, whch wll be denoted by s = ΣΠ(s, S ). The select condton F s ntroduced n the formula () snce subschema constrants may be more restrctve then database schema constrants. It should be also noted that the set s that satsfes (), may not satsfy subschema nterrelaton constrants I. Now, the frst update prncple may be formally expressed n the followng way. Defnton 2. A subschema P (S, I ) and a database schema (S, I) satsfy the frst update prncple f the condton () s satsfed and: ( s SAT(S, I))(!s SAT(S, I ))( r s )(r = π R (σ F ( r ))), (2) r ΣΠ( s, S ) holds, where F s a select condton that selects those tuples from Cartesan product of relatons satsfyng () that also satsfy subschema nterrelaton constrants I. Now, we defne the noton of a correspondng nstance of a subschema. Defnton 3. Suppose a subschema P (S, I ) and a database schema (S, I) satsfy condtons () and (2), and let s SAT(S, I). An nstance s SAT(S, I ) s a correspondng nstance of the nstance s wth regard to subschema P (S, I ), denoted s = ΠΣ ΣΠ(s, P ), f the followng holds: ( r s )(r = π R (σ F ( r ))). (3) r ΣΠ( s, ) S 6

7 Example 2. Consder the database schema and subschemas gven n Example. To select only the domestc orders for the relaton scheme Dom_Shpped_Order of the subschema P, the selecton condton of formula () wll be F Dom_Shpped_Order : Orgn = d. The selecton condton F of formula (2) should provde only already shpped domestc orders. So, F : ORDER.OrdId = SHIPMENT.OrdId. Alternatvely, to select those domestc orders that are only partally shpped, the correspondng selecton condton would be: F : ORDER.OrdId = SHIPMENT.OrdId ORDER.Total > SHIPMENT.ShpTotal. Let s = {r, r 2, r 3 } SAT(S, I) be an nstance over a database schema, where r (ORDER), r 2 (SHIPMENT), and r 3 (CUSTOMER) are shown on Fg. 2. For F Dom_Shpped_Order : Orgn = d, F : ORDER.OrdId = SHIPMENT.OrdId and a subschema P nstance s = {r, r 2 } SAT(S, I ), where r (Dom_Shpped_Order), and r 2 (Shpment) are shown on Fg. 3, s = ΠΣ ΣΠ(s, P ) holds. r 3 (CUSTOMER) r 2 (SHIPMENT) CustId CustName CustAdrr ShpId OrdId ShpDate ShpTotal Alfa Belgrade Beta Rome Gama Belgrade Delta Wen r (ORDER) OrdId Ordate CustId Orgn Total f f d d d f 000 Fg. 2. An nstance over the database schema from Example. r (Dom_Shpped_Order) r 2 (Shpment) OrdId Ordate CustId Orgn Total ShpId OrdId ShpDate ShpTotal d d Fg. 3. An nstance over subschema P from Example. Let a set of relatons s = {r(r ),..., r(r n )} be gven, and suppose t s a correspondng nstance of a database nstance s wth regard to subschema P.. A transacton program havng subschema P as a part of ts specfcaton, may perform only the operatons covered by the set {Role(P, N ),, Role(P, N n )}, where each Role(P, N ) defnes allowed operatons on nstances over N. Each update of an nstance over a relaton scheme N may be represented as a composton of operatons from Role(P, N ). Defnton 4. Let a subschema P (S, I ) and an nstance s = {r(r ),..., r(r n )} SAT(S, I ) be gven. Let O r {, d, m, r} Role(P, N ), where N S, be a database operaton, t r a tuple over the set of attrbutes R and P r the prmary ey value of a tuple on whch operaton O r s gong to be appled. It s supposed that the followng condtons are satsfed. If O r = d, then P r represents the prmary ey value of a tuple from r (R ) s that s ntended for deletng. If O r = m, then t r contans values that are ntended to replace the old values of a tuple from r (R ) s wth the prmary ey value P r. If O r =, then t r s a tuple ntended for nserton nto relaton r (R ) s. In ths case, P r represents the prmary ey value of t r. A functon h r = h (Pr, tr, Or) : SAT(R ) SAT(R ), defned n the followng way: 7

8 r \ { t }, f = [ ( l Or d t l r t l K p R )] = Pr, ( r \ { t }) ({ [ \ (, )]} { [ (, l t l R Mod P N tr Mod P N )]}), h r (r) = f = [ ( )] =, Or m t l r t l K p R Pr r { }, f =, tr Or r, f Or = r ( {, } ( t r)( t [ K ( R Or d m l l p )] Pr )) (4) s an allowed operaton on r SAT(R ). Example 3. Let Example and Example 2 be consdered. Functon h (06, (06,.02.02, 4, f, 200), ) s an allowed operaton on an nstance over the relaton scheme Order of the subschema P 2, for whch (s 2 \{r 2 }) {h (06, (06,.02.02, 4, f, 200), )(r 2 )} SAT(S 2, I 2 ) holds. If the same allowed operaton h (06, (06,.02.02, 4, f, 200), ) s appled on r (Dom_Shpped_Order), shown on Fg. 3, then (s \{r }) {h (06, (06,.02.02, 4, f, 200), ) (r )} SAT(S, I ) does not hold, snce t r = (06,.02.02, 4, f, 200), ) represents a foregn order. The operaton h (05, (05,.02.02, 4, f, 200), m) s not allowed over the relaton scheme Order of the subschema P 2, because m Role(P 2, N 2 ). For the sae of smplcty and wthout any mpact on further results, t s supposed n formula (4) that selecton of database tuples to be deleted or modfed s performed exclusvely by means of a prmary ey value. Defnton 5. An update functon h of a relaton over a set of attrbutes R s produced by composng a sequence of allowed update operatons h m,..., h : h = h m... h = (h m,..., h ). The operaton s appled accordng to the common mathematcal defnton for functon composton. The set of all possble update functons that may be appled on an nstance over R wll be denoted by h. Each hypothetcal nstance s over a subschema P s updated by updatng nstances over ts relaton schemes. Defnton 6. The update functon of a set of relatons s = {r(r ),..., r(r n )}, where S = {N,..., N n }, denoted by H, s any mappng H(s ) = (h,..., h n )(s ) = {r (R ),..., r (R n )} such that: ( {,..., n})(r (R ) = h (r(r )) h h ) (5) s satsfed. The set of all possble update functons over {R,..., R n } wll be denoted by H. Defnton 7. Let s = {r(r ),..., r(r n )} be a set of relatons, where S = {N,..., N n }. The set of relatons s up = {r (R ),..., r (R n )} s an updated nstance of s f the followng holds: ( H H )(s up = H(s )). (6) Snce Defnton 7 s strongly related to Defnton 4, t follows that s up = H(s ) need not necessarly be an nstance over P (S, I ), even n the cases when s SAT(S, I ) holds. The next lemma ntroduce a consequence of condton () that s mportant for further consderatons. The lemma s gven wthout proof. Lemma. Suppose a subschema P (S, I ) and a database schema (S, I) satsfy condton (). Then the followng s satsfed: ( N S )(N = Sr(P, N ) (R R (K Un(N )) (K Un(N ))), (7) where Un(N) = {X Unque(N, X) Unq(N)}. Snce an nstance s does not physcally exst, each update operaton h r (r ) and update functon h must be transformed nto an update operaton and an update functon on an nstance r over a relaton scheme N of a database schema (S, I) that s correspondng to N. 8

9 Defnton 8. Suppose a subschema P (S, I ) and a database schema (S, I) satsfy condtons () and (2). Let h r = h (Pr, tr, Or) and N = Sr(P, N ) be gven. A correspondng operaton to h r that should be executed on an nstance r over N s a functon Ch r = Ch (Pr, tr, Or) : SAT(R, C ) SAT(R ) defned n the followng way: r \ { t l }, f O r = d t l r t l [ K p ( R )] = P r, ( r \ { }) ({ [ \ (, )]} { [ (, t l t l R Mod P N t r Mod P N )]}), f Or = m t l r t l [ K p ( R )] = Pr, Ch r (r ) = r ({ tr } { DefTup( N, ( R \ R ))}), f O r =, r, f = Or r ( {, } ( t r )( t [ K ( R Or d m l l p )] Pr )) (8) where P r s a prmary ey value of a tuple from database relaton r s, t r s a tuple over the set of attrbutes R, and O r {, d, m, r} s an operaton that s performed on a tuple from r s. The term DefTup(N, W) s defned n the followng way: DefTup(N, W) = {t[w] ( A W)(t[A] = Def(N, A))}, where Def(N, A) s an attrbute A default value n the relaton scheme N, f t s declared, otherwse t s a null value. Defnton 9. The update functon Ch = (Ch m,..., Ch ) that corresponds to the update functon h = (h m,..., h ), s a composton of correspondng operatons Ch m,..., Ch, where for each {,..., m}, Ch corresponds to an allowed operaton h : Ch = Ch m... Ch = (Ch m,..., Ch ). The set of all possble correspondng update functons nduced by a relaton scheme N wll be denoted by Ch. Defnton 0. An update functon CH of a database schema nstance s that corresponds to the update functon H = (h,..., h n ) of a subschema nstance s, s a mappng CH(s) = (f,..., f t )(s) = {r (R ),..., r t (R t )} such that: ( {,..., t})(r (R ) = f (r(r )) (9) holds, where: Ch, f = dent, f f ( N )( = (, S N Sr P N )) ( N S )( N ( P, N Sr )). Each functon Ch Ch corresponds to the update functon h from H, whereas dent s an dentty functon,.e. ( r s)(dent(r ) = r ). We wll denote by CH the set of all possble update functons of an nstance over a database schema that are nduced by the concepts of a subschema P. Snce Defnton 0 s strongly related to Defnton 8, t follows that the updated nstance CH(s) need not necessarly be an nstance over (S, I), despte the fact that s SAT(S, I) holds. Let us ntroduce a term of successful update functon. Then, a formal defnton of the second update prncple follows. (0) 9

