256,007 Hits in 3.5 sec

IEC 61850 SCL Validation Using UML Model in Modern Digital Substation

Byungtae Jang, Alidu Abubakari, Namdae Kim
2018 Smart Grid and Renewable Energy  
In this research, we extend the conventional SCL validation algorithm to develop a more advanced validator which can validate the standard data model using the Unified Modeling Language (UML).  ...  By using the Rule-based SCL validation tool, we implement validation test cases for a more comprehensive understanding of the various validation functionalities.  ...  logical nodes for the SA system.  ... 
doi:10.4236/sgre.2018.98009 fatcat:rdppawpkgzf2nhxwnn3hvvjdr4

Concept and assumptions about the temporal graph database

Jarosław Koszela, Paulina Szczepańczyk-Wysocka, N. Mastorakis, V. Mladenov, A. Bulucea
2018 MATEC Web of Conferences  
Furthermore, the article also describes the concept and assumptions about the temporal graph database, including a proposal of two methods for representing temporal data in graph databases.  ...  Full write method assumes creating a new database object for each state of being. While incremental method writes only such features and relationships that were subject to change.  ...  [8] [9] Commonly used systems for managing temporal databases are based on relational data models.  ... 
doi:10.1051/matecconf/201821004017 fatcat:bpiprhynh5cmpdozslect5svne

Case Tool Support for Variability Managing in Database Schemas

Nesrine Khalfallah, RIADI Laboratory, National School of Computer Science, Campus of Manouba, Manouba 2010, Tunisia., Sami Ouali, Naoufel Kraiem
2018 Journal of Software  
Thus, this tool allows the automatic generation of a logical, relational, evolutive , and variable schema of a given database.  ...  Thus, we proposed an approach for modelling and implementing variability in database schemas in database product lines (VariaLBD).  ...  Thus, Microsoft SQL server management studio 2008 is used as a database management system (DBMS) on a local workstation.  ... 
doi:10.17706/jsw.13.11.600-612 fatcat:6lgsnsg3x5cn5ptqt6esbxw354

A Tool for Database Testing and Optimization

Bogdan Walek, Cyril Klimeš
2012 International Journal of Computer and Communication Engineering  
In the paper we propose a tool for testing logical model of the implemented database against original requirements for its creation.  ...  But there is no tool for testing logical model of the relational database against requirements for its creation.  ...  ACKNOWLEDGMENT The presented topic is also a part of the internal grant SGS10/PřF/2012, called Fuzzy modeling tools for analysis and design of information systems, at the Department of Infomatics and Computers  ... 
doi:10.7763/ijcce.2012.v1.67 fatcat:6gzkyefkjvfmhokgwaucwwijqy

Quality Improvement of Conceptual UML and OCL Schemata through Model Validation and Verification [chapter]

Martin Gogolla, Khanh-Hoang Doan
2017 Conceptual Modeling Perspectives  
One USE component that is in charge for this task is the so-called model validator that transforms UML and OCL models as well as validation and verification tasks into the relational logic of Kodkod [  ...  In a similar way the use case 'constraint implication' is designed for determining whether an additional invariant is a logical consequence of the model.  ... 
doi:10.1007/978-3-319-67271-7_11 dblp:conf/birthday/GogollaD17 fatcat:wmo7f423bngp3apl7p4vutqcye

Feral Concurrency Control

Peter Bailis, Alan Fekete, Michael J. Franklin, Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica
2015 Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15  
Specifically, we focus our study on the common use of feral, or application-level, mechanisms for maintaining database integrity, which, across a range of ORM systems, often take the form of declarative  ...  In light of these findings, we present recommendations for database system designers for better supporting these modern ORM programming patterns, thus eliminating their adverse effects on application integrity  ...  Bernstein, Colin Jones, Xavier Shay, and the SIGMOD reviewers for their insightful commentary and feedback on this  ... 
doi:10.1145/2723372.2737784 dblp:conf/sigmod/BailisFFGHS15 fatcat:ivgtcqcqpjgn5mak3cf44fm254

Retrieval Optimization Technique for Tuple Timestamp Historical Relation Temporal Data Model

2012 Journal of Computer Science  
Results: A technique for querying temporal database modeled by TTHR is the topic of this study.  ...  Conclusion: We proposed a data retrieval optimization technique for querying temporal database; this technique applies for the temporal database applications that are modeled by TTHR.  ...  Patel (2003) proposed a technique for developing temporal database on top of conventional relational database management system; the system architecture is in Fig. 9 .  ... 
doi:10.3844/jcssp.2012.243.250 fatcat:5ndxopi7erdjbndq5v2jg24ycy

Building a Robust Relational Implementation of Topology [chapter]

Erik Hoel, Sudhakar Menon, Scott Morehouse
2003 Lecture Notes in Computer Science  
We propose a different approach to representing such models that avoids many of the traditional relational database problems associated with maintaining complex semantic models.  ...  Topologically structured data models often form the core of many users' spatial databases.  ...  The logical topology model provides a theoretical basis for this functionality.  ... 
doi:10.1007/978-3-540-45072-6_29 fatcat:4zdlj46pcraexohlj3og5zjhui

Modelling and Managing Time in Database Systems

D. H. O. Ling, D. A. Bell
1992 Computer journal  
This paper describes a new architecture for a system to handle temporal data, called Temporal Data Management System, TDMS.  ...  We introduce a conceptual framework which permits issues such as handling schema anomalies due to updates, query validation and correct semantics modelling to be handled in a consistent and usable manner  ...  either by a Database Administrator (DBA) or automatically by the system.  ... 
doi:10.1093/comjnl/35.4.332 fatcat:nzl4lsc2creoril5hzgf52dzl4

Face Validation of Database Forensic Investigation Metamodel

Arafat Al-Dhaqm, Shukor Razak, Richard A. Ikuesan, Victor R. Kebande, Siti Hajar Othman
2021 Infrastructures  
Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM).  ...  From the expert review, the developed DBFIM was found to be complete, coherent, logical, scalable, interoperable, and useful for the DBFI field.  ...  [18] proposed a reconstruction model for rebuilding database content from a database image without using any log or system metadata.  ... 
doi:10.3390/infrastructures6020013 fatcat:bazmxg3h3zc73c6xn3ivcrswla

The Development of Accreditation App with MVC Architectural Pattern

Maksy Sendiang, Maryke Alelo, Venny Ponggawa
2017 International Journal of Computer Applications  
Accreditation of educational institutions becomes a gateway for measuring the quality of education services run by educational institutions.  ...  This paper contains the development of accreditation applications using Model View Controller (MVC) pattern.  ...  Inception is a stage model the business processes required and defines the need for the system to be created 2. Elaboration is more focused on planning the system architecture.  ... 
doi:10.5120/ijca2017915561 fatcat:u5j4arb7pzgbxeznszioa6mrkm

Database Management Systems-Their Place in Nursing Informatics Education

2011 Computers, Informatics, Nursing  
 Nursing informatics requires understanding of data structures  Including database knowledge and skills in nursing informatics curricula  Models for teaching  ...  [insert Table 1 about here] Logical Design Logical design can be classified as the planning processes for a database.  ...  For example, a student initiates the registration process by entering in a user id and password (activity); the database then checks to see if this is a valid user (activity); a message regarding authorization  ... 
doi:10.1097/ncn.0b013e3181fb5be0 pmid:21099538 fatcat:454x5jt5kbeh7df2ndfnuvasde

Model-Driven Integration of Compression Algorithms in Column-Store Database Systems

Juliana Hildebrandt, Dirk Habich, Wolfgang Lehner
2016 Lernen, Wissen, Daten, Analysen  
Aside from increased main memory capacities, a further driver for in-memory database systems was the shift to a decomposition storage model in combination with lightweight data compression algorithms.  ...  Core components of our concept are (i) a unified conceptual model for lightweight compression algorithms, (ii) specifying algorithms as platform-independent model instances, (iii) transforming model instances  ...  Acknowledgments This work was partly funded (1) by the German Research Foundation (DFG) in the context of the project "Lightweight Compression Techniques for the Optimization of Complex Database Queries  ... 
dblp:conf/lwa/HildebrandtHL16 fatcat:wcj3gzyolfharoxrk5yhugnpse

Design, implementation and validation of AI-inspired information systems

Alfredo Cuzzocrea
2013 Journal of Intelligent Information Systems  
As a consequence, it naturally follows that designing, implementing and validating AI-Inspired Information Systems not only conveys in the need for elegant and scalable approaches, but also these approaches  ...  From this main evidence, there emerges a great interest in methodologies that can improve the variegate aspects of Information Systems life-cycle, with special emphasis on the modeling, representation,  ...  The second paper, titled "Design of Distributed Database Systems: An Iterative Genetic Algorithm", by Sukkyu Song, provides cost models and solutions to two annoying problems of distributed database system  ... 
doi:10.1007/s10844-013-0287-y fatcat:yeiwcze4yzcahmnwxd7bpxxq7u

Testing Data Consistency of Data-Intensive Applications Using QuickCheck

Laura M. Castro, Thomas Arts
2011 Electronical Notes in Theoretical Computer Science  
Many software systems are data-intensive and use a data management systems for data storage, such as Relational Database Management Systems (RDBMS).  ...  In this article, we show how QuickCheck, a tool for random testing against specifications, can be used to test the business logic of an application to increase confidence on data integrity.  ...  Gulías from the University of A Coruña for his support and for creating the possibility for this collaboration.  ... 
doi:10.1016/j.entcs.2011.02.010 fatcat:jb4ru2go2bhfhg7xckfb73hbpm
« Previous Showing results 1 — 15 out of 256,007 results