• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Centralizuoto duomenų vientisumo apribojimų valdymo sistema / System for centralist management of data integrity constraints

Uzdanavičiūtė, Virginija 16 January 2007 (has links)
Integrity constraints comprise an urgent part of conceptual models. For this reason, they must be structured and represented in orderly manner. The purpose of this work is to solve the problems inherent in creation, storage and retrieval of centralized data integrity constraints. This paper analyses the methods for implementation of data integrity constraints and describes a Oracle RDBMS-based technique that enables for impeccable functionality of information system and protection from invalid data. After analysis of system requirements and currently available software solutions, UML models of system architecture, data and database were proposed. Suitable means were chosen for developing a system for centralist management of data integrity constraints. The Constraint Editor geared towards designing, implementing and maintaining of procedures, integrity constraints throughout their lifecycle was developed. A simple, functional and intuitive graphical user interface makes data integrity constraints easy to story, manage and retrieve. The created software makes optimal use of RDBVS resources while performing ETL processes with multi – table insertions. The ability to insert data into multiple tables ensures further possibilities of supplying standard statistical analysis software with correct data and better performance than a procedure to perform multiple insertions using "IF..THEN" syntax. Furthermore, the software verifies SQL DML functions system widethus protecting... [to full text]

Page generated in 0.0939 seconds