SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 6, November - December (2013), pp. 219-231
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com

IJCET
©IAEME

A GRAPH BASED APPROACH TO FIND CANDIDATE KEYS IN A
RELATIONAL DATABASE SCHEME
Subhrajyoti Bordoloi1,

Bichitra Kalita2

Dept. of Computer Applications, Assam Engg. College, Guwahati, Assam

ABSTRACT
In this paper, a simple straightforward method to find all the candidate keys of a relational
database schemes using graph is presented. First, the FD graph is drawn from the set of functional
dependencies in a relational scheme. Thereafter, by using few very simple graph transformations, the
FDG is reduced to a graph called the Candidate Graph having only the candidate nodes. From this
Candidate Graph, all the candidate keys for the relational scheme can be identified.
Key Words: Candidate Node, Candidate Graph, FD, FDG.
1.

INTRODUCTION

Graphs have many applications in the field of knowledge and data engineering. There are
many graph based approaches used in database management system, ranging from E-R modeling to
database schema design and normalization [1][3][8][10][11][17][18]. Functional dependencies
among the entities of a context problem area can be easily represented as a graph called the
functional dependence graph (FDG). Apart from database technology, FDGs have many applications
in Web data analysis [4], Language processing [5], Data cleaning [9], Network Theory [10] and Data
Mining [12]. There are several types of generalized graphs such as FD graph, Implication graph, and
Deduction graphs, etc. used to study functional dependencies. Hyper graph is another generalized
graph that can be used to study functional dependencies [14]. There are many algorithms for finding
all the candidate keys of a relational scheme based on Karnaugh map [6], Boolean matrix [7] and
other set theoretic approaches [13]. Hossein Saiedian, et.al, described a method for finding the
candidate keys in a relational scheme [2]. In their approach, the functional dependencies among the
attributes in a database table can be represented as a graph. Such graphs are also called attribute
graphs. They use the attribute graph for analyzing the dependencies to find the candidate keys. Their
approach cannot find all the candidate keys of a relational scheme if the FD graph is strongly
connected. Their approach needs a minimal set FDs to compute the candidate keys.
219
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

In this paper, a generalized graph based method to find all candidate keys in a relational
database scheme is presented.
2.

FUNCTIONAL DEPENDENCIES AND THEIR GRAPHS

Let α→β be a functional dependency, where α, β are sets of attributes. Depending on the
cardinality of α and β the following graph patterns are obtained for the FD α→β.
2.1. If α and β both are singular, i.e., |α |=|β |=1 then the graph pattern shown in fig.-1(a) is
obtained.
2.2. If |α|=1 and |β|>1 and β={β1, β2 …, βn },then the graph pattern shown in fig.-1(b)is obtained.
2.3. a) If |α|>1 and |β|=1 and α={α1,α2…,αn } then the graph pattern shown in fig.-1(c) is obtained.
b) If |α|>1 and |β|>1 and α={α1,α2 …,αn } and β={β1,β2 …, βn },then the graph pattern shown in
fig.-1(d) is obtained.

β1
β2
βn
(a): Graph for α→β

(b): Graph for α→β1 β2.. βn

1

α2

αn
(c): Graph for α1α2 … αn→β

β1
1

β2

…

α2

β

…

α

…

β

.

α

α1

α1

αn
βn
(d): Graph for
α1α2 … αn→ β1 β2 …, βn
1 : Connector Node

Figure 1: Functional Dependencies and Their Graphs

Note that there are dependencies from a connector node to all components (nodes) of it. In
fig.1, the following dependencies are also existed 1→ (α1, α2, .. ,αn)

3.

FUNCTIONAL DEPENDENCY
DATABASE SCHEME

GRAPHS

(FDG)

FOR

A

RELATIONAL

The functional dependency graph (FDG) for a relational scheme is drawn based on the set of
functional dependencies available in the relational scheme using the rules 2.1, 2.2, 2.3. One node is
created for each attribute in the relation scheme. A connector-node is created each time the Rule 2.3
is applied, i.e. for each distinct non-singular attribute set which is in the left-hand side of a FD.
Therefore, for a relational scheme R with N attributes with a set of FDs F and having M distinct nonsingular attribute sets in the left-hand side of the FDs in F there will be N+M nodes in the FDG. For
example, for a relational scheme R= (A, B, C, D, E) with the set FDs F= {A→ BC, CD →E, B→ D,
E →A} we obtain a FDG, as shown in fig-2, with a total of 6 nodes.

220
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

A
B

C
E

1

D

Figure 2: FD Graph for a relational scheme R= (A, B, C, D, E) with the set FDs
F= {A→ BC, CD →E, B→ D, E →A}
4.

FINDING THE CANDIDATE KEYS USING FDG

To find the candidate keys from the FDG, the following transformations are performed in the
FDG. The transformation process has two phases- Augmentation and Reduction. After the
transformation, the resultant graph contains only the candidate nodes. A candidate node is a node
which alone or along with some other candidate nodes, can determine all other nodes in the graph.
Therefore the resultant graph is called the Candidate Graph (GC). So, the problem now is to find the
candidate graph from an FDG. Therefore the transformation process can be represented as follows:
G → G⁺ → GC.
Augmentation: Finding G⁺
⁺
In the augmentation phase new connector nodes and edges are added to the FDG by
performing the following transformations.
4.1

T1: Let there exists a connector-type node which connect the node set C= {ci,},1<i≤n, n is the
cardinality of the set C, and has an outgoing edge to a node B. If there is a dependency ci→cj,
ci, cj Є {C} then remove cj from {C}. Delete the connector node from the G⁺ if {C} is
⁺
singular. Assign all edges of C to c⊂ C.

3

D

3

D

A

A

1

A
1

C
2

C

C
B

B

B

D

3

2

D

3
A

C

D
A

B
2

C
B

2

2

Figure 3: Transformation T1
T2: Let there exists a connector-type node which connect the node set C={ci,},1<i≤n, n is the
cardinality of the set C, and has an outgoing edge to a node B. Let there exists a node A (may
be a connector node) in the FDG from which there is a path to any node ci in C.
CASE-I:

If ∀i , 1≤ i ≤n there is a path from A to ci, then an edge from A to C is added.

CASE-II:

If there is a path from A to a set {ck} ⊂ C, 1<i<n and |ck|<n where n is the cardinality of
C, then for each ck ,a new connector node C′ is created connecting node A and the nodes in
the set {C- ck } and an edge from C′ to C is added.
221
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

A

A
B

B

⟹

C

C

1

: Edge due to T2 (case-II)

E

D

E

1

D

: Edge due to T2(case-I)

2 : Node created due to T2 (case-II)

2
+

(G)

(G )

Figure 4: Transformation T2 (Augmentation)
In fig-4., node A has a path to both components C and D of the set represented by the
connector node “1”, so an edge from A to the connector node “1” is added due to case-I of the
transformation T2. Node B has a path to only one component D of the set represented by the
connector node “1”, so a new connector node “2” is created to connect node B and node C and an
edge from “2” to the “1” is added due to case-II of the transformation T2.
Reduction: Finding GC
In the reduction phase certain nodes and edges are deleted from the augmented FDG by
performing the following transformations.
T3: Let C be a connector node in G⁺. If there is a node A in G⁺ which has a direct edge to
⁺
⁺
node C, then delete all edges from A to the first node in the paths to any ci⊆ C.
T4: Delete a node N from the augmented FDG G⁺ if its in-degree >0 and out-degree =0.
In fig-5(b), first node D is deleted because its in-degree is non zero and out-degree is
zero. Deletion of this node causes the deletion of the nodes B and C from the graph.
T5: Delete a cycle K from G⁺ if in-degree (K) >0 and out-degree (K) =0. Fig-5(c), deletion of
cycles is shown.
4.2

A
B

A

A
C

C

1

E

D

B

C
1

D
2

1

D
B

2

1

B

C

D ⟹ A

B

A
C

(b): Deletion of nodes B, C, D Using
Transformation rule T4

D

E
⟹ E

A

E

2

2
(a): Example of Transformation T3

3
A

E

B

E

E
F ⟹

D

C

G

G

F

(i)
(ii)
(c) : Cycle deletion using Transformation T5

Figure 5: Transformations in Reduction Process
The following example in fig-6 explains the transformation process. Let R= (A, B, C, D, E)
be a relational scheme with the set FDs F= {A→ BC, CD →E, B→ D, E →A}. With this set of FDs
F, the FD graph G is obtained by using rule 2.1, 2.2 and 2.3 discussed in section-2 of this paper.
After the transformation process the candidate graph GC is obtained. From GC it is clear that there is
cycle having four nodes in the graph. The candidate nodes are A, E, 1 and 2. Therefore R= (A, B, C,
D, E) with the set of FDs F= {A→ BC, CD →E, B→ D, E →A} has four candidate keys- A, E, BC,
and CD.
222
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
A

A
B
B

C
D
(G)

1

E

C

T2

A
1

E

D
(G+)

A

C
T3

B

D

1

T4
2

2

E
2

1

E

C

(G )

Figure 6: The Transformation Process to find the candidate keys of relational scheme
R= (A, B, C, D, E) with the set FDs F= {A→ BC, CD →E, B→ D, E →A}
The following definition and theorems are presented with respect to the Candidate graph GC.
4.3 Definition 1: A node in a cycle in a candidate graph GC of a relational scheme R is either a
candidate key or a part of the candidate keys of R.
4.4 Theorems
Theorem 1: G=GC iff one of the following conditions is satisfied.
i. F=ϕ
ii. G has a cycle having all the nodes in the cycle and there is no connector node.
Proof: Let R= {α1, α2 , αn) be a relational scheme with a set of FDs, F. Let G be the FD graph for R.
Case (i): If F=ϕ, ∀i,j, i≠j, αi → αj∉F, so we get that G has n isolated nodes and G remains
unchanged during the Augmentation process and the Reduction process.
Therefore,

G=G+ ----------- (1)
G+=GC ----------- (2)

Hence

G=GC (from 1 and 2).

Case (ii): Now if F≠ ϕ and we have a chain ∀i,j, i≠j, αi → αj→ αi then no new connector nodes can
be added during the Augmentation process, which gives.
G=G+ ------------ (3)
Similarly, no node of the graph G+ is deleted during the reduction process, because there exists no
node αi,1 ≤i ≤ n such that in-degree(αi)>0 and out-degree(αi)=0. Hence
G+=GC ----------- (4)
Therefore, we get that

G=GC (from 3 & 4). //

Theorem 2: In a candidate graph GC, a candidate node cannot have edges if the node does not
belong to a cycle.
Proof: Let A be the only candidate node in the candidate graph, GC. So, A is an isolated node.
Therefore we get that,
In-degree (A) =Out-degree (A) =0 ------ (5)
223
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

Now, let there are two candidate nodes A and B in GC. Here, we get two possibilities:
a) Node A and node B both may be isolated or
b) A and B are connected.
In case (b) we get that, if in-degree(B)=1 and out-degree(B)=0 then node B cannot be survived
C
in G due to transformation T4. Similarly, if in-degree(A)=1 and out-degree(A)=0 then node A
cannot survive in GC due to transformation T4. Therefore, both nodes A and B can survive in GC if
they form a cycle.
in-degree (A)=out-degree(A)= in-degree(B)= out-degree(B)=1 ------ (6)
Therefore, nodes A and B can have edges if they are in a cycle. Otherwise they are isolated nodes. //
Theorem 3: If the Candidate graph, GC, of a relational scheme R has only one cycle and if all the
nodes of G are in the cycle, then every attribute of R is a candidate key.
Proof: Let V1→ V2 →V3 →….Vn-2→ Vn-1 →Vn →V1 is the cycle in the Candidate graph GC with n
vertices. In this chain, from any node Vi there is a path to any node Vj, j≠i and 1≤ j ≤n by transitivity
rule. Therefore, from any Vi, 1≤ i ≤n, all other nodes Vj,1≤ j ≤n and j≠i are reachable, where n is the
degree of R.
A

A

B

B

D

(a)

C
(b)

Figure 7: Cyclic Candidate Graphs having only one cycle
In fig-7(a), nodes A, B, both are candidate nodes. From node A, node B is reachable and from
node B is reachable. In fig-7(b), nodes A, B, C, and D all are candidate keys. From node A, nodes B,
C, D are reachable i.e., node A can functionally determine B, C, and D. So, node A is a candidate
key. Similarly, from node B, nodes A, C, D are reachable i.e., node B can functionally determine A,
C, D. So, node B is also a candidate key. //
Theorem 4: If the Candidate graph GC has disconnected components, then the Cartesian product of
the candidate nodes of each component is the set of all candidate keys.
Proof: Let us consider a relation scheme R= {α1, α2 …, αn) with a set of FDs, F=ϕ. Since F=ϕ, there
are n disjoint components in the GC for R (by theorem 2). The candidate key k for R is the Cartesian
product all attributes of the relational scheme.
Therefore, k=α1 × α2×……× αn ----------- (7)
Now, let F≠ϕ, then we get the candidate graph GC for R. Let C be the set of m<n (since F≠ϕ,
some nodes will be deleted or there will be at least one cycle in GC) disjoint components in GC such
that C={{c1},{c2},….,{cm}}. The component ci can be considered as a set.
By Theorem-2, if the candidate graph contains disjoint components then they must be either
isolated nodes or cycles. If we consider these disjoint components as nodes, then the set of functional
dependencies F available among these components, is null, i.e. F=ϕ. Therefore, by equation-7, we
get that, the set of candidate keys K= {{c1} × {c2} ×…. × {cm}}. //
224
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

A C1 B C2

A C1 B

C C4 D C3
(a)

C

C2

D

(b)

Figure 8: Candidate graphs with Disjoint Components
In fig-8, an FDG with disjoint components is shown. In fig-8(a) {{A} ⤬ {B} ⤬{C} ⤬ {D}} =
{ABCD} is the candidate key. But in fig-8(b), {{A} ⤬ {B, C, D}} = {{AB}, {AC}, {AD}} is the set
of candidate keys.
Theorem 5: A relational scheme R has multiple candidate keys if and only if the Candidate graph GC
for R contains at least one cycle.
Proof: Let GC be the candidate graph for a relational scheme R, with n components C1,C2,…Cn. Let
K be the set of candidate keys of R. Each component Ci can be considered as a set of nodes. By
theorem3,
K= {C1 ⤬ C2 ⤬…⤬ Cn} ………..

(7)

Now by definition2 we get that,
∣Ck ∣>1 if Ck is a cycle. ………

(8)

From equation 3,
∣K∣=1 if ∀i, 1≤i≤n, ∣Ci∣=1 ….

(9)

∣K∣ >1 if ∃k, 1≤k≤n ∣ Ck ∣ >1 …

(10)

From Equation-9 and Equation-10, it is clear that K is non- singular if and only if there exists
at least one cyclic component Ck, 1≤k≤n , in GC.//
Fig-9 shows all possible cyclic candidate graphs for a relational scheme R=(A,B,C,D).

B

D

A

C

A

C

(a)

B

A

B

D

C

D
(c)

B

C

(b)

A

D

A

B

C

A

D

D

A

C

C

B
D
(g)

(f)

(e)

(d)

B

A

B

A

B

A

B

A

B

A

B

A

B

A

B

C

D

C

D

C

D

C

D

C

D

C

D

C

D

(h)

(i)

(j)

(k)

(l)

(m)

Figure 9: Candidate Graphs for R=(A,B,C,D) having Cycles
225

(n)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

5.

