Database System Concepts
Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter 18, Problem 1PE

Explanation of Solution

Proof:

Consider the set of attributes be α .

F is considered to be the set of functional dependencies (FDs).

The set of attributes is considered to be functionally determined by α under F and is defined to be close of α under F(α+).

Using the Figure 7.19 and Figure 7.8:

The algorithm provided in the figure 7.19 will correctly compute the (α+) as shown below:

  • Computing what will happen after adding A to result.
  • Proving αA
  • Since αα is trivially which means α is considered to be a part of the result.
  • Now, after adding Aα to the resultant there should be existence of functional dependency that is βγ where Aγ and where βresult.
  • Or else the value of the “fdcount” will not become zero, then the related of condition of the algorithm will not change to be the value “false”.
  • When Aα+, then it will added to the result for sure.
  • Proving this by induction by utilizing the Armstrong’s axiom on the length of proof on αA are shown below:
  • The add- in procedure gets called with the argument say “c”, then all the attribute present in the “C” gets added to the result.
  • Similarly in addition to it when the functional dependency “fdcount” value is zero, then all the attributes of its tail is surely added to the resultant too.
  • Utilizing the induction to the base case that is when Aα then Aα+ is considered to be true because the very first call that is made to the add-in procedure is made with the argument α.
  • Assume that αA and it can be proved in “n” steps or lesser than “n” steps and then it is also Aresult.
  • Now proving αA in n+1 steps;
  • The last step of proof can be obtained by applying one of the Armstrong axioms.
    • The below are three Armstrong’s axiom and they are
      • Reflexivity
        • A is considered to be set of attributes
        • BC and BA then AB
      • Augmentation
        • A is considered to be set of attributes
        • BC, then ABAC will also hold
      • Transitivity
        •  AB and BA, then AC can also be hold.
  • This indicates that the A was already present in the result and also in the nth step itself.
  • Or else by induction we can obtain that cresult

Comparison:

The algorithm present in the figure 7.19 is comparatively more efficient when compared with that of the figure 7.8 as shown below:

  • Each and every functional dependency gets scanned only one in the main program.
  • The resultant array size that appears is proportional to the size of the functional dependencies.
  • The recursive call that is made to the procedure add-in is also considered to be linear to the size that it appears.
  • Therefore, the time taken for the overall algorithm is linear to the size of the functional dependencies.
  • The algorithm presented in the figure 7.8 requires quadratic time because
    • The loop gets performed based the times of functional dependencies(FD’s)
    • Also for each loop the FD gets scanned again and again.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
57 Formula 1 point Use shift folding, length 3, on the following value to calculate the Hash Value. 114184121 Type your answer...
Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. Ex: If the input is: 2 4 6 8 10 12 14 16 18 20 the output is: 20 18 16 14 12 10 8 642 To achieve the above result, first read the integers into an array. Then output the array in reverse. 623802 1031906 nx3zmv7.
6.3B-2. Multiple Access protocols (2). Consider the figure below, which shows the arrival of 6 messages for transmission at different multiple access nodes at times t=0.1, 0.8, 1.35, 2.6, 3.9, 4.2. Each transmission requires exactly one time unit. 1 2 3 4 t=0.0 t=1.0 t=2.0 t=3.0 5 6 t=4.0 t=5.0 For the slotted ALOHA protocol, indicate which packets are successfully transmitted. You can assume that if a packet experiences a collision, a node will not attempt a retransmission of that packet until sometime after t=5. 1 2 3 4 5 K
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education