{"id":54709,"date":"2018-03-09T22:42:27","date_gmt":"2018-03-09T22:42:27","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/aplicacion-de-tecnicas-activas-para-el-control-de-restricciones-en-el-desarrollo-de-bases-de-datos\/"},"modified":"2018-03-09T22:42:27","modified_gmt":"2018-03-09T22:42:27","slug":"aplicacion-de-tecnicas-activas-para-el-control-de-restricciones-en-el-desarrollo-de-bases-de-datos","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/informatica\/aplicacion-de-tecnicas-activas-para-el-control-de-restricciones-en-el-desarrollo-de-bases-de-datos\/","title":{"rendered":"Aplicacion de tecnicas activas para el control de restricciones en el desarrollo de bases de datos"},"content":{"rendered":"<h2>Tesis doctoral de <strong>  Al Jumaily Harith T <\/strong><\/h2>\n<p>Cuando aplicamos una metodolog\u00eda para desarrollar una base de datos nos encontramos que los modelos conceptuales que aplicamos son cada vez m\u00e1s ricos sem\u00e1nticamente hablando y esto implica que son capaces de recoger con mayor precisi\u00f3n las especificaciones del dominio. El problema surge cuando queremos mantener esta sem\u00e1ntica en la siguiente fase de la metodolog\u00eda, la fase l\u00f3gica, donde algunas de las metodolog\u00edas coinciden en la utilizaci\u00f3n del modelo relacional para transformar el esquema conceptual en un esquema cercano a la implementaci\u00f3n. Para ello, se aplican un conjunto de reglas de transformaci\u00f3n. Estas reglas son, en general, muy b\u00e1sicas pues solo especifican la transformaci\u00f3n de los elementos m\u00e1s simples y sencillos del modelo conceptual, esto implica una p\u00e9rdida de sem\u00e1ntica significativa, que lleva al dise\u00f1ador a controlar y comprobar las restricciones de integridad del dominio fuera de la bd.  por eso, los objetivos que perseguimos en la elaboraci\u00f3n de la tesis doctoral son;  \u00ab\u00bb enriquecer las reglas de transformaci\u00f3n del modelo conceptual al modelo relacional con tecnolog\u00eda activa para solucionar el problema de la p\u00e9rdida de sem\u00e1ntica del ud. \u00ab\u00bb proporcionar herramientas a los dise\u00f1adores de bd para generar de manera autom\u00e1tica disparadores y visualizar su modelo de ejecuci\u00f3n. Estas herramientas podr\u00edan ayudar y facilitar el trabajo de ellos y animarles m\u00e1s para utilizar estos mecanismos en las aplicaciones. \u00ab\u00bb proponer mecanismos para mejorar el rendimiento de bd cuando se quiere implementar esquemas con tantos elementos y restricciones.   el trabajo est\u00e1 enmarcado dentro del proyecto \u00ab\u00bbplataforma de gesti\u00f3n de procesos software: modelado, reutilizaci\u00f3n y medici\u00f3n\u00bb\u00bb. Tin2004\/07083<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Aplicacion de tecnicas activas para el control de restricciones en el desarrollo de bases de datos<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Aplicacion de tecnicas activas para el control de restricciones en el desarrollo de bases de datos <\/li>\n<li><strong>Autor:<\/strong>\u00a0  Al Jumaily Harith T <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Carlos III de Madrid<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 25\/09\/2006<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Paloma Martinez Fernandez<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Antonio De amescua seco <\/li>\n<li>almudena Sierra alonso (vocal)<\/li>\n<li>matilde Celma gimenez (vocal)<\/li>\n<li>hendrik Decker (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Al Jumaily Harith T Cuando aplicamos una metodolog\u00eda para desarrollar una base de datos nos encontramos que [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[18550,13880],"tags":[120858,47313,49579,36417,36416,62933],"class_list":["post-54709","post","type-post","status-publish","format-standard","hentry","category-carlos-iii-de-madrid","category-informatica","tag-al-jumaily-harith-t","tag-almudena-sierra-alonso","tag-antonio-de-amescua-seco","tag-hendrik-decker","tag-matilde-celma-gimenez","tag-paloma-Martinez-fernandez"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/54709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=54709"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/54709\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=54709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=54709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=54709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}