• Title/Summary/Keyword: Database Trigger

Search Result 32, Processing Time 0.031 seconds

Four Consistency Levels in Trigger Processing (트리거 처리 4 단계 일관성 레벨)

  • ;Eric Hanson
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.492-501
    • /
    • 2002
  • An asynchronous trigger processor (ATP) is a oftware system that processes triggers after update transactions to databases are complete. In an ATP, discrimination networks are used to check the trigger conditions efficiently. Discrimination networks store their internal states in memory nodes. TriggerMan is an ATP and uses Gator network as the .discrimination network. The changes in databases are delivered to TriggerMan in the form of tokens. Processing tokens against a Gator network updates the memory nodes of the network and checks the condition of a trigger for which the network is built. Parallel token processing is one of the methods that can improve the system performance. However, uncontrolled parallel processing breaks trigger processing semantic consistency. In this paper, we propose four trigger processing consistency levels that allow parallel token processing with minimal anomalies. For each consistency level, a parallel token processing technique is developed. The techniques are proven to be valid and are also applicable to materialized view maintenance.

An Active Candidate Set Management Model on Association Rule Discovery using Database Trigger and Incremental Update Technique (트리거와 점진적 갱신기법을 이용한 연관규칙 탐사의 능동적 후보항목 관리 모델)

  • Hwang, Jeong-Hui;Sin, Ye-Ho;Ryu, Geun-Ho
    • Journal of KIISE:Databases
    • /
    • v.29 no.1
    • /
    • pp.1-14
    • /
    • 2002
  • Association rule discovery is a method of mining for the associated item set on large databases based on support and confidence threshold. The discovered association rules can be applied to the marketing pattern analysis in E-commerce, large shopping mall and so on. The association rule discovery makes multiple scan over the database storing large transaction data, thus, the algorithm requiring very high overhead might not be useful in real-time association rule discovery in dynamic environment. Therefore this paper proposes an active candidate set management model based on trigger and incremental update mechanism to overcome non-realtime limitation of association rule discovery. In order to implement the proposed model, we not only describe an implementation model for incremental updating operation, but also evaluate the performance characteristics of this model through the experiment.

Design and Implementation of a Spatial-Operation-Trigger for Supporting the Integrity of Meet-Spatial-Objects (상접한 공간 객체의 무결성 지원을 위한 공간 연산 트리거의 설계 및 구현)

  • Ahn, Jun-Soon;Cho, Sook-Kyoung;Chung, Bo-Hung;Lee, Jae-Dong;Bae, Hae-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.127-140
    • /
    • 2002
  • In a spatial database system, the semantic integrity should be supported for maintaining the data consistency. In the real world, spatial objects In boundary layer should always meet neighbor objects, and they cannot hold the same name. This characteristic is an implied concept in real world. So, when this characteristic is disobeyed due to the update operations of spatial objects, it is necessary to maintain the integrity of a layer. In this thesis, we propose a spatial-operation-trigger for supporting the integrity of spatial objects. The proposed method is defined a spatial-operation-trigger based on SQL-3 and executed when the constraint condition is violated. A spatial-operation-trigger have the strategy of execution. Firstly, for one layer, the spatial and aspatial data triggers are executed respectively. Secondly, the aspatial data trigger for the other layers is executed. Spatial-operation-trigger for one layer checks whether the executed operation updates only spatial data, aspatial data, or both of them, and determines the execution strategy of a spatial-operation-trigger. Finally, the aspatial data trigger for the other layers is executed. A spatial-operation-trigger is executed in three steps for the semantic integrity of the meet-property of spatial objects. And, it provides the semantic integrity of spatial objects and the convenience for users using automatic correcting operation.

An active object-oriented directory database model for management of telecommunication (통신망 관리를 위한 능동 객체 지향 디렉토리 데이타베이스 모델)

  • 이재호;임해철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.2
    • /
    • pp.435-446
    • /
    • 1996
  • In this paper, we present database model of directory systems that perform a task for distributed information repositories in communication network environments. A new model is developed through four phase: (1) A diretory database information is classified that would be stored in directory database as user, administrative, and supplementary information. (2) The modeling criteria are captured that would be used to model information classified. (3) Object-Oriented concepts are used in modeling classified information according to modeling criteria captured. (4) Methods applied to developed model are grouped, and active-based mechanisms such as trigger and constraints are developed. These selected methods and attributes are encapsulated into objects. Consequently they compose an Active Object-Oriented Directory Database Model.

  • PDF

A Termination Analyzer Including Execution Semantics of Active Rules (능동 규칙의 실행의미를 반영한 종료 분석기)

  • Sin, Ye-Ho;Hwang, Jeong-Hui;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.513-522
    • /
    • 2001
  • Active database execute an action of active rule defined in advance which is triggered automatically, whenever an event with the matching event specifications occurs, its condition is evaluated. Because these rules may in turn trigger other rules, the set of rules may be triggered each other indefinitely, Therefore, we propose a termination analysis method to guarantee termination. This proposed method considers composite event as well as rule execution time. Above all, the method not only uses deactivation graph combined to trigger graph for exact analysis, but also improves the complexity of analysis. Also the proposed method enhances accuracy of analysis result.