10 Defnton. Let a subschema P (S, I ) and a database schema (S, I) be gven. Let s be an nstance over (S, I) and H H be an update functon whch s appled on subschema nstance s = ΠΣ ΣΠ(s, P ). CH denotes an update functon of s, correspondng to H. Let a proecton of database relatons accordng to subschema Π(s, P ) be defned n the followng way: Π(s, P ) = {r '(R ) N S N = Sr(P, N ) r (R ) s r ' = π R (r )}. () The update functon H(s ) s successful, f the predcate Successful((S, I), (S, I ), s, H), defned n the followng way: H(s ) SAT(S, I ) H(Π(s, P )) = O + O + U (2) holds, where = denotes that a set of relatons H(Π(s, P )) satsfy the set of constrants O + O + U. Defnton 2. A subschema P (S, I ) and a database schema (S, I) satsfy the second update prncple f Condtons () and (2) are satsfed and the followng holds: ( s SAT(S, I))( H H )(Successful((S, I), (S, I ), s, H) CH(s) SAT(S, I)), (3) where CH s an update functon of s, correspondng to H. Condtons (), (2) and (3) consttute a formal defnton of the prncples of a database update usng subschema concepts. It follows from Defnton 2 that the frst update prncple s a prerequste for the second one. It s due to the fact that Condtons () and (2) are necessary to provde the exstence of an nstance ΠΣ ΣΠ(s, P ), for each s SAT(S, I). By means of (), (2) and (3) we express the fact that database updates, ntated by a transacton program based on the concepts of subschema, are safe. Example 4. Let Example and Example 2 be consdered. Let us consder an update functon H(s ) = (h, h 2 )(s ), where s s shown on Fg. 3. Let h = (h (06, (06, , 6, d, 000), ) )(r ) and h 2 = (h (404, (404, 06, , 000), ) )(r 2 ) be gven operatons. It s obvous that both of them are allowed operatons over s, such that H(s ) SAT(S, I ) holds. For s shown on Fg. 2, a correspondng database update functon s CH(s) = (f, f 2, f 3 )(s), where f (r ) = Ch (r ) = (h (06, (06, , 6, d, 000), ) )(r ), f 2 (r 2 ) = Ch 2 (r 2 ) = (h (404, (404, 06, , 000), ) )(r 2 ) and f 3 (r 3 ) = dent(r 3 ) = r 3 hold. In ths example, snce (06, , 6, d, 000) represents a new order wth a CustId = 6, whch does not exst n database, the operaton Ch (r ) wll volate referental ntegrty ORDER[CustId] CUSTOMER[CustId]. Therefore, CH(s) wll not be an nstance over (S, I). At the other hand, Successful((S, I), (S, I ), s, H) holds. Ths way, subschema P and database schema (S, I) volate the second update prncple. Informally, t s a consequence of the fact that Role(P, Dom_Shpped_Order), but ORDER[CustId] CUSTOMER[CustId] s not ncluded subschema P. If we consdered n ths example an operaton h = (h (05, (05, , 4, d, 000), ) )(r ) nstead of h = (h (06, (06, , 6, d, 000), ) )(r ), then the correspondng operaton Ch (r ) would volate a ey {OrdId} of scheme ORDER, and CH(s) would not be an nstance over (S, I), too. In ths case, however, Successful((S, I), (S, I ), s, H) would not hold. 5. The Formal Database Schema and Subschema Consstency Defnton 3. Let O be the set of database schema (S, I ) constrants. A constrant o O + s relevant for a subschema P, f t may be volated by some update functon CH CH. Example 5. Let us consder subschema P 2 n Example. The referental ntegrty ORDER[CustId] CUSTOMER[CustId] s a relevant constrant for P 2, snce Role(P 2, Order). At the other hand, the ncluson dependency CUSTOMER[CustId] ORDER[CustId] s not a relevant constrant for P 2, snce d Role(P 2, Order) and {, m} Role(P 2, Customer) =. It s ntutvely appealng that a subschema and a database schema wll be formally consstent, f ther concepts are n some way consstent. The concepts of a subschema and a database schema are formally consstent, f: 0

11 . The set of attrbutes of each subschema relaton scheme s a subset of the correspondng relaton scheme attrbute set; 2. The set of eys of each subschema relaton scheme s a subset of the unon of the correspondng relaton scheme set of eys and the set of attrbute sets wth a unque property; and 3. All the constrants that can be nferred from the database schema and that are relevant for the subschema are embedded n the subschema. Formally, the frst and the second condton are expressed by formula (7). The thrd consstency condton can be expressed by the followng logcal mplcaton: O = O r P, (4) where O r P s the set of all database schema constrants that are relevant for subschema P. The most mportant components of a constrant o O specfcaton are: A set of trples T(o) = {(N, ρ, At ),..., (N m, ρ m, At m )}; and A set of crtcal operatons. In a trple (N, ρ, At ), N s the name of a relaton scheme that s spanned by o, ρ s the role of N n o and At s a set or sequence of attrbutes from R that are relevant for o. An attrbute A s relevant for o f o s used to chec values of A. A crtcal operaton s an operaton that can volate a constrant. The constrant o should belong to the set of subschema relevant constrants f the operaton that mght volate o s allowed n the subschema P. There are two nds of relevant constrants: The nclusve relevant constrants, denoted by In(O, P ); and The extensble relevant constrants, denoted by Ex(O, P ). Suppose a constrant o O + s relevant for a subschema P. The constrant o belongs to In(O, P ) f and only f: ( (N, ρ, At ) T(o))( N S )(Sr(P, N ) = N At R ) (5) holds. A constrant o belongs to Ex(O, P ) f and only f t s a relevant for P, and o In(O, P ) holds. Example 6. In Example, the referental ntegrty ORDER[CustId] CUSTOMER[CustId] s an nclusve relevant constrant for subschema P 2, snce Role(P 2, Order), ORDER = Sr(P 2, Order), CUSTOMER = Sr(P 2, Customer) CustId R 2 and CustId R 2 2 holds. Snce Role(P, Dom_Shpped_Order) = {, r} holds n Example, the referental ntegrty ORDER[CustId] CUSTOMER[CustId] s an extendng relevant constrant for subschema P. It s relevant because Dom_Shpped_Order S, ORDER = Sr(P, Dom_Shpped_Order) and Role(P, Dom_Shpped_Order) holds. It s an extendng constrant, because for the referenced relaton scheme CUSTOMER there s no correspondng relaton scheme n P. Ths mples that a relaton scheme Customer should be ncluded n P. Defnton 4. A subschema P (S, I ) concepts are formally consstent wth a database schema (S, I) concepts f (7) holds and the followng two condtons are satsfed: O = In(O, P ), (6) Ex(O, P ) =. (7) The formal consstency of a subschema and a database schema concepts mples satsfacton of the database update prncples. The next theorem s gven wthout proof. Theorem. If a subschema P (S, I ) s formally consstent wth a database schema (S, I), then the condtons (), (2), and (3) hold.

