{"created":"2020-09-15T08:14:21.713875+00:00","id":5365,"links":{},"metadata":{"_buckets":{"deposit":"da3ce307-f452-4f53-b4fb-b24ee3d0ec4c"},"_deposit":{"created_by":45,"id":"5365","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"5365"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/5365","sets":["1582963342780:1596102391527"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Integrity Constraint Checker for Healthcare Database System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Checking integrity constraints and enforcement is by now firmly established as a key functionality of a DBMS.DBMS must therefore help present the entry of incorrect information by enforcing integrity constraints. This paper presents integrity constraint checker for hospital database. The checker will also guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency by using an efficient algorithm, Constraint Planning Algorithm (CPA). Constraints to be enforced are also stored in the meta database. CPA takes as input an update statement and checks violation with the constraints stored in the meta database. In case of violation, the update statement is rejected and the violated constraint is output to the user. This algorithm is efficient since the algorithm does not require the update statement to be executed before the constraint check is carried out."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Database"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-09-15"}],"displaytype":"preview","filename":"Implementation of Integrity Constraint Checker for Healthcare Database System.pdf","filesize":[{"value":"347 Kb"}],"format":"application/pdf","licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/5365/files/Implementation of Integrity Constraint Checker for Healthcare Database System.pdf"},"version_id":"212db9f7-6fe5-46dc-9c42-8a073726560c"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"PSC","subitem_c_date":"24 December, 2008","subitem_conference_title":"The Third Local Conference On Parallel and Soft Computing","subitem_place":"University of Computer Studies, Yangon, Myanmar"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kyawt Kyawt San"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2008-12-24"},"item_title":"Implementation of Integrity Constraint Checker for Healthcare Database System","item_type_id":"21","owner":"45","path":["1596102391527"],"publish_date":"2020-09-15","publish_status":"0","recid":"5365","relation_version_is_last":true,"title":["Implementation of Integrity Constraint Checker for Healthcare Database System"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2021-12-13T03:38:58.350602+00:00"}