This document summarizes the key aspects of database normalization including:
1) It discusses the first, second, third, and Boyce-Codd normal forms and the objectives of normalization to reduce data redundancy and dependencies.
2) It provides examples of applying normalization to tables to remove anomalies like modifying a passenger's phone number would require changing it in multiple places.
3) It includes examples of SQL queries on the normalized tables including finding driver salaries between a range, displaying bus seat availability, and retrieving passenger details based on user ID.
4) Triggers are defined to calculate total salary on insert and update bonus amounts and driver age on update. Views are defined with advantages being logical representation of data and
SQL is a language used to interface with relational database systems. It was developed by IBM in the 1970s and is now an industry standard. SQL has three main sublanguages: DDL for defining database schemas, DML for manipulating data, and DCL for controlling access.
Some key points about SQL include:
- DDL commands like CREATE, ALTER, and DROP are used to define and modify database structures.
- DML commands like SELECT, INSERT, UPDATE, and DELETE are used to query and manipulate the data.
- DCL commands like COMMIT, ROLLBACK, GRANT and REVOKE control transactions and user privileges.
- SQL can be used
This document provides an overview of basic SQL concepts including:
- The main clauses of an SQL query: SELECT, FROM, WHERE
- Common SQL operations like selection, projection, joins, aggregation, renaming, pattern matching and string operations
- How to order and group query results
- Set operations in SQL like UNION, INTERSECT, EXCEPT
- Examples of SQL queries on bank database schemas and relations
Normalization is a process of organizing data in a database to eliminate anomalies like data redundancy, insertion anomalies, update anomalies, and deletion anomalies. It involves putting data into tables and establishing relationships between those tables via primary and foreign keys. The document discusses various normal forms like 1NF, 2NF, 3NF, and BCNF that data should be normalized into. Achieving higher normal forms reduces anomalies but is more difficult. The goal of normalization is consistent, unambiguous data without redundancy.
SQL Plan Management with Oracle Database provides tools to manage SQL performance and stability. It includes SQL profiles, stored outlines, SQL patches, and SQL baselines that can capture and enforce execution plans. New features in Oracle 12c include adaptive plans, which automatically choose join methods and parallel distribution, as well as adaptive statistics using dynamic sampling to improve cardinality estimates. Bind variable peeking and cardinality feedback also help the optimizer select optimal plans.
The document discusses database design and normalization. It begins by describing different design alternatives such as using larger or smaller schemas. It then covers first normal form (1NF), which requires attributes to be atomic and domains to be indivisible. Second normal form (2NF) and third normal form (3NF) are introduced to further reduce anomalies. The document also discusses functional dependencies, normal forms like Boyce-Codd normal form (BCNF), decomposition using functional dependencies, and closure of attribute sets. Overall, the document provides an overview of relational database design principles and normalization techniques.
Managing Statistics for Optimal Query PerformanceKaren Morton
Half the battle of writing good SQL is in understanding how the Oracle query optimizer analyzes your code and applies statistics in order to derive the “best” execution plan. The other half of the battle is successfully applying that knowledge to the databases that you manage. The optimizer uses statistics as input to develop query execution plans, and so these statistics are the foundation of good plans. If the statistics supplied aren’t representative of your actual data, you can expect bad plans. However, if the statistics are representative of your data, then the optimizer will probably choose an optimal plan.
This document provides an introduction to cost based optimization. It discusses key concepts like selectivity, cardinality, histograms, and correlation issues. The author is Riyaj Shamsudeen, an Oracle expert with 18 years of experience. Sample code and examples are provided to illustrate how to calculate selectivity and cardinality accurately to improve query optimization. Extended statistics are highlighted as a way to address correlation between column predicates in Oracle 11g and above.
SQL is a language used to interface with relational database systems. It was developed by IBM in the 1970s and is now an industry standard. SQL has three main sublanguages: DDL for defining database schemas, DML for manipulating data, and DCL for controlling access.
Some key points about SQL include:
- DDL commands like CREATE, ALTER, and DROP are used to define and modify database structures.
