Intelligent Information System EasyDB
Students Name: Horon Vladyslav Mykhailovych
Qualification Level: magister
Speciality: Information Systems and Technologies
Institute: Institute of Computer Science and Information Technologies
Mode of Study: full
Academic Year: 2024-2025 н.р.
Language of Defence: ukrainian
Abstract: Nowadays, the amount of data is rapidly increasing every second. Even an ordinary, simple site can contain terabytes of information. Data is also stored on flash drives, disks, servers and other physical media. As the amount of data increases, so does the demand for workers who can work with this data[1]. Data engineers are one of the most needed positions in companies. Now employees who know SQL and know how to work with data are highly valued. Also, this position is very well paid. But what should companies do that need people who will work with data, but they do not have the time and money to find such employees. There are often situations where employees have been working all the time, for example in Excel, but over time the company needs to work with databases and for this they need to look for an employee who knows SQL. And what to do with old employees in this case? This is exactly the problem, and its solution will be described in this master’s thesis. In the first chapter, the history of the development of data warehouses is considered. It was described as Edgar F. Codd came up with the relational data model, and by doing so, he turned the very understanding of databases on its head. After the story, the very concept of data warehouses was considered, and their qualifications were described. These qualifications include: "Relational databases", "NoSQL databases", "Hierarchical databases", "Network databases", "Object-oriented databases", "multi-model databases". This section also described options for how to protect the database. The main methods of protection are access control, encryption, auditing and secure authentication of users. Access control will reduce the risk that a fraudster will be able to access important data, and it will also reduce the chances that an inexperienced employee will delete important data because they will only have access to what they need to do their job. Encryption will provide protection in transit or at rest. And even if an attacker gets the data, he will not be able to decrypt it without the key. Monitoring and logging will allow you to detect any violations and improve protection, revealing weak points in the system. It will also make it easier to find the culprit of the problem. And it is also a good option to create backups to be able to return the system to the desired state if something goes out of control. And in the last point of this section, we looked at several competitors and described their pros and cons, comparing them with our application. We chose Excel, Metabase and Microsoft Office Access as competitors. In the second section, the system was analyzed and the main idea of the EasyDB intelligent information system was described. It also describes how the system will help companies and employees, how it will facilitate and speed up work with data. And the main goal of the system was also described. In addition, in this section, a tree of goals was built and the criteria by which the system was evaluated were formed. These criteria include relevance, reliability, convenience, safety, speed of operation, quality and reliability. A qualitative characteristic was given to each criterion and matrixes of comparison of criteria and comparison of alternatives were constructed. And at the end of this point, step-by-step diagrams were constructed and described. 6 diagrams were created, including: "Use case diagram", "Class diagram", "Sequence diagram", "State diagram", "Activity diagram" and "Component diagram". All users, the actions they can perform in the system and how the system processes these steps were described. In the third chapter, the methods of solving the problem were considered and described. The reason why the information system was created was also described. The advantages of the system were considered. These advantages include clear and simple interface, automatic generation of SQL queries to the database, management of user roles. Another item in this section was a description of the tools that were used to create the information system. The list of these tools includes: “React”, “Electron”, “CSS”, “Bootstrap”, “PostgreSQL”, “Heroku”. The fourth, last, section described the implementation of the information system itself. The database that was created for the system was described. This data store contains the following tables: “administrators”, “users”, “roles”, “users_role”, “connections”, “connections_administrators”, “connections_users”. The columns themselves, which are in these tables, and the relationship between these tables were also described. All the steps of using the application were described in the next subsection. Screenshots showing the EasyDB intelligent information system were also presented and described. And the capabilities of the system and how it protects user data were described. The object of research is the process of working with data in various tools, as well as how this work can be translated into SQL queries. Scope of research is the means that can be used to achieve the set goal, namely the development of such an intelligent information system. The goal of research is to create an information system that will help employees who do not know SQL. The result of the research is an analysis of the systems used to work with data, highlighting their pros and cons. Also, the result is the development of the intelligent information system EasyDB. Keywords: databases, information system, SQL, data, database security. References. Davenport T. Big Data at Work: Dispelling the Myths, Uncovering the Opportunities : Scientific journal / T. Davenport – Boston : Publishing House “ Harvard Business Review Press”, 2014. – P. 73