  • PDF

A Database Model for Intelligent Peripheral of Advanced Intelligent Network (차세대 지능망의 지능형 정보 제공 시스템을 위한 데이터베이스 모델)

  • Lee, Jae-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.2
    • /
    • pp.1-15
    • /
    • 1997
  • In this paper we present database model for Intelligent Peripheral (IP) of Advanced Intelligent Network (AIN). The new model is developed through four phase. (1) An information of AIN IP is classified that would be stored in AIN IP database as specialized resources, service. schema and system information. (2) The modeling criteria are developed that would be used to model information classified. (3) Object-oriented concepts are used in modelifl8 classified information according to modeling criteria captured. (4) Methods applied to developed model are grouped, and active-based mechnisms such as trigger and constraints are developed. These selected methods and attributes are encapsulated into objects. Consequently they compose an active object-oriented AIN IP database model.

  • PDF

Backward Propagation of User-Defined Integrity Constraints On Active Object-Oriented Database (능동적 객체지향 데이타베이스에서 사용자 정의 제약조건의 역방향 전달에 관한 연구)

  • 도남철;최인준
    • The Journal of Information Technology and Database
    • /
    • v.1 no.1
    • /
    • pp.63-81
    • /
    • 1994
  • The trigger mechanism in active object-oriented database systems is known to be a good tool for describing user-defined integrity constraints. It cannot adequately support, however, certain integrity constrains specified on the objects in class composition hierarchy. Those are the cases where the constraints must be maintained in the forward direction along the composition hierarchy as well as in the backward direction We call theses kinds of problems "backward propagation problem" and investigate several ways to resolve them using the currently available techniques. Based on them, a new constructor, called CONSTRAIN $T^{cch}$, is proposed. The constructor can be realized with enhanced facilities for active OODBMS which we recommend in this paper.d facilities for active OODBMS which we recommend in this paper.r.

  • PDF

Design of Trigger Protocol for Location Based Services (위치기반서비스를 위한 트리거 프로토콜 설계)

  • Shim, Jae-Min;Kim, Kyu Ik;Lee, Chang Eun;Lee, Eung-Jae;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.905-907
    • /
    • 2010
  • 최근 스마트폰의 급속한 보급 확대로 무선 인터넷 기반의 위치기반광고 등 위치기반서비스에 대한 관심이 커지고 있다. 이 논문은 위치기반서비스를 제공하기 위하여 필수적으로 요구되는 트리거 유형을 살펴보고 각각의 트리거 유형을 처리하기 위한 트리거 프로토콜을 제시한다. 제안된 프로토콜은 위치기반서비스를 효과적으로 제공하기 위하여 필요한 시간 트리거와 공간트리거의 설정 및 처리 방법을 기술한다.

An Active Candidate Set Management Model for Realtime Association Rule Discovery (실시간 연관규칙 탐사를 위한 능동적 후보항목 관리 모델)

  • Sin, Ye-Ho;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.215-226
    • /
    • 2002
  • Considering the rapid process of media's breakthrough and diverse patterns of consumptions's analysis, a uniform analysis might be much rooms to be desired for interpretation of new phenomena. In special, the products happening intensive sails on around an anniversary or fresh food have the restricted marketing hours. Moreover, traditional association rule discovery algorithms might not be appropriate for analysis of sales pattern given in a specific time because existing approaches require iterative scan operation to find association rule in large scale transaction databases. in this paper, we propose an incremental candidate set management model based on twin-hashing technique to find association rule in special sales pattern using database trigger and stored procedure. We also prove performance of the proposed model through implementation and experiment.

An Analysis for Goodness of Fit on Trigger Runoff of Flash Flood and Topographic Parameters Using GIS (GIS를 이용한 돌발홍수의 한계유량과 유역특성인자의 적합도 분석)

  • Oh, Myung-Jin;Yang, In-Tae;Park, Byung-Soo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.14 no.3 s.37
    • /
    • pp.87-95
    • /
    • 2006
  • Recently, local heavy rain for a short term is caused by unusual changing in the weather. This phenomenon has, several times, caused an extensive flash flood, casualties, and material damage. This study is aimed at calculating the characteristics of flash floods in streams. For this purpose, the analysis of topographical characteristics of water basin through applying GIS techniques will be conducted. The flash flood prediction model we used is made with GCIUH (geomorphoclimatic instantaneous unit hydrograph). The database is established by the use of GIS and by the extraction of streams and watersheds from DEM. The streams studied are included small, middle and large scale watersheds. For the first, for the establishment or criteria on the flash flood warning, peak discharge and trigger runoff must be decided. This study analyzed the degree or aptitude of topographical factors to the trigger runoff calculated by GCUH model.

  • PDF