- DML commands like SELECT, INSERT, UPDATE, and DELETE are used to query and manipulate the data.
- DCL commands like COMMIT, ROLLBACK, GRANT and REVOKE control transactions and user privileges.
- SQL can be used
This document provides an overview of basic SQL concepts including:
- The main clauses of an SQL query: SELECT, FROM, WHERE
- Common SQL operations like selection, projection, joins, aggregation, renaming, pattern matching and string operations
- How to order and group query results
- Set operations in SQL like UNION, INTERSECT, EXCEPT
- Examples of SQL queries on bank database schemas and relations
Normalization is a process of organizing data in a database to eliminate anomalies like data redundancy, insertion anomalies, update anomalies, and deletion anomalies. It involves putting data into tables and establishing relationships between those tables via primary and foreign keys. The document discusses various normal forms like 1NF, 2NF, 3NF, and BCNF that data should be normalized into. Achieving higher normal forms reduces anomalies but is more difficult. The goal of normalization is consistent, unambiguous data without redundancy.
SQL Plan Management with Oracle Database provides tools to manage SQL performance and stability. It includes SQL profiles, stored outlines, SQL patches, and SQL baselines that can capture and enforce execution plans. New features in Oracle 12c include adaptive plans, which automatically choose join methods and parallel distribution, as well as adaptive statistics using dynamic sampling to improve cardinality estimates. Bind variable peeking and cardinality feedback also help the optimizer select optimal plans.
The document discusses database design and normalization. It begins by describing different design alternatives such as using larger or smaller schemas. It then covers first normal form (1NF), which requires attributes to be atomic and domains to be indivisible. Second normal form (2NF) and third normal form (3NF) are introduced to further reduce anomalies. The document also discusses functional dependencies, normal forms like Boyce-Codd normal form (BCNF), decomposition using functional dependencies, and closure of attribute sets. Overall, the document provides an overview of relational database design principles and normalization techniques.
Managing Statistics for Optimal Query PerformanceKaren Morton
Half the battle of writing good SQL is in understanding how the Oracle query optimizer analyzes your code and applies statistics in order to derive the “best” execution plan. The other half of the battle is successfully applying that knowledge to the databases that you manage. The optimizer uses statistics as input to develop query execution plans, and so these statistics are the foundation of good plans. If the statistics supplied aren’t representative of your actual data, you can expect bad plans. However, if the statistics are representative of your data, then the optimizer will probably choose an optimal plan.
This document provides an introduction to cost based optimization. It discusses key concepts like selectivity, cardinality, histograms, and correlation issues. The author is Riyaj Shamsudeen, an Oracle expert with 18 years of experience. Sample code and examples are provided to illustrate how to calculate selectivity and cardinality accurately to improve query optimization. Extended statistics are highlighted as a way to address correlation between column predicates in Oracle 11g and above.
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...IRJET Journal
This document proposes an enhanced pipelined bus invert coding technique to optimize power consumption on data buses. The proposed technique reduces the number of transitions on the bus compared to existing methods like bus invert coding and shift invert coding. It modifies the bus invert coding method to maximize power reduction. The proposed circuit performs better in terms of delay, number of transitions, and hardware complexity. Experimental results show the proposed circuit has fewer transitions and is faster than previous versions. It was implemented using Verilog HDL on a Xilinx FPGA and demonstrated improved performance over prior techniques for reducing switching activity and power dissipation.
The document discusses database normalization. It begins by defining normalization and describing its purpose in eliminating data redundancy and anomalies. The document then covers various normal forms including 1st normal form (1NF), 2nd normal form (2NF), 3rd normal form (3NF) and Boyce-Codd normal form (BCNF). It also defines key concepts like functional dependencies, full dependencies, partial dependencies and transitive dependencies. Examples are provided to illustrate the normalization process and how relations can be decomposed to remove anomalies through normalization.
