Index Link

  • RootNode

Item

{"_buckets": {"deposit": "da3ce307-f452-4f53-b4fb-b24ee3d0ec4c"}, "_deposit": {"created_by": 45, "id": "5365", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "5365"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5365", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Integrity Constraint Checker for Healthcare Database System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Database"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-09-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Implementation of Integrity Constraint Checker for Healthcare Database System.pdf", "filesize": [{"value": "347 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 347000.0, "url": {"url": "https://meral.edu.mm/record/5365/files/Implementation of Integrity Constraint Checker for Healthcare Database System.pdf"}, "version_id": "212db9f7-6fe5-46dc-9c42-8a073726560c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "PSC", "subitem_c_date": "24 December, 2008", "subitem_conference_title": "The Third Local Conference On Parallel and Soft Computing", "subitem_place": "University of Computer Studies, Yangon, Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyawt Kyawt San"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2008-12-24"}, "item_title": "Implementation of Integrity Constraint Checker for Healthcare Database System", "item_type_id": "21", "owner": "45", "path": ["1596102391527"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005365", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-09-15"}, "publish_date": "2020-09-15", "publish_status": "0", "recid": "5365", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Integrity Constraint Checker for Healthcare Database System"], "weko_shared_id": -1}

Implementation of Integrity Constraint Checker for Healthcare Database System

http://hdl.handle.net/20.500.12678/0000005365
d206b418-d2e3-4db8-a134-57981331335a
da3ce307-f452-4f53-b4fb-b24ee3d0ec4c
None
Name / File License Actions
Implementation Implementation of Integrity Constraint Checker for Healthcare Database System.pdf (347 Kb)
Publication type
Conference paper
Upload type
Publication
Title
Title Implementation of Integrity Constraint Checker for Healthcare Database System
Language en
Publication date 2008-12-24
Authors
Kyawt Kyawt San
Description
Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out.
Keywords
Database
Conference papers
PSC
24 December, 2008
The Third Local Conference On Parallel and Soft Computing
University of Computer Studies, Yangon, Myanmar
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats