This document provides an overview of XML (Extensible Markup Language) including its introduction, syntax, documents, declaration, tags, elements, attributes, comments, character entities, CDATA sections, whitespace, processing, encoding, validation, DTDs, schemas, tree structure, and DOM. XML is a text-based markup language that is commonly used for data storage and transmission. It has defined rules for encoding documents in a format that is both human-readable and machine-readable.
Visual cryptography is a cryptographic technique that allows visual information like images and text to be encrypted in a way that decryption does not require a computer and is instead a mechanical operation performed by the human visual system. It was pioneered in 1994 by Moni Naor and Adi Shamir. The technique works by breaking an image into shares such that individual shares reveal no information about the original image but combining the shares allows the image to be revealed. For example, in a 2 out of 2 visual cryptography scheme each pixel is broken into 4 subpixels distributed randomly across 2 shares such that stacking the shares recovers the original pixel value. Visual cryptography finds applications in secure identification and communication.
The document discusses data link control and protocols used at the data link layer. It describes the functions of data link control including framing, flow control, and error control. Framing divides the bit stream into frames and adds header/trailer. Flow control restricts the amount of data sent before acknowledgment. Error control detects/corrects errors and retransmits lost frames. Stop-and-wait and sliding window protocols are discussed for flow control over noisy channels. Bit stuffing and byte stuffing techniques are compared to avoid flag patterns in data.
This document describes the five layers of the OSI model from top to bottom: Application layer, Transport layer, Network layer, Link layer, and Physical layer. It provides details on the purpose and functions of each layer, including that the Application layer dictates how requests are made, the Transport layer transports messages and ensures reliable delivery, the Network layer handles addressing and routing of packets, the Link layer deals with frame synchronization and error detection, and the Physical layer transmits individual bits between nodes. Common protocols are also listed for certain layers, such as TCP and UDP for the Transport layer and Ethernet for the Link layer.
This document discusses different strategies for selecting strong passwords. It outlines four basic techniques: user education, computer-generated passwords, reactive password checking, and proactive password checking. User education involves providing guidelines to users on creating hard-to-guess passwords using a mix of characters. Computer-generated passwords are random and difficult for users to remember. Reactive checking uses password crackers to find weak passwords after the fact, while proactive checking evaluates passwords during creation to reject weak options. The document also provides additional tips for strong passwords, such as making them long, unique, memorable through phrases, and incorporating a variety of characters.
The document summarizes key aspects of the transport layer. It discusses how the transport layer provides logical communication between application processes running on different hosts by abstracting physical network details. It then describes the services provided by the transport layer including connection-oriented and connectionless services. It also discusses topics like quality of service, transport service primitives, addressing, connection establishment and release, flow control, multiplexing, and crash recovery for the transport layer.
The document provides an introduction to data communications and networks. It discusses five components of data communication including data representation and flow. It defines what a network is as a set of connected devices and nodes. It also discusses different network topologies like star, bus, ring and hybrid configurations. The document then provides an overview of the Internet, its history and organization. It concludes by defining protocols and standards that govern data communication.
High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the ARQ mechanisms. This protocol is more a theoretical issue than practical; most of the concept defined in this protocol is the basis for other practical protocols.
The document provides an overview of GPRS (General Packet Radio Service) technology. It discusses:
- The need for GPRS to provide faster speeds, immediacy, new applications, and user-friendly billing.
- The history and development of GPRS from HSCSD as an upgrade path for GSM networks.
- Key GPRS network elements like the SGSN, GGSN, and their roles in routing packets and connecting to external networks.
- GPRS architecture and how it works in parallel with existing GSM networks.
- Logical channels used for control, signaling, and transport of user data packets.
Visual cryptography is a cryptographic technique that allows visual information like images and text to be encrypted in a way that decryption does not require a computer and is instead a mechanical operation performed by the human visual system. It was pioneered in 1994 by Moni Naor and Adi Shamir. The technique works by breaking an image into shares such that individual shares reveal no information about the original image but combining the shares allows the image to be revealed. For example, in a 2 out of 2 visual cryptography scheme each pixel is broken into 4 subpixels distributed randomly across 2 shares such that stacking the shares recovers the original pixel value. Visual cryptography finds applications in secure identification and communication.
The document discusses data link control and protocols used at the data link layer. It describes the functions of data link control including framing, flow control, and error control. Framing divides the bit stream into frames and adds header/trailer. Flow control restricts the amount of data sent before acknowledgment. Error control detects/corrects errors and retransmits lost frames. Stop-and-wait and sliding window protocols are discussed for flow control over noisy channels. Bit stuffing and byte stuffing techniques are compared to avoid flag patterns in data.
This document describes the five layers of the OSI model from top to bottom: Application layer, Transport layer, Network layer, Link layer, and Physical layer. It provides details on the purpose and functions of each layer, including that the Application layer dictates how requests are made, the Transport layer transports messages and ensures reliable delivery, the Network layer handles addressing and routing of packets, the Link layer deals with frame synchronization and error detection, and the Physical layer transmits individual bits between nodes. Common protocols are also listed for certain layers, such as TCP and UDP for the Transport layer and Ethernet for the Link layer.
This document discusses different strategies for selecting strong passwords. It outlines four basic techniques: user education, computer-generated passwords, reactive password checking, and proactive password checking. User education involves providing guidelines to users on creating hard-to-guess passwords using a mix of characters. Computer-generated passwords are random and difficult for users to remember. Reactive checking uses password crackers to find weak passwords after the fact, while proactive checking evaluates passwords during creation to reject weak options. The document also provides additional tips for strong passwords, such as making them long, unique, memorable through phrases, and incorporating a variety of characters.
The document summarizes key aspects of the transport layer. It discusses how the transport layer provides logical communication between application processes running on different hosts by abstracting physical network details. It then describes the services provided by the transport layer including connection-oriented and connectionless services. It also discusses topics like quality of service, transport service primitives, addressing, connection establishment and release, flow control, multiplexing, and crash recovery for the transport layer.
The document provides an introduction to data communications and networks. It discusses five components of data communication including data representation and flow. It defines what a network is as a set of connected devices and nodes. It also discusses different network topologies like star, bus, ring and hybrid configurations. The document then provides an overview of the Internet, its history and organization. It concludes by defining protocols and standards that govern data communication.
High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the ARQ mechanisms. This protocol is more a theoretical issue than practical; most of the concept defined in this protocol is the basis for other practical protocols.
The document provides an overview of GPRS (General Packet Radio Service) technology. It discusses:
- The need for GPRS to provide faster speeds, immediacy, new applications, and user-friendly billing.
- The history and development of GPRS from HSCSD as an upgrade path for GSM networks.
- Key GPRS network elements like the SGSN, GGSN, and their roles in routing packets and connecting to external networks.
- GPRS architecture and how it works in parallel with existing GSM networks.
- Logical channels used for control, signaling, and transport of user data packets.
Frame Relay is a WAN technology that uses virtual circuits (VCs) to connect multiple remote sites over a single serial interface on a router in a more cost-effective way than leased lines. There are two types of VCs - permanent VCs that remain active and switched VCs that are dynamically created. Each VC is identified by a unique data-link connection identifier (DLCI). Frame Relay uses these VCs to create logical connections between devices on a physical circuit.
Image secret sharing using Shamir's scheme with Steganography2510stk
This document discusses using Shamir's secret sharing algorithm and steganography to securely share secret images. The objectives are to provide more security for image communication while achieving transparency and preventing tampering. Shamir's algorithm is used to split images into shares, and steganography techniques like LSB encoding are used to hide the shares in cover images. This allows the shares to be transmitted securely without drawing attention. Potential applications include secure medical image sharing and military photography. The document reviews relevant literature and provides an example of a secret image being split and hidden in stego images. Future work could improve reconstruction quality and use additional cryptography techniques for enhanced security.
This document provides an overview of data communications and computer networks. It discusses the need for computer communication over distances, defines data communication, and describes the key components and characteristics of data communication systems. It also covers various data representation methods, transmission media, network topologies, categories of networks including LANs, MANs and WANs, and the importance of protocols and standards in networking.
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
Object oriented analysis and design uses modeling to understand systems being developed. Models simplify systems at different abstraction levels to visualize structure and behavior, provide templates for building systems, and document decisions. Effective modeling requires choosing appropriate models that influence solutions, expressing models at different abstraction levels for different stakeholders, ensuring models are grounded in reality, and using multiple complementary models to solve complex systems.
Here we describe federated learning based traffic flow prediction system. In federated learning we solve the problem of data security and also provide collaborative learning. model parameter are shared here ,not data
This document describes a deep learning approach for detecting diabetic retinopathy using OCT images. It discusses the proposed system which will use OCT images and apply classification algorithms to identify the level of infection. The model will be trained on datasets of infected images to accurately detect regions of infection and the condition level. Image processing techniques like median filtering and edge detection will be used along with statistical data extraction and supervised training to identify clusters and classify images. Results will be compared to evaluate the machine learning models. The system aims to automate diabetic retinopathy detection to improve efficiency over conventional methods.
This presentation discusses semi-joins and their effectiveness in distributed environments. It begins by defining distributed systems and relational algebra operations like joins. It then explains that a semi-join returns rows from the first table that match rows in the second table, without duplicate rows. Examples are provided to illustrate how semi-joins can reduce communication costs compared to conventional joins. The presentation concludes by stating that semi-joins are an efficient way to join data across multiple tables in a query in distributed systems.
Overview of handover decision strategies in heterogeneous networks by narendr...Narendra Prajapati
The availability of diverse wireless access technologies such as (Wi-Fi), (WiMAX), and (UMTS) allows users to stay “always on” in fast roaming too using IEEE802.21.
Vertical handovers had made possible for user to transfer itself to other technology service without disturbances in ongoing process.
Its is known that security problems in GSM authentication when it comes to high speed moving users, because of there frequent change of cell sites.
Handover could be horizontal or vertical and per user requirement. MIH (media independent handover) though provide vertical handover but on other hand 802.11had provided us fast and secure connection oriented handover from one access point to another with in same mobility domain.
Thus feature of security and authentication is integrated with handover for user security.
What are heterogeneous networks?
Evolutions of Generations
The Cellular GSM Transitions
Overview of 4G Communications
Concept of Handover /Handoff
Handovers distinguished according to criteria
The Vertical handover IEEE 802.21 & its phases.
VHO Management procedures
Requirements of Handover mechanism in heterogeneous networks
Performance evaluation (Technology )
Performance evaluation in Handover mechanisms
The document discusses Non-orthogonal multiple access (NOMA) as a potential key technology for 5G networks. It describes two types of NOMA - power domain NOMA (PD-NOMA) and code domain NOMA (NOMA-2000). PD-NOMA allocates one radio resource to multiple users using different transmit power levels, while NOMA-2000 uses orthogonal CDMA and TDMA signal waveforms. The document compares the performance of these two NOMA techniques through simulation results, finding that PD-NOMA shows better performance than NOMA-2000 under different channel conditions.
The document discusses different clustering techniques used for grouping large amounts of data. It covers partitioning methods like k-means and k-medoids that organize data into exclusive groups. It also describes hierarchical methods like agglomerative and divisive clustering that arrange data into nested groups or trees. Additionally, it mentions density-based and grid-based clustering and provides algorithms for different clustering approaches.
The document describes High-Level Data Link Control (HDLC), a bit-oriented protocol developed by ISO for point-to-point and multipoint data links. HDLC supports full-duplex communication and was modified by ITU as Balanced Link Access Protocol for use in X.25 networks. It defines three types of stations (primary, secondary, combined), three modes of data transfer (normal response, asynchronous response, asynchronous balanced), and three types of frames (unnumbered, information, supervisory). HDLC provides reliable communication, flow control, and uses physical layer synchronization.