Design and implementation of address generator for wi max deinterleaver on fpgaeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Reliability improvement and loss reduction in radial distribution system wit...IJECEIAES
Studies on load flow in electrical distribution system have always been an area of interest for research from the previous few years. Various approaches and techniques are brought into light for load flow studies within the system and simulation tools are being used to work out on varied characteristics of system. This study concentrates on these approaches and the improvements made to the already existing techniques considering time and the algorithms complexity. Also, the paper explains the network reconfiguration (NR) techniques considered in reconfiguring radial distribution network (RDN) to reduce power losses in distribution system and delivers an approach to how various network reconfiguration techniques support loss reduction and improvement of reliability in the electrical distribution network.
A few things about the Oracle optimizer - 2013Connor McDonald
The document discusses how using the wrong data types for columns in a database table can negatively impact performance and data integrity. It shows examples of creating a table with date, string, and number columns using implicit data type conversions and the problems this causes for indexing, statistics gathering, and query optimization. Maintaining the correct data types is important for the optimizer to choose efficient execution plans and for the database to properly enforce data constraints.
The document discusses database design and normalization. It introduces relational database models (RDBM) which store data in tables with columns and rows. Normalization is defined as converting relations with redundant data into simpler structures with minimum redundancy. Functional dependencies and second normal form (2NF) are explained as ways to remove redundancy during normalization. An example shows decomposing a relation that is not in 2NF by identifying determinants.
Presentation introducing materialized views in PostgreSQL with use cases. These slides were used for my talk at Indian PostgreSQL Users Group meetup at Hyderabad on 28th March, 2014
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
Abstract Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network (MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network. The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection. All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number of hop to transfer information between nodes. Keywords: MANET, DSR, ANT Algorithm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document provides a GAMS code for solving the DC optimal power flow (OPF) problem. It defines the objective function as minimizing total generation costs while considering transmission line constraints. The code is applied to a 5 bus test system and finds the optimal dispatch of generators by determining local marginal prices, generator outputs, line flows, and voltage angles. It takes as inputs generator costs and limits and network characteristics, and provides as outputs the local marginal prices, generator dispatch, line flows, and voltage angles.
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
This is widely accepted that Network-on-Chip represents a promising solution for forthcoming complex embedded systems. The current SoC Solutions are built from heterogeneous hardware and Software components integrated around a complex communication infrastructure. The crossbar is a vital component of in any NoC router. In this work, we have designed a crossbar interconnect for serial bit data transfer and 128-parallel bit data transfer. We have shown comparision between power and delay for the serial bit and parallel bit data transfer through crossbar switch. The design is implemented in 0.180 micron TSM technology.The bit rate achived in serial transfer is slow as compared with parallel data transfer. The simulation resuls show that the critical path delay is less for parallel bit data transfer but power dissipation is high.
This document contains a list of SQL interview questions and answers. Some of the questions covered include:
- Explain NVL, NVL2 and NULLIF functions
- How to create a third index on a table that already has two indexes
- The difference between a view and materialized view
Oracle Join Methods and 12c Adaptive PlansFranck Pachot
Join Methods and 12c Adaptive Plans
In its quest to improve cardinality estimation, 12c has introduced Adaptive Execution Plans which deals with the cardinalities that are difficult to estimate before execution. Ever seen a hanging query because a nested loop join is running on millions of rows?
This is the point addressed by Adaptive Joins. But that new feature is also a good occasion to look at the four possible join methods available for years.
1. The document provides an introduction to synchronous sequential circuits, also known as finite state machines, explaining their behavior and design techniques for both manual and automated design. 2. It covers topics like Moore and Mealy state models for representing finite state machines, state minimization procedures, and algorithmic state machines. 3. Examples of designing synchronous sequential circuits like an arbiter and implementing them using Verilog code are also included to help students understand the concepts better.
This document discusses why SQL optimizers sometimes produce suboptimal query plans. It begins by introducing concepts like selectivity, cardinality, and histograms which are important for query optimization. It then describes issues like correlation between predicates that can cause underestimation of cardinality. The document recommends gathering statistics on columns and indexes, using histograms, and explains how Oracle 11g's extended statistics feature can help address correlation problems.
The document discusses adaptive query optimization in Oracle 12c. Key points include:
- In 12c, adaptive plans allow the execution plan to change at runtime based on statistics collected, such as switching from a hash join to a nested loops join.
