• Title/Summary/Keyword: 사용자 문서

Search Result 1,728, Processing Time 0.034 seconds

The practical use with online database program of cosmetics' raw materials. (화장품원료 온라인 데이터베이스 구축과 활용)

  • Jeon Sang-hoon;Kim Ju-Duck
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.29 no.2 s.43
    • /
    • pp.233-250
    • /
    • 2003
  • We often use the KCID(Korean Cosmetic Ingredient Dictionary) and ICID(International Cosmetic Ingredient Dictionary) within cosmetics research and within their export and import. so far, we do not have a database of a cosmetics' raw materials. Because of this, we consume a lot of time to find the raw material data that is needed. This study constructs a cosmetics' raw material database and develops the program to retrieve it. We used a Linux machine as the equipment for this study and we used Apache web server, MySQL database server and PHP as the tools of this study. 11,817 kinds of raw materials data were registered as ICID, 866 kinds of raw materials data were registered as KCID and 28,008 kinds of raw materials data with registered trade name into the database. Also, The database was composed of the database of the association form. The database of the online form could ultimately reduce the task time as soon as it did its purpose. The product of this study can become a good basis of data to reconfigure. In the future, it can become a good database in relation with different databases.

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.

Digital Holographic Security Identification System (디지털 홀로그래픽 보안 인증 시스템)

  • Kim, Jung-Hoi;Kim, Nam;Jeon, Seok-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.89-98
    • /
    • 2004
  • In this paper, we implement a digital holographic security card system that combines digital holographic memory using random phase encoded reference beams with electrical biometrics. Digitally encoded data including a document, a picture of face, and a fingerprint are recorded by multiplexing of holographic memory. A random phase mask encoding reference beams are used as a decoded key to protect illegal counterfeit. As a result, we can achieve a raw BER of 3.6${\times}$10-4 and shift selectivity of 4${\mu}{\textrm}{m}$ using the 2D random phase mask. Also, we develop a recording pattern and image processing which are suitable for a low cost reader without a position sensing photo-detector for real time data extraction and remove danger of fraud from unauthorized person by comparing the reconstructed holographic data with the live fingerprint data.

An XQuery Processing Engine for Real-Time Sensor Data in Ubiquitous Environments (유비쿼터스 환경에서 실시간 센서 데이터를 위한 XML 질의언어 처리 엔진)

  • Yim, Hyung-Jun;Kim, Jae-Hoon;Lee, Kyu-Chul
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.1-19
    • /
    • 2010
  • Recently, it is necessary to process real time sensor data, which is generated from ubiquitous environments. Data, which are written by XML, are small, but, large volumes of data. Therefore, weneed to use an efficient method for processing a large amount of it. An XQuery has two types for sensor data: one is to get sensor identification and value from sensor data; the other is restructuring for user's convenience. Existing XQuery engines don't have efficient method for batch processing of sensor data. This paper proposed the twig query processing over reverse path summary, and we developed and applied restructuring batch processing method for real time processing of a large amount of sensor data. Finally, we do performance evaluation using XMark and RFID EPC data, and comparison analysis with MonetDB/XQuery and Berkeley DB XML.

XSTAR: XQuery to SQL Translation Algorithms on RDBMS (XSTAR: XML 질의의 SQL 변환 알고리즘)

  • Hong, Dong-Kweon;Jung, Min-Kyoung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.3
    • /
    • pp.430-433
    • /
    • 2007
  • There have been several researches to manipulate XML Queries efficiently since XML has been accepted in many areas. Among the many of the researches majority of them adopt relational databases as underlying systems because relational model which is used the most widely for managing large data efficiently. In this paper we develop XQuery to SQL Translation Algorithms called XSTAR that can efficiently handle XPath, XQuery FLWORs with nested iteration expressions, element constructors and keywords retrieval on relational database as well as constructing XML fragments from the transformed SQL results. The entire algorithms mentioned in XSTAR have been implemented as the XQuery processor engine in XML management system, XPERT, and we can test and confirm it's prototype from "http ://dblab.kmu.ac.kr/project.jsp".