This document discusses steganography, which is the practice of hiding secret information within other information. It provides an introduction and history of steganography, describing how it has been used for centuries to hide messages. The document then discusses different types of steganography, including fragile steganography which embeds information that is destroyed if the file is modified, and robust steganography which aims to embed information that cannot easily be destroyed. It also describes the least significant bit (LSB) technique for hiding information in digital images by changing the LSB of pixels without affecting the appearance of the image. Examples are provided to illustrate how the LSB technique works.
This document discusses and compares different topologies for interconnection networks in parallel and distributed systems. It describes static interconnection networks like complete graphs, linear arrays, rings, d-dimensional meshes, d-dimensional toruses, and k-dimensional hypercubes. For each topology, it provides the degree, diameter, edge connectivity, and bisection bandwidth to characterize the properties of the network. The document explains that different topologies provide different tradeoffs between properties like hardware cost, fault tolerance, message transmission time, and data throughput.
This document provides an overview of mobile communication and wireless networks. It discusses applications such as use in vehicles, emergencies, and business. It also covers a brief history of wireless communication and open research topics like interference and security issues. A simplified reference model is presented showing the protocol stack from the physical to application layers in a wireless environment.
UML (Unified Modeling Language) is a standard modeling language used to specify, visualize, construct and document software systems. It uses graphical notations to express the design of object-oriented software projects. UML includes diagrams, relationships and elements that help design different perspectives of a system including design, implementation, process and deployment. The key building blocks of UML are things (like classes and use cases), relationships (like generalization and dependency), and diagrams (like class, sequence and deployment diagrams) which are used to model different aspects of a software system.
The DMZ, or De-Militarized Zone, refers to a portion of a network that is outside of the main security protections but still under the organization's control. Machines placed in the DMZ, like web servers and DNS servers, are less protected than internal machines and should not be brought back inside the network once placed in the DMZ. The DMZ acts as an isolated island that contains services to the public but should not contain any sensitive information or files that cannot be lost.
The document discusses High-level Data Link Control (HDLC), a bit-oriented protocol used for point-to-point and multipoint data links. It supports full-duplex communication and defines three types of frames - Unnumbered frames for link setup/disconnection, Information frames to carry data, and Supervisory frames to transport control information. HDLC also specifies different transfer modes including Normal Response Mode (NRM) with balanced and unbalanced configurations, and Asynchronous Balanced Mode (ABM) where each station can function as primary or secondary.
This document provides an overview of data link control (DLC) and data link layer protocols. It discusses the key functions of DLC including framing, flow control, and error control. Framing involves encapsulating data frames with header information like source and destination addresses. Flow control manages the flow of data between nodes while error control handles detecting and correcting errors. Common data link layer protocols described include simple protocol, stop-and-wait protocol, and High-Level Data Link Control (HDLC). HDLC is a bit-oriented protocol that supports full-duplex communication over both point-to-point and multipoint links. It uses three types of frames: unnumbered, information, and supervisory frames.
The document discusses a technical seminar on the OSI model. It describes the seven layers of the OSI model, including the physical, data link, network, transport, session, presentation and application layers. It explains the functions of each layer and how they interact to exchange data and deliver messages from source to destination across networks.
XML stands for Extensible Markup Language and is used to mark up data so it can be processed by computers, whereas HTML is used to mark up text to be displayed for users. Both XML and HTML use elements enclosed in tags, attributes, and entities, but XML only describes content while HTML describes both structure and appearance. XML allows users to define their own tags, and is strictly structured, making it suitable for data processing by computers.
Introduction to XML, Defining XML tags, their attributes and values, Document Type Definition, XML Schemas, Document Object Model, XHTML Parsing XML Data - DOM and SAX Parsers in java.
Frame Relay is a WAN technology that uses virtual circuits (VCs) to connect multiple remote sites over a single serial interface on a router in a more cost-effective way than leased lines. There are two types of VCs - permanent VCs that remain active and switched VCs that are dynamically created. Each VC is identified by a unique data-link connection identifier (DLCI). Frame Relay uses these VCs to create logical connections between devices on a physical circuit.
Image secret sharing using Shamir's scheme with Steganography2510stk
This document discusses using Shamir's secret sharing algorithm and steganography to securely share secret images. The objectives are to provide more security for image communication while achieving transparency and preventing tampering. Shamir's algorithm is used to split images into shares, and steganography techniques like LSB encoding are used to hide the shares in cover images. This allows the shares to be transmitted securely without drawing attention. Potential applications include secure medical image sharing and military photography. The document reviews relevant literature and provides an example of a secret image being split and hidden in stego images. Future work could improve reconstruction quality and use additional cryptography techniques for enhanced security.
This document provides an overview of data communications and computer networks. It discusses the need for computer communication over distances, defines data communication, and describes the key components and characteristics of data communication systems. It also covers various data representation methods, transmission media, network topologies, categories of networks including LANs, MANs and WANs, and the importance of protocols and standards in networking.
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
Object oriented analysis and design uses modeling to understand systems being developed. Models simplify systems at different abstraction levels to visualize structure and behavior, provide templates for building systems, and document decisions. Effective modeling requires choosing appropriate models that influence solutions, expressing models at different abstraction levels for different stakeholders, ensuring models are grounded in reality, and using multiple complementary models to solve complex systems.
Here we describe federated learning based traffic flow prediction system. In federated learning we solve the problem of data security and also provide collaborative learning. model parameter are shared here ,not data
This document describes a deep learning approach for detecting diabetic retinopathy using OCT images. It discusses the proposed system which will use OCT images and apply classification algorithms to identify the level of infection. The model will be trained on datasets of infected images to accurately detect regions of infection and the condition level. Image processing techniques like median filtering and edge detection will be used along with statistical data extraction and supervised training to identify clusters and classify images. Results will be compared to evaluate the machine learning models. The system aims to automate diabetic retinopathy detection to improve efficiency over conventional methods.
