Lecture notes on Functional dependencies, normal forms, first, second, third normal forms, BCNF, inclusion dependence, loss less join decompositions, normalization using FD, MVD, and JDs, alternative approaches to database design.
Functional dependencies in Database Management SystemKevin Jadiya
Slides attached here describes mainly Functional dependencies in database management system, how to find closure set of functional dependencies and in last how decomposition is done in any database tables
ACID properties
Atomicity, Consistency, Isolation, Durability
Transactions should possess several properties, often called the ACID properties; they should be enforced by the concurrency control and recovery methods of the DBMS.
DDBMS, characteristics, Centralized vs. Distributed Database, Homogeneous DDBMS, Heterogeneous DDBMS, Advantages, Disadvantages, What is parallel database, Data fragmentation, Replication, Distribution Transaction
It consists of important different concepts related to PL/SQL that are covered like the Basic structure of PL/SQL block, Variables and Constants in PL/SQL, Control Structures i.e., Conditional, Iterative, and Sequential Control, Procedure and Function, Cursors and its Types, Applications of implicit and explicit cursors, Triggers and its Types and Exception Handling.
Functional dependencies in Database Management SystemKevin Jadiya
Slides attached here describes mainly Functional dependencies in database management system, how to find closure set of functional dependencies and in last how decomposition is done in any database tables
ACID properties
Atomicity, Consistency, Isolation, Durability
Transactions should possess several properties, often called the ACID properties; they should be enforced by the concurrency control and recovery methods of the DBMS.
DDBMS, characteristics, Centralized vs. Distributed Database, Homogeneous DDBMS, Heterogeneous DDBMS, Advantages, Disadvantages, What is parallel database, Data fragmentation, Replication, Distribution Transaction
It consists of important different concepts related to PL/SQL that are covered like the Basic structure of PL/SQL block, Variables and Constants in PL/SQL, Control Structures i.e., Conditional, Iterative, and Sequential Control, Procedure and Function, Cursors and its Types, Applications of implicit and explicit cursors, Triggers and its Types and Exception Handling.
ALGORITHM FOR RELATIONAL DATABASE NORMALIZATION UP TO 3NFijdms
When an attempt is made to modify tables that have not been sufficiently normalized undesirable sideeffects
may follow. This can be further specified as an update, insertion or deletion anomaly depending on
whether the action that causes the error is a row update, insertion or deletion respectively. If a relation R
has more than one key, each key is referred to as a candidate key of R. Most of the practical recent works
on database normalization use a restricted definition of normal forms where only the primary key (an
arbitrary chosen key) is taken into account and ignoring the rest of candidate keys.
In this paper, we propose an algorithmic approach for database normalization up to third normal form by
taking into account all candidate keys, including the primary key. The effectiveness of the proposed
approach is evaluated on many real world examples
Normalization is the process of organizing data in a database. This includes creating tables and establishing relationships between those tables according to rules designed both to protect the data and to make the database more flexible by eliminating redundancy and inconsistent dependency.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
1. Subject: Database Management System Mukesh Kumar
Subject Code: (NCS-502) Assistant Professor (CSE-Deptt)
UNIT-3
I.T.S Engineering College, Greater Noida
Syllabus:
Data Base Design & Normalization: Functional dependencies, normal forms, first, second, third
normal forms, BCNF, inclusion dependence, loss less join decompositions, normalization using
FD, MVD, and JDs, alternative approaches to database design.
12 Rules of RDBMS
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve
rules of his own, which according to him, a database must obey in order to be regarded as a true relational
database.
These rules can be applied on any database system that manages stored data using only its relational capabilities.
This is a foundation rule, which acts as a base for all the other rules.
Rule 1: Information Rule
The data stored in a database, may it be user data or metadata, must be a value of some table cell. Everything in a
database must be stored in a table format.
Rule 2: Guaranteed Access Rule
Every single data element (value) is guaranteed to be accessible logically with a combination of table-name,
primary-key (row value), and attribute-name (column value). No other means, such as pointers, can be used to
access data.