12 Example 7. Suppose Role(P 2, Customer) = {, r} n Example holds. The constrants ORDER[CustId] CUSTOMER[CustId] and CUSTOMER[CustId] ORDER[CustId] are nclusve relevant constrants for subschema P 2. In ths example, however, the condton O 2 = In(O, P 2 ) s not satsfed, snce Customer[CustId] Order[CustId] s not ncluded n the set of subschema constrants I 2. An nserton of a new customer not havng any order would not volate the consstency of a hypothetcal nstance over P 2, whereas DBMS would reect ths operaton, snce t would volate the consstency of a database schema nstance. Besdes, the predcate Successful((S, I), (S 2, I 2 ), s, H), for such an nstance s and update functon H would hold. Snce Role(P, Dom_Shpped_Order) = {, r} n Example holds, the referental ntegrty ORDER[CustId] CUSTOMER[CustId] s an extendng relevant constrant for subschema P, whch means that Ex(O, P ) holds. An nserton of a new order wth a non-exstng CustId value would not volate the consstency of an nstance over P, whereas DBMS would reect ths operaton, snce t would volate the consstency of a database schema nstance. In ths case, the predcate Successful would be satsfed too. 6. Concluson In ths paper, the noton of a subschema that represents the data defnton part of a transacton program specfcaton s ntroduced. A subschema s a structure, expressed by means of relatonal database schema concepts, extended by the specfcaton of the allowed database update actvtes, and a mappng that unquely bonds subschema relaton schemes wth the database relaton schemes. The relatonshp between a database schema and a subschema s establshed by defnng condtons of database update prncples and the formal subschema and database schema consstency. It s clamed n the paper that the formal consstency mples database update prncples. Accordngly, f a subschema s amed to consttute the data defnton component of a transacton program specfcaton, ts desgn process should adhere to formal consstency condtons. One of the man consequences of that statement s that the set of subschema constrants should mply all those database schema constrants that mght be volated by the allowed database update operatons. A general soluton of the mplcatonal problem n the presence of dfferent constrant types s very hard to fnd, f even possble. Testng the satsfacton of the formal consstency may be relaxed by consderng mplcatonal problem for varous constrant types separately. We beleve that our approach relaxed n that way, may lead to a good transacton program desgn practce. We have studed subschemas where each relaton scheme nstance has been produced by applyng relatonal proect and select operatons onto a base relaton. That approach enables an easy transformaton of database update operatons expressed upon subschema concepts nto database update operatons expressed upon database schema concepts. However, sometmes t may appear preferable to allow defnng nstances of a subschema relaton scheme by applyng select and proect operatons onto ons of base relatons. Therefore, a future wor should study the effects of constructng a subschema relaton scheme from more than one database schema relaton scheme. References. Luovć I., Mogn P., Govedarca M., Rstć S.: The Structure of A Subschema and Its XML Specfcaton, XIII Internatonal Conference on Informaton and Intellgent Systems, Varaždn, Croata (2002), Proceedngs, Rstć, S.: A Research of Subschema Consoldaton Problem. PhD Thess, Unversty of Nov Sad, Faculty of Economcs, Subotca (n progress) 3. Mogn P., Luovć I., Govedarca M.: Database Desgn Prncples. Unversty of Nov Sad, Faculty of Techncal Scences & MP "Stylos", Nov Sad, Yugoslava (2000) 4. Luovć I., Mogn P.: On The Role of Subschema as A Component of The Implementaton Specfcaton of A Program. VI Symposum on Computer Scence and Informaton Technologes YUINFO, Kopaon, Yugoslava (2000), Proceedngs on CD ROM 5. Mogn P., Luovć I.: An Approach to Database Desgn. Internatonal Journal of INDUSTRIAL SYSTEMS, Vol., No. 2, Nov Sad, Yugoslava (999) Codd E. F.: The Relatonal Model for Database Management Verson 2. Addson-Wesley-Publshng-Company, USA (990) 7. Langera R.: Vew Updates n Relatonal Databases wth An Independent Scheme, ACM Transactons on Database Systems, Vol. 5, No. (990) Dayal U., Bernsten P.: On the Correct Translaton of Updates on the Relatonal Vews. ACM Transactons on Database Systems, Vol. 8, No. 3 (988) Banclhon F., Spyratos N.: Update Semantcs of Relatonal Vews. ACM Transactons on Database Systems, Vol. 6, No. 4 (98)

