Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "da3ce307-f452-4f53-b4fb-b24ee3d0ec4c"}, "_deposit": {"created_by": 45, "id": "5365", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "5365"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5365", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Integrity Constraint Checker for Healthcare Database System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Database"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-09-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Implementation of Integrity Constraint Checker for Healthcare Database System.pdf", "filesize": [{"value": "347 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 347000.0, "url": {"url": "https://meral.edu.mm/record/5365/files/Implementation of Integrity Constraint Checker for Healthcare Database System.pdf"}, "version_id": "212db9f7-6fe5-46dc-9c42-8a073726560c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "PSC", "subitem_c_date": "24 December, 2008", "subitem_conference_title": "The Third Local Conference On Parallel and Soft Computing", "subitem_place": "University of Computer Studies, Yangon, Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyawt Kyawt San"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2008-12-24"}, "item_title": "Implementation of Integrity Constraint Checker for Healthcare Database System", "item_type_id": "21", "owner": "45", "path": ["1596102391527"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005365", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-09-15"}, "publish_date": "2020-09-15", "publish_status": "0", "recid": "5365", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Integrity Constraint Checker for Healthcare Database System"], "weko_shared_id": -1}
  1. University of Information Technology
  2. Faculty of Information Science

Implementation of Integrity Constraint Checker for Healthcare Database System

http://hdl.handle.net/20.500.12678/0000005365
http://hdl.handle.net/20.500.12678/0000005365
d206b418-d2e3-4db8-a134-57981331335a
da3ce307-f452-4f53-b4fb-b24ee3d0ec4c
None
Preview
Name / File License Actions
Implementation Implementation of Integrity Constraint Checker for Healthcare Database System.pdf (347 Kb)
license.icon
Publication type
Conference paper
Upload type
Publication
Title
Title Implementation of Integrity Constraint Checker for Healthcare Database System
Language en
Publication date 2008-12-24
Authors
Kyawt Kyawt San
Description
Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out.
Keywords
Database
Conference papers
PSC
24 December, 2008
The Third Local Conference On Parallel and Soft Computing
University of Computer Studies, Yangon, Myanmar
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-15 08:21:35.095960
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL