Generalization of Typed Inclusion Dependencies with Null Values in Databases

IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2025-02-12 DOI:10.3103/S0146411624700317
S. V. Zykin
{"title":"Generalization of Typed Inclusion Dependencies with Null Values in Databases","authors":"S. V. Zykin","doi":"10.3103/S0146411624700317","DOIUrl":null,"url":null,"abstract":"<p>A new type of dependency in databases, which is a generalization of inclusion dependencies, is considered. Traditionally, such dependencies are used in practice to ensure referential integrity. In this case, the constraint is established only between a pair of relations, the first of which is called the main relation, and the second one is the external relation. In practice, referential integrity often needs to be established for a larger number of relations, where several main relations and several external relations participate in the same constraint. This structure corresponds to an ultragraph. Generalized inclusion dependencies that take into account the presence of null values in external relations are justified. The system of axioms is obtained based on a study of the properties of typed dependencies. The consistency (soundness) and completeness of the system are proved.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 7","pages":"861 - 868"},"PeriodicalIF":0.5000,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411624700317","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

A new type of dependency in databases, which is a generalization of inclusion dependencies, is considered. Traditionally, such dependencies are used in practice to ensure referential integrity. In this case, the constraint is established only between a pair of relations, the first of which is called the main relation, and the second one is the external relation. In practice, referential integrity often needs to be established for a larger number of relations, where several main relations and several external relations participate in the same constraint. This structure corresponds to an ultragraph. Generalized inclusion dependencies that take into account the presence of null values in external relations are justified. The system of axioms is obtained based on a study of the properties of typed dependencies. The consistency (soundness) and completeness of the system are proved.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
数据库中带空值的类型化包含依赖的泛化
本文考虑了数据库中一种新的依赖关系,即包含依赖关系的泛化。传统上,在实践中使用这种依赖关系来确保引用完整性。在这种情况下,约束只在一对关系之间建立,其中第一个关系称为主要关系,第二个关系称为外部关系。在实践中,通常需要为数量较多的关系建立参照完整性,其中几个主要关系和几个外部关系参与同一约束。这个结构对应于一张超音波图。考虑到外部关系中存在空值的广义包含依赖关系是合理的。在研究类型化依赖的性质的基础上,得到了一个公理系统。证明了系统的一致性(稳健性)和完备性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
AUTOMATIC CONTROL AND COMPUTER SCIENCES AUTOMATION & CONTROL SYSTEMS-
CiteScore
1.70
自引率
22.20%
发文量
47
期刊介绍: Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision
期刊最新文献
Protecting Smart City Blockchain Systems from Selfish Mining Attacks Application of Large Language Models in the Problem of Event Forecasting Application of Convolutional Neural Networks to Increase the Security Level of Steganographic Methods Artificial Immunization in Hierarchical and Peer-to-Peer Networks to Protect Against Cyber Threats Countering Illegitimate Activations of a Smart Voice Assistant
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1