The way to choose the logical structure of relation of relational databases out of alternatively possible ones

Author(s):  
P.A. Starodubtsev ◽  
◽  
E.A. Storozhok ◽  
Author(s):  
Amir Abbas Moslemi

Ezra Pound’s Shi-Shu: Rats is read Foucauldianly to instantiate an interaction between Confucianism and Western schools of thought in response to the problem of evil. There is a review of Leibniz’s theodicy to clear up confusion, and also to pave the way for a succession of readings of a number of philosophers like Hume and James — foregrounding epistemic inclination of poets like Pope, Wordsworth and Burns. ‘Accidentality’ and ‘essentiality’ are key philosophic terms, without which this problem cannot hold its logical structure, especially in terms of an answer. Epistemo-political ‘docility’ and literal ‘decency’ are employed together for the first time to be reintroducing ancient relationship between cruel politicians and carceral system. Utopia is taken as a mere dream so that ‘the problem’ would tend to keep its identity. What is new in this paper is a ‘gaze’-wise trace of mice in literature supporting the problem of evil in philosophy, based on an actual political background, within a broad sociological realm.


2019 ◽  
pp. 94-106
Author(s):  
Mikhail D. Malykh ◽  
◽  
Anton L. Sevastianov ◽  
Leonid A. Sevastianov ◽  
◽  
...  

The work of transforming a database from one format periodically appears in different organizations for various reasons. Today, the mechanism for changing the format of relational databases is well developed. But with the advent of new types of database such as NoSQL, this problem was exacerbated due to the radical difference in the way data was organized. This article discusses a formalized method based on set theory, at the choice of the number and composition of collections for a key-value type database. The initial data are the properties of the objects, information about which is stored in the database, and the set of queries that are most frequently executed or the speed of which should be maximized. The considered method can be applied not only when creating a new key-value database, but also when transforming an existing one, when moving from relational databases to NoSQL, when consolidating databases.


Author(s):  
Ivan Alekseevich Selishchev ◽  
Svetlana Aleksandrovna Oleinikova

The object of this research is the service systems that receive a stream of requests on their input, which represents a range of mutually dependent operations of the “finish” – “start” type. The time of conducting separate operations is a random variable, and the delivery itself requires the use of one or several types of resources. It is suggested that there are timeframes for processing the request. The goal of this research is to develop the database structure that would allow storing information on the incoming projects, operations, mutual dependence, used resources and specialists. The design of logical structure of the database was carried out using the methodology “essence – link”, which determines the data values in the context of their correlation with other data. The analysis of specificity of the object of research revealed a range of requirements submitted in the database. Leaning on these requirements along with considering normalization of relations used in the theory of relational databases, the author designed the universal structure from the perspective of its application, support of the analysis of the scheduling process, and the entirety of peculiarities of the object of research. Such database structure can be used in different fields that allow decomposition of the project into multiple separate interdependent tasks, not requiring major modifications. The article provides the examples of using the database for information systems in construction sector, as well as for the development of IT projects.


2020 ◽  
Vol 164 ◽  
pp. 09014
Author(s):  
Mikhail Urubkin ◽  
Vasiliy Galushka ◽  
Vladimir Fathi ◽  
Denis Fathi ◽  
Alla Gerasimenko

The article is devoted to the problem of representing graphs in the form that is most suitable for their recording in relational databases and for subsequent efficient extracting and processing. The article analyzes various ways to describe graphs, such as adjacency and, incidence matrices, and adjacency lists. Each of them is reviewed from the point of view of their compliance with normal forms to assess the possibility of using a particular method when developing databases for storing graphs. It is shown that for such a task, each of these methods has a large number of disadvantages that lead to low efficiency of both data storing and processing. The article suggests the way to represent graphs in the form of a relational list of edges corresponding to the third normal form and allowing to eliminate the disadvantages of other methods.