This presentation discusses semi-joins and their effectiveness in distributed environments. It begins by defining distributed systems and relational algebra operations like joins. It then explains that a semi-join returns rows from the first table that match rows in the second table, without duplicate rows. Examples are provided to illustrate how semi-joins can reduce communication costs compared to conventional joins. The presentation concludes by stating that semi-joins are an efficient way to join data across multiple tables in a query in distributed systems.
Overview of handover decision strategies in heterogeneous networks by narendr...Narendra Prajapati
The availability of diverse wireless access technologies such as (Wi-Fi), (WiMAX), and (UMTS) allows users to stay “always on” in fast roaming too using IEEE802.21.
Vertical handovers had made possible for user to transfer itself to other technology service without disturbances in ongoing process.
Its is known that security problems in GSM authentication when it comes to high speed moving users, because of there frequent change of cell sites.
Handover could be horizontal or vertical and per user requirement. MIH (media independent handover) though provide vertical handover but on other hand 802.11had provided us fast and secure connection oriented handover from one access point to another with in same mobility domain.
Thus feature of security and authentication is integrated with handover for user security.
What are heterogeneous networks?
Evolutions of Generations
The Cellular GSM Transitions
Overview of 4G Communications
Concept of Handover /Handoff
Handovers distinguished according to criteria
The Vertical handover IEEE 802.21 & its phases.
VHO Management procedures
Requirements of Handover mechanism in heterogeneous networks
Performance evaluation (Technology )
Performance evaluation in Handover mechanisms
The document discusses Non-orthogonal multiple access (NOMA) as a potential key technology for 5G networks. It describes two types of NOMA - power domain NOMA (PD-NOMA) and code domain NOMA (NOMA-2000). PD-NOMA allocates one radio resource to multiple users using different transmit power levels, while NOMA-2000 uses orthogonal CDMA and TDMA signal waveforms. The document compares the performance of these two NOMA techniques through simulation results, finding that PD-NOMA shows better performance than NOMA-2000 under different channel conditions.
The document discusses different clustering techniques used for grouping large amounts of data. It covers partitioning methods like k-means and k-medoids that organize data into exclusive groups. It also describes hierarchical methods like agglomerative and divisive clustering that arrange data into nested groups or trees. Additionally, it mentions density-based and grid-based clustering and provides algorithms for different clustering approaches.
The document describes High-Level Data Link Control (HDLC), a bit-oriented protocol developed by ISO for point-to-point and multipoint data links. HDLC supports full-duplex communication and was modified by ITU as Balanced Link Access Protocol for use in X.25 networks. It defines three types of stations (primary, secondary, combined), three modes of data transfer (normal response, asynchronous response, asynchronous balanced), and three types of frames (unnumbered, information, supervisory). HDLC provides reliable communication, flow control, and uses physical layer synchronization.
This document discusses steganography, which is the practice of hiding secret information within other information. It provides an introduction and history of steganography, describing how it has been used for centuries to hide messages. The document then discusses different types of steganography, including fragile steganography which embeds information that is destroyed if the file is modified, and robust steganography which aims to embed information that cannot easily be destroyed. It also describes the least significant bit (LSB) technique for hiding information in digital images by changing the LSB of pixels without affecting the appearance of the image. Examples are provided to illustrate how the LSB technique works.
This document discusses and compares different topologies for interconnection networks in parallel and distributed systems. It describes static interconnection networks like complete graphs, linear arrays, rings, d-dimensional meshes, d-dimensional toruses, and k-dimensional hypercubes. For each topology, it provides the degree, diameter, edge connectivity, and bisection bandwidth to characterize the properties of the network. The document explains that different topologies provide different tradeoffs between properties like hardware cost, fault tolerance, message transmission time, and data throughput.
This document provides an overview of mobile communication and wireless networks. It discusses applications such as use in vehicles, emergencies, and business. It also covers a brief history of wireless communication and open research topics like interference and security issues. A simplified reference model is presented showing the protocol stack from the physical to application layers in a wireless environment.
UML (Unified Modeling Language) is a standard modeling language used to specify, visualize, construct and document software systems. It uses graphical notations to express the design of object-oriented software projects. UML includes diagrams, relationships and elements that help design different perspectives of a system including design, implementation, process and deployment. The key building blocks of UML are things (like classes and use cases), relationships (like generalization and dependency), and diagrams (like class, sequence and deployment diagrams) which are used to model different aspects of a software system.
The DMZ, or De-Militarized Zone, refers to a portion of a network that is outside of the main security protections but still under the organization's control. Machines placed in the DMZ, like web servers and DNS servers, are less protected than internal machines and should not be brought back inside the network once placed in the DMZ. The DMZ acts as an isolated island that contains services to the public but should not contain any sensitive information or files that cannot be lost.
The document discusses High-level Data Link Control (HDLC), a bit-oriented protocol used for point-to-point and multipoint data links. It supports full-duplex communication and defines three types of frames - Unnumbered frames for link setup/disconnection, Information frames to carry data, and Supervisory frames to transport control information. HDLC also specifies different transfer modes including Normal Response Mode (NRM) with balanced and unbalanced configurations, and Asynchronous Balanced Mode (ABM) where each station can function as primary or secondary.
This document provides an overview of data link control (DLC) and data link layer protocols. It discusses the key functions of DLC including framing, flow control, and error control. Framing involves encapsulating data frames with header information like source and destination addresses. Flow control manages the flow of data between nodes while error control handles detecting and correcting errors. Common data link layer protocols described include simple protocol, stop-and-wait protocol, and High-Level Data Link Control (HDLC). HDLC is a bit-oriented protocol that supports full-duplex communication over both point-to-point and multipoint links. It uses three types of frames: unnumbered, information, and supervisory frames.
The document discusses a technical seminar on the OSI model. It describes the seven layers of the OSI model, including the physical, data link, network, transport, session, presentation and application layers. It explains the functions of each layer and how they interact to exchange data and deliver messages from source to destination across networks.