ANALYSIS OF THE APPROACH

In the approach, from an FDG, G we get transformed graph GC by using the transformation
rules described here. But G cannot be obtained from GC since all functional dependencies except the
dependencies among the candidate nodes are deleted, i.e., GC does not include all dependencies
which imply the original set of FDs F. Though GC cannot be obtained from G, the transformations
applied in the FDG drawn from the set of FDs F do not generate any extra dependencies that are not
members of the closure of F, F⁺. Moreover, in this graph based approach, it is not required to
calculate F⁺, the closure of F and FC, the canonical cover of F. The approach can be implemented by
the following algorithms. The outline of the approach is shown in fig.10.
Draw the FDG (G) from the FD set
Augment G by adding Connector Nodes.
G→G⁺
Reduce G⁺ to get GC
⁺
G⁺→GC
⁺
Figure 10: Outline of the Approach

5.1

Procedure Make-FDG=(R( α1, α2 …, αn),,F,G)
{
G=ϕ;
For each α ЄR create a node for in G;
If ( F≠ϕ ) Then
{
For all (α→β) Є F
{ If (│α│=1 AND │β│=1) Then
Add an edge from node α to β in G;
If (│α│=1 AND │ β│≥1) Then
For all b Є β add an edge from node α to b in G
{ If (│α │>1 AND │β │≥1) Then
{ Create a new connector node C to connect all a Є {α};
For all a Є {α} Put an undirected edge from all a to C;
For all b Є{β} Add an edge from node C to each b Є{β};
Delete the functional dependency α→β from F ;}
}
}
}
}
Figure 11: Algorithm to construct the FDG from the set of FDs F

226
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

5.2

Procedure Augment-G (graph G, graph G+)
{
G+=G;
For each connector node C Є G+
{
If (there is a dependency ci→cj, ci, cj Є {C}) Then {Remove cj from {C}. }
If (│{C} │=1) Then { Delete node C from G+; Assign all edges of C to c ⊂{C};}
}
For all node AЄ G+, A∉ {C}
{
If there is a path from A to all nodes ci Є {C} Then Add an edge from A to C;
}
Repeat
{ For all node AЄ G+, A∉ {C} and for all nodes ci⊂ {C}
If there is a path from A to ci Then Create a connector node C′
to group node A and nodes {C-{ci}} add an edge from C′ to C;
} Until no more connector node can be created;
For all node AЄ G+, A∉ {C}
{
If there is a path from A to all nodes ci Є {C} Then Add an edge from A to C;
}
}
Figure 12: Algorithm for the Augmentation Process of FD Graph G

5.3

Procedure Reduce-G (graph G+, graph GC)
{
GC =G+;
For each connector node C Є GC
{ If the node c Є {C} has no edges except the connecting edge Then
Delete node c from GC;
Else
Delete the connecting edge between c and C;
}
For all node A which has a direct edge to C in GC
{ Delete the edge from A to the path to ci Є{C}; }
For all Cycle KЄGC
{ Remove all redundant edges from K;/Removal does not break the cycle/
}
While ((∃ node A Є GC) AND (in-degree(A)>0 AND out- degree(A)=0))
Delete node A from GC;
For all Cycle KЄGC
{ If (in-degree(K)>0 AND out- degree(K)=0) Then
Delete cycle K from GC ;}
}
Figure 13: Algorithm for Reduction Process of the Augmented FDG G⁺ to GC

227
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

6.

EXPLANATORY EXAMPLES

6.1

Example1

Problem: Find the candidate keys of the relation schema R= (A, B, C, G, H, I) with the set of
functional dependencies F= {A→ B, A→C, CG→ H, CG→ I, B→H}.
Solution: From the problem statement we know that the FDG G has 7 vertices A, B, C, G,
H, I and CG as shown in fig-14. From fig.-14 it is found that the candidate node for R= (A,
B, C, G, H, I) with the set of functional dependencies F= {A→ B, A→C, CG→ H, CG→ I,
B→H} is the connector node 2. Therefore the candidate key of R is {2} = (AG).

C

C

1

I
1
A

C

I

H

C

I

G

G

G

1

A

2

B

I

2

H

G
2

A

B

(G)

H

1

H

A

2
(GC)

(G+)

B

B

Figure 14: Finding candidate nodes for R= (A, B, C, G, H, I) with the set of functional
dependencies F= {A→ B, A→C, CG→ H, CG→ I, B→H}
6.2

Example2

Problem: Find the candidate keys of the relation scheme R= (A, B, C, D, E, F, G) with the set of
functional dependencies F= {A→ B, AB→C BC→A, AC→ D, DE→F, EF→G, AG→E}
Solution: From the problem statement we know that the FDG G has 13 vertices A, B, C, G, E, F, G
and AB,AC,BC,DE,EF,AG as shown in fig-15. There are following six connector nodes in the FDG:
1={AB}, 2={BC}, 3={AC}, 4={DE}, 5={EF}, 6={AG}.
For node 1: Since A→B so B is removed from 1.
For node 3: Since A→C so C is removed from 3.
Since |1|=1 and |3|=1, connector nodes 1 and 3 are deleted from the graph G+.
For node 2: Since A→B and A→C so an edge from A to node 2 is added.
For node 4, the connector nodes 7= {AE} and 8= {BCE} are added to the graph.
For node 6, the node 9= {BCG} is added to the graph.

228
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
D
D

3

4

F

A
C

1
2

B

E

5

6

4
T1, T2

A

7

C
B

G

F

E
2

5

8
6
G

T3, T4

7
9
8

A
2

T5

6

7

8

6

9

9

Figure 15: Finding the candidate keys of the relation scheme R= (A, B, C, D, E, F, G) with
the set of FDs F= {A→ B, AB→C BC→A, AC→ D, DE→F, EF→G, AG→E}
By doing so, the augmented graph G⁺ is obtained. After the reduction process the Candidate
graph GC is obtained from which it is decided that the relation scheme R=(A,B,C,D,E,F,G) with the
set of FDs F={A→B,AB→C,BC→A,AC→D,DE→F, EF→G,AG→E} has four candidate keysAG,BCE,BCG and AE.
6.3 Example3
Problem: Find the candidate keys of the relation scheme R= (A, B, C, D, E, F) with the set of
functional dependencies F={AB→C, CD→E,CD→-B,EF→-C}.
Solution: From the problem statement we know that the FDG G has 9 vertices A, B, C, G, E, F and
AB,CD, EF, as shown in fig-16. There are three six connector nodes in the FDG: 1={AB}, 2={CD},
3={EF}.
C
A

A
1

2
B

5

1

C
E

D

3

D

B

E
2

6
4

F

F

3

8
(GC)

7
8

(G)

(G+)

Figure 16: Finding the candidate keys of the relation scheme R= (A, B, C, D, E, F) with the set of
functional dependencies F={AB→C, CD→E,CD→-B,EF→-C}

229
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

For node 1: Since 2→B the connector node 6= {ACD) is obtained.
For node 2: Since 1→C and 3→C, the connector nodes 4= {ABD} and 5= {DEF} is added.
For node 3: Since 2→E the connector node 7= {CDF} is added. Now because 4→2→E node 8=
→
{ABDF} is added.
Now,
-

6 has a path to each of the components of node 4 so the edge 6→4 is added.
→

-

8 has a path to each of the components of node 2 so the edge 8→2 is added.
→

-

8 has a path to each of the components of node 3 so the edge 8→3 is added.
→

-

8 has a path to each of the components of node 5 so the edge 8→5 is added.
→

After the reduction process all other nodes except node 8 are deleted from the Augmented
Graph G+ due to Transformation T4. The Candidate Graph GC contains only node 8. Therefore, the
candidate key of the relation scheme R= (A, B, C, D, E, F) with the set of functional dependencies
F= {AB→C, CD→E, CD→-B, EF→-C} is ABDF.
7.

CONCLUSION

In this paper, a simple graph based method to find candidate keys of a relation scheme is
described. This method takes an FDG, drawn based on the set of FDs available in a relational
scheme, as an input and using five very simple graph transformations the input FDG is converted
into a candidate graph (Transformed FDG). This candidate graph gives all the candidate keys of the
relation scheme. This approach does not require computation of F⁺, Fc and α⁺, the closure, canonical
cover of F and closure of an attribute set α. This is a purely graph based approach. This approach can
also be used to find the candidate factors in the problem areas like medical diagnosis, social
problems where there are many factors with cause-effect dependencies among them.
REFERENCES
[1]
[2]
[3]
[4]

[5]

[6]

Paris C. Kanellakis, ”Elements of Relational Database Theory” Technical Report No. CS8939, October, 1989, Brown University.
Hossein Saiedian and Thomas Spencer “An Efficient Algorithm to Compute The Candidate
Keys of A Relational Database Schema” The Computer Journal, Vol. 39, No. 2, 1996.
Hua Chang,”Graph Algorithms for Database Schema Design”, Master Thesis, Concordia
University, (C) National Library of Canada, ,ISBN 0-315-97701-9, September, 1986 .
Yang Yu, et. al. “Extending Functional Dependency to Detect Abnormal Data in RDF
Graphs”. Proc. 10th International Semantic Web Conference, Bonn, Germany, October 2327, 2011, Part-I, LNCS 7031, © Springer-Verlag Berlin Heidelberg, 2011, pp. 794-809.
Joakim Nivre, “Algorithms for Deterministic Incremental Dependency Parsing”
Computational Linguistics, Volume 34, Number 4, (C) 2008 Association for Computational
Linguistics, pp-523-553.
Y. Zhang, “Determining all candidate keys based on Karnaugh map.”, Proc. IEEE
International Conference on Information Management, Innovation Management and
Industrial Engineering - Volume 04, 2009, pp. 226–229.
230
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

