Normalization For Removing Dependancies In XML Data
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2014, Vol 3, Issue 12
Abstract
Designing a well-structured XML document is important for the sake of readability and maintainability. More importantly, this will avoid data redundancies and update anomalies when maintaining a large quantity of XML based documents. In this paper, we propose a method to improve XML structural design by adopting graphical notations for Document Type Definitions (GN-DTD), which is used to describe the structure of an XML document at the schema level. Multiples levels of normal forms for GN-DTD are proposed on the basis of conceptual model approaches and theories of normalization. The normalization rules are applied to transform a poorly designed XML document into a well- designed based on normalized GN-DTD, which is illustrated through examples.
[b]Analysis: The Effect of Inter Symbol Interference on Optical Communication System[/b]
Inter Symbol Interference is considered to be one of the most challenging problems encountered in fiber optical communication system. It causes increase in path loss, delay spread, degraded performance, achieving...
VIRTUAL ANALYSIS OF EFFECT OF DAMPING IN DIFFERENT MATERIAL LAYERED BEAM USING STRUCTURAL JOINTS
In Engineering Vibration and noise reduction are crucial in maintaining high performance level and prolong use. Structures are generally fabricated using a variety of shear connectors such as bolts, rivets, etc. The joi...
Optimal Placement of FACTS Devices in a Typical Power System
This paper presents an approach for the optimal placement of FACTS devices. The devices considered are Static Var Compensator (SVC) and Thyristor Controller Series Capacitor (TCSC). Optimal location of TCSC is id...
Mathematical Approaches For Computer Virus
This paper presents various aspects of mathematical approaches that are used to make analysis of computer viruses . The theory of functions ,logics and the automata theory helps to understand the replicati viruses with...
OPTIMISED SECURITY FRAMEWORK BASED ON TIME STAMP FOR DOS ATTACKS IN WIRELESS SENSOR NETWORKS
Network performance always dependent on the perfect flow of the data processing packets in network but with attacks in network, performance halted a lot or just degraded at times. Denial of service attack is one o...