• Title/Summary/Keyword: 데이터베이스 성능

Search Result 1,858, Processing Time 0.027 seconds

A Concurrency Control Method for Data Broadcasting in Mobile Computing Environment (이동 컴퓨팅 환경에서 데이타 방송을 위한 동시성 제어 기법)

  • 윤혜숙;김영국
    • Journal of KIISE:Databases
    • /
    • v.31 no.2
    • /
    • pp.140-149
    • /
    • 2004
  • Data broadcast has received much attention as a very efficient method for disseminating data items in mobile environment with large number of mobile clients. In this approach, a database server periodically and continuously broadcasts data items through wireless channels and clients perform read-only transactions by accessing necessary data items from the air. While broadcasting, the server must also process update transactions on the database, which raises an obstacle for client's accessing consistent data. In this research, we propose a new algorithm SCDSC(Serialization Checking with DirtySet on Commit) which is an alternative for solving the concurrency control problem efficiently. The SCDSC is a kind of optimistic concurrency control in that a client checks the consistency of data using a DirtySet as a part of data broadcast when it commits its transaction. In each broadcast cycle, the server updates and disseminates the DirtySet with newly changed data items for last few cycles in the sliding window approach. We perform an analysis and a simulation study to evaluate the performance of our SCDSC algorithm in terms of data consistency and data currency.

Design and Implementation of Trajectory Riving Tree for Combined Queries in Moving Object Databases (이동체 데이타베이스에서 복합 질의를 위한 궤적 분할 트리의 설계 및 구현)

  • 임덕성;전봉기;홍봉희;조대수
    • Journal of KIISE:Databases
    • /
    • v.31 no.2
    • /
    • pp.150-162
    • /
    • 2004
  • Moving objects have characteristics that they change continuously their positions over time. The movement of moving objects should be stored on trajectories for processing past queries. Moving objects databases need to provide spatio-temporal index for handling moving objects queries like combined queries. Combined queries consist of a range query selecting trajectories within a specific range and a trajectory query extracting to parts of the whole trajectory. Access methods showing good performance in range queries have a shortcoming that the cost of processing trajectory Queries is high. On the other hand, trajectory-based index schemes like the TB-tree are not suitable for range queries because of high overlaps between index nodes. This paper proposes new TR(Trajectory Riving)-tree which is revised for efficiently processing the combined queries. This index scheme has several features like the trajectory preservation, the increase of the capacity of leaf nodes, and the logical trajectory riving in order to reduce dead space and high overlap between bounding boxes of nodes. In our Performance study, the number of node access for combined queries in TR-tree is about 25% less than the STR-tree and the TB-tree.

An Algorithm for reducing the search time of Frequent Items (빈발 항목의 탐색 시간을 단축하기 위한 알고리즘)

  • Yun, So-Young;Youn, Sung-Dae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.147-156
    • /
    • 2011
  • With the increasing utility of the recent information system, the methods to pick up necessary products rapidly by using a lot of data has been studied. Association rule search methods to find hidden patterns has been drawing much attention, and the Apriori algorithm is a major method. However, the Apriori algorithm increases search time due to its repeated scans. This paper proposes an algorithm to reduce searching time of frequent items. The proposed algorithm creates matrix using transaction database and search for frequent items using the mean number of items of transactions at matrix and a defined minimum support. The mean number of items of transactions is used to reduce the number of transactions, and the minimum support to cut down on items. The performance of the proposed algorithm is assessed by the comparison of search time and precision with existing algorithms. The findings from this study indicated that the proposed algorithm has been searched more quickly and efficiently when extracting final frequent items, compared to existing Apriori and Matrix algorithm.

An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems (실시간 네트워크 침입탐지 시스템을 위한 아웃라이어 클러스터 검출 기법)

  • Chang, Jae-Young;Park, Jong-Myoung;Kim, Han-Joon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.43-53
    • /
    • 2007
  • Intrusion detection system(IDS) has recently evolved while combining signature-based detection approach with anomaly detection approach. Although signature-based IDS tools have been commonly used by utilizing machine learning algorithms, they only detect network intrusions with already known patterns, Ideal IDS tools should always keep the signature database of your detection system up-to-date. The system needs to generate the signatures to detect new possible attacks while monitoring and analyzing incoming network data. In this paper, we propose a new outlier cluster detection algorithm with density (or influence) function, Our method assumes that an outlier is a kind of cluster with similar instances instead of a single object in the context of network intrusion, Through extensive experiments using KDD 1999 Cup Intrusion Detection dataset. we show that the proposed method outperform the conventional outlier detection method using Euclidean distance function, specially when attacks occurs frequently.

  • PDF

3D Object Modeling for Laser Radar Simulation (레이저레이더 시뮬레이션을 위한 3차원 객체 모델링)

  • Kim, Geun-Han;Jun, Chul-Min
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.2
    • /
    • pp.57-65
    • /
    • 2008
  • The improvement of the performance in laser radar simulation requires fast retrievals of the spatial locations and attributes of objects in response to the laser signals of the simulators. Since the data used in simulation are complex 3D objects such as terrain, buildings and vehicles, and are of large sizes, commonly used 3D modeling tools are not suitable for this use. We proposed a method to store such 3D objects in a database, perform required queries and integrate with visualization tools. We showed the processes for the data modeling based on 3D topological concepts and then building a spatial DBMS. Also, we illustrated the process for accessing and visualizing the stored data using VRML and performed test computations using some laser signal data. With further enhancement on data modeling and LOD problems in visualization, the proposed method will be practically applied in different situations including laser simulation.

  • PDF

Minimizing Redundant Route Nodes in USN by Integrating Spatially Weighted Parameters: Case Study for University Campus (가중치가 부여된 공간변수에 의거하여 USN 루트노드 최소화 방안 -대학 캠퍼스를 사례로-)

  • Kim, Jin-Taek;Um, Jung-Sup
    • Journal of the Korean Geographical Society
    • /
    • v.45 no.6
    • /
    • pp.788-805
    • /
    • 2010
  • The present USN (Ubiquitous Sensor Networks) node deployment practices have many limitations in terms of positional connectivity. The aim of this research was to minimize a redundancy of USN route nodes, by integrating spatially weighted parameters such as visibility, proximity to cell center, road density, building density and cell overlapping ratio into a comprehensive GIS database. This spatially weighted approach made it possible to reduce the number of route nodes (11) required in the study site as compared to that of the grid network method (24). The field test for RSSI (Received Signal Strength Indicator) indicates that the spatially weighted deployment could comply with the quality assurance standard for node connectivity, and that reduced route nodes do not show a significant degree of signal fluctuation for different site conditions. This study demonstrated that the spatially weighted deployment can be used to minimize a redundancy of USN route nodes in a routine manner, and the quantitative evidence removing a redundancy of USN route nodes could be utilized as major tools to ensure the strong signal in the USN, that is frequently encountered in real applications.

Place Modeling and Recognition using Distribution of Scale Invariant Features (스케일 불변 특징들의 분포를 이용한 장소의 모델링 및 인식)

  • Hu, Yi;Shin, Bum-Joo;Lee, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.51-58
    • /
    • 2008
  • In this paper, we propose a place modeling based on the distribution of scale-invariant features, and a place recognition method that recognizes places by comparing the place model in a database with the extracted features from input data. The proposed method is based on the assumption that every place can be represented by unique feature distributions that are distinguishable from others. The proposed method uses global information of each place where one place is represented by one distribution model. Therefore, the main contribution of the proposed method is that the time cost corresponding to the increase of the number of places grows linearly without increasing exponentially. For the performance evaluation of the proposed method, the different number of frames and the different number of features are used, respectively. Empirical results illustrate that our approach achieves better performance in space and time cost comparing to other approaches. We expect that the Proposed method is applicable to many ubiquitous systems such as robot navigation, vision system for blind people, wearable computing, and so on.

  • PDF

AHP-Based Recommendation System of Mobile Games Reflecting User Preferences (사용자 선호도를 반영한 AHP 기반 모바일 게임 추천 시스템)

  • Oh, Jae-Taek;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.427-433
    • /
    • 2017
  • Mobile game users tend to value the opinions from their friends or SNS when making a decision on which game to play. This is because they are not satisfied with the information on suggestions provided by the conventional mobile game recommendation systems. In this research, we made a system that can reflect user preference directly by using Analytic Hierarchy Process(AHP). In the system, the hierarchy of AHP is composed of final goal(Level 1), evaluation basis(Level 2) and alternative(Level 3). And the system is made up of an input module, an AHP processing module, a recommendation module and database. Through comparison analysis with two conventional systems to test the performance of the system, we could find that the system got more higher satisfaction than the other systems.

A Selectivity Estimation Technique for Current Query of Moving Objects (이동객체를 위한 현재 질의 선택율 추정 기법)

  • Chi, Jeong-Hee;Ryu, Keun-Ho;Jeong, Doo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.87-96
    • /
    • 2006
  • Selectivity estimation is one of the query optimization techniques. It is difficult for the previous selectivity estimation techniques for moving objects to apply the position change of moving objects to synopsis. Therefore, they result in much error when estimating selectivity for queries, because they are based on the extended spatial synopsis which does not consider the property of the moving objects. In order to reduce the estimation error, the existing techniques should often rebuild the synopsis. Consequently problem occurs, that is, the whole database should be read frequently. In this paper, we proposed a moving object histogram method based on quad tree to develop a selectivity estimation technique for moving object queries. We then analyzed the performance of the proposed method through the implementation and evaluation of the proposed method. Our method can be used in various location management systems such as vehicle location tracking systems, location based services, telematics services, emergency rescue service, etc in which the location information of moving objects changes over time.

  • PDF

Study on Post-Fire Safe Shutdown Analysis using an Imaginary Plant for Training (교육용 가상원전을 이용한 화재안전정지분석에 관한 연구)

  • Lee, Jaiho;Kim, Jin Hong
    • Fire Science and Engineering
    • /
    • v.32 no.1
    • /
    • pp.57-65
    • /
    • 2018
  • In this study, a post-fire safe shutdown analysis (PFSSA) including multiple spurious operation (MSO) treatments for cables was conducted with an imaginary nuclear power plant for training using a deterministic fire analysis code. The imaginary nuclear power plant for the training consisted of a reactor containment building and an auxiliary building, including a total of 22 fire areas. The equipment including valves, pumps, emergency diesel generators, switch gears, motor control centers, and logic controllers were located in each fire area of the imaginary plant. It was assumed that each equipment is connected with two cables and that each cable passes through the fire areas along the cable trays. A database containing the information on the equipment and cables for the imaginary plant was constructed for the fire area analysis. The fire area analysis was performed for several assumed MSO scenarios, equipment logics, and cable logics. A mitigation measure using a three hour rated wrap was applied to the failed cables and cable trays after the fire area analysis.