• No results found

XML and relational data

Mapping Process of Relational Data to OWL Class Instances using XSLT

Mapping Process of Relational Data to OWL Class Instances using XSLT

... The XML structure of named individual After the new individual I(R) has been created, it must be filled by the values of all columns of the row, including primary keys and foreign ...

5

Extended Tuple Constraint Type as a Complex Integrity Constraint Type in XML Data Model – Definition and Enforcement

Extended Tuple Constraint Type as a Complex Integrity Constraint Type in XML Data Model – Definition and Enforcement

... the relational data model in order to determine more closely the set of complex integrity ...the relational and XML data ...the XML data model and proposed two techniques ...

24

Tractable XML data exchange via relations

Tractable XML data exchange via relations

... a relational representation to ...an XML pattern used in a mapping will result in a join in the relational translation, making it inefficient, and second, enforcing even a simple schema structure ...

18

Storing, Querying and Validating Fuzzy XML
          Data in Relational Database

Storing, Querying and Validating Fuzzy XML Data in Relational Database

... [24] XML schemas have substituted DTDs as the new way for putting constraints on XML ...fuzzy XML schema to show an execution of a fuzzy relational database that permitted for resemble ...

8

Detection of Repetition Data in XML Storage

Detection of Repetition Data in XML Storage

... Hierarchical Data focuses on the homogeneous xml schema duplicate detection using the Bayesian ...as data integration to identify and characterize inter-schema relationships between multiple ...

5

A Scalable Business Intelligence Decision Making System in the Era of Big Data

A Scalable Business Intelligence Decision Making System in the Era of Big Data

... the relational data, the XML data, and NoSQL data stored in the HBase version ...different data sources: the relational database, an XML file, the multidimensional ...

9

LEARNING OBJECTS MANAGEMENT SYSTEM FOR E-LEARNING

LEARNING OBJECTS MANAGEMENT SYSTEM FOR E-LEARNING

... The XML presentation of metadata should be stored for the management of learning ...so-called XML-native database. XML-native means that when the XML documents are stored into the database the ...

7

Accelerating XML Query Processing on Views

Accelerating XML Query Processing on Views

... In this paper, we employ some processing methods on XML documents to improve document retrieval. The goal is to reduce the number of visited nodes during tree traversing, thereby leading to faster query ...

12

Investigation into Indexing XML Data Techniques

Investigation into Indexing XML Data Techniques

... A number of researchers [17] developed a dynamic labelling method that can be used with Dewey labels with identifiers of size 0(log n) where “n” is the size of the database. All labelling schemes including Dewey need ...

8

The Process and Application of XML Data Mining

The Process and Application of XML Data Mining

... diversified data mining ...of data exchange. To overcome these limitations, XML (eXtensible Markup Language) uses custom-defined tags to describe the data and the structural relationships of ...

22

Mining XML data: A clustering approach

Mining XML data: A clustering approach

... from XML documents without any need for pre or post processing by using XQuery to implement the well known Apriori ...that XML data can be mined using XQuery and then integrate the data mining ...

6

Use of XML and Relational Databases for Consistent Development and Maintenance of Lexicons and Annotated Corpora

Use of XML and Relational Databases for Consistent Development and Maintenance of Lexicons and Annotated Corpora

... First, the system maintains two kinds of data in the database: lexicons and annotated corpora. The lexicons provide grammatical information as well as canonical form and the construction of the entry words. In ...

7

Practical Integrity Assurance for Big Data Processing Deployed over Open Cloud.

Practical Integrity Assurance for Big Data Processing Deployed over Open Cloud.

... of data has been exploding in the ...large data sets, so- called big data, is becoming a key basis of competition, underpinning new waves of productivity growth, research innovation, preventing ...

109

9. XML_ Defining Data for Web Applications V2

9. XML_ Defining Data for Web Applications V2

... • XML declaration is the first statement • Every document must contain a root element • Attribute values must have quotation marks • Certain characters are reserved for parsing ...

19

Mapping of XML to Sparse Table Using Relational Engine for P2P Databases: Implementation

Mapping of XML to Sparse Table Using Relational Engine for P2P Databases: Implementation

... new data management problems, such as extracting data from Web pages and making databases accessible from Web browsers, and has renewed the interest in problems that had appeared before in other contexts, ...

7

A framework for efficent association rule mining in XML data

A framework for efficent association rule mining in XML data

... from XML documents efficiently. XAR-Miner transforms data in the XML document and constructs an Indexed XML Tree (IX-tree) if the XML data can be fully loaded into main memory or ...

22

The Fly Search in XML Data Using Fuzzy Keyword Search

The Fly Search in XML Data Using Fuzzy Keyword Search

... This framework gives faster searching strategy for XML information. The search will be executed as clients sort the queries or query keywords; so that, the minor errors in the keywords can be dismissed. The ...

6

Building XML data warehouse based on frequent patterns in user queries

Building XML data warehouse based on frequent patterns in user queries

... of XML-based data sources available across the Internet, it is increasingly important to provide users with a data warehouse of XML data sources to facilitate decision-making ...of ...

10

Rule based Detection of SQL Injection Attack

Rule based Detection of SQL Injection Attack

... Turning back to our example given for the query string query, in the beginning of the section, the candidate input v : s←“Jimmey OR „a‟ = „a‟ ” is an SQL injection attack, since it generates a query whose structure is - ...

10

Extracting the Attributes of Entities from Semi Structured Information Using XSearch

Extracting the Attributes of Entities from Semi Structured Information Using XSearch

... fact, XML might be referred to as having "flexible structure" capable of human-centric flow and hierarchy as well as highly rigorous element structure and data ...of XML as ...

8

Show all 10000 documents...

Related subjects