Data Anomaly - How Data Anomaly Could Be Prevented

feature-top

Anomalies are caused directly by users when the data does not conform to the expected behavior, and the design of the database is not done correctly. Database administrators (DBAs) face many problems when developing a database, which has many tables that are related. When an anomaly happens, data redundancy may occur, which means that the data has been duplicated, and may cause users to access incorrect information (Chen et al. 2011). Anomalies must be detected, because a lot of applications, could use well design databases; fraud detection in insurance and healthcare, as well as credit cards, are some of the database driven applications, where anomalies can be found (Chandola, Banerjee & Kumar, 2009). Anomalies can also cause problems in applications such as military surveillance systems and cyber-security system (Chandola, Banerjee & Kumar, 2009). When a database is not correctly designed, three types of anomalies can occur; according to EESSAAR (2016), update, insert and deletion are three types of data anomaly. Strange situations can happen, when the linkage between data items are not done properly, and these data items are scattered in the database inconsistently when updates of these data items take place, this is known as update anomalies.

When an update of one data item, that is supposed to be linked to other data items; takes place in the database and these other items are not updated properly, it is said that an update anomaly has occurred (EESSAAR 2016). The database will, in turn, have data inconsistency, due to update anomalies, for example, when users want to pull information from the database in my project, about the patient table and the staff table, then a new table would be created. Using SQL statements, such as JOINS, two tables can be used together, to provide valuable information, to users about these data items. This new table would be known as the patient_staff table, if the address of a staff change in the staff table, then this update must also take place in the patient_staff table, or else there would be data inconsistency also known as an update anomaly.

Deletion anomaly is another type of anomaly, where data that is meant to be deleted, is not deleted from the database, leaving undeleted data on the database. Deletion also happens, when the deletion of one item that is linked to another, causes the deletion of the linked item, which the user didn’t intend to delete, to be deleted.

 For example, in the table patient_staff in the project that I am proposing, if a patient is discharged and that patient record needs to be deleted, then the deletion should not affect the staff table. The staff table do form a relationship, with the patient entity, and anomalies can occur when the patient_staff table is created. Only the patient table and the patient_staff table should be affected by the deletion, in order to make sure, that all information about the patient, has been deleted all across the database (EESSAAR 2016).

 Another type of anomaly is the insertion anomaly, which happens when data that is meant to be inserted into the database, cannot enter the database, due to the fact that other items must exist in the database, in order for the data to be inserted (EESSAAR 2016). A good example would be, in my project there would be to entities known as patient and hospital entity, and these will be forming a relationship. When users try to input a new patient information in the database, there needs to be hospital information as well, in order for that patient information to be inserted, in the database. If the hospital information, for that patient, is not found, then the database will be missing vital information about the patient.

Anomalies can mean something different, for different types of database driven applications, for example, in my project, a change in the blood pressure, in the patient record table, might signify an anomaly to doctors. While a change in the address of a patient, in the patient entity, might be considered normal because people move all the time. In order to avoid all these problems, normalization must be used to normalize the database. The techniques of normalization will be discussed below, in order to answer the second question below. 

Thank you for reading this article!!!

References:

Chandola, V., Banerjee, A. & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys. Retrieved from http://cucis.ece.northwestern.edu/projects/DMS/publications/AnomalyDetection.pdf

Chen, T. X., Meyer, M. D., Ganapathi, N., Liu, S., & Jonathan M. Cirella, J. M. (2011). Improving data quality in relational databases: Overcoming functional entanglements. RIT International. Retrieved from https://www.rti.org/sites/default/files/resources/op-0004-1105-chen.pdf

Coulson, F. (2016). The 3 normal forms: A tutorial by Fred Coulson. Retrieved from http://www.phlonx.com/resources/nf3/nf3_tutorial.pdf

Eessaar, E. (2016). The database normalization theory and the theory of normalized systems: finding a common ground. Baltic J. Modern Computing, 4(1), 5-33. Retrieved from https://www.bjmc.lu.lv/fileadmin/user_upload/lu_portal/projekti/bjmc/Contents/4_1_3_Eessaar.pdf

 

 

But I must explain to you how all this mistaken idea of denouncing pleasure and praising pain was born and I will give you a complete account of the system, and expound the actual teachings of the great explorer of the truth, the master-builder of human happiness. No one rejects, dislikes, or avoids pleasure itself, because it is pleasure, but because those who do not know how to pursue pleasure rationally encounter consequences that are extremely painful.

Nor again is there anyone who loves or pursues or desires to obtain pain of itself, because it is pain, but because occasionally circumstances occur in which toil and pain can procure him some great pleasure. To take a trivial example, which of us ever undertakes laborious physical exercise, except to obtain some advantage from it?

But I must explain to you how all this mistaken idea of denouncing pleasure

But who has any right to find fault with a man who chooses to enjoy a pleasure that has no annoying consequences, or one who avoids a pain that produces no resultant pleasure? On the other hand, we denounce with righteous indignation and dislike men who are so beguiled and demoralized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee.Nor again is there anyone who loves or pursues or desires to obtain pain of itself, because it is pain, but because occasionally circumstances occur in which toil and pain can procure him some great pleasure. To take a trivial example, which of us ever undertakes laborious physical exercise, except to obtain some advantage from it? Nor again is there anyone who loves or pursues or desires to obtain pain of itself, because it is pain, but because occasionally circumstances occur in which toil and pain can procure him some great pleasure. To take a trivial example, which of us ever

But I must explain to you how all this mistaken idea of denouncing pleasure and praising pain was born and I will give you a complete account of the system, and expound the actual teachings of the great explorer of the truth, the master-builder of human happiness. No one rejects, dislikes, or avoids pleasure itself, because it is pleasure, but because those who do not know how to pursue pleasure rationally encounter consequences that are extremely painful.

feature-top
feature-top

Add a Comment

Hernando Cadet

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without revolutionary ROI.

Hernando Cadet

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without revolutionary ROI.