Data Dependencies in Codd's Relational Model with Similarities

Author(s):  
Radim Belohlavek ◽  
Vilem Vychodil

This chapter deals with data dependencies in Codd’s relational model of data. In particular, we deal with fuzzy logic extensions of the relational model that consist of adding similarity relations to domains and consider functional dependencies in these extensions. We present a particular extension and functional dependencies in this extension that follow the principles of fuzzy logic in a narrow sense. We present selected features and results regarding this extension. Then, we use this extension as a reference model and compare it to several other extensions proposed in the literature. We argue that following the principles of fuzzy logic in a narrow sense, the same way we can follow the principles of classical logic in the case of the ordinary Codd relational model, helps achieve transparency, versatility, conceptual clarity, and theoretical and computational tractability of the extension. We outline several topics for future research.

Author(s):  
Radim Bělohlávek ◽  
Joseph W. Dauben ◽  
George J. Klir

Mathematical reasoning is governed by the laws of classical logic, based on the principle of bivalence. With the acceptance of intermediate truth degrees, the situation changed substantially. This chapter begins with a characterization of mathematics based on fuzzy logic, an identification of principal issues of its development, and an outline of this development. It then examines the role of fuzzy logic in the narrow sense for developing mathematics based on fuzzy logic and the main approaches developed toward its foundations. Next, some selected areas of mathematics based on fuzzy logic are presented, such as the theory of sets and relations, algebra, topology, quantities and mathematical analysis, probability, and geometry. The chapter concludes by examining various semantic questions regarding fuzzy logic and mathematics based on it.


Author(s):  
Radim Bělohlávek ◽  
Joseph W. Dauben ◽  
George J. Klir

This chapter is a general introduction to the book and an overview of its content. It describes the aims and scope of the book, and explains why a historical perspective is essential for achieving the aims. It introduces informally the key concepts involved, and the particular challenge fuzzy logic poses to the principle of bivalence in classical logic. It looks at the circumstances that led to the emergence of fuzzy logic in the academic community and as well as at the agendas of two main subareas of fuzzy logic, known as fuzzy logic in the narrow sense and fuzzy logic in the broad sense. The content of each of the subsequent chapters of the book is also briefly described.


2021 ◽  
Author(s):  
◽  
Van Tran Bao Le

<p>A database is said to be C-Armstrong for a finite set Σ of data dependencies in a class C if the database satisfies all data dependencies in Σ and violates all data dependencies in C that are not implied by Σ. Therefore, Armstrong databases are concise, user-friendly representations of abstract data dependencies that can be used to judge, justify, convey, and test the understanding of database design choices. Indeed, an Armstrong database satisfies exactly those data dependencies that are considered meaningful by the current design choice Σ. Structural and computational properties of Armstrong databases have been deeply investigated in Codd’s Turing Award winning relational model of data. Armstrong databases have been incorporated in approaches towards relational database design. They have also been found useful for the elicitation of requirements, the semantic sampling of existing databases, and the specification of schema mappings. This research establishes a toolbox of Armstrong databases for SQL data. This is challenging as SQL data can contain null marker occurrences in columns declared NULL, and may contain duplicate rows. Thus, the existing theory of Armstrong databases only applies to idealized instances of SQL data, that is, instances without null marker occurrences and without duplicate rows. For the thesis, two popular interpretations of null markers are considered: the no information interpretation used in SQL, and the exists but unknown interpretation by Codd. Furthermore, the study is limited to the popular class C of functional dependencies. However, the presence of duplicate rows means that the class of uniqueness constraints is no longer subsumed by the class of functional dependencies, in contrast to the relational model of data. As a first contribution a provably-correct algorithm is developed that computes Armstrong databases for an arbitrarily given finite set of uniqueness constraints and functional dependencies. This contribution is based on axiomatic, algorithmic and logical characterizations of the associated implication problem that are also established in this thesis. While the problem to decide whether a given database is Armstrong for a given set of such constraints is precisely exponential, our algorithm computes an Armstrong database with a number of rows that is at most quadratic in the number of rows of a minimum-sized Armstrong database. As a second contribution the algorithms are implemented in the form of a design tool. Users of the tool can therefore inspect Armstrong databases to analyze their current design choice Σ. Intuitively, Armstrong databases are useful for the acquisition of semantically meaningful constraints, if the users can recognize the actual meaningfulness of constraints that they incorrectly perceived as meaningless before the inspection of an Armstrong database. As a final contribution, measures are introduced that formalize the term “useful” and it is shown by some detailed experiments that Armstrong tables, as computed by the tool, are indeed useful. In summary, this research establishes a toolbox of Armstrong databases that can be applied by database designers to concisely visualize constraints on SQL data. Such support can lead to database designs that guarantee efficient data management in practice.</p>


Author(s):  
Vilém Novák ◽  
Alessandro Zorat ◽  
Mario Fedrizzi

In this paper a simple procedure for pattern pre-recognition is presented. The task is to recognize whether a given pattern should be interesting for further analysis or not. The description of the procedure presented in this paper is based on formal theory of fuzzy logic in narrow sense so that the procedure – being general – can be used for many other purposes where patterns are to be recognized.


Author(s):  
Vilém Novák ◽  
Irina Perfilieva ◽  
JiŘí Močkoř
Keyword(s):  

2016 ◽  
Vol 24 ◽  
pp. 43 ◽  
Author(s):  
Alfredo J. Artiles ◽  
Elizabeth B. Kozleski

The purpose of this article is to offer critical notes on inclusive education research in the U.S. We discuss issues germane to conceptual clarity and the ways in which inclusive education interacts with reforms that share equity goals, noting disruptions and unintended consequences that arise at the nexus of these reforms. In addition, we identify enduring challenges and paradoxes in this research literature. These include sampling issues, an emphasis on where students are placed as a proxy for inclusive education vis-à-vis inclusive education as the transformation of educational systems, the ways in which outcome measures have been examined in this research, and the need for and challenges of building strategic alliances that could advance an inclusive education agenda. We conclude with reflections and suggestions for a future research program that include sharpening inclusion’s identity, attending to the fluid nature of ability differences and students’ multiple identities, broadening the unit of analysis to systems of activities, and documenting processes and outcomes.


Author(s):  
Alberto López Ortega

AbstractConcerns about the use of online political microtargeting (OPM) by campaigners have arisen since the Cambridge Analytica scandal hit the international political arena. In addition to providing conceptual clarity on OPM and explore the use of such techniques in Europe, this paper seeks to empirically disentangle the differing behaviours of campaigners when they message citizens through microtargeted rather than non-targeted campaigning. More precisely, I hypothesise that campaigners use negative campaigning and are more diverse in terms of topics when they use OPM. To investigate whether these expectations hold true, I use text-as-data techniques to analyse an original dataset of 4,091 political Facebook Ads during the last national elections in Austria, Italy, Germany and Sweden. Results show that while microtargeted ads might indeed be more thematically diverse, there does not seem to be a significant difference to non-microtargeted ads in terms of negativity. In conclusion, I discuss the implications of these findings for microtargeted campaigns and how future research could be conducted.


2021 ◽  
Vol 12 ◽  
Author(s):  
Nicola Döring ◽  
Nicole Krämer ◽  
Veronika Mikhailova ◽  
Matthias Brand ◽  
Tillmann H. C. Krüger ◽  
...  

Based on its prevalence, there is an urgent need to better understand the mechanisms, opportunities and risks of sexual interaction in digital contexts (SIDC) that are related with sexual arousal. While there is a growing body of literature on SIDC, there is also a lack of conceptual clarity and classification. Therefore, based on a conceptual analysis, we propose to distinguish between sexual interaction (1) through, (2) via, and (3) with digital technologies. (1) Sexual interactions through digital technologies are face-to-face sexual interactions that (a) have been started digitally (e.g., people initiating face-to-face sexual encounters through adult dating apps) or (b) are accompanied by digital technology (e.g., couples augmenting their face-to-face sexual encounters through filming themselves during the act and publishing the amateur pornography online). (2) Sexual interactions via digital technology are technology-mediated interpersonal sexual interactions (e.g., via text chat: cybersex; via smartphone: sexting; via webcam: webcam sex/camming). (3) Sexual interactions with digital technology occur when the technology itself has the role of an interaction partner (e.g., sexual interaction with a sex robot or with a media persona in pornography). The three types of SIDC and their respective subtypes are explained and backed up with empirical studies that are grouped according to two major mediators: consent and commerce. Regarding the causes and consequences of the three types of SIDC we suggest a classification that entails biological, psychological, social, economic, and technological factors. Regarding implications of SIDC we suggest to focus on both opportunities and risks for sexual health. The proposed conceptual framework of SIDC is meant to inform future research.


Author(s):  
Deborah Welch Larson ◽  
T.V. Paul ◽  
Harold A. Trinkunas ◽  
Anders Wivel ◽  
Ralf Emmers

This concluding chapter offers a summary and evaluation of the key ideas contained in the chapters of this Handbook. The chapter discusses peaceful change in terms of conceptual clarity; historical evolution of scholarship in the area, especially the interwar, Cold War, and post–Cold War era efforts at analyzing the concepts; and the policy innovations in this realm. This is followed by an evaluation of the key umbrella theories of international relations—realism, liberalism, and constructivism—and how they approach peaceful change. Some important sources and mechanisms of change are analyzed. This is followed by discussion of the policy contributions of selected great and rising powers toward peaceful change. The chapter then offers a summary of contributions and progress that various regions have made in the area of peaceful change. It concludes with some ideas for future research while highlighting the significance of the subject matter for international relations and the world order.


Sign in / Sign up

Export Citation Format

Share Document