Cross joins are used to return every combination of rows from two and more than two tables. Cross Joins are sometimes called a Cartesian product. This presentation illustrates cross join examples and applications in real life.
PL/SQL is a combination of SQL along with the procedural features of programming languages.
It provides specific syntax for this purpose and supports exactly the same datatypes as SQL.
The document discusses temporal databases, which store information about how data changes over time. It covers several key points:
- Temporal databases allow storage of past and future states of data, unlike traditional databases which only store the current state.
- Time can be represented in terms of valid time (when facts were true in the real world) and transaction time (when facts were current in the database). Temporal databases may track one or both dimensions.
- SQL supports temporal data types like DATE, TIME, TIMESTAMP, INTERVAL and PERIOD for representing time values and durations.
- Temporal information can describe point events or durations. Relational databases incorporate time by adding timestamp attributes, while object databases
This document discusses Python database programming. It introduces databases and how they store data in tables connected through columns. It discusses SQL for creating, accessing, and manipulating database data. It then discusses how Python supports various databases and database operations. It covers the Python DB-API for providing a standard interface for database programming. It provides examples of connecting to a database, executing queries, and retrieving and inserting data.
This presentation discusses semi-joins and their effectiveness in distributed environments. It begins by defining distributed systems and relational algebra operations like joins. It then explains that a semi-join returns rows from the first table that match rows in the second table, without duplicate rows. Examples are provided to illustrate how semi-joins can reduce communication costs compared to conventional joins. The presentation concludes by stating that semi-joins are an efficient way to join data across multiple tables in a query in distributed systems.
The document contains 16 sections that describe database management system experiments to be performed. Each section includes instructions to create and manipulate tables, perform queries, and implement concepts like triggers, functions, stored procedures, cursors, and embedded SQL. Students will connect to databases and design systems for payroll, banking, and a library using Visual Basic. Their work will be evaluated based on aim and description, queries, results, output, and records.
The document discusses artificial neural networks and backpropagation. It provides an overview of backpropagation algorithms, including how they were developed over time, the basic methodology of propagating errors backwards, and typical network architectures. It also gives examples of applying backpropagation to problems like robotics, space robots, handwritten digit recognition, and face recognition.
This document defines a data warehouse as a collection of corporate information derived from operational systems and external sources to support business decisions rather than operations. It discusses the purpose of data warehousing to realize the value of data and make better decisions. Key components like staging areas, data marts, and operational data stores are described. The document also outlines evolution of data warehouse architectures and best practices for implementation.
This document discusses M2M and IoT design methodologies. It begins with an overview of M2M architecture, including the key components of an M2M area network, M2M core network, M2M gateways, and M2M applications. It then contrasts M2M and IoT, noting differences in communication protocols, types of connected devices, emphasis on hardware vs software, how data is collected and analyzed, and applications. The document also introduces software-defined networking (SDN) and network function virtualization (NFV) as approaches to address limitations of conventional network architectures for IoT.
PL/SQL is a combination of SQL along with the procedural features of programming languages.
It provides specific syntax for this purpose and supports exactly the same datatypes as SQL.
The document discusses temporal databases, which store information about how data changes over time. It covers several key points:
- Temporal databases allow storage of past and future states of data, unlike traditional databases which only store the current state.
- Time can be represented in terms of valid time (when facts were true in the real world) and transaction time (when facts were current in the database). Temporal databases may track one or both dimensions.
- SQL supports temporal data types like DATE, TIME, TIMESTAMP, INTERVAL and PERIOD for representing time values and durations.
- Temporal information can describe point events or durations. Relational databases incorporate time by adding timestamp attributes, while object databases
This document discusses Python database programming. It introduces databases and how they store data in tables connected through columns. It discusses SQL for creating, accessing, and manipulating database data. It then discusses how Python supports various databases and database operations. It covers the Python DB-API for providing a standard interface for database programming. It provides examples of connecting to a database, executing queries, and retrieving and inserting data.
This presentation discusses semi-joins and their effectiveness in distributed environments. It begins by defining distributed systems and relational algebra operations like joins. It then explains that a semi-join returns rows from the first table that match rows in the second table, without duplicate rows. Examples are provided to illustrate how semi-joins can reduce communication costs compared to conventional joins. The presentation concludes by stating that semi-joins are an efficient way to join data across multiple tables in a query in distributed systems.
The document contains 16 sections that describe database management system experiments to be performed. Each section includes instructions to create and manipulate tables, perform queries, and implement concepts like triggers, functions, stored procedures, cursors, and embedded SQL. Students will connect to databases and design systems for payroll, banking, and a library using Visual Basic. Their work will be evaluated based on aim and description, queries, results, output, and records.
The document discusses artificial neural networks and backpropagation. It provides an overview of backpropagation algorithms, including how they were developed over time, the basic methodology of propagating errors backwards, and typical network architectures. It also gives examples of applying backpropagation to problems like robotics, space robots, handwritten digit recognition, and face recognition.