XML stands for Extensible Markup Language and is used to mark up data so it can be processed by computers, whereas HTML is used to mark up text to be displayed for users. Both XML and HTML use elements enclosed in tags, attributes, and entities, but XML only describes content while HTML describes both structure and appearance. XML allows users to define their own tags, and is strictly structured, making it suitable for data processing by computers.
Introduction to XML, Defining XML tags, their attributes and values, Document Type Definition, XML Schemas, Document Object Model, XHTML Parsing XML Data - DOM and SAX Parsers in java.
This document provides an overview of XML (eXtensible Markup Language) by comparing and contrasting it with HTML. It discusses how XML is used to mark up data for computers to process rather than for display like HTML. The document outlines the basic rules for well-formed XML, including the need for matching tags, proper nesting, and defined entities. It also covers XML extensions like namespaces, attributes, and how to define a valid XML vocabulary through DTDs or schemas.
This document provides an overview of XML, XML schema, parsing XML, and GladeXML. It defines XML and its components like elements and attributes. It describes XML schema and provides a simple example. It explains how to parse an XML document into a DOM object and access elements. It also gives an overview of how GladeXML can dynamically load user interfaces from XML descriptions.
This document provides an overview of XML including:
- XML stands for Extensible Markup Language and is used to carry data, not display it. Tags are user-defined.
- An XML example shows a simple note with predefined tags.
- XML schemas define valid elements, attributes, structure and data types for XML documents.
- XML documents form a tree structure with elements nested within a root element. Syntax rules ensure documents are well-formed.
- XML parsers like SAX and DOM are used to read and build a model of an XML document programmatically.
This document provides an overview of XML (eXtensible Markup Language). It discusses how XML is used to store structured data, compares XML to databases and HTML, and outlines the basic structure and syntax of XML documents. Key points covered include XML tags, elements, attributes, namespaces, parsing XML with PHP, and manipulating XML data using DOM and SimpleXML extensions.
This document provides an overview of XML (eXtensible Markup Language). It defines XML as a meta markup language for representing text documents and data. XML allows users to define their own tags to represent different types of information. The document discusses how XML documents form a tree structure with a root element and nested elements. It also covers XML syntax rules and parsing methods like SAX and DOM that can be used to read and manipulate XML documents.
This document discusses XML (eXtensible Markup Language). It defines XML, outlines its advantages over HTML and other data formats. These include being human-readable, industry supported, and allowing validation of data. The document also compares XML to HTML, describes XML technologies like DTDs, schemas, CSS, and XSLT. It explains how to parse and structure XML documents and the role of XML parsers.
XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is built on top of SGML and is an open standard developed by W3C. XML allows users to define their own tags to structure documents and is widely used for data exchange across different systems. Some key advantages of XML include being based on international standards, allowing user-defined tags, and having a hierarchical structure suitable for most document types.
The document provides an introduction to XML including its structure, elements, attributes, and namespaces. It discusses XML declarations, document type declarations, elements, attributes, character data, comments, processing instructions, content models, and the handling of whitespace in XML documents. It also covers XML namespaces, default and explicit namespace declarations, and the scope of namespaces. Finally, it discusses the structure of document type definitions including elements, attributes, entities, and directives.
eXtensible Markup Language (By Dr.Hatem Mohamed)MUFIX Community
XML is used to mark up data so it can be processed by computers, whereas HTML is used to mark up text for display to users. XML allows users to define their own tags, and elements in XML must have both a start and end tag. Well-formed XML requires proper nesting of elements and attributes enclosed in quotes.
This document provides an introduction to XML including its key characteristics and uses. XML allows for custom tags to store and transport data independently of how it is presented. It is an open standard developed by W3C. XML is commonly used to exchange information between organizations and systems, store and arrange customized data, and combine with style sheets to output desired formats. XML documents require a root element, closed tags, proper nesting, and quoted attribute values. The XML declaration specifies settings for parsing.
XML is a markup language that defines rules for encoding documents to be both human- and machine-readable. It allows users to define customized tagging structures for different types of documents. A DTD defines the structure and legal elements and attributes of an XML document, ensuring documents conform to the specified rules. XML documents can reference internal or external DTDs to validate document structure. Elements, attributes, and other syntax rules like closing tags help ensure XML documents are properly structured and readable.
SGML is a standard for specifying markup languages. It describes how to define document structure separately from presentation. XML is a simplified version of SGML used to store and transport data. Key differences between XML and HTML include XML focusing on data rather than presentation, being case sensitive, requiring closing tags, and preserving whitespace.
The document discusses XML (Extensible Markup Language), its structure and types of XML documents. It also describes two common XML parsers - DOM and SAX. DOM represents an XML document as a tree structure in memory, while SAX is an event-based parser that reads XML documents node-by-node without loading the entire document into memory. SAX typically uses less memory and is faster than DOM for large documents.
This document provides an overview of XML (eXtensible Markup Language). It defines XML as a meta language that allows users to create their own document markups. XML files are easy to read, unambiguous, extensible, and platform-independent. The document compares XML to HTML and discusses XML parsers like SAX and DOM. It also covers XML schemas, which provide structure to XML documents, and an example of Glade XML structure.
The document provides an overview of XML (Extensible Markup Language). It describes XML as a text-based markup language derived from SGML that uses tags to identify and organize data rather than display it like HTML. The document outlines key characteristics of XML including that it is extensible, carries data without presenting it, and is an open standard. It also provides examples of XML usage and describes the basic syntax and components of XML documents and elements.
XML Introduction,Syntax of XML,Well formed XML Documents,XML Document Structure,Document Type Definitions,XML Namespace,XML Schemas,DOM(Document Object Model)
This document provides an introduction to XML, including its structure, syntax, and uses. It defines XML as a markup language that provides a format for structured data. It describes XML elements, attributes, and how XML documents must follow specific syntax rules to be considered well-formed. The document also discusses Document Type Definitions (DTDs), XML namespaces, XML schemas, displaying XML with CSS, and transforming XML with XSLT.