[7]

[8]
[9]

[10]
[11]

[12]

[13]

[14]
[15]

[16]

[17]

[18]

[19]

[20]

[21]

Wenxiu Duan, “Candidate keys Solving Method Based on Boolean Matrix for Single
Attribute Functional Dependency Sets”, World Congress on Software Engineering, IEEE
Computer Society, 2009, pp. 265-267.
Vitalie COTELEA “Problem Decomposition Method to Compute an Optimal Cover for a Set
of Functional Dependencies” Database Systems Journal vol. II, no. 4, 2011 pp. 17-30.
D.Raghu, “Comparison of Conditional Functional Dependencies using Fast CFD and
CTANE Algorithms”, International Journal of Computer Science and Technology Vol. 3,
Issue 1,Jan. -March 2012 ISSN: 0976-8491 (Online) | ISSN: 2229-4333 (Print), pp. 176-178.
X Xu, et al.,” Reduced Functional Dependence Graphs and Their Applications”, Proc. IEEE
International Symposium on Network Coding (NetCod), 29-30 June 2012, pp. 61-66.
Moussa Demba, “Algorithm for Relational Database Normalization Up To 3NF”,
International Journal of Database Management Systems (IJDMS) Vol.5, No.3, June 2013,
pp. 39-51.
Catharine Wyss, Chris Giannella, and Edward, Robertson, “ FastFDs: A Heuristic-Driven,
Depth-First Algorithm for Mining Functional Dependencies from Relation Instances”
DaWaK, Lecture Notes in Computer Science, Volume 2114, 2001,© Springer-Verlag Berlin
Heidelberg,2001 pp 101-110.
Raymond Fadous, John Forsyth “Finding candidate keys for relational databases”,
Proceeding SIGMOD '75 Proc. ACM SIGMOD International conference on Management of
Data, New York, NY, USA ©1975, pp. 203-210.
Giorgio Gallo1, “Directed Hyper graphs and Applications”, Discrete Applied Mathematics,
Elsevier, Volume 42, Issues 2–3, April 1993, pp. 177-201.
Anupama A Chavan, Vijay Kumar Verma , “Functional Dependency Mining form Relational
Database: A Survey “,International Journal of Engineering and Advanced Technology
(IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-6, August 2013,pp-208-210.
P. Cordero, M. Enciso, A. Mora “Automated Reasoning to Infer all Minimal Keys”,
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence,
pp. 817-823.
Subhrajyoti Bordoloi, Bichitra Kalita, “E-R Model to an Abstract Mathematical Model for
Database Schema using Reference Graph”, International Journal of Engineering Research
And Development, e-ISSN:2278-067X,p-ISSN:2278-800X, Volume 6, Issue 4, March, 2013,
pp. 51-60.
Subhrajyoti Bordoloi, Bichitra Kalita, “Designing Graph Database Models From Existing
Relational Databases” International Journal of Computer Applications (0975 – 8887)
Volume 74 No.1, July, 2013, pp. 25-31.
M.Siva Parvathi and B.Maheswari, “Minimal Dominating Functions of Corona Product
Graph Of A Cycle with a Complete Graph”, International Journal of Computer Engineering
& Technology (IJCET), Volume 4, Issue 4, 2013, pp. 248 - 256, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
Shameem Akthar, Dr. D Rajaylakshmi and Dr. Syed Abdul Sattar, “A Modified Pso Based
Graph Cut Algorithm for the Selection of Optimal Regularizing Parameter in Image
Segmentation”, International Journal of Advanced Research in Engineering & Technology
(IJARET), Volume 4, Issue 3, 2013, pp. 273 - 279, ISSN Print: 0976-6480, ISSN Online:
0976-6499.
Jayanta Kr. Choudhury, Anupam Dutta and Bichitra Kalita, “Decomposition of Complete
Graphs into Circulant Graphs and its Application”, International Journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 6, 2013, pp. 25 - 47, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375.

231

More Related Content

What's hot

Accurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset PoolingAccurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset PoolingMLAI2
 
Pixel Relationships Examples
Pixel Relationships ExamplesPixel Relationships Examples
Pixel Relationships ExamplesMarwa Ahmeid
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...IRJET Journal
 
Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...
Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...
Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...MLAI2
 
Edge Representation Learning with Hypergraphs
Edge Representation Learning with HypergraphsEdge Representation Learning with Hypergraphs
Edge Representation Learning with HypergraphsMLAI2
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
 
Hybrid method for automating generation of reticulated structures (lattice st...
Hybrid method for automating generation of reticulated structures (lattice st...Hybrid method for automating generation of reticulated structures (lattice st...
Hybrid method for automating generation of reticulated structures (lattice st...IJECEIAES
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...inventionjournals
 
Ugcnet4 u
Ugcnet4 uUgcnet4 u
Ugcnet4 usadhi
 
Gil Shapira's Active Appearance Model slides
Gil Shapira's Active Appearance Model slidesGil Shapira's Active Appearance Model slides
Gil Shapira's Active Appearance Model slideswolf
 
A Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical DesignA Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical DesignIOSR Journals
 
The Digital Image Processing Q@A
The Digital Image Processing Q@AThe Digital Image Processing Q@A
The Digital Image Processing Q@AChung Hua Universit
 
Minimal spanning tree class 15
Minimal spanning tree class 15Minimal spanning tree class 15
Minimal spanning tree class 15Kumar
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityIOSR Journals
 
Ee2 chapter8 applicationsof_booleanalgebra
Ee2 chapter8 applicationsof_booleanalgebraEe2 chapter8 applicationsof_booleanalgebra
Ee2 chapter8 applicationsof_booleanalgebraCK Yang
 
Tracking Faces using Active Appearance Models
Tracking Faces using Active Appearance ModelsTracking Faces using Active Appearance Models
Tracking Faces using Active Appearance ModelsComponica LLC
 
Face Alignment Using Active Shape Model And Support Vector Machine
Face Alignment Using Active Shape Model And Support Vector MachineFace Alignment Using Active Shape Model And Support Vector Machine
Face Alignment Using Active Shape Model And Support Vector MachineCSCJournals
 
Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...eSAT Journals
 

What's hot (20)

Accurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset PoolingAccurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset Pooling
 
Pixel Relationships Examples
Pixel Relationships ExamplesPixel Relationships Examples
Pixel Relationships Examples
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
 
Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...
Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...
Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Pr...
 
Edge Representation Learning with Hypergraphs
Edge Representation Learning with HypergraphsEdge Representation Learning with Hypergraphs
Edge Representation Learning with Hypergraphs
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
 
Hybrid method for automating generation of reticulated structures (lattice st...
Hybrid method for automating generation of reticulated structures (lattice st...Hybrid method for automating generation of reticulated structures (lattice st...
Hybrid method for automating generation of reticulated structures (lattice st...
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
 
Ugcnet4 u
Ugcnet4 uUgcnet4 u
Ugcnet4 u
 
Gil Shapira's Active Appearance Model slides
Gil Shapira's Active Appearance Model slidesGil Shapira's Active Appearance Model slides
Gil Shapira's Active Appearance Model slides
 
A Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical DesignA Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical Design
 
Spectral factorization
Spectral factorizationSpectral factorization
Spectral factorization
 
The Digital Image Processing Q@A
The Digital Image Processing Q@AThe Digital Image Processing Q@A
The Digital Image Processing Q@A
 
Cad for vlsi circuits june 2012
Cad for vlsi circuits june 2012Cad for vlsi circuits june 2012
Cad for vlsi circuits june 2012
 
Minimal spanning tree class 15
Minimal spanning tree class 15Minimal spanning tree class 15
Minimal spanning tree class 15
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
 
Ee2 chapter8 applicationsof_booleanalgebra
Ee2 chapter8 applicationsof_booleanalgebraEe2 chapter8 applicationsof_booleanalgebra
Ee2 chapter8 applicationsof_booleanalgebra
 
Tracking Faces using Active Appearance Models
Tracking Faces using Active Appearance ModelsTracking Faces using Active Appearance Models
Tracking Faces using Active Appearance Models
 
Face Alignment Using Active Shape Model And Support Vector Machine
Face Alignment Using Active Shape Model And Support Vector MachineFace Alignment Using Active Shape Model And Support Vector Machine
Face Alignment Using Active Shape Model And Support Vector Machine
 
Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...
 