This document defines a data warehouse as a collection of corporate information derived from operational systems and external sources to support business decisions rather than operations. It discusses the purpose of data warehousing to realize the value of data and make better decisions. Key components like staging areas, data marts, and operational data stores are described. The document also outlines evolution of data warehouse architectures and best practices for implementation.
This document discusses M2M and IoT design methodologies. It begins with an overview of M2M architecture, including the key components of an M2M area network, M2M core network, M2M gateways, and M2M applications. It then contrasts M2M and IoT, noting differences in communication protocols, types of connected devices, emphasis on hardware vs software, how data is collected and analyzed, and applications. The document also introduces software-defined networking (SDN) and network function virtualization (NFV) as approaches to address limitations of conventional network architectures for IoT.
This document provides an overview of object-oriented databases. It introduces object-oriented programming concepts like encapsulation, polymorphism and inheritance. It then discusses how object-oriented databases combine these concepts with database principles like ACID properties. Advantages include being integrated with programming languages and automatic method storage. Disadvantages include requiring object-oriented programming and high costs to convert data. The document also discusses the Object Query Language and provides an example query in OQL.
The Internet is a combination of networks glued together by connecting devices (routers or switches). If a packet is to travel from a host to another host, it needs to pass through these networks
Machine Learning With Logistic RegressionKnoldus Inc.
Machine learning is the subfield of computer science that gives computers the ability to learn without being programmed. Logistic Regression is a type of classification algorithm, based on linear regression to evaluate output and to minimize the error.
YouTube Link: https://youtu.be/f6VWSlnHGCE
** MySQL DBA Certification Training: https://www.edureka.co/mysql-dba **
This Edureka PPT on 'SQL Triggers' will help you understand the concept of triggers in SQL. Below are the topics covered in this SQL Triggers For Beginners.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
This document discusses stored procedures in MySQL and MSSQL, including their advantages, syntax, and examples. It also covers the differences between procedures and functions, and provides an example of creating a trigger to update total department salaries when employees are inserted, updated, or deleted.
The document discusses different types of SQL join operations including inner, left, right, and outer joins. It provides examples of each join type using sample tables and explains how the results of each join are determined. Key points covered include how joins combine rows from two or more tables based on matching column values, and how different join types handle rows with no matches differently, such as including or excluding them from results.
Dbms lifecycle. ..Database System Development LifecycleNimrakhan89
The database development life cycle (DDLC) is a process of designing, implementing and maintaining a database system to meet strategic or operational information needs of an organisation or enterprise such as: Improved customer support and customer satisfaction. Better production management.
Grid based method & model based clustering methodrajshreemuthiah
The document discusses several grid-based, density-based, and conceptual clustering algorithms. Grid-based approaches like STING and WAVECLUSTER cluster data by quantizing space into grids or cells. CLIQUE uses a grid-based approach to identify dense units of data. Conceptual clustering algorithms like COBWEB create hierarchical cluster trees to classify objects based on attribute probabilities.
This document summarizes a seminar on temporal databases. It discusses the key topics covered in the seminar including an introduction to temporal databases and their features like valid time and transaction time. It also covers the problems of schema versioning that temporal databases address. The advantages include support for declarative queries and solving problems in temporal data models. Applications mentioned include financial, medical, and scheduling systems. Current research is focused on improving spatiotemporal database management systems. The conclusion is that temporal databases are an emerging concept for storing data in a time-sensitive manner and further efforts are needed to generalize databases as structures change over time.
This document discusses data mining and different types of data mining techniques. It defines data mining as the process of analyzing large amounts of data to discover patterns and relationships. The document describes predictive data mining, which makes predictions based on historical data, and descriptive data mining, which identifies patterns and relationships. It also discusses classification, clustering, time-series analysis, and data summarization as specific data mining techniques.
This document discusses different approaches to requirements modeling including scenario-based modeling using use cases and activity diagrams, data modeling using entity-relationship diagrams, and class-based modeling using class-responsibility-collaborator diagrams. Requirements modeling depicts requirements using text and diagrams to help validate requirements from different perspectives and uncover errors, inconsistencies, and omissions. The models focus on what the system needs to do at a high level rather than implementation details.
This document discusses data independence in databases. It defines database schemas, including the internal, conceptual, and external schemas that make up the three-schema architecture. The database state and valid state are also defined. Logical data independence allows changes to the conceptual schema without changing external schemas or applications. Physical data independence allows changes to the internal schema without changing the conceptual schema. Both help ensure that changes to lower-level schemas do not require changes to higher-level schemas and applications.
PL/SQL is Oracle's standard language for accessing and manipulating data in Oracle databases. It allows developers to integrate SQL statements with procedural constructs like variables, conditions, and loops. PL/SQL code is organized into blocks that define a declarative section for variable declarations and an executable section containing SQL and PL/SQL statements. Variables can be scalar, composite, reference, or LOB types and are declared in the declarative section before being used in the executable section.