Rule 3: Systematic Treatment of NULL Values
The NULL values in a database must be given a systematic and uniform treatment. This is a very important rule
because a NULL can be interpreted as one the following − data is missing, data is not known, or data is not
applicable.
Rule 4: Active Online Catalog
The structure description of the entire database must be stored in an online catalog, known as data dictionary,
which can be accessed by authorized users. Users can use the same query language to access the catalog which
they use to access the database itself.
Rule 5: Comprehensive Data Sub-Language Rule
A database can only be accessed using a language having linear syntax that supports data definition, data
manipulation, and transaction management operations. This language can be used directly or by means of some
application. If the database allows access to data without any help of this language, then it is considered as a
violation.
Rule 6: View Updating Rule
All the views of a database, which can theoretically be updated, must also be updatable by the system.
Rule 7: High-Level Insert, Update, and Delete Rule
A database must support high-level insertion, updation, and deletion. This must not be limited to a single row, that
is, it must also support union, intersection and minus operations to yield sets of data records.
Rule 8: Physical Data Independence
The data stored in a database must be independent of the applications that access the database. Any change in the
physical structure of a database must not have any impact on how the data is being accessed by external
applications.
Rule 9: Logical Data Independence
2. Subject: Database Management System Mukesh Kumar
Subject Code: (NCS-502) Assistant Professor (CSE-Deptt)
UNIT-3
I.T.S Engineering College, Greater Noida
The logical data in a database must be independent of its user’s view (application). Any change in logical data
must not affect the applications using it. For example, if two tables are merged or one is split into two different
tables, there should be no impact or change on the user application. This is one of the most difficult rule to apply.
Rule 10: Integrity Independence
A database must be independent of the application that uses it. All its integrity constraints can be independently
modified without the need of any change in the application. This rule makes a database independent of the front-
end application and its interface.
Rule 11: Distribution Independence
The end-user must not be able to see that the data is distributed over various locations. Users should always get
the impression that the data is located at one site only. This rule has been regarded as the foundation of distributed
database systems.
Rule 12: Non-Subversion Rule
If a system has an interface that provides access to low-level records, then the interface must not be able to
subvert the system and bypass security and integrity constraints.
Functional Dependency
Functional dependencies are constraints on the set of legal relations. They allow us to express facts about the
enterprise that we are modeling with our database.
Let R be a relation schema. A subset K of R is a superkey of R if, in any legal relation r(R), for all pairs t1 and t2
of tuples in r such that t1 ≠ t2, then t1 [K] ≠ t2[K]. That is, no two tuples in any legal relation r(R) may have the
same value on attribute set K.
The notion of functional dependency generalizes the notion of superkey. Consider a relation schema R, and let α
⊆ R and β ⊆ R. The functional dependency α →β holds on schema R if, in any legal relation r(R), for all pairs of
tuples t1 and t2 in r such that t1[α] = t2[α], it is also the case that t1[β] = t2[β].
Using the functional-dependency notation, we say that K is a superkey of R if K → R. That is, K is a superkey if,
whenever t1[K] = t2[K], it is also the case that t1[R] = t2[R] (that is, t1 = t2).
Functional dependency (FD) is a set of constraints between two attributes in a relation. Functional dependency
says that if two tuples have same values for attributes A1, A2,..., An, then those two tuples must have to have
same values for attributes B1, B2, ..., Bn.
Functional dependency is represented by an arrow sign (→) that is, X→Y, where X functionally determines Y.
The left-hand side attributes determine the values of attributes on the right-hand side.
3. Subject: Database Management System Mukesh Kumar
Subject Code: (NCS-502) Assistant Professor (CSE-Deptt)
UNIT-3
I.T.S Engineering College, Greater Noida
Closure of a Set of Functional Dependencies
If F is a set of functional dependencies then the closure of F, denoted as F+, is the set of all functional
dependencies logically implied by F. Armstrong's Axioms are a set of rules, that when applied
repeatedly, generates a closure of functional dependencies.
Reflexivity rule. If α is a set of attributes and β ⊆ α, then α →β holds.
Augmentation rule. If α → β holds and γ is a set of attributes, then γα → γβ holds.