- During the first execution, a statistics collector is inserted and the plan is changed. SQL plan directives are then created.
- For subsequent executions, the information from the initial execution is used to automatically re-optimize the plan, improving performance over time.
Cisco MATE Design is a network modeling tool that allows users to simulate complex routing policies through the use of external endpoints for demands. External endpoints define priority-based failover configurations for demand sources and destinations. This enables modeling of inter-autonomous system traffic distribution and failover policies, as well as data center redundancy. When an external endpoint member fails in a simulation, MATE Design instantly updates the network display to show the impact on traffic routing.
The document contains SQL statements and execution plans for counting records in a table where the ID is between 1 and 10 and the status is either '00' or '01'. It shows that for a status of '00' there are 10000 records, but for a status of '01' there are 0 records. Execution plans and statistics are provided with each statement to analyze the performance and resource usage.
This document provides an overview of HSPICE tutorials available on the class website and instructions for setting up an HSPICE account. It describes the HSPICE simulation software and outlines the general structure and purpose of key sections in HSPICE input files, such as title, setup statements, library includes, netlist, sources, analysis statements, and output. It also summarizes common HSPICE elements, analysis types, and output file formats.
The document summarizes how SQL Plan Directives in Oracle 12c can help address issues caused by cardinality misestimation in the optimizer. It provides an example where the optimizer underestimates the number of rows returned by a query on a table due to not having statistics on correlated columns. In 12c, a SQL Plan Directive is automatically generated after the first execution to capture this misestimation. On subsequent queries, the directive can be used to provide more accurate cardinality estimates through automatic reoptimization or dynamic sampling.
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...IRJET Journal
This document proposes an enhanced pipelined bus invert coding technique to optimize power consumption on data buses. The proposed technique reduces the number of transitions on the bus compared to existing methods like bus invert coding and shift invert coding. It modifies the bus invert coding method to maximize power reduction. The proposed circuit performs better in terms of delay, number of transitions, and hardware complexity. Experimental results show the proposed circuit has fewer transitions and is faster than previous versions. It was implemented using Verilog HDL on a Xilinx FPGA and demonstrated improved performance over prior techniques for reducing switching activity and power dissipation.
The document discusses database normalization. It begins by defining normalization and describing its purpose in eliminating data redundancy and anomalies. The document then covers various normal forms including 1st normal form (1NF), 2nd normal form (2NF), 3rd normal form (3NF) and Boyce-Codd normal form (BCNF). It also defines key concepts like functional dependencies, full dependencies, partial dependencies and transitive dependencies. Examples are provided to illustrate the normalization process and how relations can be decomposed to remove anomalies through normalization.
Design and implementation of address generator for wi max deinterleaver on fpgaeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Reliability improvement and loss reduction in radial distribution system wit...IJECEIAES
Studies on load flow in electrical distribution system have always been an area of interest for research from the previous few years. Various approaches and techniques are brought into light for load flow studies within the system and simulation tools are being used to work out on varied characteristics of system. This study concentrates on these approaches and the improvements made to the already existing techniques considering time and the algorithms complexity. Also, the paper explains the network reconfiguration (NR) techniques considered in reconfiguring radial distribution network (RDN) to reduce power losses in distribution system and delivers an approach to how various network reconfiguration techniques support loss reduction and improvement of reliability in the electrical distribution network.
A few things about the Oracle optimizer - 2013Connor McDonald
The document discusses how using the wrong data types for columns in a database table can negatively impact performance and data integrity. It shows examples of creating a table with date, string, and number columns using implicit data type conversions and the problems this causes for indexing, statistics gathering, and query optimization. Maintaining the correct data types is important for the optimizer to choose efficient execution plans and for the database to properly enforce data constraints.
The document discusses database design and normalization. It introduces relational database models (RDBM) which store data in tables with columns and rows. Normalization is defined as converting relations with redundant data into simpler structures with minimum redundancy. Functional dependencies and second normal form (2NF) are explained as ways to remove redundancy during normalization. An example shows decomposing a relation that is not in 2NF by identifying determinants.