2005 ◽  
Vol 18 (2) ◽  
pp. 275-284
Author(s):  
Milena Stankovic ◽  
Milan Rajkovic ◽  
Petar Rajkovic ◽  
Ivan Petkovic

This paper explains the concept of web content management systems (web CMS) and presents a CMS called Centura, developed at the Faculty of Electronic Engineering in Nis. The way this solution can be used for supervising student projects is discussed in details. We also present the architecture of Centura, emphasizing the elements in the logical structure that can be used for adding new functionalities to the system, without changing the existing application architecture. Using this extension points, we introduce new behavior for standard elements, adjusting them to meet special requirements of student project management.


Phronesis ◽  
2004 ◽  
Vol 49 (3) ◽  
pp. 219-224 ◽  
Author(s):  

AbstractOne of Euthyphro's proposed de finitions of to hosion says: '[T]he pious is what all the gods love . . .'. Scholarly analyses of Socrates' refutation of this de finition have focused on its validity or even its 'truth'. By contrast, this paper restricts itself to the refutation's logical structure, particularly the way Socrates juxtaposes the agreed-upon premises to derive a double or 'chiastic' contradiction. In this article, I lay out the details of Socrates' ingenious logical construction, without regard to its validity or fallaciousness, and argue that the chiastic contradiction alone makes possible Socrates' refutation of Euthyphro's claim to expertise in the realm of to hosion.


IDEA JOURNAL ◽  
1969 ◽  
pp. 15-29
Author(s):  
Elizabeth Grosz

This paper is about the ontology, the materiality and logical structure of art. While I am not trained in the visual arts or architecture, nonetheless I see there are many points of overlap, regions of co-occupation, that concern art and philosophy, and it is these shared concerns that I want to explore. I want to discuss the ‘origins’ of art and architecture, but not the historical, evolutionary or material origins of art – an origin confirmable by some kind of material evidence or research – but rather, the conceptual origins of art, what concepts art entails, assumes and elaborates. These of course are linked to historical, evolutionary and material forces, but are nevertheless conceptually, that is to say, metaphysically or ontologically separable from them. Art, according to Deleuze, does not produce concepts, though it does address problems and provocations. It produces sensations, affects, intensities, as its mode of addressing problems, which sometimes align with and link to concepts, the object of philosophical production, the way philosophy deals with problems. Thus philosophy may have a place, not in assessing art, but in addressing the same provocations or incitements to production as art faces, through different means and with different effects and consequences.


Author(s):  
Liliana María Favre

Reverse Engineering is the process of analyzing available software artifacts such as requirements, design, architectures, code or byte code, with the objective of extracting information and providing high-level views on the underlying system. A common idea in reverse engineering is to exploit the source code as the most reliable description both of the behavior of a software system and of the organization and its business rules. However, reverse engineering is immersed in a variety of tasks related to comprehending and modifying software such as re-documentation of programs and relational databases, recovering of architectures, recovering of alternative design views, recovering of design patterns, building traceability between code and designs, modernization of interfaces or extracting the source code or high level abstractions from byte code when the source code is not available. Reverse engineering is hardly associated with modernization of legacy systems that were developed many years ago with technology that is now obsolete. These systems include software, hardware, business processes and organizational strategies and politics. Many of them remain in use after more than 20 years; they may be written for technology which is expensive to maintain and which may not be aligned with current organizational politics. Legacy systems resume key knowledge acquired over the life of an organization. Changes are motivated for multiple reasons, for instance the way in which we do business and create value. Important business rules are embedded in the software and may not be documented elsewhere. The way in which the legacy system operates is not explicit (Brodie and Stonebraker, 1995) (Sommerville, 2004).


2018 ◽  
Vol 41 ◽  
Author(s):  
Maria Babińska ◽  
Michal Bilewicz

AbstractThe problem of extended fusion and identification can be approached from a diachronic perspective. Based on our own research, as well as findings from the fields of social, political, and clinical psychology, we argue that the way contemporary emotional events shape local fusion is similar to the way in which historical experiences shape extended fusion. We propose a reciprocal process in which historical events shape contemporary identities, whereas contemporary identities shape interpretations of past traumas.


Sign in / Sign up

Export Citation Format

Share Document