Verified Document

XML Physical Evaluation Of XML Term Paper

One such body is the American National Standards Institute or ANSI which is a non-profit private organization that surprisingly institutes standards the industry accepts voluntarily. Other influential standards organizations include the Institute of Electrical and Electronic Engineers or IEEE and the Organization for Standardization or ISO. The IEEE was the organization that defined LAN standards in the Project 802 or the 802 series. These projects could be the blueprints that could be used to make XML more effective by using PAT Algebra Operators for query needs.

XML PAT Algebra Operators

The internet is based on a foundation of distributed hypertext. There is also plenty of proof that the internet could be regarded as a large distributed database where there are million to billions of queries processed daily. "XML is too slow an exchange format for any large volume of data transfer. It is fine for exchange of small amounts of data on the fly but when you get to the stage of wanting to transfer Gigabytes of data when converted to XML that mushrooms pretty rapidly. Before XML becomes any more mainstream it should be looked at now to see how compression can be adopted. It must be backward compatible so that uncompressed XML will work with new compressed aware apps." (Tech Republic, 2005)

XML as a language does exactly that. XML was designed to make the information that is scattered all around the world to seem more like a large repository of database that can be retrieved by using XML. The problem is that databases such as Oracle or ACCESS can use the specific programming languages that are like or incorporate the Sequential Query Language or SQL. "The mission of the XML Query project is to provide flexible query facilities to extract data from real and virtual documents on the World Wide Web, therefore finally providing the needed interaction between the Web world and the database world. Ultimately, collections of XML files will be accessed like databases." (W3C, 2005)

Thus, XML Query is currently attempting to develop a standard for querying web documents. "However, the XML Query (XQuery) project is all-around, and also includes in its efforts not only the standard for querying XML documents, but also the next-generation standards for doing XML selection (XPath2), for doing XML serialization, for doing Full-Text Search, for providing a possible functional XML Data Model, and for providing a standard set of functions and operators for manipulating web data." (W3C, 2005)

The internet has no unique equivalent to SQL. Although XML has been designed to be as simple as possible in regard to client-side processing, XML does not equate to SQL when it comes to retrieving the electronic publishing or data interchange. Thus, by creating a standardized methodology for the XML PAT Algebra Operators through a physical evaluation and assigning them a cost may facilitate a simplification of the development process; there may be a way to increase the effectiveness of the XML retrieval process.

In other...

The algebra queries could be derived from a nested relational algebra similar to object-oriented databases. The XML process of retrieval currently uses tree like or based macro-algebras for query processing and micro-algebras that are more like individual nodes. By assigning costs, it could be possible to merge operators and also to create a situation where single access methods could be used to evaluate a multiple operators. The objective would be to use the PAT operators to create a framework that could take advantage of both macro-algebras and micro-algebras for XML. From that, new access methods from the operator combinations
Conclusion

This abstract proposal presented a foreshadowing of what would be the foundation of a full evaluative report on how the Extensible Markup Language (XML) PAT Algebra Operators could be physically evaluated and thus be assigned with a cost that would help standardize the XML programming query process. The advances in computing hardware and software as well as the World Wide Web have revolutionized politics, science and the business world. One way this has been accomplished has been through standardization. Standardization has therefore greatly influenced and enhanced the majority of research, development and productivity in a large number of industries by reducing maintenance, costs while simplifying cycles of the production process. The XML programming language should be no exception. By standardizing the XML PAT Algebra Operators through physically evaluation and then assigning them a cost, the query process could be greatly enhanced.

References

Avolio, Frederick M. (2000, March 20). Best Practices In Network Security -- As The Networking Landscape Changes, So Must The Policies That Govern Its Use. Don't Be Afraid Of Imperfection When It Comes To Developing Those For Your Group. Network Computing.

