Figure 12 - uploaded by Gordon C Everest
Content may be subject to copyright.
Representation of a Binary Relation.  

Representation of a Binary Relation.  

Source publication
Article
Full-text available
This paper presents a taxonomy of basic data structures which highlights the most important logical differences. First, all data structure models are divided into single file models and multifile models. Single file models further divide into flat file data structures and hierarchical data structure models. Multifile data structure models are divid...

Similar publications

Data
Full-text available
ProMoT Tutorial. A Tutorial explaining how to install ProMoT and how to set up and export logical models is attached. For updated versions check ProMoT's web page (see Availability and requirements section).

Citations

... Table keys are written in bold type. Relationships between tables are expressed with Crow's foot notation (11): multiplicity in the edge denotes many mappings, a circle on the edge denotes optional mapping and a cut on the edge denotes mandatory mapping. Two tables are built for internal processing, temporarily storing Sequences and their AA_Changes (i.e. ...
Article
Full-text available
With the progression of the COVID-19 pandemic, large datasets of SARS-CoV-2 genome sequences were collected to closely monitor the evolution of the virus and identify the novel variants/strains. By analyzing genome sequencing data, health authorities can ‘hunt’ novel emerging variants of SARS-CoV-2 as early as possible, and then monitor their evolution and spread. We designed VariantHunter, a highly flexible and user-friendly tool for systematically monitoring the evolution of SARS-CoV-2 at global and regional levels. In VariantHunter, amino acid changes are analyzed over an interval of 4 weeks in an arbitrary geographical area (continent, country, or region); for every week in the interval, the prevalence is computed and changes are ranked based on their increase or decrease in prevalence. VariantHunter supports two main types of analysis: lineage-independent and lineage-specific. The former considers all the available data and aims to discover new viral variants. The latter evaluates specific lineages/viral variants to identify novel candidate designations (sub-lineages and sub-variants). Both analyses use simple statistics and visual representations (diffusion charts and heatmaps) to track viral evolution. A dataset explorer allows users to visualize available data and refine their selection. VariantHunter is a web application free to all users. The two types of supported analysis (lineage-independent and lineage-specific) allow user-friendly monitoring of the viral evolution, empowering genomic surveillance without requiring any computational background. Database URL http://gmql.eu/variant_hunter/
... Hierarchical framework for TOR signals within the context of a takeover situation. Connections between blocks follow crow foot notation (Everest, 1976). For example, a takeover situation involves one setting and one or more TOR signals, each of which are implemented using one or more modalities. ...
Article
Background Meta studies on factors contributing to take-over performance did not include the design of take-over request (TOR) signals, other than the modality at which TORs are presented. A detailed understanding of the influence of TOR design on take-over performance is therefore lacking. Objective To gain an overview of the level of detail with which TOR designs are reported in academic literature, by using and evaluating a novel classification framework. In this framework TORs are classified in terms of modalities, classes, and underlying attributes. Furthermore, the framework involves classification of potentially competing background signals, as well as the setting in which a study is performed. Method A systematic review was performed on articles written in English that were published between 2014 and 2021 using Web of Science, as well as articles retrieved from two previous TOR classification studies and three meta studies on take-over performance. Studies were considered for subsequent analysis if they involved a downward transition of the level of automation following a TOR, resulting in a sample of 391 TORs found in 189 studies. Results No predominant TOR design was found, and a considerable part of the available design space has not yet been explored. Studies reported less information on TOR designs when examining TOR designs at an increased level of detail. On average, attribute information was reported for half of the TORs per class. Conclusions More attention towards a detailed description of TOR implementations is needed and how this can impact experimental findings. The classification framework and the corresponding coding sheet could support systematic reporting and subsequent meta-analysis in future work. This way, a better understanding about the impact of TOR design on take-over performance can be gained, which in turn can support implementation of safe and effective TORs in (automated) vehicles.
