-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "da3ce307-f452-4f53-b4fb-b24ee3d0ec4c"}, "_deposit": {"created_by": 45, "id": "5365", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "5365"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5365", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Integrity Constraint Checker for Healthcare Database System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Database"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-09-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Implementation of Integrity Constraint Checker for Healthcare Database System.pdf", "filesize": [{"value": "347 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 347000.0, "url": {"url": "https://meral.edu.mm/record/5365/files/Implementation of Integrity Constraint Checker for Healthcare Database System.pdf"}, "version_id": "212db9f7-6fe5-46dc-9c42-8a073726560c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "PSC", "subitem_c_date": "24 December, 2008", "subitem_conference_title": "The Third Local Conference On Parallel and Soft Computing", "subitem_place": "University of Computer Studies, Yangon, Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyawt Kyawt San"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2008-12-24"}, "item_title": "Implementation of Integrity Constraint Checker for Healthcare Database System", "item_type_id": "21", "owner": "45", "path": ["1596102391527"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005365", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-09-15"}, "publish_date": "2020-09-15", "publish_status": "0", "recid": "5365", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Integrity Constraint Checker for Healthcare Database System"], "weko_shared_id": -1}
Implementation of Integrity Constraint Checker for Healthcare Database System
http://hdl.handle.net/20.500.12678/0000005365
http://hdl.handle.net/20.500.12678/0000005365d206b418-d2e3-4db8-a134-57981331335a
da3ce307-f452-4f53-b4fb-b24ee3d0ec4c
Name / File | License | Actions |
---|---|---|
![]() |
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Implementation of Integrity Constraint Checker for Healthcare Database System | |||||
Language | en | |||||
Publication date | 2008-12-24 | |||||
Authors | ||||||
Kyawt Kyawt San | ||||||
Description | ||||||
Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out. | ||||||
Keywords | ||||||
Database | ||||||
Conference papers | ||||||
PSC | ||||||
24 December, 2008 | ||||||
The Third Local Conference On Parallel and Soft Computing | ||||||
University of Computer Studies, Yangon, Myanmar |