XML is a markup language similar to HTML but designed to carry data rather than display it. XML allows users to define their own elements and tags to structure data. XML separates data from display, making it well-suited for transporting data between incompatible systems or updating dynamic web pages without changing HTML. CSS can be used to style XML documents for display.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
1. XML - Prepared by Sruthi JS - 26/09/2023
XML
Prepared by Sruthi JS
1
2. XML - Prepared by Sruthi JS - 26/09/2023
1 XML - Introduction
2 XML - Syntax
3 XML - Documents
4 XML - Declaration
5 XML - Tags
6 XML - Elements
7 XML - Attributes
8 XML - Comments
9 XML - Character Entities
10 XML - CDATA Sections
11 XML - WhiteSpaces
12 XML - Processing
13 XML - Encoding
14 XML - Validation
15 XML - DTDs
16 XML - Schemas
17 XML - Tree Structure
18 XML - DOM
19 XML - Namespaces
20 XML - Databases
21 XML - Viewers
22 XML - Editors
23 XML - Parsers
24 XML - Processors
3. XML - Prepared by Sruthi JS - 26/09/2023
1
XML - introduction
3
4. XML - Prepared by Sruthi JS - 26/09/2023
1. XML - Introduction
➔ XML stands for Extensible Markup Language.
➔ It is a text-based markup language derived from Standard Generalized Markup Language
(SGML).
Is XML a Programming Language?
➔ A programming language consists of grammar rules and its own vocabulary which is used to
create computer programs. These programs instruct the computer to perform specific tasks.
➔ XML does not qualify to be a programming language as it does not perform any computation or
algorithms. It is usually stored in a simple text file and is processed by special software that is
capable of interpreting XML.
Advantages of xml
➔ XML uses human, not computer, language. XML is readable and understandable, even by
novices, and no more difficult to code than HTML.
➔ XML is completely compatible with Java™ and 100% portable. Any application that can
process XML can use our information, regardless of platform.
➔ XML is extendable. Create our own tags, or use tags created by others, that use the natural
language of our domain, that have the attributes we need, and that makes sense to us and our
users. 4
5. XML - Prepared by Sruthi JS - 26/09/2023
2
XML - Syntax
5
6. XML - Prepared by Sruthi JS - 26/09/2023
2. XML - Syntax
➔ The following diagram depicts the syntax rules to write different types of
markup and text in an XML document.
6
7. XML - Prepared by Sruthi JS - 26/09/2023
3
XML - Documents
7
8. XML - Prepared by Sruthi JS - 26/09/2023
3. XML - Documents
➔ An XML document is a basic unit of XML information composed of elements and other markup in an
orderly package.
➔ An XML document can contains wide variety of data.
➔ The following image depicts the parts of XML document.
Document Prolog Section :
➔ Document Prolog comes at the top of the document, before the root element.
➔ This section contains −
◆ XML declaration
◆ Document type declaration
Document Elements Section :
➔ Document Elements are the building blocks of XML.
➔ These divide the document into a hierarchy of sections, each serving a specific purpose.
➔ We can separate a document into multiple sections so that they can be rendered differently, or used by
a search engine. The elements can be containers, with a combination of text and other elements. 8
9. XML - Prepared by Sruthi JS - 26/09/2023
4
XML - Declaration
9
10. XML - Prepared by Sruthi JS - 26/09/2023
4. XML - Declaration
➔ XML declaration contains details that prepare an XML processor to parse
the XML document.
➔ It is optional, but when used, it must appear in the first line of the XML
document.
➔ Syntax
➔ Rules
◆ If the XML declaration is present in the XML, it must be placed as the first line in the XML
document.
◆ If the XML declaration is included, it must contain version number attribute.
◆ The Parameter names and values are case-sensitive.
◆ The names are always in lowercase.
◆ The order of placing the parameters is important. The correct order is: version, encoding
and standalone.
◆ Either single or double quotes may be used.
◆ The XML declaration has no closing tag i.e. </?xml>
10
11. XML - Prepared by Sruthi JS - 26/09/2023
5
XML - Tags
11
12. XML - Prepared by Sruthi JS - 26/09/2023
5. XML - Tags
➔ XML tags form the foundation of XML.
➔ They define the scope of an element in XML.
➔ They can also be used to insert comments, declare settings required for
parsing the environment, and to insert special instructions.
➔ We can broadly categorize XML tags as follows −
◆ Start Tag : The beginning of every non-empty XML element is marked by a start-tag.
◆ End Tag : Every element that has a start tag should end with an end-tag.
◆ Empty Tag : The text that appears between start-tag and end-tag is called content. An
element which has no content is termed as empty.
➔ Rules
◆ XML tags are case-sensitive.
◆ XML tags must be closed in an appropriate order, i.e., an XML tag opened inside another
element must be closed before the outer element is closed.
12
13. XML - Prepared by Sruthi JS - 26/09/2023
6
XML - Elements
13
14. XML - Prepared by Sruthi JS - 26/09/2023
6. XML - Elements
➔ XML elements can be defined as building blocks of an XML.
➔ Elements can behave as containers to hold text, elements, attributes, media objects or all
of these.
➔ Each XML document contains one or more elements, the scope of which are either
delimited by start and end tags, or for empty elements, by an empty-element tag.
➔ Syntax
➔ Example
➔ Rules
◆ An element name can contain any alphanumeric characters. The only punctuation mark allowed in
names are the hyphen (-), underscore (_) and period (.).
◆ Names are case sensitive. For example, Address, address, and ADDRESS are different names.
◆ Start and end tags of an element must be identical.
◆ An element, which is a container, can contain text or elements as seen in the above example.
14
15. XML - Prepared by Sruthi JS - 26/09/2023
7
XML - Attributes
15
16. XML - Prepared by Sruthi JS - 26/09/2023
7. XML - Attributes
➔ Attributes are part of XML elements. An element can have multiple unique
attributes.