1. The document defines and provides examples of various data structures including lists, stacks, queues, trees, and their properties.
2. Key concepts covered include linear and non-linear data structures, common tree types, tree traversals, and operations on different data structures like insertion, deletion, and searching.
3. Examples are provided to illustrate concepts like binary search trees, tree representation and traversal methods.
The document discusses the relational database model. It was introduced in 1970 and became popular due to its simplicity and mathematical foundation. The model represents data as relations (tables) with rows (tuples) and columns (attributes). Keys such as primary keys and foreign keys help define relationships between tables and enforce integrity constraints. The relational model provides a standardized way of structuring data through its use of relations, attributes, tuples and keys.
Coupling refers to the interdependence between software modules. There are several types of coupling from loose to tight, with the tightest being content coupling where one module relies on the internal workings of another. Cohesion measures how strongly related the functionality within a module is, ranging from coincidental to functional cohesion which is the strongest. Tight coupling and low cohesion can make software harder to maintain and reuse modules.
The document discusses normalization in database design. Normalization is the process of organizing data to avoid redundancy and dependency. It involves splitting tables and restructuring relationships between tables. The document outlines various normal forms including 1NF, 2NF, 3NF, BCNF, 4NF and 5NF and provides examples to illustrate how to normalize tables to conform to each form.
This document provides an overview of the Hadoop MapReduce Fundamentals course. It discusses what Hadoop is, why it is used, common business problems it can address, and companies that use Hadoop. It also outlines the core parts of Hadoop distributions and the Hadoop ecosystem. Additionally, it covers common MapReduce concepts like HDFS, the MapReduce programming model, and Hadoop distributions. The document includes several code examples and screenshots related to Hadoop and MapReduce.
This document discusses different types of SQL functions including string, numeric, conversion, group, date/time, and user-defined functions. It provides examples of common string functions like UPPER, LENGTH, SUBSTR. Numeric functions covered include ABS, ROUND, POWER. Group functions include AVG, COUNT, MAX, MIN, SUM. Date functions allow conversion and calculation involving dates. The document demonstrates how to create scalar and table-valued user-defined functions in SQL.
The document discusses syntax-directed translation using attribute grammars. Attribute grammars assign semantic values or attributes to the symbols in a context-free grammar. A depth-first traversal of the parse tree executes semantic rules that calculate the values of attributes. There are two types of attributes: synthesized attributes which are computed bottom-up and inherited attributes which are passed top-down. L-attributed grammars allow efficient evaluation by passing inherited attributes left-to-right during a depth-first traversal.
This document provides an outline of Chapter 8 from the textbook "Introductory Mathematical Analysis" which covers introduction to probability and statistics. The chapter objectives are to develop basic counting principles, understand combinations and permutations, define sample spaces and events, and introduce probability, conditional probability, independent events, and Bayes' formula. The chapter is divided into sections that cover these topics, including examples applying concepts like the counting principle, permutations, combinations, sample spaces, events, and calculating probabilities.
This chapter discusses probability and statistics concepts including counting principles, permutations, combinations, sample spaces, events, and probability calculations. It covers topics such as the basic counting principle, permutations of objects with and without repetition, combinations, determining sample spaces and events for experiments, and calculating probabilities for events in finite sample spaces, including using combinations and factorials. Examples include finding the number of possible routes between cities, quiz answer arrangements, poker hands, and probabilities of coin toss or dice roll outcomes.
This document provides an overview of object-oriented databases. It introduces object-oriented programming concepts like encapsulation, polymorphism and inheritance. It then discusses how object-oriented databases combine these concepts with database principles like ACID properties. Advantages include being integrated with programming languages and automatic method storage. Disadvantages include requiring object-oriented programming and high costs to convert data. The document also discusses the Object Query Language and provides an example query in OQL.
The Internet is a combination of networks glued together by connecting devices (routers or switches). If a packet is to travel from a host to another host, it needs to pass through these networks
Machine Learning With Logistic RegressionKnoldus Inc.
Machine learning is the subfield of computer science that gives computers the ability to learn without being programmed. Logistic Regression is a type of classification algorithm, based on linear regression to evaluate output and to minimize the error.
YouTube Link: https://youtu.be/f6VWSlnHGCE
** MySQL DBA Certification Training: https://www.edureka.co/mysql-dba **
This Edureka PPT on 'SQL Triggers' will help you understand the concept of triggers in SQL. Below are the topics covered in this SQL Triggers For Beginners.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
This document discusses stored procedures in MySQL and MSSQL, including their advantages, syntax, and examples. It also covers the differences between procedures and functions, and provides an example of creating a trigger to update total department salaries when employees are inserted, updated, or deleted.
The document discusses different types of SQL join operations including inner, left, right, and outer joins. It provides examples of each join type using sample tables and explains how the results of each join are determined. Key points covered include how joins combine rows from two or more tables based on matching column values, and how different join types handle rows with no matches differently, such as including or excluding them from results.