The Structure of A Subschema and Its XML Specification

The Structure of A Subschema and Its XML Specification The Structure of A Subschema and Its XML Specfcaton Ivan Lukovć Unversty of Nov Sad, Yugoslava Faculty of Techncal Scences, Nov Sad van@s.ns.ac.yu Pavle Mogn Vctora Unversty of Wellngton, New Zeland School

More information

A Methodology of A Database Schema Design Using The Subschemas

A Methodology of A Database Schema Design Using The Subschemas A Methodology of A Database Schema Design Using The Subschemas Ivan Luović University of Novi Sad, Faculty of Technical Sciences Novi Sad, Serbia and Montenegro ivan@iis.ns.ac.yu Sonja Ristić Business

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Semi - - Connectedness in Bitopological Spaces

Semi - - Connectedness in Bitopological Spaces Journal of AL-Qadsyah for computer scence an mathematcs A specal Issue Researches of the fourth Internatonal scentfc Conference/Second صفحة 45-53 Sem - - Connectedness n Btopologcal Spaces By Qays Hatem

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Math Homotopy Theory Additional notes

Math Homotopy Theory Additional notes Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

b * -Open Sets in Bispaces

b * -Open Sets in Bispaces Internatonal Journal of Mathematcs and Statstcs Inventon (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 wwwjmsorg Volume 4 Issue 6 August 2016 PP- 39-43 b * -Open Sets n Bspaces Amar Kumar Banerjee 1 and

More information

On Correctness of Nonserializable Executions

On Correctness of Nonserializable Executions Journal of Computer and System Scences 56, 688 (1998) Artcle No. SS971536 On Correctness of Nonseralzable Executons Rajeev Rastog,* Sharad Mehrotra, - Yur Bretbart, [,1 Henry F. Korth,* and Av Slberschatz*

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

AN ALGEBRAIC APPROACH TO CONSISTENCY CHECKING BETWEEN CLASS DIAGRAMS

AN ALGEBRAIC APPROACH TO CONSISTENCY CHECKING BETWEEN CLASS DIAGRAMS AN ALGEBRAIC AROACH TO CONSISTENC CHECKING BETWEEN CLASS DIAGRAMS HIDEKAZU ENJO, MOTONARI TANABU, JUNICHI IIJIMA NTT DATA Corporaton, okohama Natonal Unversty, Tokyo Insttute of Technology enouh@nttdata.co.p,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Composition of UML Described Refactoring Rules *

Composition of UML Described Refactoring Rules * Composton of UML Descrbed Refactorng Rules * Slavsa Markovc Swss Federal Insttute of Technology Department of Computer Scence Software Engneerng Laboratory 05 Lausanne-EPFL Swtzerland e-mal: Slavsa.Markovc@epfl.ch

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

THE THEORY OF REGIONALIZED VARIABLES

THE THEORY OF REGIONALIZED VARIABLES CHAPTER 4 THE THEORY OF REGIONALIZED VARIABLES 4.1 Introducton It s ponted out by Armstrong (1998 : 16) that Matheron (1963b), realzng the sgnfcance of the spatal aspect of geostatstcal data, coned the

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

A Note on Quasi-coincidence for Fuzzy Points of Fuzzy Topology on the Basis of Reference Function

A Note on Quasi-coincidence for Fuzzy Points of Fuzzy Topology on the Basis of Reference Function I.J. Mathematcal Scences and Computng, 2016, 3, 49-57 Publshed Onlne July 2016 n MECS (http://www.mecs-press.net) DOI: 10.5815/jmsc.2016.03.05 Avalable onlne at http://www.mecs-press.net/jmsc A Note on

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of

More information

Querying by sketch geographical databases. Yu Han 1, a *

Querying by sketch geographical databases. Yu Han 1, a * 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information

Information Sciences

Information Sciences Informaton Scences 79 (9) 369 367 ontents lsts avalable at ScenceDrect Informaton Scences ournal homepage: www.elsever.com/locate/ns Necessary and suffcent condtons for transacton-consstent global checkponts

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton;

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Data Exchange: Algorithm for Computing Maybe Answers for Relational Algebra Queries

Data Exchange: Algorithm for Computing Maybe Answers for Relational Algebra Queries JOUNAL OF SOFTWAE, VOL. 6, NO., JANUAY 0 3 Data Exchange: Algorthm for Computng Maybe Answers for elatonal Algebra Queres S. M. Masud Karm Computer Scence and Engneerng Dscplne, Khulna Unversty, Khulna

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Alignment Results of SOBOM for OAEI 2010

Alignment Results of SOBOM for OAEI 2010 Algnment Results of SOBOM for OAEI 2010 Pegang Xu, Yadong Wang, Lang Cheng, Tany Zang School of Computer Scence and Technology Harbn Insttute of Technology, Harbn, Chna pegang.xu@gmal.com, ydwang@ht.edu.cn,

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Concurrent models of computation for embedded software

Concurrent models of computation for embedded software Concurrent models of computaton for embedded software and hardware! Researcher overvew what t looks lke semantcs what t means and how t relates desgnng an actor language actor propertes and how to represent

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN Some Polygonal Sum Labeling of Bistar

International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN Some Polygonal Sum Labeling of Bistar Internatonal Journal of Scentfc & Engneerng Research Volume 7 Issue 5 May-6 34 Some Polygonal Sum Labelng of Bstar DrKAmuthavall SDneshkumar ABSTRACT- A (p q) graph G s sad to admt a polygonal sum labelng

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Decision Strategies for Rating Objects in Knowledge-Shared Research Networks

Decision Strategies for Rating Objects in Knowledge-Shared Research Networks Decson Strateges for Ratng Objects n Knowledge-Shared Research etwors ALEXADRA GRACHAROVA *, HAS-JOACHM ER **, HASSA OUR ELD ** OM SUUROE ***, HARR ARAKSE *** * nsttute of Control and System Research,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Cell Count Method on a Network with SANET

Cell Count Method on a Network with SANET CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Memory Modeling in ESL-RTL Equivalence Checking

Memory Modeling in ESL-RTL Equivalence Checking 11.4 Memory Modelng n ESL-RTL Equvalence Checkng Alfred Koelbl 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 koelbl@synopsys.com Jerry R. Burch 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 burch@synopsys.com

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information