0% found this document useful (0 votes)
20 views38 pages

SCSA1301 DBMS Unit-5

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views38 pages

SCSA1301 DBMS Unit-5

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

DATABASE MANAGEMENT SYSTEM

SCSA1301

Dr. J Cruz Antony


Dept. of CSE
SIST

1
Object Database
Object Database is referred to as Object-
oriented database (OODB) and the
database system is referred to as Object-
oriented database management
system (ODBMS/OODBMS)
ODBMS is the data model in which data is
stored in form of objects, which are
instances of classes. These classes and
objects together make an object-oriented
data model

2
RDBMS and OODBMS
BASIS RDBMS OODBMS
Stands for Relational
Stands for Object Oriented Database
Long Form Database Management
Management System
System

Stores data in Entities,


Way of
defined as tables hold Stores data as Objects
storing data
specific information

Data Handles comparatively Handles larger and complex data than


Complexity simpler data RDBMS

Entity type refers to the Class describes a group of objects that


Grouping collection of entity that have common relationships, behaviors,
share a common definition and also have similar properties

Data
RDBMS stores only data Stores data as well as methods to use it
Handling

Main Data Independence from


Data Encapsulation
Objective application program

A Primary key distinctively An object identifier (OID) is an


3 Key identifies an object in a unambiguous, long-term name for any
table type of object or entity
Object Database
Reasons for creation of Object Oriented
Databases
Need for more complex applications
Need for additional data modeling
features
Increased use of object-oriented
programming languages

4
Components of Object-Oriented
Data Model
 Objects – User defined
complex data types
 An object has structure
or state (variables)
and methods
(behavior/operations)
An object is described by
four characteristics
 Identifier: a system-
wide unique id for an
object
 Name: an object may
also have a unique
name in DB (optional)
5  Lifetime: determines if
Components of ODBMS
There are three major components
1. Object structure
2. Object classes
3. Object identity

6
Components of ODBMS
Object Structure
The structure of an object refers to the
properties that an object is made up of. These
properties of an object are referred to as an
attribute
Thus, an object is a real-world entity with
certain attributes that makes up the object
structure
Also, an object encapsulates the data code into
a single unit which in turn provides data
abstraction by hiding the implementation
details from the user
7
Components of ODBMS
Object Structure
 The object structure is further composed of three types of
components: Messages, Methods, and Variables
 Messages
 A message provides an interface or acts as a
communication medium between an object and the
outside world
 A message can be of two types:
 Read-only message: If the invoked method does not
change the value of a variable, then the invoking
message is said to be a read-only message
 Update message: If the invoked method changes the
value of a variable, then the invoking message is said to
be an update message

8
Components of ODBMS
Object Structure
Methods
When a message is passed then the body of code
that is executed is known as a method
 Whenever a method is executed, it returns a
value as output. A method can be of two types:
 Read-only method: When the value of a variable
is not affected by a method, then it is known as
the read-only method
 Update-method: When the value of a variable
change by a method, then it is known as an
update method

9
Components of ODBMS
Object Structure
Variables
It stores the data of an object. The
data stored in the variables makes
the object distinguishable from one
another

10
Components of ODBMS
Object Classes
An object which is a real-world entity is
an instance of a class. Hence first we
need to define a class and then the
objects are made which differ in the
values they store but share the same
class definition
The objects in turn correspond to
various messages and variables stored
in them
11
Components of ODBMS
Object Classes
class CLERK
{ //variables
char name;
string address;
int id;
int salary;
//methods
char get_name();
string get_address();
int annual_salary();
};
In the above example code, we can see, CLERK is a
class that holds the object variables and messages

12
Components of ODBMS
Object Identity
 One goal of an ODBMS is to maintain a direct
correspondence between real-world and database objects
so that objects do not lose their integrity and identity and
can easily be identified and operated
 Hence it provides a unique system generated identity to
each independent object stored in the database known as
object identifier (OID)
 The value of an OID is not visible to the external user, but
is used internally by the system to identify each object
uniquely and to create and manage inter-object references
 The OID is immutable, OID should be used only once for an
object and cannot be assigned to another object even it is
removed from the database

13
Characteristics of ODBMS
Easy to link with programming language: The
programming language and the database
schema use the same type definitions, so there is
no need to learn a new database query language
No need for user defined keys: ODBMS have an
automatically generated OID associated with
each of the objects
Easy modeling: ODBMS can easily model real-
world objects, hence, are suitable for applications
with complex data
Can store non-textual data: ODBMS can also
store audio, video and image data

14
Advantages of ODBMS
Speed: Access to data can be faster
because an object can be retrieved directly
without a search, by following pointers
Improved performance: These systems are
most suitable for applications that use
object oriented programming
Extensibility: Unlike traditional RDBMS
where the basic-datatypes are hardcoded,
when using ODBMS the user can encode
any kind of data structures to hold the data

15
Advantages of ODBMS
Data consistency: When ODBMS is
integrated with an object-based
application, there is much greater
consistency between the database and the
programming language since both use the
same model of representation for the data.
This helps avoid the impedance mismatch
Capability of handling variety of data:
Unlike other database management
systems, ODBMS can also store non textual
data like-: images, videos and audios
16
Disadvantages of ODBMS
 No universal standards: There is no universally
agreed standards of operating ODBMS. This the
most significant drawback as the user is free to
manipulate data model as he wants which can
be an issue when handling enormous amounts
of data
 No security features: Since use of ODBMS is
very limited, there are not adequate security
features to store production-grade data
 Exponential increase in complexity: ODBMS
become very complex very fast. When there is
a lot of data and a lot of relations between
data, managing and optimizing ODBMS
17
becomes difficult
Emerging Database Technologies and
Application
Mobile Databases
Multimedia Databases
Geographic Information Systems
GENOME Data Management

18
Mobile database
A Mobile database is a database that can be
connected to a mobile computing device over a
mobile network (or wireless network). Here the
client and the server have wireless connections
In today’s world, mobile computing is growing
very rapidly, and it is huge potential in the field
of the database
It will be applicable on different-different devices
like android based mobile databases, iOS based
mobile databases, etc. Common examples of
databases are Couch base Lite, Object Box, etc.

