scholarly journals Choosing the most appropriate query language to use Outer Joins for data extraction in Datalog mode in the Deductive Database System DES

2018 ◽  
Vol 15 (1) ◽  
pp. 139-150
Author(s):  
Mahdi Ranjbar Hassani Mahmood Abadi ◽  
Ahmad Faraahi ◽  
◽  
2003 ◽  
pp. 1-35 ◽  
Author(s):  
Nick Bassiliades ◽  
Ioannis Vlahavas ◽  
Dimitros Sampson

In this chapter, we propose the use of first-order logic, in the form of deductive database rules, as a query language for XML data, and we present X-Device, an extension of the deductive object-oriented database system Device, for storing and querying XML data. XML documents are stored into the OODB by automatically mapping the DTD to an object schema. XML elements are treated either as classes or attributes based on their complexity, without loosing the relative order of elements in the original document. Furthermore, this chapter describes the extension of the system’s deductive rule query language with second-order variables, general path and ordering expressions, for querying over the stored, tree-structured XML data and constructing XML documents as a result. The extensions were implemented by translating all the extended features into the basic, first-order deductive rule language of Device using meta-data about stored XML objects.


2002 ◽  
Author(s):  
S. Kuhara ◽  
K. Satou ◽  
E. Furuichi ◽  
T. Takagi ◽  
H. Takehara ◽  
...  

Author(s):  
Thomas Eiter ◽  
Nicola Leone ◽  
Cristinel Mateis ◽  
Gerald Pfeifer ◽  
Francesco Scarcello

BMJ Open ◽  
2020 ◽  
Vol 10 (3) ◽  
pp. e034845
Author(s):  
Damon P Eisen ◽  
Emma S McBryde ◽  
Luke Vasanthakumar ◽  
Matthew Murray ◽  
Miriam Harings ◽  
...  

PurposeTo design a linked hospital database using administrative and clinical information to describe associations that predict infectious diseases outcomes, including long-term mortality.ParticipantsA retrospective cohort of Townsville Hospital inpatients discharged with an International Classification of Diseases and Related Health Problems 10th Revision Australian Modification code for an infectious disease between 1 January 2006 and 31 December 2016 was assembled. This used linked anonymised data from: hospital administrative sources, diagnostic pathology, pharmacy dispensing, public health and the National Death Registry. A Created Study ID was used as the central identifier to provide associations between the cohort patients and the subsets of granular data which were processed into a relational database. A web-based interface was constructed to allow data extraction and evaluation to be performed using editable Structured Query Language.Findings to dateThe database has linked information on 41 367 patients with 378 487 admissions and 1 869 239 diagnostic/procedure codes. Scripts used to create the database contents generated over 24 000 000 database rows from the supplied data. Nearly 15% of the cohort was identified as Aboriginal or Torres Strait Islanders. Invasive staphylococcal, pneumococcal and Group A streptococcal infections and influenza were common in this cohort. The most common comorbidities were smoking (43.95%), diabetes (24.73%), chronic renal disease (17.93%), cancer (16.45%) and chronic pulmonary disease (12.42%). Mortality over the 11-year period was 20%.Future plansThis complex relational database reutilising hospital information describes a cohort from a single tropical Australian hospital of inpatients with infectious diseases. In future analyses, we plan to explore analyses of risks, clinical outcomes, healthcare costs and antimicrobial side effects in site and organism specific infections.


2018 ◽  
Vol 210 ◽  
pp. 04053
Author(s):  
Mikhail M. Kucherov ◽  
Nina A. Bogulskaya

Designing security, from the hardware level, is essential to ensure the integrity of the intelligent cyber-physical infrastructure that is the Industrial Internet of Things (IIoT). If intelligent cyber-physical infrastructure fails to do the right things because it is insecure and vulnerable, then there will be negative social consequences [1]. Security is, in a sense, the access control to IIoT systems, which increasingly relies on the ability to compose different policies. Therefore, the advantage in any framework for compiling policies is that it is intuitive, formal, expressive, application-independent, as well as expandable to create domain-specific instances. Recently, such a scheme was proposed based on Belnap logic FOUR2 [2]. Four values of the Belnap bilattice have been interpreted as grant, deny, conflict, or unspecified with respect to access-control policy. Belnap’s four-valued logic has found a variety of applications in various fields, such as deductive database theory, distributed logic programming, and other areas. However, it turns out that the truth order in FOUR2 is a truth-and-falsity order at the same time [3]. The smallest lattice, where the orders of truth and falsity are independent of each other, which is especially important for security policy, is that of Shramko-Wansing’s SIXTEEN3. This generalization is well-motivated and leads from the bilattice FOUR2 with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN3 with an information ordering together with a truth ordering and a (distinct) falsity ordering.Based onSIXTEEN3 and new Boolean predicates to control access [4], we define an expressive access-control policy language, having composition statements based on the statements of Schramko-Wansing’s logic. Natural orderings on politics are obtained by independent lifting the orders of truth and falsity of trilattice, which results in a query language in which conflict freedom analysis can be developed. The reduction of formal verification of queries to that on predicates over access requests enables to carry out policy analysis. We evaluate our approach through examples of control access model policy.


Sign in / Sign up

Export Citation Format

Share Document