scholarly journals Validation of schema mappings with nested queries

2013 ◽  
Vol 10 (1) ◽  
pp. 79-104
Author(s):  
Guillem Rull ◽  
Carles Farré ◽  
Ernest Teniente ◽  
Toni Urpí

With the emergence of the Web and the wide use of XML for representing data, the ability to map not only flat relational but also nested data has become crucial. The design of schema mappings is a semi-automatic process. A human designer is needed to guide the process, choose among mapping candidates, and successively refine the mapping. The designer needs a way to figure out whether the mapping is what was intended. Our approach to mapping validation allows the designer to check whether the mapping satisfies certain desirable properties. In this paper, we focus on the validation of mappings between nested relational schemas, in which the mapping assertions are either inclusions or equalities of nested queries. We focus on the nested relational setting since most XML?s Document Type Definitions (DTDs) can be represented in this model. We perform the validation by reasoning on the schemas and mapping definition. We take into account the integrity constraints defined on both the source and target schema. We consider constraints and mapping?s queries which may contain arithmetic comparisons and negations. This class of mapping scenarios is significantly more expressive than the ones addressed by previous work on nested relational mapping validation. We encode the given mapping scenario into a single flat database schema, so we can take advantage of our previous work on validating flat relational mappings, and reformulate each desirable property check as a query satisfiability problem.

2017 ◽  
Vol 10 (2) ◽  
pp. 359-363
Author(s):  
Rupal Sharma ◽  
Ravi Sheth

Today, web application security is most significant battlefield between victim, attacker and resource of web service. The owner of web applications can’t see security vulnerability in web application which develops in ASP.NET. This paper explain one algorithm which aim to identify broken authentication and session management vulnerability. The given method of this paper scan the web application files. The created scanner generator relies on studying the source character of the application limited ASP.NET files and the code be beholden files. A program develop for this motive is to bring about a report which describes vulnerabilities types by mentioning the indict name, disclose description and its location. The aim of the paper is to discover the broken authentication and session management vulnerabilities. The indicated algorithm will uphold organization and developer to repair the vulnerabilities and recover from one end to the other security.


2019 ◽  
Vol 11 (2) ◽  
pp. 20-34
Author(s):  
Meenakshi Sharma ◽  
Anshul Garg

The World Wide Web is immensely rich in knowledge. The knowledge comes from both the content and distinctive characteristics of the web like its hyperlink structure. The problem comes in digging the relevant data from the web and giving the most appropriate decision to solve the given problem, which can be used for improving any business organisation. The effective solution of the problem depends on how efficiently and effectively the analysis of the web data is done. In analysing the data on web, not only relevant content analysis is essential but also the analysis of web structure is important. This article gives a brief introduction about the various terminologies and measures like centrality, Page Rank, and density used in the web networking analysis. This article will also give a brief introduction about the various supervised ML techniques such as classification, regression, and unsupervised machine learning techniques such as clustering, etc., which are very useful in analysing the web network so that user can make quick and effective decision making


2016 ◽  
Vol 48 (4) ◽  
pp. 363-372
Author(s):  
Gordana Rudić ◽  
Bojana Dimić Surla ◽  
Dragan Ivanović

The paper provides suggestions for cataloguing session materials (especially minutes of sessions) using the MARC 21 Format for Bibliographic Data and MARC 21 Format for Authority Data. The suggested solution is shown on the example of materials from the government of the Autonomous Province of Vojvodina in Serbia (APV) sessions. Two business applications were developed on the basis of this MARC 21 cataloguing of the materials: a web application for searching government materials and a web application for generating various reports for the APV government. The web application supports searching metadata as well as the full text of the material and search criteria may include all of the given words or exact phrase. The examples of the reports supported by the application are: total number of sessions; total number of agenda items and sub-items; session attendance by the government members.


First Monday ◽  
2017 ◽  
Vol 22 (4) ◽  
Author(s):  
Sarah Kreiseler ◽  
Viktoria Brüggemann ◽  
Marian Dörk

Museums are broadening their program beyond the physical institutions by providing digital collections online. In digital collections, objects are prepared and presented particularly for the Web and the ambition is to provide the entirety of a physical collection. To make these rich and comprehensive data sets accessible, an explore mode is increasingly offered. The present study considers this mode, first by making sense of the term “exploration” and suggesting four functional principles in support of exploration in digital collections — view, movement, contextualization, and participation. On this basis, we compare eight well-known museums with regard to the explore modes for their digital collections. We have devised a three-part methodology, reverse information architecture, to address the question: How is the function of exploration manifested in the structure and interface elements of digital collections? With this unique method we use the given content to investigate how far the four principles are implemented in explore modes of digital collections and, broadly said, how explorable they are. The introduced approach to studying digital collections could be opened up to other fields to analyze a variety of Web interfaces in general.