➔ Attribute gives more information about XML elements. To be more precise,
they define properties of elements. An XML attribute is always a name-
value pair.
➔ Rules
◆ An attribute name must not appear more than once in the same start-tag or empty-
element tag.
◆ An attribute must be declared in the Document Type Definition (DTD) using an Attribute-
List Declaration.
◆ Attribute values must not contain direct or indirect entity references to external entities.
◆ The replacement text of any entity referred to directly or indirectly in an attribute value
must not contain a less than sign (<)
16
17. XML - Prepared by Sruthi JS - 26/09/2023
7. XML - Attributes (cond…)
➔ Example
◆ Attributes are used to distinguish among elements of the same name, when we do not
want to create a new element for every situation. Hence, the use of an attribute can add a
little more detail in differentiating two or more similar elements.
17
18. XML - Prepared by Sruthi JS - 26/09/2023
8
XML - Comments
18
19. XML - Prepared by Sruthi JS - 26/09/2023
8. XML - Comments
➔ XML comments are similar to HTML comments. The comments are added
as notes or lines for understanding the purpose of an XML code.
➔ Comments can be used to include related links, information, and terms.
They are visible only in the source code; not in the XML code.
➔ Comments may appear anywhere in XML code.
➔ Rules
◆ Comments cannot appear before XML declaration.
◆ Comments may appear anywhere in a document.
◆ Comments must not appear within attribute values.
◆ Comments cannot be nested inside the other comments.
19
20. XML - Prepared by Sruthi JS - 26/09/2023
8. XML - Comments (cond…)
➔ Example
20
21. XML - Prepared by Sruthi JS - 26/09/2023
9
XML - Character
Entities
21
22. XML - Prepared by Sruthi JS - 26/09/2023
9. XML - Character Entities
➔ There are some characters or symbols which are not available to be typed
directly from the keyboard or reserved for their use, which cannot be used
as content in XML code. Character Entities can be used to display those
symbols/special characters.
➔ Types of Character Entities
◆ Predefined Character Entities
◆ Numbered Character Entities
◆ Named Character Entities
22
23. XML - Prepared by Sruthi JS - 26/09/2023
10
XML - CDATA
Sections
23
24. XML - Prepared by Sruthi JS - 26/09/2023
10. XML - CDATA Sections
➔ The term CDATA means, Character Data.
➔ CDATA is defined as blocks of text that are not parsed by the parser, but
are otherwise recognized as markup.
➔ The predefined entities such as <, >, and & require typing and
are generally difficult to read in the markup. In such cases, CDATA
section can be used.
➔ By using CDATA section, we are commanding the parser that the
particular section of the document contains no markup and should be
treated as regular text.
➔ Rules
◆ CDATA cannot contain the string "]]>" anywhere in the XML document.
◆ Nesting is not allowed in CDATA section.
➔ Example
24
25. XML - Prepared by Sruthi JS - 26/09/2023
11
XML - WhiteSpaces
25
26. XML - Prepared by Sruthi JS - 26/09/2023
11. XML - WhiteSpaces
➔ Whitespace is a collection of spaces, tabs, and newlines. They are
generally used to make a document more readable.
➔ XML document contains two types of whitespaces -
◆ Significant Whitespace
● A significant Whitespace occurs within the element which contains text and markup
present together.
◆ Insignificant Whitespace.
● Insignificant whitespace means the space where only element content is allowed.
➔ A special attribute named xml:space may be attached to an element. This
indicates that whitespace should not be removed for that element by the
application. We can set this attribute to default or preserve.
◆ The value default signals that the default whitespace processing modes of an application
are acceptable for this element.
◆ The value preserve indicates the application to preserve all the whitespaces.
26
27. XML - Prepared by Sruthi JS - 26/09/2023
12
XML - Processing
27
28. XML - Prepared by Sruthi JS - 26/09/2023
12. XML - Processing
➔ Processing instructions (PIs) allow documents to contain instructions for
applications. PIs are not part of the character data of the document, but
MUST be passed through to the application.
➔ Processing instructions (PIs) can be used to pass information to
applications. PIs can appear anywhere in the document outside the
markup. They can appear in the prolog, including the document type
definition (DTD), in textual content, or after the document.
➔ Syntax
➔ Example
◆ Here, the target is xml-stylesheet. href="tutorialspointstyle.css" and type="text/css" are
data or instructions the target application will use at the time of processing the given XML
document.
◆ In this case, a browser recognizes the target by indicating that the XML should be
transformed before being shown; the first attribute states that the type of the transform is
XSL and the second attribute points to its location. 28
29. XML - Prepared by Sruthi JS - 26/09/2023
13
XML - Encoding
29
30. XML - Prepared by Sruthi JS - 26/09/2023
13. XML - Encoding
➔ Encoding is the process of converting unicode characters into their
equivalent binary representation.
➔ When the XML processor reads an XML document, it encodes the
document depending on the type of encoding. Hence, we need to specify
the type of encoding in the XML declaration.
➔ Encoding Types
● UTF-8
● UTF-16
◆ UTF stands for UCS Transformation Format, and UCS itself means Universal Character
Set.
30
31. XML - Prepared by Sruthi JS - 26/09/2023
14
XML - Validation
31
32. XML - Prepared by Sruthi JS - 26/09/2023
14. XML - Validation
➔ Validation is a process by which an XML document is validated. An XML
document is said to be valid if its contents match with the elements,
attributes and associated document type declaration(DTD), and if the
document complies with the constraints expressed in it.
➔ Validation is dealt in two ways by the XML parser. They are −
◆ Well-formed XML document
● A well-formed document in XML is a document that "adheres to the syntax rules
specified by the XML 1.0 specification in that it must satisfy both physical and
logical structures"
◆ Valid XML document
● If an XML document is well-formed and has an associated Document Type
Declaration (DTD), then it is said to be a valid XML document.
32
33. XML - Prepared by Sruthi JS - 26/09/2023
15
XML - DTDs
33
34. XML - Prepared by Sruthi JS - 26/09/2023
15. XML - DTDs
➔ The XML Document Type Declaration, commonly known as DTD, is a way
to describe XML language precisely.
➔ DTDs check vocabulary and validity of the structure of XML documents
against grammatical rules of appropriate XML language.
➔ An XML DTD can be either specified inside the document, or it can be
kept in a separate document.
➔ Syntax
34
35. XML - Prepared by Sruthi JS - 26/09/2023
15. XML - DTDs
◆ The DTD starts with <!DOCTYPE delimiter.
◆ An element tells the parser to parse the document from the specified root element.
◆ DTD identifier is an identifier for the document type definition, which may be the path to
a file on the system or URL to a file on the internet. If the DTD is pointing to external
path, it is called External Subset.
◆ The square brackets [ ] enclose an optional list of entity declarations called Internal
Subset.
35
36. XML - Prepared by Sruthi JS - 26/09/2023
16
XML - Schemas
36
37. XML - Prepared by Sruthi JS - 26/09/2023
16. XML - Schemas
➔ XML Schema is commonly known as XML Schema Definition (XSD).
➔ It is used to describe and validate the structure and the content of XML
data.
➔ XML schema defines the elements, attributes and data types.
➔ Schema element supports Namespaces.
➔ It is similar to a database schema that describes the data in a database.
37
38. XML - Prepared by Sruthi JS - 26/09/2023
17
XML - Tree
Structure
38
39. XML - Prepared by Sruthi JS - 26/09/2023
17. XML - Tree Structure
➔ An XML document is always descriptive. The tree structure is often
referred to as XML Tree and plays an important role to describe any XML
document easily.
➔ The tree structure contains root (parent) elements, child elements and so
on. By using tree structure, we can get to know all succeeding branches
and sub-branches starting from the root. The parsing starts at the root,
then moves down the first branch to an element, take the first branch
from there, and so on to the leaf nodes.
39
40. XML - Prepared by Sruthi JS - 26/09/2023
17. XML - Tree Structure
➔ Example
40
41. XML - Prepared by Sruthi JS - 26/09/2023
18
XML - DOM
41
42. XML - Prepared by Sruthi JS - 26/09/2023
18. XML - DOM
➔ The Document Object Model (DOM) is the foundation of XML. XML
documents have a hierarchy of informational units called nodes; DOM is a
way of describing those nodes and the relationships between them.
➔ A DOM document is a collection of nodes or pieces of information
organized in a hierarchy. This hierarchy allows a developer to navigate
through the tree looking for specific information. Because it is based on a
hierarchy of information, the DOM is said to be tree based.
➔ The XML DOM, on the other hand, also provides an API that allows a
developer to add, edit, move, or remove nodes in the tree at any point in
order to create an application.
42
43. XML - Prepared by Sruthi JS - 26/09/2023
19
XML - Namespaces
43
44. XML - Prepared by Sruthi JS - 26/09/2023
19. XML - Namespaces
➔ A Namespace is a set of unique names. Namespace is a mechanisms by
which element and attribute name can be assigned to a group. The
Namespace is identified by URI(Uniform Resource Identifiers).
➔ Namespace Declaration
◆ The Namespace starts with the keyword xmlns.
◆ The word name is the Namespace prefix.
◆ The URL is the Namespace identifier.
44
45. XML - Prepared by Sruthi JS - 26/09/2023
20
XML - Databases
45
46. XML - Prepared by Sruthi JS - 26/09/2023
20. XML - Databases
➔ XML Database is used to store huge amount of information in the XML
format. As the use of XML is increasing in every field, it is required to
have a secured place to store the XML documents. The data stored in the
database can be queried using XQuery, serialized, and exported into a
desired format.
➔ There are two major types of XML databases −
◆ XML- enabled
● XML enabled database is nothing but the extension provided for the conversion of
XML document.
◆ Native XML (NXD)
● Native XML database is based on the container rather than table format. It can store
large amount of XML document and data. Native XML database is queried by the
XPath-expressions.
46
47. XML - Prepared by Sruthi JS - 26/09/2023
21
XML - Viewers
47
48. XML - Prepared by Sruthi JS - 26/09/2023
21. XML - Viewers
➔ An XML document can be viewed using a simple text editor or any
browser.
➔ Most of the major browsers supports XML. XML files can be opened in the
browser by just double-clicking the XML document (if it is a local file) or
by typing the URL path in the address bar (if the file is located on the
server), in the same way as we open other files in the browser.
➔ XML files are saved with a ".xml" extension.
48
49. XML - Prepared by Sruthi JS - 26/09/2023
22
XML - Editors
49
50. XML - Prepared by Sruthi JS - 26/09/2023
22. XML - Editors
➔ XML Editor is a markup language editor. The XML documents can be
edited or created using existing editors such as Notepad, WordPad, or any
similar text editor.
➔ Open Source XML Editors
◆ Online XML Editor
◆ Xerlin
◆ CAM - Content Assembly Mechanism
50
51. XML - Prepared by Sruthi JS - 26/09/2023
23
XML - Parsers
51
52. XML - Prepared by Sruthi JS - 26/09/2023
23. XML - Parsers
➔ XML parser is a software library or a package that provides interface for
client applications to work with XML documents. It checks for proper
format of the XML document and may also validate the XML documents.
Modern day browsers have built-in XML parsers.
➔ Following diagram shows how XML parser interacts with XML document
52
53. XML - Prepared by Sruthi JS - 26/09/2023
24
XML - Processors
53
54. XML - Prepared by Sruthi JS - 26/09/2023
24. XML - Processors
➔ When a software program reads an XML document and takes actions
accordingly, this is called processing the XML.
➔ Any program that can read and process XML documents is known as an
XML processor.
➔ An XML processor reads the XML file and turns it into in-memory
structures that the rest of the program can access.
➔ The most fundamental XML processor reads an XML document and
converts it into an internal representation for other programs or
subroutines to use.
➔ This is called a parser, and it is an important component of every XML
processing program.
54