Presentation introducing materialized views in PostgreSQL with use cases. These slides were used for my talk at Indian PostgreSQL Users Group meetup at Hyderabad on 28th March, 2014
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
Abstract Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network (MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network. The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection. All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number of hop to transfer information between nodes. Keywords: MANET, DSR, ANT Algorithm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document provides a GAMS code for solving the DC optimal power flow (OPF) problem. It defines the objective function as minimizing total generation costs while considering transmission line constraints. The code is applied to a 5 bus test system and finds the optimal dispatch of generators by determining local marginal prices, generator outputs, line flows, and voltage angles. It takes as inputs generator costs and limits and network characteristics, and provides as outputs the local marginal prices, generator dispatch, line flows, and voltage angles.
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
This is widely accepted that Network-on-Chip represents a promising solution for forthcoming complex embedded systems. The current SoC Solutions are built from heterogeneous hardware and Software components integrated around a complex communication infrastructure. The crossbar is a vital component of in any NoC router. In this work, we have designed a crossbar interconnect for serial bit data transfer and 128-parallel bit data transfer. We have shown comparision between power and delay for the serial bit and parallel bit data transfer through crossbar switch. The design is implemented in 0.180 micron TSM technology.The bit rate achived in serial transfer is slow as compared with parallel data transfer. The simulation resuls show that the critical path delay is less for parallel bit data transfer but power dissipation is high.
This document contains a list of SQL interview questions and answers. Some of the questions covered include:
- Explain NVL, NVL2 and NULLIF functions
- How to create a third index on a table that already has two indexes
- The difference between a view and materialized view
Oracle Join Methods and 12c Adaptive PlansFranck Pachot
Join Methods and 12c Adaptive Plans
In its quest to improve cardinality estimation, 12c has introduced Adaptive Execution Plans which deals with the cardinalities that are difficult to estimate before execution. Ever seen a hanging query because a nested loop join is running on millions of rows?
This is the point addressed by Adaptive Joins. But that new feature is also a good occasion to look at the four possible join methods available for years.
1. The document provides an introduction to synchronous sequential circuits, also known as finite state machines, explaining their behavior and design techniques for both manual and automated design. 2. It covers topics like Moore and Mealy state models for representing finite state machines, state minimization procedures, and algorithmic state machines. 3. Examples of designing synchronous sequential circuits like an arbiter and implementing them using Verilog code are also included to help students understand the concepts better.
This document discusses why SQL optimizers sometimes produce suboptimal query plans. It begins by introducing concepts like selectivity, cardinality, and histograms which are important for query optimization. It then describes issues like correlation between predicates that can cause underestimation of cardinality. The document recommends gathering statistics on columns and indexes, using histograms, and explains how Oracle 11g's extended statistics feature can help address correlation problems.
The document discusses adaptive query optimization in Oracle 12c. Key points include:
- In 12c, adaptive plans allow the execution plan to change at runtime based on statistics collected, such as switching from a hash join to a nested loops join.
- During the first execution, a statistics collector is inserted and the plan is changed. SQL plan directives are then created.
- For subsequent executions, the information from the initial execution is used to automatically re-optimize the plan, improving performance over time.
Cisco MATE Design is a network modeling tool that allows users to simulate complex routing policies through the use of external endpoints for demands. External endpoints define priority-based failover configurations for demand sources and destinations. This enables modeling of inter-autonomous system traffic distribution and failover policies, as well as data center redundancy. When an external endpoint member fails in a simulation, MATE Design instantly updates the network display to show the impact on traffic routing.
The document contains SQL statements and execution plans for counting records in a table where the ID is between 1 and 10 and the status is either '00' or '01'. It shows that for a status of '00' there are 10000 records, but for a status of '01' there are 0 records. Execution plans and statistics are provided with each statement to analyze the performance and resource usage.
This document provides an overview of HSPICE tutorials available on the class website and instructions for setting up an HSPICE account. It describes the HSPICE simulation software and outlines the general structure and purpose of key sections in HSPICE input files, such as title, setup statements, library includes, netlist, sources, analysis statements, and output. It also summarizes common HSPICE elements, analysis types, and output file formats.