Transitivity rule. If α → β holds and β → γ holds, then α → γ holds.
Union rule. If α → β holds and α → γ holds, then α → βγ holds
Decomposition rule. If α → βγ holds, then α → β holds and α →γ holds
Pseudo-transitivity rule. If α → β holds and γβ → δ holds, then αγ → δ holds.
TrivialFunctionalDependency
Trivial − If a functional dependency (FD) X → Y holds, where Y is a subset of X, then it is
called a trivial FD. Trivial FDs always hold.
Non-trivial − If an FD X → Y holds, where Y is not a subset of X, then it is called a non-trivial
FD.
Completely non-trivial − If an FD X → Y holds, where x intersect Y = Φ, it is said to be a
completely non-trivial FD.
A procedure to compute F+
.
F+
= F
repeat
for each functional dependency f in F+
apply reflexivity and augmentation rules on f
add the resulting functional dependencies to F+
for each pair of functional dependencies f1 and f2 in F+
if f1 and f2 can be combined using transitivity
add the resulting functional dependency to F+
until F+
does not change any further
Example:
F= (A → B, A → C, CG → H, CG → I, B → H)
A→ B & B → H ═> A→ H
CG → H & CG → I ═> CG → HI
A → C & CG → H ═> AG→I similarly AG→H
F+
= (A → B, A → C, CG → H, CG → I, B → H, A→ H, CG → HI, AG→I, AG → H)
Closure of Attribute Sets
To test whether a set of is a super key, we need to find the set of attributes functionally determined by α.
Let α be a set of attributes. We call the set of attributes determined by α under a set F of functional
dependencies the closure of α under F, denoted α+
.
A procedure to compute α +
4. Subject: Database Management System Mukesh Kumar
Subject Code: (NCS-502) Assistant Professor (CSE-Deptt)
UNIT-3
I.T.S Engineering College, Greater Noida
result := α;
while (changes to result) do
for each functional dependency β → γ in F do
begin
if β ⊆ result then result := result ∪ γ;
end
Example:
Find AG+
in F= (A → B, A → C, CG → H, CG → I, B → H)
A → B causes us to include B in result. To see this fact, we observe that A → B is in F, A ⊆ result which
is AG), so result: = result ∪ B.
A→ C causes result to become ABCG.
CG→H causes result to become ABCGH.
CG→I causes result to become ABCGHI.
To test if α is a superkey, we compute α+, and check if α+ contains all attributes of R.
Extraneousattributes
An attribute of a functional dependency is said to be extraneous if we can remove it without changing the closure
of the set of functional dependencies. The formal definition of extraneous attributes is as follows. Consider a set F
of functional dependencies and the functional dependency α →β in F.
Attribute A is extraneous in α if A ∈ α, and F logically implies (F − {α → β}) ∪ {(α − A) → β}.
• Attribute A is extraneous in β if A ∈ β, and the set of functional dependencies (F − {α →β}) ∪ {α → (β −
A)} logically implies F.
Consider a set F of functional dependencies and the functional dependency α→β in F.
• To test if attribute A ∈ α is extraneous in α
1. compute ({α} – A)+ using the dependencies in F
2. check that ({α} – A)+ contains all attributes of β; if it does, A is extraneous
• To test if attribute A ∈ β is extraneous in β
1. compute α+ using only the dependencies in F’ = (F – {α→β}) ∪ {α →(β – A)},
2. check that α+ contains A; if it does, A is extraneous
CanonicalCover
A canonical cover for F is a set of dependencies Fc such that
• F logically implies all dependencies in Fc,
• Fc logically implies all dependencies in F
• No functional dependency in Fc contains an extraneous attribute
• Each left side of functional dependency in Fc is unique.