The Dessing and Implementation of the SPR/SCR Management System for Reliability Data Collection and Analysis (신뢰성 데이터 수집 및 분석을 위한 SPR/SCR 관리 시스템의 설계 및 구현)

  • Lee, Chang-Hui;Han, Pan-Am
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.409-429
    • /
    • 1997
  • Problems encountered during software development or pteration nay result from defects in the software,ghrdware,or their oterations.Because of their diversity,the determination of the sources of a problem and its corrective adtion requires a centrally controlled system for monitoring provlems and detemining systematiccauses. In the paper,the SPR/SCR management system was developed and applied for the collection and analysis of the error data,process data and product data delected by each phasd in SDLC.There are four objectibes in the SPR/SCR management system.The first is to assure that software errors are documented,corrected,and vot forgottem. The second is to assure that SPR.are assessed for their validity.The third is to provide feedback on SPR status to the developer and the user.The fourth is ot prvide data for measuring and prediciting sofware quality and reliability.These goals could be satisfied by the application of the SPR/SCR mangement system.Also,the accomplishment rate of software reliability,criterion of test completion,estimation of release time, efficient development and management can be reflected by applying the SPR/SCR management system.

  • PDF

Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table (가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식)

  • Song, You-Jin;Kim, Jin-Seog
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.27-36
    • /
    • 2009
  • The leaking of personal information is mostly occurred by internal users. The confidential information such as credit card number can be disclosed or modified by system manager easily. The secure storaging and managing scheme for sensitive data of individual and enterprise is required for distributed data management. The manager owning private data is needed to have a weight which is a right to disclose a private data. For deciding a weight, it is required that system is able to designate the level of user's right. In this paper, we propose the new algorithm named digit-independent algorithm. And we propose a new data management scheme of gathering and processing the data based on digit-independent algorithm. Our sharing and recovering scheme have the efficient computation operation for managing a large quantity of data using weight table. The proposed scheme is able to use for secure e-business data management and storage in ubiquitous computing environment.

k-Bitmap Clustering Method for XML Data based on Relational DBMS (관계형 DBMS 기반의 XML 데이터를 위한 k-비트맵 클러스터링 기법)

  • Lee, Bum-Suk;Hwang, Byung-Yeon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.845-850
    • /
    • 2009
  • Use of XML data has been increased with growth of Web 2.0 environment. XML is recognized its advantages by using based technology of RSS or ATOM for transferring information from blogs and news feed. Bitmap clustering is a method to keep index in main memory based on Relational DBMS, and which performed better than the other XML indexing methods during the evaluation. Existing method generates too many clusters, and it causes deterioration of result of searching quality. This paper proposes k-Bitmap clustering method that can generate user defined k clusters to solve above-mentioned problem. The proposed method also keeps additional inverted index for searching excluded terms from representative bits of k-Bitmap. We performed evaluation and the result shows that the users can control the number of clusters. Also our method has high recall value in single term search, and it guarantees the searching result includes all related documents for its query with keeping two indices.

A Study on Ontology Instance Generation Using Keywords (키워드를 활용한 온톨로지 인스턴스 생성에 관한 연구)

  • Han, Kwang-Rok;Kang, Hyun-Min;Sohn, Surg-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.1-11
    • /
    • 2010
  • The success of semantic web depends largely on the semantic annotation which systematizes knowledge for the construction and production of ontology. Therefore, the efficiency of semantic annotation is very important in order to change many knowledge expressions and generate into ontology instances. In this paper, we presents a generation system of rule-based ontology instances which are produced accurately and efficiently via semantic annotation in conventional web sites. In conventional studies, the manual process is necessary for finding relevant information, comparing it with ontology, and entering information. We propose a new method that manages keyword data regarding extracted information and rule information separately. Thus, it is quite practical to extract information efficiently from various web documents by adding a small number of keywords and rules. The proposed method shows the possibility of ontology instance generation which reuses the rules and keywords from the various websites.

A Study on the Development of Intelligent Contents and Interactive Storytelling System (지능형콘텐츠 개발과 인터렉티브 스토리텔링 시스템 연구)

  • Lee, Eun Ryoung;Kim, Kio Chung
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.423-430
    • /
    • 2013
  • The development of information technology introduced digital contents and Social Network Services(SNS), and allowed the virtual transaction and communication between users called "the experience knowledge" advanced from "the objective knowledge." This paper will analyze interactive storytelling system creating different types of stories on narrative genre about family history, personal history and so on. Through analysis on narrative interviews, direct observations, documentations and visual records, contents about CEO story, corporate story, family story and especially family history will be categorized into sampleDB and informationDB. Accumulated contents will allow the user to increase the value and usage of the contents through interactive storytelling system by restructuring the contents on family history. This research has developed writing tool data model using different digital contents such as texts, images and pictures to encourage open communications between first generations and third generations in Korea. Furthermore, researched about connected system on interactive storytelling creation device using various genre of family story that has been data based.