The document summarizes how SQL Plan Directives in Oracle 12c can help address issues caused by cardinality misestimation in the optimizer. It provides an example where the optimizer underestimates the number of rows returned by a query on a table due to not having statistics on correlated columns. In 12c, a SQL Plan Directive is automatically generated after the first execution to capture this misestimation. On subsequent queries, the directive can be used to provide more accurate cardinality estimates through automatic reoptimization or dynamic sampling.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
1. BUS RESERVATION SYSTEM
MSPM’S
Deogiri Institute of Engineering and Management Studies Aurangabad
A CA2 Presentation for Advanced Database System On
Presented by –
3762 Urja Dhabarde
3771 Mansi Gaikwad
3773 Nikita Dabhade
Under the guidance of
– prof. Sugandha Nandedkar
2. o ER Diagram
o Normalization
o SQL queries
o Question
Table
of
Contents
4. Normalization is a database design technique which is used to organize the tables in such a manner
that it should reduce redundancy and dependency of data. Normalization is a multi step process. It
creates smaller tables from larger tables.
4 commonly used normal forms are first normal form (1NF), second normal form (2NF), third normal
form (3NF), and Boyce-Codd normal form (BCNF).
OBJECTIVES
To make it feasible to represent any relation in the database.
To free relations from undesirable insertion, update, and deletion anomalies.
Anomalies – Unconventional situation
NORMALIZATION
6. 1st Normal Form (1NF)
• Each table cell should contain a single value.
• Each record needs to be unique.
In our data, we will apply 1NF on the passenger table and Bus&Route_details table as they have multi-
valued attributes.
7. Important Terminologies
• Super Key : Attribute or set of attributes that uniquely identify each record in the relation.
• Candidate Key : A candidate key is super key whose proper subset is not a super key (minimal super key).
• Prime attribute − Part of the candidate-key.
• Non-prime attribute − Not a part of the prime-key
• Functional dependency (A B) means, for all instances of a particular value of A, there is same value for B.
Here, A is determiner and B is dependent factor.
• TYPES OF FUNCTIONAL DEPENDANCIES
Partial dependency
• If there is some attribute that can be removed from A and the dependency still holds.
• Ex. P_id, p_name -> userid
Transitive dependency
• In a relation, if attribute(s) A->B and B->C, the C is transitively dependent on A via B (provided that A is not
functionally dependent on B or C). Ex., Bus_no -> Route_no
• And Route_no -> Route_name
8. 2nd Normal Form (2NF) remove partial dependencies
• A table is in 2 NF if it is 1 NF and if all non prime attributes are dependent upon prime attributes i.e., no patrial
dependency.
• User (user_id username, email)
• Passenger (P_id P_name, P_address, DOB, Gender, User_id)
11. 3rd Normal From (3NF) no transitive dependencies
1) User (user_id username, email)
2) Passenger (P_id P_name, P_address, DOB, Gender, User_id)
3) Contacts (Ph_id, P_id PhNo)
• As Bus_no Route_no & Route_no Distance, Break BusRoute relation into two tables as:
4) Bus (Bus_no B_name, Capacity, Type, Route_no)
5) Route (Route_no R_name, Source, Destination, Distance, Dept_date, Dept_time, Fare)
Now, we apply 3NF on the Reservation table
As SeatNo TicketNo & TicketNo ModeOfPayment,
Break the relation into 2 tables as:
6) Booking (SeatNo P_id, Bus_no, Status, TicketNo)
7) Ticket (TicketNo BookingDate, ModeOfPayment)
12. Boyce-Codd Normal Form (BDNF)
• Boyce-Codd Normal Form (BCNF) is an extension of Third Normal Form on strict terms. It has
additional constraints compared with the general definition of 3NF.
• A relation is in BCNF, if and only if, in every non-trivial FD (X Y) X is a super key.
• X Y is a FD and X intersection Y = 0, then this is non-trivial FD.
• In case of our data, BCNF normalization cannot be applied.
13. SQL Queries
MOTO – To list the drivers names with salaries>=12000 and <=15000.