... We consider a requirements quality factor-as Fig. 1. Schema of the ontology structure in Crow's foot notation [16] described in the introduction-as a normative metric which maps a textual requirement at a specific level of granularity to a scale which informs about the quality of this input, where the level of granularity represents different ranges of text (e.g., words, sentences, or documents) and the scale is an often binary categorization of whether the factor has a positive or negative impact on specific aspects of quality (e.g., ambiguity, consistency) [14]. The lack of an explicit definition of this concept so far, however, led to quality factors only being referred to implicitly in literature. ...
... In the relational model, data is organized "in tables, nothing but tables" (Date, 2004), in other words, the types of entities are transformed into tables, the attributes in columns of the respective tables, the multivalued attributes in different tables, the relationships in foreign keys and (possibly) new tables. In the diagram of the relational scheme, the crow's foot notation (Everest, 1976) was used to indicate the cardinalities of the relationships established through foreign keys. This notation was created for conceptual data modeling, but it is often used (combined with other notations) to graphically represent cardinality and participation constraints on relationships expressed through foreign keys in a relational scheme. ...
Article
Full-text available
Established populations of Aedes aegypty, a mosquito vector of major arthropod-Borne-Viruses, were first found in three California (CA) cities in 2013. From 2013 to april 2021, Ae. Aegypty thwarted almost all control efforts to stop its spread and expanded its range to 308 cities, including exeter, in 22 counties in CA. Population Genomic analyses have suggested that ultiplr genetically distinct Ae. Aegypty populations were introduced into CA. However Ae. Aegypty for the first time in 2014 in Exeter, appeared to be different to three major genetic clusters found elsewhere in CA.Due to intense control efforts by the delta vector control district (DVCD), Ae. Aegypty was thought to have been eliminated from Exeter in 2015. Unfortunately, it was recolected in 2018. It was not clear if the reemergence of Ae. Aegypty in Exeter, was derived from the bottlenecked remnants of the original 2014 Exeter population or from an independent invasion from a different population derived from surrounding areas. The goal of this work was to determine which of this scenarios ocurred (Recovery after bottleneck or reintroduction after elimination) and if elimination and reintroduction ocurred, to identify the origin of the invading population usinga population genomic approach. Our rresults support the reintroduction after the elimination hypothesis. The source of reintroduction, however, was unesprectedly from the southern CA cluster rather than other two geographically closer central CA genetic clusters. We also conducted a knockdown resistance mutation profile, which show Exeter 2014, have the lower levels of resistance alleles compared to the other populations, could have contibuted towards DVCV´s ability to locally eliminate Ae. Aegypty in 2014.
... The use of a per-Resource Master enables DIMINET to deal with network partitions for intersite Resources straightforwardly: When an end-user request cannot be satisfied due to network issues (i.e., either a remote site cannot be reached or reciprocally when a remote site cannot interact with the Master), the request is revoked, and the user is notified of the impossibility to serve the request. Figure 9.5 shows the schema of the objects used by the Logic Core to represent an intersite resource using an Entity Relationship (ER) diagram with crow's foot notation [152]. ...
Thesis
The evolution of the cloud computing paradigm in the last decade has amplified the access of on-demand services (economical attractive, easy-to-use manner, etc.). However, the current model built upon a few large datacenters (DC) may not be suited to guarantee the needs of new use cases, no-tably the boom of the Internet of Things (IoT). To better respond to the new requirements (in terms of delay, traffic, etc.), compute and storage resources should be deployed closer to the end-user. In the case of telecommunication operators, the network Point of Presence (PoP), which they have always operated, can be inexpensively extended to host these resources. The question is then how to manage such a massively Distributed Cloud Infrastructure (DCI) to provide end-users the same services that made the current cloud computing model so successful. In this thesis realized in an industrial context with Orange Labs, we study the inter-site connectivity management issue in DCIs leveraging the Software Defined Networking (SDN) principles. More in detail, we analyze the problems and limitations related to centralized management, and then, we investigate the challenges related to distributed connectivity management in DCIs. We provide an analysis of major SDN controllers indicating whether they are able or not to answer the DCI challenges in their respective contexts. Based on this detailed study, which is a first contribution on its own, we propose the DIMINET solution, a service in charge of providing on-demand connectivity for multiple sites. DIMINET leverages a logically and physically distributed architecture where instances collaborate on-demand and with minimal traffic exchange to provide inter-site connectivity management. The lessons learned during this study allows usto propose the premises of a generalization in order to be able to distribute in a non-intrusive manner anservice in a DCI.
... In the relational model, data is organized "in tables, nothing but tables" (Date, 2004), in other words, the types of entities are transformed into tables, the attributes in columns of the respective tables, the multivalued attributes in different tables, the relationships in foreign keys and (possibly) new tables. In the diagram of the relational scheme, the crow's foot notation (Everest, 1976) was used to indicate the cardinalities of the relationships established through foreign keys. This notation was created for conceptual data modeling, but it is often used (combined with other notations) to graphically represent cardinality and participation constraints on relationships expressed through foreign keys in a relational scheme. ...
Article
Full-text available
Mosquito-borne diseases affect millions of people and cause thousands of deaths yearly. Vaccines have been hitherto insufficient to mitigate them, which makes mosquito control the most viable approach. But vector control depends on correct species identification and geographical assignment, and the taxonomic characters of mosquitoes are often inconspicuous to non-taxonomists, which are restricted to a life stage and/or even damaged. Thus, geometric morphometry, a low cost and precise technique that has proven to be efficient for identifying subtle morphological dissimilarities, may contribute to the resolution of these types of problems. We have been applying this technique for more than 10 years and have accumulated thousands of wing images with their metadata. Therefore, the aims of this work were to develop a prototype of a platform for the storage of biological data related to wing morphometry, by means of a relational database and a web system named “WingBank.” In order to build the WingBank prototype, a multidisciplinary team performed a gathering of requirements, modeled and designed the relational database, and implemented a web platform. WingBank was designed to enforce data completeness, to ease data query, to leverage meta-studies, and to support applications of automatic identification of mosquitoes. Currently, the database of the WingBank contains data referring to 77 species belonging to 15 genera of Culicidae. From the 13,287 wing records currently cataloged in the database, 2,138 were already made available for use by third parties. As far as we know, this is the largest database of Culicidae wings of the world.
... After that, the script checks which of the species are contained in B10K's current annotation of 363 bird species. For each of these species, the script connects to the [42] of Avimm. Core tables represent the basic structure of the database and link the evidence-specific identifiers to Avimm's unique identifiers (uid). ...
Article
Full-text available
Background Genomic and genetic studies often require a target list of genes before conducting any hypothesis testing or experimental verification. With the ever-growing number of sequenced genomes and a variety of different annotation strategies, comes the potential for ambiguous gene symbols, making it cumbersome to capture the “correct” set of genes. In this article, we present and describe the Avian Immunome DB (Avimm) for easy gene property extraction as exemplified by avian immune genes. The avian immune system is characterised by a cascade of complex biological processes underlaid by more than 1000 different genes. It is a vital trait to study particularly in birds considering that they are a significant driver in spreading zoonotic diseases. With the completion of phase II of the B10K (“Bird 10,000 Genomes”) consortium’s whole-genome sequencing effort, we have included 363 annotated bird genomes in addition to other publicly available bird genome data which serve as a valuable foundation for Avimm. Construction and content A relational database with avian immune gene evidence from Gene Ontology, Ensembl, UniProt and the B10K consortium has been designed and set up. The foundation stone or the “seed” for the initial set of avian immune genes is based on the well-studied model organism chicken (Gallus gallus). Gene annotations, different transcript isoforms, nucleotide sequences and protein information, including amino acid sequences, are included. Ambiguous gene names (symbols) are resolved within the database and linked to their canonical gene symbol. Avimm is supplemented by a command-line interface and a web front-end to query the database. Utility and discussion The internal mapping of unique gene symbol identifiers to canonical gene symbols allows for an ambiguous gene property search. The database is organised within core and feature tables, which makes it straightforward to extend for future purposes. The database design is ready to be applied to other taxa or biological processes. Currently, the database contains 1170 distinct avian immune genes with canonical gene symbols and 612 synonyms across 363 bird species. While the command-line interface readily integrates into bioinformatics pipelines, the intuitive web front-end with download functionality offers sophisticated search functionalities and tracks the origin for each record. Avimm is publicly accessible at https://avimm.ab.mpg.de.
... Du point de vue général, il existe de nombreux outils graphiques de représentation des modèles conceptuels de données comme le paradigme Entité-Association-Propriété pour la méthode Merise (Tardieu et al., 1983 ;Quang et al., 1991), les diagrammes de classes pour le formalisme UML (Booch et al., 1998), etc. Ces modèles permettent de modéliser n'importe quelle structure de données, mais, de ce fait, ne Parmi ces modèles standard, nous nous sommes intéressés aux "Crow's Foot Diagrams" (CFD) de (Everest, 1976). Ils sont utilisés depuis longtemps en ingénierie de l'information (Martin et Finkelstein, 1988) pour la représentation des tables et de leurs liens dans le modèle Entité-Relation. ...
Conference Paper
Full-text available
XML est un (méta-)langage actuellement très utilisé. Dans le cadre des formations en informatique, il est indispensable d'initier les étudiants à ce langage et, surtout, à tout son éco-système. Nous avons mis au point un modèle permettant d'accompagner l'enseignement de XML. Il propose de représenter un schéma XML sous la forme d'un graphe mettant en valeur les caractéristiques structurelles des documents valides. Nous présentons dans cet article les différents éléments graphiques et les améliorations qu'il apporte à la modélisation de données en XML.
... Ces modèles permettent de modéliser n'importe quelle structure de données, mais, de ce fait, ne sont pas nécessairement adaptés pour une compréhension des modèles hiérarchiques. Cependant, parmi ces modèles standard, nous nous sommes intéressés aux "Crow's Foot diagrams" de G. C. Everest [11]. Ils sont utilisés par beaucoup de logiciels pour la représentation des tables et de leurs liens dans le modèle Entité-Relation 4 . ...
... Tout d'abord, nous allons représenter les opérateurs d'itération "*", "+" et " ?". Pour cela, nous nous sommes inspirés des "Crow's foot diagrams" de G. C. Everest [11] utilisés principalement pour représenter graphiquement les tables du modèle relationnel. Lafigure 9 présente la symbolique utilisée pour chacun des opérateurs. ...
Technical Report
Full-text available
Currently, XML is a format widely used. In the context of computer science teaching, it is necessary to introduce students to this format and, especially, at its eco-system. We have developed a model to support the teaching of XML. We propose to represent an XML schema as a graph highlighting the structural characteristics of the valide documents. We present in this report different graphic elements of the model. --- XML est un format actuellement très utilisé. Dans le cadre des formations en informatique, il est indispensable d'initier les étudiants à ce format et, surtout, à tout son éco-système. Nous avons donc mis au point un modèle permettant d'appuyer l'enseignement de XML. Ce modèle propose de représenter un schéma XML sous la forme d'un graphe mettant en valeur les caractéristiques structurelles des documents valides. Nous présentons dans ce rapport les différents éléments graphique du modèle.
Article
The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles and an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, the fraudulent schemes that steal investors’ funds. From a curated dataset of 760 rug pulls across 10 NFT marketplaces, we examine these schemes’ structural and behavioral properties, identify the characteristics and motivations of rug-pullers, and classify NFT projects into 20 groups based on creators’ association with their accounts. Our findings reveal that repeated rug pulls account for a significant proportion of the rise in NFT-related cryptocurrency crimes, with one NFT creator attempting 37 rug pulls within 3 months. Additionally, we identify the largest group of creators influencing the majority of rug pulls and demonstrate the connection between rug-pullers of different NFT projects using the same wallets to store and move money. Our study contributes to understanding NFT market risks and provides insights for designing preventative strategies to mitigate future losses.