Viewers also liked (20)

10120130406022
1012013040602210120130406022
10120130406022
 
50120130406024
5012013040602450120130406024
50120130406024
 
30120130405025
3012013040502530120130405025
30120130405025
 
40120130406010 2-3-4-5-6
40120130406010 2-3-4-5-640120130406010 2-3-4-5-6
40120130406010 2-3-4-5-6
 
50120130405035 2-3-4-5-6
50120130405035 2-3-4-5-650120130405035 2-3-4-5-6
50120130405035 2-3-4-5-6
 
10120140502008
1012014050200810120140502008
10120140502008
 
costos
costoscostos
costos
 
Event 29 08-14
Event 29 08-14Event 29 08-14
Event 29 08-14
 
O mundo encantado da escrita e leitura
O mundo encantado da escrita e leituraO mundo encantado da escrita e leitura
O mundo encantado da escrita e leitura
 
3.9 os professores problematica_luciano_campos
3.9 os professores  problematica_luciano_campos3.9 os professores  problematica_luciano_campos
3.9 os professores problematica_luciano_campos
 
Meu primeiro beijo_-_trabalho
Meu primeiro beijo_-_trabalhoMeu primeiro beijo_-_trabalho
Meu primeiro beijo_-_trabalho
 
Sesion didactica
Sesion  didacticaSesion  didactica
Sesion didactica
 
Manifesto em Educação espiritualidade e transformação social
Manifesto em Educação espiritualidade e transformação socialManifesto em Educação espiritualidade e transformação social
Manifesto em Educação espiritualidade e transformação social
 
Tarea 10
Tarea 10Tarea 10
Tarea 10
 
Lucero alexandra 9-7 Tics
Lucero alexandra 9-7 TicsLucero alexandra 9-7 Tics
Lucero alexandra 9-7 Tics
 
Presentation
PresentationPresentation
Presentation
 
Holy Quran
Holy QuranHoly Quran
Holy Quran
 
ArtChat: Art & Power -Andrew Hurle
ArtChat: Art & Power -Andrew Hurle ArtChat: Art & Power -Andrew Hurle
ArtChat: Art & Power -Andrew Hurle
 
Trabajo de taller de comunicacion
Trabajo de taller de comunicacionTrabajo de taller de comunicacion
Trabajo de taller de comunicacion
 
Las_estrellas_1103
Las_estrellas_1103Las_estrellas_1103
Las_estrellas_1103
 

Similar to 50120130406025 2

A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...
A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...
A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...IRJET Journal
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...ijseajournal
 
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET Journal
 
A Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph DatabasesA Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph DatabasesIJMER
 
Sequences classification based on group technology
Sequences classification based on group technologySequences classification based on group technology
Sequences classification based on group technologyeSAT Publishing House
 
Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF IJECEIAES
 
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...VLSICS Design
 
IRJET - Distributed Arithmetic Method for Complex Multiplication
IRJET -  	  Distributed Arithmetic Method for Complex MultiplicationIRJET -  	  Distributed Arithmetic Method for Complex Multiplication
IRJET - Distributed Arithmetic Method for Complex MultiplicationIRJET Journal
 
IRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite IntegrationIRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite IntegrationIRJET Journal
 
Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...
Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...
Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...Kunjan Shinde
 
kunjan elsevier paper
kunjan elsevier paperkunjan elsevier paper
kunjan elsevier paperKunjan Shinde
 
Elliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaIAEME Publication
 
COMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHM
COMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHMCOMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHM
COMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHMsipij
 
Comparison of GPU and FPGA Hardware Acceleration of Lane Detection Algorithm
Comparison of GPU and FPGA Hardware Acceleration of Lane Detection AlgorithmComparison of GPU and FPGA Hardware Acceleration of Lane Detection Algorithm
Comparison of GPU and FPGA Hardware Acceleration of Lane Detection Algorithmsipij
 
A Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO SystemsA Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO SystemsIJERA Editor
 
presentation on solid manipulation in computer aided design
presentation on solid manipulation in computer aided designpresentation on solid manipulation in computer aided design
presentation on solid manipulation in computer aided designRakshit vadi
 
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...IJCSEIT Journal
 

Similar to 50120130406025 2 (20)

Ax03303120316
Ax03303120316Ax03303120316
Ax03303120316
 
A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...
A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...
A Hybrid Data Clustering Approach using K-Means and Simplex Method-based Bact...
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
 
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
 
A Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph DatabasesA Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph Databases
 
Sequences classification based on group technology
Sequences classification based on group technologySequences classification based on group technology
Sequences classification based on group technology
 
Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF
 
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
 
IRJET - Distributed Arithmetic Method for Complex Multiplication
IRJET -  	  Distributed Arithmetic Method for Complex MultiplicationIRJET -  	  Distributed Arithmetic Method for Complex Multiplication
IRJET - Distributed Arithmetic Method for Complex Multiplication
 
IRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite IntegrationIRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite Integration
 
Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...
Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...
Modeling design and_performance_analysis_of_various_8_bit_adders_for_embedded...
 
kunjan elsevier paper
kunjan elsevier paperkunjan elsevier paper
kunjan elsevier paper
 
Elliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsuba
 
COMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHM
COMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHMCOMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHM
COMPARISON OF GPU AND FPGA HARDWARE ACCELERATION OF LANE DETECTION ALGORITHM
 
Comparison of GPU and FPGA Hardware Acceleration of Lane Detection Algorithm
Comparison of GPU and FPGA Hardware Acceleration of Lane Detection AlgorithmComparison of GPU and FPGA Hardware Acceleration of Lane Detection Algorithm
Comparison of GPU and FPGA Hardware Acceleration of Lane Detection Algorithm
 
A Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO SystemsA Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO Systems
 
presentation on solid manipulation in computer aided design
presentation on solid manipulation in computer aided designpresentation on solid manipulation in computer aided design
presentation on solid manipulation in computer aided design
 
PCA and SVD in brief
PCA and SVD in briefPCA and SVD in brief
PCA and SVD in brief
 