-----------------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT d_name, salary
FROM driver
WHERE d_id in (SELECT d_id FROM driver WHERE salary BETWEEN 12000 AND 15000);
14. MOTO - To check the status of seats in shivneri bus. It display the details of shivneri bus.
----------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT booking.seat_no, b_name, status
FROM bus1, booking
WHERE bus1.bus_no = booking.Bus_no AND b_name = 'shivneri’;
---------------------------------------------------------------------------------------------------------------------------------------
15. MOTO – Display 3 max salaries from the drivers table.
-----------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT distinct salary
FROM driver a
WHERE 3>= (SELECT COUNT(distinct salary) FROM driver b WHERE a.salary <= b.salary) ORDER BY a.salary
desc;
---------------------------------------------------------------------------------------------------------------------------------------
16. MOTO – To find the list of passengers who booked ticket using UPI mode and on which date.
passengers booked ticket using UPI.
------------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT passenger.p_name, ticket.booking_date
FROM passenger, ticket
WHERE passenger.p_id = ticket.p_id and ticket.modeOfPay = 'UPI’;
-----------------------------------------------------------------------------------------------------------------------------------------
17. MOTO – To connect the user table with user_id and p_address in passenger table and find which user
belongs to which city.
------------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT u.user_id, username, email, p_id, p_address
FROM UserTable u, passenger p
WHERE u.username=p.p_name AND p_address in (SELECT p_address FROM passenger WHERE user_id in
(1,2,3,4,5,6,7));
----------------------------------------------------------------------------------------------------------------------------------------------
18. MOTO - Display the count of seat_no having status is not booked.
------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT COUNT(seat_no)
FROM booking, bus1
WHERE status!='booked’;
------------------------------------------------------------------------------------------------------------------------------------
19. MOTO - The goal is display the bus name having same bus number where ticket no is T3.
The bus no is connect with the ticket number which show the bus name based on ticket no.
------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT b_name
FROM bus1
WHERE bus_no=(SELECT bus_no FROM booking WHERE ticket_no in('T3’));
-------------------------------------------------------------------------------------------------------------------------------------
20. MOTO – to find the name of passenger name for P1 and with ticket T1 using union operation
------------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT p_name FROM passenger WHERE p_id='P1’
UNION
SELECT ticket_no FROM booking WHERE ticket_no='T1’;
------------------------------------------------------------------------------------------------------------------------------------------
21. MOTO - display the details of passengers who is having uesrid is greater than 3 and paseenger id is
not equal to P1 and P4
----------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT * FROM passenger WHERE user_id>3
INTERSECT
SELECT * FROM passenger WHERE p_id!='P1' AND p_id!='P4';
-----------------------------------------------------------------------------------------------------------------------------------------
22. MOTO - Return the those passengers who has id>3 and address is delhi.
----------------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT * FROM passenger WHERE user_id>3
INTERSECT
SELECT * FROM passenger WHERE p_address='delhi’;
----------------------------------------------------------------------------------------------------------------------------------------------
23. MOTO - Find out the passengers who is having user id >3 and address is not delhi.
--------------------------------------------------------------------------------------------------------------------------------------------
SQL>
SELECT * FROM passenger WHERE user_id>3
MINUS
SELECT * FROM passenger WHERE p_address='delhi’;
---------------------------------------------------------------------------------------------------------------------------------------------------------
24. Triggers
Moto –
Trigger 1 – To calculate the total salary of a driver by adding the regular salary with bonus using a ‘after insert’ trigger.
Trigger 2 – To set bonus of every driver to Rs200 using ‘after update’ trigger and update the age of driver by one year.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Trigger 1 –
CREATE TRIGGER trigg1
AFTER INSERT
ON driver
FOR EACH ROW
BEGIN
UPDATE driver SET total = salary + bonus;
END;
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Trigger 2 –
CREATE TRIGGER trigg2
AFTER UPDATE
ON driver
FOR EACH ROW
BEGIN
UPDATE driver SET bonus=200;
END;
25.
26. Views
Q) With suitable example define view. Discuss the advantages and disadvantages of view in DBMS.