• To compute a canonical cover for F:
repeat
Use the union rule to replace any dependencies in F
α1 → β1 and α1 → β1 with α1 → β1 β2
Find a functional dependency α→β with an
extraneous attribute either in α or in β
If an extraneous attribute is found, delete it from α→β
until F does not change
• Note: Union rule may become applicable after some extraneous attributes have been deleted, so it has to
be re-applied
R = (A, B, C)
F = {A → BC, B → C, A → B, AB → C}
• Combine A → BC and A → B into A → BC
5. Subject: Database Management System Mukesh Kumar
Subject Code: (NCS-502) Assistant Professor (CSE-Deptt)
UNIT-3
I.T.S Engineering College, Greater Noida
Set is now {A → BC, B → C, AB → C}
• A is extraneous in AB → C
Check if the result of deleting A from AB → C is implied by the other dependencies
Yes: in fact, B → C is already present!
Set is now {A → BC, B → C}
• C is extraneous in A → BC
Check if A → C is logically implied by A → B and the other dependencies
Yes: using transitivity on A → B and B → C.
Can use attribute closure of A in more complex cases
• The canonical cover is: A → B, B → C
Normalization
If a database design is not perfect, it may contain anomalies, which are like a bad dream for any
database administrator. Managing a database with anomalies is next to impossible.
Update anomalies − If data items are scattered and are not linked to each other properly, then it
could lead to strange situations. For example, when we try to update one data item having its
copies scattered over several places, a few instances get updated properly while a few others are
left with old values. Such instances leave the database in an inconsistent state.
Deletion anomalies − we tried to delete a record, but parts of it was left undeleted because of
unawareness, the data is also saved somewhere else.
Insert anomalies − we tried to insert data in a record that does not exist at all.
Normalization:
Normalization is a method to remove all these anomalies and bring the database to a consistent state.
First Normal Form
First Normal Form defines that all the attributes in a relation must have atomic domains. The values in
an atomic domain are indivisible units.
We re-arrange the relation (table) as below, to convert it to First Normal Form.
Each attribute must contain only a single value from its pre-defined domain.
SecondNormalForm
Before we learn about the second normal form, we need to understand the following −
6. Subject: Database Management System Mukesh Kumar
Subject Code: (NCS-502) Assistant Professor (CSE-Deptt)
UNIT-3
I.T.S Engineering College, Greater Noida
• Prime attribute − An attribute, which is a part of the primary-key, is known as a prime attribute.
• Non-prime attribute − An attribute, which is not a part of the primary-key, is said to be a non-
prime attribute.
The relation is in 2NF if every non-prime attribute is fully functionally dependent on primary key
attribute. That is, if X → A holds, then there should not be any proper subset Y of X, for which Y → A
also holds true.
In the above Student_Project relation, the prime key attributes are Stu_ID and Proj_ID. According to the
rule, non-key attributes, i.e. Stu_Name and Proj_Name must be dependent upon both and not on any of
the prime key attribute individually.
But we find that Stu_Name can be identified by Stu_ID and Proj_Name can be identified by Proj_ID
independently. This is called partial dependency, which is not allowed in Second Normal Form.
We broke the relation in two as in the above picture. So there exists no partial dependency.
ThirdNormalForm
A relation is in Third Normal Form, if it is in Second Normal form and the following must satisfy −
• No non-prime attribute is transitively dependent on prime key attribute.
• For any non-trivial functional dependency, X → A, then either −
o X is a superkey or,
o A is prime attribute.
We find that in the above Student_detail relation, Stu_ID is the key and only prime key attribute. We
find that City can be identified by Stu_ID as well as Zip itself. Neither Zip is a superkey nor is City a
prime attribute. Additionally, Stu_ID → Zip → City, so there exists transitive dependency.
To bring this relation into third normal form, we break the relation into two relations as follows −
7. Subject: Database Management System Mukesh Kumar
Subject Code: (NCS-502) Assistant Professor (CSE-Deptt)
UNIT-3
I.T.S Engineering College, Greater Noida
Boyce-CoddNormalForm
Boyce-Codd Normal Form (BCNF) is an extension of Third Normal Form on strict terms. A relation is
in BCNF if it is in 3NF and for any non-trivial functional dependency, X → A, X must be a super-key.
In the above image, Stu_ID is the super-key in the relation Student_Detail and Zip is the super-key in
the relation ZipCodes. So,
Stu_ID → Stu_Name, Zip
and
Zip → City
Which confirms that both the relations are in BCNF.