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

50120130406025 2

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 219-231 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME A GRAPH BASED APPROACH TO FIND CANDIDATE KEYS IN A RELATIONAL DATABASE SCHEME Subhrajyoti Bordoloi1, Bichitra Kalita2 Dept. of Computer Applications, Assam Engg. College, Guwahati, Assam ABSTRACT In this paper, a simple straightforward method to find all the candidate keys of a relational database schemes using graph is presented. First, the FD graph is drawn from the set of functional dependencies in a relational scheme. Thereafter, by using few very simple graph transformations, the FDG is reduced to a graph called the Candidate Graph having only the candidate nodes. From this Candidate Graph, all the candidate keys for the relational scheme can be identified. Key Words: Candidate Node, Candidate Graph, FD, FDG. 1. INTRODUCTION Graphs have many applications in the field of knowledge and data engineering. There are many graph based approaches used in database management system, ranging from E-R modeling to database schema design and normalization [1][3][8][10][11][17][18]. Functional dependencies among the entities of a context problem area can be easily represented as a graph called the functional dependence graph (FDG). Apart from database technology, FDGs have many applications in Web data analysis [4], Language processing [5], Data cleaning [9], Network Theory [10] and Data Mining [12]. There are several types of generalized graphs such as FD graph, Implication graph, and Deduction graphs, etc. used to study functional dependencies. Hyper graph is another generalized graph that can be used to study functional dependencies [14]. There are many algorithms for finding all the candidate keys of a relational scheme based on Karnaugh map [6], Boolean matrix [7] and other set theoretic approaches [13]. Hossein Saiedian, et.al, described a method for finding the candidate keys in a relational scheme [2]. In their approach, the functional dependencies among the attributes in a database table can be represented as a graph. Such graphs are also called attribute graphs. They use the attribute graph for analyzing the dependencies to find the candidate keys. Their approach cannot find all the candidate keys of a relational scheme if the FD graph is strongly connected. Their approach needs a minimal set FDs to compute the candidate keys. 219
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME In this paper, a generalized graph based method to find all candidate keys in a relational database scheme is presented. 2. FUNCTIONAL DEPENDENCIES AND THEIR GRAPHS Let α→β be a functional dependency, where α, β are sets of attributes. Depending on the cardinality of α and β the following graph patterns are obtained for the FD α→β. 2.1. If α and β both are singular, i.e., |α |=|β |=1 then the graph pattern shown in fig.-1(a) is obtained. 2.2. If |α|=1 and |β|>1 and β={β1, β2 …, βn },then the graph pattern shown in fig.-1(b)is obtained. 2.3. a) If |α|>1 and |β|=1 and α={α1,α2…,αn } then the graph pattern shown in fig.-1(c) is obtained. b) If |α|>1 and |β|>1 and α={α1,α2 …,αn } and β={β1,β2 …, βn },then the graph pattern shown in fig.-1(d) is obtained. β1 β2 βn (a): Graph for α→β (b): Graph for α→β1 β2.. βn 1 α2 αn (c): Graph for α1α2 … αn→β β1 1 β2 … α2 β … α … β . α α1 α1 αn βn (d): Graph for α1α2 … αn→ β1 β2 …, βn 1 : Connector Node Figure 1: Functional Dependencies and Their Graphs Note that there are dependencies from a connector node to all components (nodes) of it. In fig.1, the following dependencies are also existed 1→ (α1, α2, .. ,αn) 3. FUNCTIONAL DEPENDENCY DATABASE SCHEME GRAPHS (FDG) FOR A RELATIONAL The functional dependency graph (FDG) for a relational scheme is drawn based on the set of functional dependencies available in the relational scheme using the rules 2.1, 2.2, 2.3. One node is created for each attribute in the relation scheme. A connector-node is created each time the Rule 2.3 is applied, i.e. for each distinct non-singular attribute set which is in the left-hand side of a FD. Therefore, for a relational scheme R with N attributes with a set of FDs F and having M distinct nonsingular attribute sets in the left-hand side of the FDs in F there will be N+M nodes in the FDG. For example, for a relational scheme R= (A, B, C, D, E) with the set FDs F= {A→ BC, CD →E, B→ D, E →A} we obtain a FDG, as shown in fig-2, with a total of 6 nodes. 220
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME A B C E 1 D Figure 2: FD Graph for a relational scheme R= (A, B, C, D, E) with the set FDs F= {A→ BC, CD →E, B→ D, E →A} 4. FINDING THE CANDIDATE KEYS USING FDG To find the candidate keys from the FDG, the following transformations are performed in the FDG. The transformation process has two phases- Augmentation and Reduction. After the transformation, the resultant graph contains only the candidate nodes. A candidate node is a node which alone or along with some other candidate nodes, can determine all other nodes in the graph. Therefore the resultant graph is called the Candidate Graph (GC). So, the problem now is to find the candidate graph from an FDG. Therefore the transformation process can be represented as follows: G → G⁺ → GC. Augmentation: Finding G⁺ ⁺ In the augmentation phase new connector nodes and edges are added to the FDG by performing the following transformations. 4.1 T1: Let there exists a connector-type node which connect the node set C= {ci,},1<i≤n, n is the cardinality of the set C, and has an outgoing edge to a node B. If there is a dependency ci→cj, ci, cj Є {C} then remove cj from {C}. Delete the connector node from the G⁺ if {C} is ⁺ singular. Assign all edges of C to c⊂ C. 3 D 3 D A A 1 A 1 C 2 C C B B B D 3 2 D 3 A C D A B 2 C B 2 2 Figure 3: Transformation T1 T2: Let there exists a connector-type node which connect the node set C={ci,},1<i≤n, n is the cardinality of the set C, and has an outgoing edge to a node B. Let there exists a node A (may be a connector node) in the FDG from which there is a path to any node ci in C. CASE-I: If ∀i , 1≤ i ≤n there is a path from A to ci, then an edge from A to C is added. CASE-II: If there is a path from A to a set {ck} ⊂ C, 1<i<n and |ck|<n where n is the cardinality of C, then for each ck ,a new connector node C′ is created connecting node A and the nodes in the set {C- ck } and an edge from C′ to C is added. 221
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME A A B B ⟹ C C 1 : Edge due to T2 (case-II) E D E 1 D : Edge due to T2(case-I) 2 : Node created due to T2 (case-II) 2 + (G) (G ) Figure 4: Transformation T2 (Augmentation) In fig-4., node A has a path to both components C and D of the set represented by the connector node “1”, so an edge from A to the connector node “1” is added due to case-I of the transformation T2. Node B has a path to only one component D of the set represented by the connector node “1”, so a new connector node “2” is created to connect node B and node C and an edge from “2” to the “1” is added due to case-II of the transformation T2. Reduction: Finding GC In the reduction phase certain nodes and edges are deleted from the augmented FDG by performing the following transformations. T3: Let C be a connector node in G⁺. If there is a node A in G⁺ which has a direct edge to ⁺ ⁺ node C, then delete all edges from A to the first node in the paths to any ci⊆ C. T4: Delete a node N from the augmented FDG G⁺ if its in-degree >0 and out-degree =0. In fig-5(b), first node D is deleted because its in-degree is non zero and out-degree is zero. Deletion of this node causes the deletion of the nodes B and C from the graph. T5: Delete a cycle K from G⁺ if in-degree (K) >0 and out-degree (K) =0. Fig-5(c), deletion of cycles is shown. 4.2 A B A A C C 1 E D B C 1 D 2 1 D B 2 1 B C D ⟹ A B A C (b): Deletion of nodes B, C, D Using Transformation rule T4 D E ⟹ E A E 2 2 (a): Example of Transformation T3 3 A E B E E F ⟹ D C G G F (i) (ii) (c) : Cycle deletion using Transformation T5 Figure 5: Transformations in Reduction Process The following example in fig-6 explains the transformation process. Let R= (A, B, C, D, E) be a relational scheme with the set FDs F= {A→ BC, CD →E, B→ D, E →A}. With this set of FDs F, the FD graph G is obtained by using rule 2.1, 2.2 and 2.3 discussed in section-2 of this paper. After the transformation process the candidate graph GC is obtained. From GC it is clear that there is cycle having four nodes in the graph. The candidate nodes are A, E, 1 and 2. Therefore R= (A, B, C, D, E) with the set of FDs F= {A→ BC, CD →E, B→ D, E →A} has four candidate keys- A, E, BC, and CD. 222
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME A A B B C D (G) 1 E C T2 A 1 E D (G+) A C T3 B D 1 T4 2 2 E 2 1 E C (G ) Figure 6: The Transformation Process to find the candidate keys of relational scheme R= (A, B, C, D, E) with the set FDs F= {A→ BC, CD →E, B→ D, E →A} The following definition and theorems are presented with respect to the Candidate graph GC. 4.3 Definition 1: A node in a cycle in a candidate graph GC of a relational scheme R is either a candidate key or a part of the candidate keys of R. 4.4 Theorems Theorem 1: G=GC iff one of the following conditions is satisfied. i. F=ϕ ii. G has a cycle having all the nodes in the cycle and there is no connector node. Proof: Let R= {α1, α2 , αn) be a relational scheme with a set of FDs, F. Let G be the FD graph for R. Case (i): If F=ϕ, ∀i,j, i≠j, αi → αj∉F, so we get that G has n isolated nodes and G remains unchanged during the Augmentation process and the Reduction process. Therefore, G=G+ ----------- (1) G+=GC ----------- (2) Hence G=GC (from 1 and 2). Case (ii): Now if F≠ ϕ and we have a chain ∀i,j, i≠j, αi → αj→ αi then no new connector nodes can be added during the Augmentation process, which gives. G=G+ ------------ (3) Similarly, no node of the graph G+ is deleted during the reduction process, because there exists no node αi,1 ≤i ≤ n such that in-degree(αi)>0 and out-degree(αi)=0. Hence G+=GC ----------- (4) Therefore, we get that G=GC (from 3 & 4). // Theorem 2: In a candidate graph GC, a candidate node cannot have edges if the node does not belong to a cycle. Proof: Let A be the only candidate node in the candidate graph, GC. So, A is an isolated node. Therefore we get that, In-degree (A) =Out-degree (A) =0 ------ (5) 223
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME Now, let there are two candidate nodes A and B in GC. Here, we get two possibilities: a) Node A and node B both may be isolated or b) A and B are connected. In case (b) we get that, if in-degree(B)=1 and out-degree(B)=0 then node B cannot be survived C in G due to transformation T4. Similarly, if in-degree(A)=1 and out-degree(A)=0 then node A cannot survive in GC due to transformation T4. Therefore, both nodes A and B can survive in GC if they form a cycle. in-degree (A)=out-degree(A)= in-degree(B)= out-degree(B)=1 ------ (6) Therefore, nodes A and B can have edges if they are in a cycle. Otherwise they are isolated nodes. // Theorem 3: If the Candidate graph, GC, of a relational scheme R has only one cycle and if all the nodes of G are in the cycle, then every attribute of R is a candidate key. Proof: Let V1→ V2 →V3 →….Vn-2→ Vn-1 →Vn →V1 is the cycle in the Candidate graph GC with n vertices. In this chain, from any node Vi there is a path to any node Vj, j≠i and 1≤ j ≤n by transitivity rule. Therefore, from any Vi, 1≤ i ≤n, all other nodes Vj,1≤ j ≤n and j≠i are reachable, where n is the degree of R. A A B B D (a) C (b) Figure 7: Cyclic Candidate Graphs having only one cycle In fig-7(a), nodes A, B, both are candidate nodes. From node A, node B is reachable and from node B is reachable. In fig-7(b), nodes A, B, C, and D all are candidate keys. From node A, nodes B, C, D are reachable i.e., node A can functionally determine B, C, and D. So, node A is a candidate key. Similarly, from node B, nodes A, C, D are reachable i.e., node B can functionally determine A, C, D. So, node B is also a candidate key. // Theorem 4: If the Candidate graph GC has disconnected components, then the Cartesian product of the candidate nodes of each component is the set of all candidate keys. Proof: Let us consider a relation scheme R= {α1, α2 …, αn) with a set of FDs, F=ϕ. Since F=ϕ, there are n disjoint components in the GC for R (by theorem 2). The candidate key k for R is the Cartesian product all attributes of the relational scheme. Therefore, k=α1 × α2×……× αn ----------- (7) Now, let F≠ϕ, then we get the candidate graph GC for R. Let C be the set of m<n (since F≠ϕ, some nodes will be deleted or there will be at least one cycle in GC) disjoint components in GC such that C={{c1},{c2},….,{cm}}. The component ci can be considered as a set. By Theorem-2, if the candidate graph contains disjoint components then they must be either isolated nodes or cycles. If we consider these disjoint components as nodes, then the set of functional dependencies F available among these components, is null, i.e. F=ϕ. Therefore, by equation-7, we get that, the set of candidate keys K= {{c1} × {c2} ×…. × {cm}}. // 224
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME A C1 B C2 A C1 B C C4 D C3 (a) C C2 D (b) Figure 8: Candidate graphs with Disjoint Components In fig-8, an FDG with disjoint components is shown. In fig-8(a) {{A} ⤬ {B} ⤬{C} ⤬ {D}} = {ABCD} is the candidate key. But in fig-8(b), {{A} ⤬ {B, C, D}} = {{AB}, {AC}, {AD}} is the set of candidate keys. Theorem 5: A relational scheme R has multiple candidate keys if and only if the Candidate graph GC for R contains at least one cycle. Proof: Let GC be the candidate graph for a relational scheme R, with n components C1,C2,…Cn. Let K be the set of candidate keys of R. Each component Ci can be considered as a set of nodes. By theorem3, K= {C1 ⤬ C2 ⤬…⤬ Cn} ……….. (7) Now by definition2 we get that, ∣Ck ∣>1 if Ck is a cycle. ……… (8) From equation 3, ∣K∣=1 if ∀i, 1≤i≤n, ∣Ci∣=1 …. (9) ∣K∣ >1 if ∃k, 1≤k≤n ∣ Ck ∣ >1 … (10) From Equation-9 and Equation-10, it is clear that K is non- singular if and only if there exists at least one cyclic component Ck, 1≤k≤n , in GC.// Fig-9 shows all possible cyclic candidate graphs for a relational scheme R=(A,B,C,D). B D A C A C (a) B A B D C D (c) B C (b) A D A B C A D D A C C B D (g) (f) (e) (d) B A B A B A B A B A B A B A B C D C D C D C D C D C D C D (h) (i) (j) (k) (l) (m) Figure 9: Candidate Graphs for R=(A,B,C,D) having Cycles 225 (n)
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 5. ANALYSIS OF THE APPROACH In the approach, from an FDG, G we get transformed graph GC by using the transformation rules described here. But G cannot be obtained from GC since all functional dependencies except the dependencies among the candidate nodes are deleted, i.e., GC does not include all dependencies which imply the original set of FDs F. Though GC cannot be obtained from G, the transformations applied in the FDG drawn from the set of FDs F do not generate any extra dependencies that are not members of the closure of F, F⁺. Moreover, in this graph based approach, it is not required to calculate F⁺, the closure of F and FC, the canonical cover of F. The approach can be implemented by the following algorithms. The outline of the approach is shown in fig.10. Draw the FDG (G) from the FD set Augment G by adding Connector Nodes. G→G⁺ Reduce G⁺ to get GC ⁺ G⁺→GC ⁺ Figure 10: Outline of the Approach 5.1 Procedure Make-FDG=(R( α1, α2 …, αn),,F,G) { G=ϕ; For each α ЄR create a node for in G; If ( F≠ϕ ) Then { For all (α→β) Є F { If (│α│=1 AND │β│=1) Then Add an edge from node α to β in G; If (│α│=1 AND │ β│≥1) Then For all b Є β add an edge from node α to b in G { If (│α │>1 AND │β │≥1) Then { Create a new connector node C to connect all a Є {α}; For all a Є {α} Put an undirected edge from all a to C; For all b Є{β} Add an edge from node C to each b Є{β}; Delete the functional dependency α→β from F ;} } } } } Figure 11: Algorithm to construct the FDG from the set of FDs F 226
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 5.2 Procedure Augment-G (graph G, graph G+) { G+=G; For each connector node C Є G+ { If (there is a dependency ci→cj, ci, cj Є {C}) Then {Remove cj from {C}. } If (│{C} │=1) Then { Delete node C from G+; Assign all edges of C to c ⊂{C};} } For all node AЄ G+, A∉ {C} { If there is a path from A to all nodes ci Є {C} Then Add an edge from A to C; } Repeat { For all node AЄ G+, A∉ {C} and for all nodes ci⊂ {C} If there is a path from A to ci Then Create a connector node C′ to group node A and nodes {C-{ci}} add an edge from C′ to C; } Until no more connector node can be created; For all node AЄ G+, A∉ {C} { If there is a path from A to all nodes ci Є {C} Then Add an edge from A to C; } } Figure 12: Algorithm for the Augmentation Process of FD Graph G 5.3 Procedure Reduce-G (graph G+, graph GC) { GC =G+; For each connector node C Є GC { If the node c Є {C} has no edges except the connecting edge Then Delete node c from GC; Else Delete the connecting edge between c and C; } For all node A which has a direct edge to C in GC { Delete the edge from A to the path to ci Є{C}; } For all Cycle KЄGC { Remove all redundant edges from K;/Removal does not break the cycle/ } While ((∃ node A Є GC) AND (in-degree(A)>0 AND out- degree(A)=0)) Delete node A from GC; For all Cycle KЄGC { If (in-degree(K)>0 AND out- degree(K)=0) Then Delete cycle K from GC ;} } Figure 13: Algorithm for Reduction Process of the Augmented FDG G⁺ to GC 227