19
Mobile database - Features
A cache is maintained to hold frequent
transactions so that they are not lost due to
connection failure
Mobile databases are physically separate from
the central database server, Mobile databases
are capable of communicating with a central
database server or other mobile clients from
remote sites
With the help of a mobile database, mobile
users must be able to work without a wireless
connection due to poor or even non-existent
connections
20
Mobile database
Mobile Database typically involves three parties
1. Fixed Hosts
It performs the transactions and data management
functions with the help of database servers
2. Mobiles Units
These are portable computers that move around a
geographical region that includes the cellular
network that these units use to communicate to base
stations
3. Base Stations
These are two-way radios installation in fixed
locations, that pass communication with the mobile
units to and from the fixed hosts
21
Multimedia Database
 DBMSs have been constantly adding to the types of data they support.
 Today many types of multimedia data are available in current systems.
 Text: May be formatted or unformatted. For ease of parsing structured documents, standards like
SGML and variations such as HTML
 Graphics: Examples include drawings and illustrations that are encoded using some descriptive
standards (e.g. CGM, PICT, postscript).
 Images: Includes drawings, photographs, and so forth, encoded in standard formats such as
bitmap, JPEG, and MPEG. Compression is built into JPEG and MPEG.
 Animations: Temporal sequences of image or graphic data.
 Video: A set of temporally sequenced photographic data for presentation at
specified rates– for example, 30 frames per second.
 Structured audio: A sequence of audio components comprising note, tone,
duration, and so forth.
 Audio: Sample data generated from aural recordings in a string of bits in digitized
form. Analog recordings are typically converted into digital form before storage.

22
Multimedia Database

23
Geographical Information System
(GIS)
Geographic information systems(GIS) are
used to collect, model, and analyze
information describing physical properties
of the geographical world

24
Geographical Information System
(GIS)
 The scope of GIS broadly encompasses two types of data:

 Spatial data, originating from maps, digital images,


administrative and political boundaries, roads, transportation
networks, physical data, such as rivers, soil characteristics,
climatic regions, land elevations, and
 Non-spatial data, such as socio-economic data (like census

counts), economic data, and sales or marketing information.


GIS is a rapidly developing domain that offers highly
innovative approaches to meet some challenging technical
demands.

25
Geographical Information System
(GIS)
Data Analysis

GIS data undergoes various types of

analysis.
For example, in applications

such as soil erosion studies,

environmental impact studies, or


hydrological runoff simulations,
26
Geographical Information System
(GIS)

27
Genome Database
 Biological Sciences and Genetics:

 The biological sciences encompass an enormous variety of

information.
 Environmental science gives us a view of how species live

and interact in a world filled with natural phenomena.


 Biology and ecology study particular species.
 Anatomy focuses on the overall structure of an organism,

documenting the physical aspects of individual bodies.


 Traditional medicine and physiology break the organism into

systems and tissues and strive to collect information on the


workings of these systems and the organism as a whole.

28
Genome Database

29
Data Mining
Data Mining is known as the Knowledge
Discovery in Databases, refers to the
nontrivial extraction of implicit, previously
unknown and potentially useful information
from data stored in databases
Data mining is used in business to make
better managerial decisions by
1. Automatic summarization of data
2. Extracting essence of information stored
3. Discovering patterns in raw data

30
Data Mining - KDD

31
Data Mining – KDD - 1
Data cleaning is defined as removal of
noisy and irrelevant data from collection
Cleaning in case of Missing values
Cleaning noisy data, where noise is a
random or variance error
Cleaning with Data discrepancy detection
and Data transformation tools

32
Data Mining – KDD - 2
Data integration is defined as
heterogeneous data from multiple sources
combined in a common source called as
Data Warehouse
Data integration using Data Migration tools
Data integration using Data
Synchronization tools
Data integration using ETL (Extract-
Transform-Load) process

33
Data Mining – KDD - 3
Data selection is defined as the process
where data relevant to the analysis is
decided and retrieved from the data
collection
Data selection using Neural network,
Decision Trees, Naive bayes, etc.
Data selection using Clustering, Regression,
etc.

34
Data Mining – KDD - 4
Data Transformation is defined as the
process of transforming data into
appropriate form required by mining
procedure
Data Transformation is a two step process:
Data Mapping: Assigning elements from
source base to destination to capture
transformations
Code generation: Creation of the actual
transformation program

35
Data Mining – KDD - 5
Data mining is defined as clever
techniques that are applied to extract
patterns potentially useful
Transforms task relevant data into patterns
Decides purpose of model using
classification or characterization

36
Data Mining – KDD - 6
Pattern Evaluation is defined as
identifying strictly increasing patterns
representing knowledge based on given
measures
Find interestingness score of each pattern
Uses summarization and Visualization to
make data understandable by user

37
Data Mining – KDD - 7
Knowledge representation is defined as
technique which utilizes visualization tools
to represent data mining results
Generate reports and tables
Generate discriminant rules, classification
rules, characterization rules, etc.

38

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy