4 resultados para Relational symbolic model
em Digital Commons at Florida International University
Resumo:
The purpose of this research was to apply model checking by using a symbolic model checker on Predicate Transition Nets (PrT Nets). A PrT Net is a formal model of information flow which allows system properties to be modeled and analyzed. The aim of this thesis was to use the modeling and analysis power of PrT nets to provide a mechanism for the system model to be verified. Symbolic Model Verifier (SMV) was the model checker chosen in this thesis, and in order to verify the PrT net model of a system, it was translated to SMV input language. A software tool was implemented which translates the PrT Net into SMV language, hence enabling the process of model checking. The system includes two parts: the PrT net editor where the representation of a system can be edited, and the translator which converts the PrT net into an SMV program.
Resumo:
Query processing is a commonly performed procedure and a vital and integral part of information processing. It is therefore important and necessary for information processing applications to continuously improve the accessibility of data sources as well as the ability to perform queries on those data sources. ^ It is well known that the relational database model and the Structured Query Language (SQL) are currently the most popular tools to implement and query databases. However, a certain level of expertise is needed to use SQL and to access relational databases. This study presents a semantic modeling approach that enables the average user to access and query existing relational databases without the concern of the database's structure or technicalities. This method includes an algorithm to represent relational database schemas in a more semantically rich way. The result of which is a semantic view of the relational database. The user performs queries using an adapted version of SQL, namely Semantic SQL. This method substantially reduces the size and complexity of queries. Additionally, it shortens the database application development cycle and improves maintenance and reliability by reducing the size of application programs. Furthermore, a Semantic Wrapper tool illustrating the semantic wrapping method is presented. ^ I further extend the use of this semantic wrapping method to heterogeneous database management. Relational, object-oriented databases and the Internet data sources are considered to be part of the heterogeneous database environment. Semantic schemas resulting from the algorithm presented in the method were employed to describe the structure of these data sources in a uniform way. Semantic SQL was utilized to query various data sources. As a result, this method provides users with the ability to access and perform queries on heterogeneous database systems in a more innate way. ^
Resumo:
The Semantic Binary Data Model (SBM) is a viable alternative to the now-dominant relational data model. SBM would be especially advantageous for applications dealing with complex interrelated networks of objects provided that a robust efficient implementation can be achieved. This dissertation presents an implementation design method for SBM, algorithms, and their analytical and empirical evaluation. Our method allows building a robust and flexible database engine with a wider applicability range and improved performance. ^ Extensions to SBM are introduced and an implementation of these extensions is proposed that allows the database engine to efficiently support applications with a predefined set of queries. A New Record data structure is proposed. Trade-offs of employing Fact, Record and Bitmap Data structures for storing information in a semantic database are analyzed. ^ A clustering ID distribution algorithm and an efficient algorithm for object ID encoding are proposed. Mapping to an XML data model is analyzed and a new XML-based XSDL language facilitating interoperability of the system is defined. Solutions to issues associated with making the database engine multi-platform are presented. An improvement to the atomic update algorithm suitable for certain scenarios of database recovery is proposed. ^ Specific guidelines are devised for implementing a robust and well-performing database engine based on the extended Semantic Data Model. ^
Resumo:
Past HIV interventions have been critiqued for their failure to incorporate relational factors linked to condom use. Furthermore, few studies have focused on the relational context of sexual risk behavior among adolescents at elevated risk for HIV/STI exposure in the context of substance use. Therefore, this study evaluated the influence of three key relational factors (rejection sensitivity, intimacy dating goals, intercourse-related anxiety) salient for understanding condom use among adolescents in outpatient substance abuse treatment in South Florida. Structural equation modeling was used to test relational factors as direct and indirect predictors of condom use. Specifically, the current study investigated the influence of rejection sensitivity and intimacy dating goals on percentage of protected intercourse, with intercourse-related anxiety modeled as a mediator of this association. ^ Results obtained from the hypothesized structural model suggest rejection sensitivity and intimacy dating goals are significant predictors of percentage of protected intercourse. As expected, rejection sensitivity was related to lower levels of percentage of protected intercourse via heightened levels of intercourse-related anxiety and was not related directly to percentage of protected intercourse. Intercourse-related anxiety was indicated as a partial mediator between rejection sensitivity and percentage of protected intercourse. In contrast, intimacy dating goals was related to lower levels of percentage of protected intercourse directly. The findings demonstrate the importance of relational factors in condom use among adolescents in outpatient substance abuse treatment. Levels of protected intercourse are likely to increase when relational factors are targeted among adolescents in this high-risk population. Implications for prevention strategies targeting this high-risk subgroup of adolescents are discussed. ^