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 6. EXPLANATORY EXAMPLES 6.1 Example1 Problem: Find the candidate keys of the relation schema R= (A, B, C, G, H, I) with the set of functional dependencies F= {A→ B, A→C, CG→ H, CG→ I, B→H}. Solution: From the problem statement we know that the FDG G has 7 vertices A, B, C, G, H, I and CG as shown in fig-14. From fig.-14 it is found that the candidate node for R= (A, B, C, G, H, I) with the set of functional dependencies F= {A→ B, A→C, CG→ H, CG→ I, B→H} is the connector node 2. Therefore the candidate key of R is {2} = (AG). C C 1 I 1 A C I H C I G G G 1 A 2 B I 2 H G 2 A B (G) H 1 H A 2 (GC) (G+) B B Figure 14: Finding candidate nodes for R= (A, B, C, G, H, I) with the set of functional dependencies F= {A→ B, A→C, CG→ H, CG→ I, B→H} 6.2 Example2 Problem: Find the candidate keys of the relation scheme R= (A, B, C, D, E, F, G) with the set of functional dependencies F= {A→ B, AB→C BC→A, AC→ D, DE→F, EF→G, AG→E} Solution: From the problem statement we know that the FDG G has 13 vertices A, B, C, G, E, F, G and AB,AC,BC,DE,EF,AG as shown in fig-15. There are following six connector nodes in the FDG: 1={AB}, 2={BC}, 3={AC}, 4={DE}, 5={EF}, 6={AG}. For node 1: Since A→B so B is removed from 1. For node 3: Since A→C so C is removed from 3. Since |1|=1 and |3|=1, connector nodes 1 and 3 are deleted from the graph G+. For node 2: Since A→B and A→C so an edge from A to node 2 is added. For node 4, the connector nodes 7= {AE} and 8= {BCE} are added to the graph. For node 6, the node 9= {BCG} is added to the graph. 228
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME D D 3 4 F A C 1 2 B E 5 6 4 T1, T2 A 7 C B G F E 2 5 8 6 G T3, T4 7 9 8 A 2 T5 6 7 8 6 9 9 Figure 15: Finding the candidate keys of the relation scheme R= (A, B, C, D, E, F, G) with the set of FDs F= {A→ B, AB→C BC→A, AC→ D, DE→F, EF→G, AG→E} By doing so, the augmented graph G⁺ is obtained. After the reduction process the Candidate graph GC is obtained from which it is decided that the relation scheme R=(A,B,C,D,E,F,G) with the set of FDs F={A→B,AB→C,BC→A,AC→D,DE→F, EF→G,AG→E} has four candidate keysAG,BCE,BCG and AE. 6.3 Example3 Problem: Find the candidate keys of the relation scheme R= (A, B, C, D, E, F) with the set of functional dependencies F={AB→C, CD→E,CD→-B,EF→-C}. Solution: From the problem statement we know that the FDG G has 9 vertices A, B, C, G, E, F and AB,CD, EF, as shown in fig-16. There are three six connector nodes in the FDG: 1={AB}, 2={CD}, 3={EF}. C A A 1 2 B 5 1 C E D 3 D B E 2 6 4 F F 3 8 (GC) 7 8 (G) (G+) Figure 16: Finding the candidate keys of the relation scheme R= (A, B, C, D, E, F) with the set of functional dependencies F={AB→C, CD→E,CD→-B,EF→-C} 229
  • 12. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME For node 1: Since 2→B the connector node 6= {ACD) is obtained. For node 2: Since 1→C and 3→C, the connector nodes 4= {ABD} and 5= {DEF} is added. For node 3: Since 2→E the connector node 7= {CDF} is added. Now because 4→2→E node 8= → {ABDF} is added. Now, - 6 has a path to each of the components of node 4 so the edge 6→4 is added. → - 8 has a path to each of the components of node 2 so the edge 8→2 is added. → - 8 has a path to each of the components of node 3 so the edge 8→3 is added. → - 8 has a path to each of the components of node 5 so the edge 8→5 is added. → After the reduction process all other nodes except node 8 are deleted from the Augmented Graph G+ due to Transformation T4. The Candidate Graph GC contains only node 8. Therefore, the candidate key of the relation scheme R= (A, B, C, D, E, F) with the set of functional dependencies F= {AB→C, CD→E, CD→-B, EF→-C} is ABDF. 7. CONCLUSION In this paper, a simple graph based method to find candidate keys of a relation scheme is described. This method takes an FDG, drawn based on the set of FDs available in a relational scheme, as an input and using five very simple graph transformations the input FDG is converted into a candidate graph (Transformed FDG). This candidate graph gives all the candidate keys of the relation scheme. This approach does not require computation of F⁺, Fc and α⁺, the closure, canonical cover of F and closure of an attribute set α. This is a purely graph based approach. This approach can also be used to find the candidate factors in the problem areas like medical diagnosis, social problems where there are many factors with cause-effect dependencies among them. REFERENCES [1] [2] [3] [4] [5] [6] Paris C. Kanellakis, ”Elements of Relational Database Theory” Technical Report No. CS8939, October, 1989, Brown University. Hossein Saiedian and Thomas Spencer “An Efficient Algorithm to Compute The Candidate Keys of A Relational Database Schema” The Computer Journal, Vol. 39, No. 2, 1996. Hua Chang,”Graph Algorithms for Database Schema Design”, Master Thesis, Concordia University, (C) National Library of Canada, ,ISBN 0-315-97701-9, September, 1986 . Yang Yu, et. al. “Extending Functional Dependency to Detect Abnormal Data in RDF Graphs”. Proc. 10th International Semantic Web Conference, Bonn, Germany, October 2327, 2011, Part-I, LNCS 7031, © Springer-Verlag Berlin Heidelberg, 2011, pp. 794-809. Joakim Nivre, “Algorithms for Deterministic Incremental Dependency Parsing” Computational Linguistics, Volume 34, Number 4, (C) 2008 Association for Computational Linguistics, pp-523-553. Y. Zhang, “Determining all candidate keys based on Karnaugh map.”, Proc. IEEE International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 04, 2009, pp. 226–229. 230
  • 13. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] Wenxiu Duan, “Candidate keys Solving Method Based on Boolean Matrix for Single Attribute Functional Dependency Sets”, World Congress on Software Engineering, IEEE Computer Society, 2009, pp. 265-267. Vitalie COTELEA “Problem Decomposition Method to Compute an Optimal Cover for a Set of Functional Dependencies” Database Systems Journal vol. II, no. 4, 2011 pp. 17-30. D.Raghu, “Comparison of Conditional Functional Dependencies using Fast CFD and CTANE Algorithms”, International Journal of Computer Science and Technology Vol. 3, Issue 1,Jan. -March 2012 ISSN: 0976-8491 (Online) | ISSN: 2229-4333 (Print), pp. 176-178. X Xu, et al.,” Reduced Functional Dependence Graphs and Their Applications”, Proc. IEEE International Symposium on Network Coding (NetCod), 29-30 June 2012, pp. 61-66. Moussa Demba, “Algorithm for Relational Database Normalization Up To 3NF”, International Journal of Database Management Systems (IJDMS) Vol.5, No.3, June 2013, pp. 39-51. Catharine Wyss, Chris Giannella, and Edward, Robertson, “ FastFDs: A Heuristic-Driven, Depth-First Algorithm for Mining Functional Dependencies from Relation Instances” DaWaK, Lecture Notes in Computer Science, Volume 2114, 2001,© Springer-Verlag Berlin Heidelberg,2001 pp 101-110. Raymond Fadous, John Forsyth “Finding candidate keys for relational databases”, Proceeding SIGMOD '75 Proc. ACM SIGMOD International conference on Management of Data, New York, NY, USA ©1975, pp. 203-210. Giorgio Gallo1, “Directed Hyper graphs and Applications”, Discrete Applied Mathematics, Elsevier, Volume 42, Issues 2–3, April 1993, pp. 177-201. Anupama A Chavan, Vijay Kumar Verma , “Functional Dependency Mining form Relational Database: A Survey “,International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-6, August 2013,pp-208-210. P. Cordero, M. Enciso, A. Mora “Automated Reasoning to Infer all Minimal Keys”, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, pp. 817-823. Subhrajyoti Bordoloi, Bichitra Kalita, “E-R Model to an Abstract Mathematical Model for Database Schema using Reference Graph”, International Journal of Engineering Research And Development, e-ISSN:2278-067X,p-ISSN:2278-800X, Volume 6, Issue 4, March, 2013, pp. 51-60. Subhrajyoti Bordoloi, Bichitra Kalita, “Designing Graph Database Models From Existing Relational Databases” International Journal of Computer Applications (0975 – 8887) Volume 74 No.1, July, 2013, pp. 25-31. M.Siva Parvathi and B.Maheswari, “Minimal Dominating Functions of Corona Product Graph Of A Cycle with a Complete Graph”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp. 248 - 256, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Shameem Akthar, Dr. D Rajaylakshmi and Dr. Syed Abdul Sattar, “A Modified Pso Based Graph Cut Algorithm for the Selection of Optimal Regularizing Parameter in Image Segmentation”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 3, 2013, pp. 273 - 279, ISSN Print: 0976-6480, ISSN Online: 0976-6499. Jayanta Kr. Choudhury, Anupam Dutta and Bichitra Kalita, “Decomposition of Complete Graphs into Circulant Graphs and its Application”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 6, 2013, pp. 25 - 47, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 231