MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "da3ce307-f452-4f53-b4fb-b24ee3d0ec4c"}, "_deposit": {"created_by": 45, "id": "5365", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "5365"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5365", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Integrity Constraint Checker for Healthcare Database System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Database"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-09-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Implementation of Integrity Constraint Checker for Healthcare Database System.pdf", "filesize": [{"value": "347 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 347000.0, "url": {"url": "https://meral.edu.mm/record/5365/files/Implementation of Integrity Constraint Checker for Healthcare Database System.pdf"}, "version_id": "212db9f7-6fe5-46dc-9c42-8a073726560c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "PSC", "subitem_c_date": "24 December, 2008", "subitem_conference_title": "The Third Local Conference On Parallel and Soft Computing", "subitem_place": "University of Computer Studies, Yangon, Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyawt Kyawt San"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2008-12-24"}, "item_title": "Implementation of Integrity Constraint Checker for Healthcare Database System", "item_type_id": "21", "owner": "45", "path": ["1596102391527"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005365", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-09-15"}, "publish_date": "2020-09-15", "publish_status": "0", "recid": "5365", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Integrity Constraint Checker for Healthcare Database System"], "weko_shared_id": -1}
Implementation of Integrity Constraint Checker for Healthcare Database System
http://hdl.handle.net/20.500.12678/0000005365
http://hdl.handle.net/20.500.12678/0000005365d206b418-d2e3-4db8-a134-57981331335a
da3ce307-f452-4f53-b4fb-b24ee3d0ec4c
Name / File | License | Actions |
---|---|---|
Implementation of Integrity Constraint Checker for Healthcare Database System.pdf (347 Kb)
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Implementation of Integrity Constraint Checker for Healthcare Database System | |||||
Language | en | |||||
Publication date | 2008-12-24 | |||||
Authors | ||||||
Kyawt Kyawt San | ||||||
Description | ||||||
Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out. | ||||||
Keywords | ||||||
Database | ||||||
Conference papers | ||||||
PSC | ||||||
24 December, 2008 | ||||||
The Third Local Conference On Parallel and Soft Computing | ||||||
University of Computer Studies, Yangon, Myanmar |