The Semantic Web (SW) may be represented as it is advancement of the web; it is specifically conspired to describe information in a specific manner, which machine can understand easily. In this context the ‘object’ or “resource” derived from web must be a unique as Uniform Resource Identifier (URI). Ontologies are used to establish the relationships between objects. Trust or provenance plays important role in the semantic web. Trust defines the merit by which a user considers authenticity of the documents. Semantic web refers the credibility, reliability and tustability of the data in the given context. It is necessary to observe and differentiate trusted data points from entrusted ones. [8]. User has to take decision regarding selection of the documents based on considering all the parameters of trust, whether given information is reliable or not. The documents available in the web in which users put a new set of problems every time and need to obtain the solution exactly trustworthy.


2012 ◽  
Vol 3 (1) ◽  
pp. 18-30 ◽  
Author(s):  
Jiangning Wu ◽  
Yunfei Shi ◽  
Chonghui Guo

Collaborative tagging has been very popular with the development of the Web 2.0, which helps users manage, share and utilize resources effectively. For various kinds of resources, the way to recommend appropriate resources to right users is the key problem in tagging system. This paper proposes a user taste diffusion model based on the tripartite hypergraph to deal with the tri-relation of user-resource-tag in folksonomies and the data sparsity problem in personalized recommendation. Through the defined tri-relation model and diffusion probability matrix, the user’s taste is diffused from itself to other users, resources and tags. When diffusion stops, the candidate resources can be identified then be ranked according to the taste values. As a result the top resources that have not been collected by the given user are selected as the final recommendations. Benefiting from the introduction of iterative diffusion mechanism, the recommendation results not only cover the resources collected by the given user’s direct neighbors but also cover the ones which are collected by his/her extended neighbors. Experimental results show that our method performs better in terms of precision and recall than other recommendation methods.


2017 ◽  
Vol 922 (4) ◽  
pp. 19-25
Author(s):  
V.V. Kuklina ◽  
V.N. Bogdanov

Geographical analysis of scientific communication is given in the article based on comparison of geographical distribution of the authors and their citations in English and Russian peer-reviewed journals. Despite the urgency of the problem of inclusion of Russian scientists in the international scientific community, studies of geography of scientific communication between Russian and foreign colleagues are poorly developed. As a model the geographic analysis of the articles with the keyword «periphery» is chosen as one of the main concepts in the World Geography. The databases of the Web of Science, ArticlesPlus, and Elibrary were used for the analysis. Because of evident peripheral location of the Russian articles in the Web of Science database the analysis of distribution of citations was based on wider data bases of ArticlesPlus and Elibrary. It was noted that the articles in English follow the trends described above, while in the Russian papers the native specificity was distinguished by centralized arrangement of space, as well as by close connections with the neighboring countries. As a result, it was concluded that the peripheral location of the Russian geographic articles is associated not only with the language barrier, but also with the limited number of citations in the Russian articles. The practical implications of the articles are related to the prospects of creating an application that would make geographical maps of citation networks based on the given key words or the names of the authors.


Author(s):  
Jiaqi Zheng ◽  
Yongli Xing ◽  
Fei Lei ◽  
Jin Diao ◽  
Zhangbing Zhou

With an increasing number of Geographical Information System (GIS) services publicly available on the Web, the discovery of composite GIS services is promising when novel requirements are to be satisfied. GIS services in the repository like ArcGIS software are organized in a tree hierarchy, where a parent node represents a categorial GIS service with a coarser-granularity than its child GIS services, while leaf nodes correspond to atomic and exercisable GIS services. In this setting, discovering appropriate atomic GIS services is challenging. To remedy this issue, this paper proposes a composite GIS service discovery mechanism. Specifically, for the given requirement, select the parent nodes that take the given input parameters as input and remove their inactivated children. Use remaining children to build the network and repeat the previous operation until finding the services that contain the required output. Then record the semantic similarity degree, calculated by services functional description, in this network. By using the simulated annealing algorithm, a composite GIS services solution will be recommended from this semantic network. Evaluation results demonstrate that our approach could give more significant solution compared with the state-of-the-art techniques.


2008 ◽  
Vol 54 (No. 3) ◽  
pp. 102-107
Author(s):  
Z. Havlíček ◽  
E. Šilerová ◽  
Č. Halbich

www technologies are developing very fast. The new technologies make possible the easier creation of the web applications, which support business activities. Small and medium size enterprises, which serve as the driving force for innovations and thus for economic development, can utilize these technologies for the creation of relatively inexpensive applications, which can be tailor-made for the given enterprise by using the open source software (OSS). This contribution presents several practical examples of how to create – update – the web site of an enterprise and how to supplement it with an e-shop option. Examples from the area of flower selling have been selected.


Sign in / Sign up

Export Citation Format

Share Document