Dbms lifecycle. ..Database System Development LifecycleNimrakhan89
The database development life cycle (DDLC) is a process of designing, implementing and maintaining a database system to meet strategic or operational information needs of an organisation or enterprise such as: Improved customer support and customer satisfaction. Better production management.
Grid based method & model based clustering methodrajshreemuthiah
The document discusses several grid-based, density-based, and conceptual clustering algorithms. Grid-based approaches like STING and WAVECLUSTER cluster data by quantizing space into grids or cells. CLIQUE uses a grid-based approach to identify dense units of data. Conceptual clustering algorithms like COBWEB create hierarchical cluster trees to classify objects based on attribute probabilities.
This document summarizes a seminar on temporal databases. It discusses the key topics covered in the seminar including an introduction to temporal databases and their features like valid time and transaction time. It also covers the problems of schema versioning that temporal databases address. The advantages include support for declarative queries and solving problems in temporal data models. Applications mentioned include financial, medical, and scheduling systems. Current research is focused on improving spatiotemporal database management systems. The conclusion is that temporal databases are an emerging concept for storing data in a time-sensitive manner and further efforts are needed to generalize databases as structures change over time.
This document discusses data mining and different types of data mining techniques. It defines data mining as the process of analyzing large amounts of data to discover patterns and relationships. The document describes predictive data mining, which makes predictions based on historical data, and descriptive data mining, which identifies patterns and relationships. It also discusses classification, clustering, time-series analysis, and data summarization as specific data mining techniques.
This document discusses different approaches to requirements modeling including scenario-based modeling using use cases and activity diagrams, data modeling using entity-relationship diagrams, and class-based modeling using class-responsibility-collaborator diagrams. Requirements modeling depicts requirements using text and diagrams to help validate requirements from different perspectives and uncover errors, inconsistencies, and omissions. The models focus on what the system needs to do at a high level rather than implementation details.
This document discusses data independence in databases. It defines database schemas, including the internal, conceptual, and external schemas that make up the three-schema architecture. The database state and valid state are also defined. Logical data independence allows changes to the conceptual schema without changing external schemas or applications. Physical data independence allows changes to the internal schema without changing the conceptual schema. Both help ensure that changes to lower-level schemas do not require changes to higher-level schemas and applications.
PL/SQL is Oracle's standard language for accessing and manipulating data in Oracle databases. It allows developers to integrate SQL statements with procedural constructs like variables, conditions, and loops. PL/SQL code is organized into blocks that define a declarative section for variable declarations and an executable section containing SQL and PL/SQL statements. Variables can be scalar, composite, reference, or LOB types and are declared in the declarative section before being used in the executable section.
1. The document defines and provides examples of various data structures including lists, stacks, queues, trees, and their properties.
2. Key concepts covered include linear and non-linear data structures, common tree types, tree traversals, and operations on different data structures like insertion, deletion, and searching.
3. Examples are provided to illustrate concepts like binary search trees, tree representation and traversal methods.
The document discusses the relational database model. It was introduced in 1970 and became popular due to its simplicity and mathematical foundation. The model represents data as relations (tables) with rows (tuples) and columns (attributes). Keys such as primary keys and foreign keys help define relationships between tables and enforce integrity constraints. The relational model provides a standardized way of structuring data through its use of relations, attributes, tuples and keys.
Coupling refers to the interdependence between software modules. There are several types of coupling from loose to tight, with the tightest being content coupling where one module relies on the internal workings of another. Cohesion measures how strongly related the functionality within a module is, ranging from coincidental to functional cohesion which is the strongest. Tight coupling and low cohesion can make software harder to maintain and reuse modules.
The document discusses normalization in database design. Normalization is the process of organizing data to avoid redundancy and dependency. It involves splitting tables and restructuring relationships between tables. The document outlines various normal forms including 1NF, 2NF, 3NF, BCNF, 4NF and 5NF and provides examples to illustrate how to normalize tables to conform to each form.
This document provides an overview of the Hadoop MapReduce Fundamentals course. It discusses what Hadoop is, why it is used, common business problems it can address, and companies that use Hadoop. It also outlines the core parts of Hadoop distributions and the Hadoop ecosystem. Additionally, it covers common MapReduce concepts like HDFS, the MapReduce programming model, and Hadoop distributions. The document includes several code examples and screenshots related to Hadoop and MapReduce.
This document discusses different types of SQL functions including string, numeric, conversion, group, date/time, and user-defined functions. It provides examples of common string functions like UPPER, LENGTH, SUBSTR. Numeric functions covered include ABS, ROUND, POWER. Group functions include AVG, COUNT, MAX, MIN, SUM. Date functions allow conversion and calculation involving dates. The document demonstrates how to create scalar and table-valued user-defined functions in SQL.
The document discusses syntax-directed translation using attribute grammars. Attribute grammars assign semantic values or attributes to the symbols in a context-free grammar. A depth-first traversal of the parse tree executes semantic rules that calculate the values of attributes. There are two types of attributes: synthesized attributes which are computed bottom-up and inherited attributes which are passed top-down. L-attributed grammars allow efficient evaluation by passing inherited attributes left-to-right during a depth-first traversal.
This document provides an outline of Chapter 8 from the textbook "Introductory Mathematical Analysis" which covers introduction to probability and statistics. The chapter objectives are to develop basic counting principles, understand combinations and permutations, define sample spaces and events, and introduce probability, conditional probability, independent events, and Bayes' formula. The chapter is divided into sections that cover these topics, including examples applying concepts like the counting principle, permutations, combinations, sample spaces, events, and calculating probabilities.
This chapter discusses probability and statistics concepts including counting principles, permutations, combinations, sample spaces, events, and probability calculations. It covers topics such as the basic counting principle, permutations of objects with and without repetition, combinations, determining sample spaces and events for experiments, and calculating probabilities for events in finite sample spaces, including using combinations and factorials. Examples include finding the number of possible routes between cities, quiz answer arrangements, poker hands, and probabilities of coin toss or dice roll outcomes.
This document provides an outline of Chapter 8 from the textbook "Introductory Mathematical Analysis" which covers the topics of introduction to probability and statistics. The chapter objectives are to develop basic counting principles, permutations, combinations, sample spaces, events, probability, conditional probability, independent events, and Bayes' formula. The chapter is divided into sections that cover these topics through examples such as coin tosses, card hands, dice rolls, and more. Formulas and definitions for key probability and statistics concepts are provided throughout examples.
This document provides a progression grid for teaching number concepts in stages 7-9 of the Cambridge Lower Secondary Mathematics curriculum. It outlines learning objectives and examples for teaching integers, place value, fractions, decimals, percentages, ratios, proportions, and standard form. Key concepts covered include addition and subtraction of integers, order of operations, factors and multiples, square and cube roots, rounding, and multiplying/dividing by powers of ten. The document is intended to guide teachers in building students' number sense and mathematical skills over several years.
ISM3230 In-class lab 8 Spring 2019 TOPIC Introduction .docxvrickens
1) The document describes an in-class lab assignment on object-oriented programming with Java. Students will create Student and GradingScheme classes to store and relate student score and grade data.
2) Students are instructed to write code for the Student and GradingScheme classes, including methods to print student data and convert scores to grades. They will then use these classes to generate random student data and calculate class averages.
3) The assignment involves creating objects, setting object properties, using methods, looping through arrays, performing calculations, and printing output to demonstrate an understanding of key concepts in object-oriented programming.
This document outlines a 5th grade mathematics unit on growth patterns from the Isaac School District curriculum guide. The unit focuses on calculating area and perimeter, analyzing patterns that change over time, and generating and comparing numerical patterns based on given rules. Key concepts include rate of change, area, perimeter, writing numerical expressions, and generating ordered pairs from patterns to graph. Students will work on skills like comparing decimals to thousandths, writing expressions to represent word problems, and justifying relationships between patterns.
Workshop 1 (Mathematics)_)Regional Training on Instrumentation and Improvisat...LoisReinCura
This document discusses instrumentation and improvisation in mathematics classrooms. It begins by defining instrumentation as the tools and techniques used to measure, analyze, present, and manipulate mathematical concepts. Examples of standard manipulatives are given for different math topics, such as calculators, abacuses, and graphing boards. Mathematical games are also discussed as an interactive technique. The document then explores improvisation as creating materials from local resources when standard ones are unavailable. Various types of improvisation including substitution and modification are outlined. Sample improvised materials for geometry and other topics are presented. The importance of improvisation for students, teachers, and learning is emphasized in developing skills like creativity and problem-solving. Participants are then instructed
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
The document discusses box-and-whisker plots, also known as five number summaries, which visually represent a dataset using certain statistics rather than showing all the data points. It explains that a box-and-whisker plot depicts the median, quartiles, and range of the distribution using boxes and whiskers. The document then provides examples of how to calculate the median, quartiles, and interquartile range and how to draw box-and-whisker plots based on sample datasets.
This document provides instructions for Project 3 of the CS348 course. Students will create PL/SQL functions and procedures to process data stored in Oracle database tables. The project involves setting up database tables, populating them with data, and creating 5 procedures to generate reports from the data. The procedures include generating department reports, student statistics, faculty statistics with histogram binning, and an enrollment report. Detailed descriptions and sample outputs are provided for each procedure.
The document discusses the topic of sets in mathematics. It introduces sets as collections of well-defined objects that can be represented in different forms such as roster, statement, and set-builder forms. It discusses the contributions of mathematician Georg Cantor who established the foundations of set theory. The document also presents different concepts related to sets such as operations on sets, Venn diagrams, and examples of sets in real life. Finally, it proposes some open-ended questions and classroom activities about sets.
This document discusses using a mathematics laboratory approach to teaching concepts like factors, prime numbers, and the relationship between cylinders and cones. It provides an example lesson plan where students use manipulatives like square cards and containers to explore factors and prime/composite numbers. Students then perform an experiment to derive the formula for the volume of a cone by filling cylinders with cones of matching diameters and heights. The document outlines the advantages of this hands-on approach but also notes some topics may not be best suited and it requires careful planning.
A String Sculpture Illustrating Fermat's Little TheoremJames Smith
Please see also, the video https://www.youtube.com/watch?v=4lyhoAMnAc0. Fermat's Little Theorem states that if p is any prime number, and a is any integer, then a^p is congruent to a, modulus p. This document shows how to construct a string sculpture that illustrates that relationship for p=13.
This document outlines a fifth grade mathematics curriculum guide from the Isaac School District. Unit 9 focuses on data analysis and probability. Students will understand probability, how it can be represented, and how mathematical methods can maximize efficiency. They will learn to fluently multiply multi-digit numbers, find quotients of whole numbers with up to four-digit dividends and two-digit divisors, and make and interpret line plots displaying fractional data. Examples are provided to illustrate different strategies and models for solving problems within these domains.
(8) Lesson 7.5 - Similar Triangles and Indirect measurementwzuri
This document contains examples and explanations for determining similarity of triangles using angle-angle criterion. It includes:
1) An example comparing two triangles' corresponding angles to determine if they are similar or not.
2) An example using similarity of triangles to solve for the height of a street light using shadow lengths proportional to heights.
3) An example applying similarity to find the distance across a lake by setting up a proportion between corresponding sides of two similar triangles.
Here are step-by-step directions for finding the mean, median, mode, and range of a data set:
1. List all data values from the data set.
2. To find the median, arrange the data values in numerical order from lowest to highest.
3. If there is an odd number of values, the median is the middle number. If there is an even number of values, the median is the average of the two middle numbers.
4. To find the mode, identify the data value(s) that occur most frequently. There may be more than one mode.
5. To find the mean, add all the data values and divide the sum by the total number of
This document provides a scheme of work for teaching mathematics at Stage 8. It includes 3 units per term that each focus on a different topic area like number, algebra, or data handling. Each unit lists learning objectives, example activities, and resources for teaching key concepts. It also provides problem-solving activities that can be incorporated across each unit to develop problem-solving skills. The purpose is to illustrate one way the curriculum could be planned and delivered over the school year in 3 terms with flexibility for teachers.
This document discusses strategies for differentiated instruction in mathematics. It defines differentiation as modifying tasks to fit students' ability levels, interests, and learning styles. The goals are to provide engaging math activities for all students and define several differentiation strategies with examples aligned to Common Core standards. Teachers will work in groups to create mathematical tasks with at least two modifications to differentiate instruction and consider strategies for differentiating assessment.
This document provides step-by-step examples for determining a line of best fit from a scatter plot and using the line of best fit to make predictions. It explains how to construct a scatter plot, draw a line that best represents the data, write the equation in slope-intercept form, and use the equation to predict values. The examples illustrate how to find the slope and y-intercept, write the line of best fit equation, and make conjectures for data points not explicitly in the original data set.
Similar to Cross Join Example and Applications (20)
Data is the Fuel of Organizations: Opportunities and Challenges in AfghanistanAbdul Rahman Sherzad
A car without fuel cannot be driven; a mobile, a laptop or a PC without power cannot be used; a website without feeding won't have any visitors; likewise, an organization without data will not stand and cannot be survived.
The data quickly becoming one of the most important resources for any country, company, or organizations. It is the data that enables organizations to explain the past and guess the future through data science and business intelligence tools.
This presentation demonstrates how the Kankor data can be used as a resource in the context of Afghanistan, particularly, the candidates’ names that organizations in Afghanistan do not use for anything.
Read the following paper for more information and examples:
https://www.researchgate.net/publication/322695084_Data_is_the_Fuel_of_Organizations_Opportunities_and_Challenges_in_Afghanistan
These useful functions/snippets enable you to validate Unicode characters such as Digits, Person names, and Text mainly used in Afghanistan and Iran.
Feature list:
* Validate Person names commonly used in Afghanistan and Iran. Person names may be in Persian/Dari, Arabic, and English and similar languages;
* Validate only Persian Text;
* Validate only Pashtu Text;
* Validate digit in Persian/Dari, Pashtu and Arabic format;
* Validate digit in all common formats.
The document discusses the differences between recursion and iteration. Recursion involves a method calling itself, with each call reducing the problem size until a base case is reached. Iteration uses loops to repeat a process. Examples include calculating factorials, Fibonacci numbers, and binary search recursively and iteratively. Some problems like directory traversal are simpler using recursion due to its divide-and-conquer approach, while iterations may be preferred for easier explanation or to avoid stack overflows with deep recursions.
