Download presentation
Presentation is loading. Please wait.
Published byCamron Alexander Modified over 9 years ago
1
DBMS Lab Projects
2
Information System Design
3
Auction Portal Items Bidders Bid Managers Lowest Bid Incremental Bidding
4
Resume Posting Service Resume Posts Employers Managers Matching
5
Tourism Information System Data Integration Location Aware Services Map Based Interface Travel Information
6
Web Based Dictionary Data Organization Graph Structure
7
Financial Portfolio Managers Users Projections Web based data access
8
Automatic Time Table and Course Management System Courses Class rooms Hard constraints Soft Constraints
9
Social Network of IIT Alumni Friends Communities Blogs Events
10
Web 2.0 Mashup is a web application that combines data from more than one source into a single integrated tool via a local database; an example is the use of cartographic data from Google Maps to add location information to real-estate data from Craigslist, thereby creating a new and distinct web service that was not originally provided by either source. Craigslist
11
Domain Specific Databases
12
Spatial Database GIS Spatio-temporal data Implement spatial queries and schemas
13
Multimedia Databases Content Based Retrieval Geometric Data Structures Music Databases
14
Streaming Data Network Monitoring Streaming Queries
15
XML Databases Query processor for restricted XQuery XML to RDBMS Converter XML database design –Biological data –Financial data
16
Sequence Databases Proteins, Gene sequences Motif, structure finding http://rdp.cme.msu.edu/
17
OODB Build a gaming framework using MyOODB
18
Fuzzy Databases FSQL
19
Text Databases Indexing – Zipfs law Search
20
Data warehousing Datacube materialization Warehouse design OLAP queries
21
Data Mining http://mill.ucsd.edu/
22
Database Security Checking a SQL query for SQL injection vulnerability statement := "SELECT * FROM users WHERE name = '" + userName + "';" setting the "userName" variable as a' or 't'='t, renders SELECT * FROM users WHERE name = 'a' OR 't'='t'; If this code were to be used in an authentication procedure then this example could be used to force the selection of a valid username because the evaluation of 't'='t' is always true.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.