Dekker, Marcel. (n.d.). Security of the Internet. Retrieved on January 17, 2005, at http://www.cert.org/encyc_article/tocencyc.html#Overview

Gast, Matthew. (2002, April 19). Wireless LAN Security: A Short History. Retrieved on January 17, 2005, at http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html

Oasis. (n.d.). XML: Overview. Retrieved on January 17, 2005, at http://xml.coverpages.org/xml.html#overview

Rae, John B. American Automobile Manufacturers: The First Forty Years. Chilton Co, Book Division, 1959.

Tech Republic. (n.d.). XML too slow. Retrieved on January 16, 2005, at http://techrepublic.com.com/5208-6230-0.html?forumID=10&threadID=166448&messageID=1701602

W3C. (n.d.). XML Query (XQuery). Retrieved on January 16, 2005, at http://www.w3.org/XML/Query

XML.com. (n.d.). What is XML. Retrieved on January 16, 2005, at http://www.xml.com/pub/a/98/10/guide0.html?page=2#AEN58

Programming / Computer Science

Sources used in this document:
References

Avolio, Frederick M. (2000, March 20). Best Practices In Network Security -- As The Networking Landscape Changes, So Must The Policies That Govern Its Use. Don't Be Afraid Of Imperfection When It Comes To Developing Those For Your Group. Network Computing.

Dekker, Marcel. (n.d.). Security of the Internet. Retrieved on January 17, 2005, at http://www.cert.org/encyc_article/tocencyc.html#Overview

Gast, Matthew. (2002, April 19). Wireless LAN Security: A Short History. Retrieved on January 17, 2005, at http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html

Oasis. (n.d.). XML: Overview. Retrieved on January 17, 2005, at http://xml.coverpages.org/xml.html#overview
Tech Republic. (n.d.). XML too slow. Retrieved on January 16, 2005, at http://techrepublic.com.com/5208-6230-0.html?forumID=10&threadID=166448&messageID=1701602
W3C. (n.d.). XML Query (XQuery). Retrieved on January 16, 2005, at http://www.w3.org/XML/Query
XML.com. (n.d.). What is XML. Retrieved on January 16, 2005, at http://www.xml.com/pub/a/98/10/guide0.html?page=2#AEN58
Cite this Document:
Copy Bibliography Citation

Related Documents

Vose, D. 2008 . Risk Analysis: A Quantitative
Words: 1740 Length: 6 Document Type: Annotated Bibliography

Vose, D. (2008). Risk Analysis: A quantitative guide. (3rd ed.). West Sussex, England: John Wiley & Sons, Ltd. The book is written on risk analysis using quantitative methodologies. The book has two parts and chapters are divided into these two parts. The first part is intended to help managers realize the rationale for conducting risk analysiswhereas the second part explains the modeling techniques of risk analysis. First part describes in detail

Metadata Repository Is a Database
Words: 2157 Length: 8 Document Type: Research Paper

An architect could also choose a Metamodel, which specify the elements of the model to be stored. 7 Select Modeling Levels to be Stored within the Repository An Architect should select the modeling levels, which include source code, models, runnable code and model instances to be stored in a Metadata Repository, Model Repository or a Model. 8 Select Metadata Types With reference to the Metadata Repository, a Model to be used, an architect could select

Cross Platform Mobile and Web
Words: 17284 Length: 63 Document Type: Thesis

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Revolution That Started When Information
Words: 6495 Length: 24 Document Type: Term Paper

As the business changes, developers can more easily map business process changes to applications and then implement the appropriate it changes. SOA facilitates business connections. With business processes packaged as modular, accessible business services, enterprises can connect them where and when they are needed to optimize processes across customers, partners, suppliers, and their own internal applications SOA enhances business control. Because services model business processes, the flow of data and transactions

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Davis V. The Board of County Commissioners
Words: 1376 Length: 4 Document Type: Essay

Davis v. The Board of County Commissioners of Dona Ana County: Mariah C. Davis filed a lawsuit against Dona Ana County for injuries he suffered while a patient at Mesilla Valley Hospital. In the lawsuit, Davis accused Joe Herrera, an employee at the hospital, of sexually assaulting her. Furthermore, she alleged that the hospital hired Herrera on incompetent, favorable suggestions from Dana Ana County Detention Center where he was also investigated

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now