This document discusses different techniques for sorting alphanumeric data in MySQL. It presents scenarios with data containing strings with numbers at the beginning or end. The standard ORDER BY clause may not produce expected results in these cases. Solution 1 uses identity elements like addition or multiplication to sort numerically. Solution 2 casts the values to SIGNED or UNSIGNED to order as numbers. Solution 3 performs a "natural sort" by first ordering on string length then value, which generally works whether numbers are at the start or end of strings. For mixed data, sorting first by numeric value or using multiple methods may be needed.
Variable variables in PHP allow the name of a variable to be dynamically set and accessed using the value of another variable. They are useful for situations where variable names need to be dynamically generated, such as when uniquely identifying employees or students with IDs. Examples shown include outputting a name based on an ID variable, generating variables from an array, and simulating Excel's indirect() function to create dependent drop-down lists in a form. Variable variables can reduce code, provide a central sanitization point for external inputs, and make variable names easier to modify.
Applicability of Educational Data Mining in Afghanistan: Opportunities and Ch...Abdul Rahman Sherzad
The increase in enrollment in education and higher education institutions, the increase in the use of the Internet as well as the emergence of technology in educational systems have led to the aggregation of large amounts of student data at educational institutions (schools, colleges, and universities), which makes it vital to use data mining methods to improve the educational settings.
Although educational institutions collect an enormous amount of student data, this data is utilized to produce basic insights and is not used for decisions to improve the educational settings.
To get essential benefits from the data, powerful techniques are required to extract the useful knowledge which is valuable and significant for the decision and policy makers.
Secure web programming plus end users' awareness are the last line of defense against attacks targeted at the corporate systems, particularly web applications, in the era of world-wide web.
Most web application attacks occur through Cross Site Scripting (XSS), and SQL Injection. On the other hand, most web application vulnerabilities arise from weak coding with failure to properly validate users' input, and failure to properly sanitize output while displaying the data to the visitors.
The literature also confirms the following web application weaknesses in 2010: 26% improper output handling, 22% improper input handling, and 15% insufficient authentication, and others.
Abdul Rahman Sherzad, lecturer at Computer Science Faculty of Herat University, and Ph.D. student at Technical University of Berlin gave a presentation at 12th IT conference on Higher Education for Afghanistan in MoHE, and then conducted a seminar at Hariwa Institute of Higher Education in Herat, Afghanistan introducing web application security threats by demonstrating the security problems that exist in corporate systems with a strong emphasis on secure development. Major security vulnerabilities, secure design and coding best practices when designing and developing web-based applications were covered.
The main objective of the presentation was raising awareness about the problems that might occur in web-application systems, as well as secure coding practices and principles. The presentation's aims were to build security awareness for web applications, to discuss the threat landscape and the controls users should use during the software development lifecycle, to introduce attack methods, to discuss approaches for discovering security vulnerabilities, and finally to discuss the basics of secure web development techniques and principles.
Database Automation with MySQL Triggers and Event SchedulersAbdul Rahman Sherzad
This advanced training seminar on "Database Automation using MySQL Triggers and Event Schedulers" is dedicated to the Computer Science graduates and students of both public and private universities.
In this seminar we are going to look in depth at MySQL Triggers and Event Schedulers– powerful features supported by most popular commercial and open source relational database systems.
The Triggers are powerful tools for protecting the integrity of the data in the databases, logging and auditing of the changes on data, business logic, perform calculations, run further SQL commands, etc.
The Events are very useful to automate some database operations such as optimizing database tables, cleaning up logs, archiving data, or generate complex reports during off-peak time, etc.
The participants will learn about the true concept, implementation and application of MySQL Triggers and Event Schedulers with real life examples and scenarios.
They will also learn how to use the database triggers and event schedulers in many real cases to automate database tasks - such as optimizing database tables, cleaning up logs, archiving data, or generate complex reports during off-peak time.
This seminar is presented by Abdul Rahman Sherzad lecturer at Computer Science faculty of Herat University, and PhD Student at Technical University of Berlin, Germany at Hariwa Institute of Higher Education, Herat, Afghanistan.
Education is one of the main pillars and key concerns for each society in general. In developing countries, in particular in Afghanistan, we observe a remarkable increase in enrollment in education and higher education institutions, but most of the students don't have proper access to their scores. For instance, while Kankor result is announced the vast amounts of traffic the visitors generate make the website completely down and inaccessible. Another example, There is no efficient method to access the university scores in particular for students from other provinces. Last but not least, Diploma and certification verification is a lengthy and complicated process, when graduated students apply for jobs and scholarships inside or outside of Afghanistan they are asked to provide their certificate and diploma. One of the solutions can be verification of the graduation documents through SMS.
In Herat Innovation Lab 2015, Education group members under the mentorship of Abdul Rahman Sherzad chose this social and educational domain problem and within three days they designed and developed a prototype solution that enable students to access i.e. Kankor Scores Result, University Scores Result, Faculties Announcements and Events, and Certificate/Diploma Verification via SMS, Mobile and Web Applications effectively and efficiently.
Innovation Labs (iLabs) is a social innovation program covering a series of conferences. One the one hand, the goal is to bring social and technology experts together for the networking purpose. On the other hand, the motivation is to harness technology to solve the most challenging social and environmental problems and to build tech-based systems.
This presentation looks into the existing web structure and services of all Afghan universities, not only to evaluate the entire infrastructure but also to systematically analyze the gaps and design challenges of web platforms and services as a means of communication and collaboration among various stakeholders including the Ministry of Higher Education, its subsidiaries, students and other related audience.
The presentation finds that the environment for necessary ICT infrastructure and services is up to the expected required standard to provide access to various online resources and systems. The next important finding is the increasing demand by students to access information online rather than the existing traditional paper-based systems. Another very important finding is related to the non-existence of a formal managerial oversight to all the online resources and thus has resulted to a very poor quality of content, outdated information and the services that don't meet the expected needs and challenges.
PHP Basic and Fundamental Questions and Answers with Detail ExplanationAbdul Rahman Sherzad
These PHP basic and fundamental questions and answers with detail explanation help students and learners to think comprehensive, and to seek more to understand the concept and the root of each topic concretely.
This presentation introduces Java Applet and Java Graphics in detail with examples and finally using the concept of both applet and graphics code the analog clock project to depict how to use them in real life challenges and applications.
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
Today, we continue our journey into the world of RDBMS (relational database management systems) and SQL (Structured Query Language).
In this presentation, you will understand about some key definitions and then you will learn how to work with multiple tables that have relationships with each other.
First, we will go covering some core concepts and key definitions, and then will begin working with JOINs queries in SQL.
This presentation guide you how to make a custom Splash Screen step by step using Java Programming. In addition, you will learn the concept and usage of Java Timer, Java Progress Bar and Window ...
This presentation explains step by step how to develop and code Fal-e Hafez (Omens of Hafez) Cards in Persian Using JAVA. There are several applications which are coded by different programming languages i.e. Java languages for Desktops and Mobiles, HTML and CSS and PHP for Web Pages, etc. and this shows the importance of Omens of Hafez among the Persian people.
This presentation is an introduction to the design, creation, and maintenance of web design and development life cycle and web technologies. With it, you will learn about the web technologies, the life cycle of developing an efficient website and web application and finally some web essentials questions will be provided and reviewed.
Java Virtual Keyboard Using Robot, Toolkit and JToggleButton ClassesAbdul Rahman Sherzad
A Virtual Keyboard is considered to be a component to use on computers without a real keyboard e.g. Touch Screen Computers and Smart Phones; where a mouse can utilize the keyboard functionalities and features.
In addition, Virtual Keyboard used for the following subjects: Foreign Character Sets, Touchscreen, Bypass Key Loggers, etc.
With Unicode you can program and accomplish many funny, cool and useful programs and tools as for instance, Abjad Calculator, Bubble Text Generator to write letters in circle, Flip Text Generator to write letters upside down, Google Transliteration to convert English names to Persian/Arabic, etc...
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
2. Definition
■ Cross joins are used to return
every combination of rows from
two and more than two tables.
■ Cross Joins are sometimes
called a Cartesian product.
2
3. Example 1: Product
and Size
■ Suppose you want every
combination of product table
and size table, as illustrated
below:
3
4. Example 2: Product
and Color
■ Suppose you want every
combination of product/item
table and color table, as
illustrated below:
4
5. Example 3:
Product, Size and
Color
■ Suppose you want every
combination of product table,
size table, and color table, as
illustrated below:
5
6. Example 4: Student and Subject
■ Suppose you want to print every combination of Student table and
Subject table to record their marks, as illustrated below:
6
7. Example 5: Scenario
■ Calculating students’ attendance in comparison to the subjects’
requirement:
– Let’s consider an example where the faculty would like to know students’
attendance against the subjects’ requirements. Also, let’s suppose some
subjects are offered by several faculties, even different universities. Hence
students can attend those subjects at different locations.
■ In such a scenario, the cross join is required to identify those students which did not
attended some of the subjects at all. Then a left outer join is required to be used as
a final step.
7
9. Example 5: Cross Join
Subjects Attendance Requirement CROSS JOIN Students Attendance
Records
The cross join successfully
identified subject “Math” where
student “20003” did not attend it
at all.
9
10. Example 5: Left Outer Join
Left Outer Join of the Cross-Join output with Students Attendance
Records total as the final step.
10
11. Example 6 – Deck of Cards
■ This is another interesting example of Cross Join demonstrating the true application
of Cartesian Product
– This example may not be very practical but very useful in teaching
■ Standard Deck of Cards
– The standard playing card ranks {Ace, 2, 3, 4, 5, 6, 7, 8, 9, 10, Jack, Queen,
King} form a 13-element set.
– The card suits {space ♠, heart ♥, diamond ♦, club ♣} form a four-element
set.
– The Cross Join (Cartesian product) of these sets returns a 52-element set
consisting of 52 ordered pairs, which correspond to all 52 possible playing
cards.
11
12. Example 6 – Inputs
Card suits Playing card ranks
12