• Title/Summary/Keyword: 웹정보시스템

Search Result 5,833, Processing Time 0.027 seconds

Automated-Database Tuning System With Knowledge-based Reasoning Engine (지식 기반 추론 엔진을 이용한 자동화된 데이터베이스 튜닝 시스템)

  • Gang, Seung-Seok;Lee, Dong-Joo;Jeong, Ok-Ran;Lee, Sang-Goo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06a
    • /
    • pp.17-18
    • /
    • 2007
  • 데이터베이스 튜닝은 일반적으로 데이터베이스 어플리케이션을 "좀 더 빠르게" 실행하게 하는 일련의 활동을 뜻한다[1]. 데이터베이스 관리자가 튜닝에 필요한 주먹구구식 룰(Rule of thumb)들을 모두 파악 하고 상황에 맞추어 적용하는 것은 비싼 비용과 오랜 시간을 요구한다. 그렇게 때문에 서로 다른 어플 리케이션들이 맞물려 있는 복잡한 서비스는 필수적으로 자동화된 데이터베이스 성능 관리와 튜닝을 필 요로 한다. 본 논문에서는 이를 해결하기 위하여 지식 도매인(Knowledge Domain)을 기초로 한 자동화 된 데이터베이스 튜닝 원칙(Tuning Principle)을 제시하는 시스템을 제안한다. 각각의 데이터베이스 튜닝 이론들은 지식 도매인의 지식으로 활용되며, 성능에 영향을 미치는 요소들을 개체(Object)와 콘셉트 (Concept)로 구성하고 추론 시스템을 통해 튜닝 원칙을 추론하여 쉽고 빠르게 현재 상황에 맞는 튜닝 방법론을 적용시킬 수 있다. 자동화된 데이터베이스 튜닝에 대해 여러 분야에 걸쳐 학문적인 연구가 이루어지고 있다. 그 예로써 Microsoft의 AutoAdmin Project[2], Oracle의 SQL 튜닝 아키텍처[3], COLT[4], DBA Companion[5], SQUASH[6] 등을 들 수 있다. 이러한 최적화 기법들을 각각의 기능적인 방법론에 따라 다시 분류하면 크게 Design Tuning, Logical Structure Tuning, Sentence Tuning, SQL Tuning, Server Tuning, System/Network Tuning으로 나누어 볼 수 있다. 이 중 SQL Tuning 등은 수치적으로 결정되어 이미 존재하는 정보를 이용하기 때문에 구조화된 모델로 표현하기 쉽고 사용자의 다양한 요구에 의해 변화하는 조건들을 수용하기 쉽기 때문에 이에 중점을 두고 성능 문제를 해결하는 데 초점을 맞추었다. 데이터베이스 시스템의 일련의 처리 과정에 따라 DBMS를 구성하는 개체들과 속성, 그리고 연관 관계들이 모델링된다. 데이터베이스 시스템은 Application / Query / DBMS Level의 3개 레벨에 따라 구조화되며, 본 논문에서는 개체, 속성, 연관 관계 및 데이터베이스 튜닝에 사용되는 Rule of thumb들을 분석하여 튜닝 원칙을 포함한 지식의 형태로 변환하였다. 튜닝 원칙은 데이터베이스 시스템에서 발생하는 문제를 해결할 수 있게 하는 일종의 황금률로써 지식 도매인의 바탕이 되는 사실(Fact)과 룰(Rule) 로써 표현된다. Fact는 모델링된 시스템을 지식 도매인의 하나의 지식 개체로 표현하는 방식이고, Rule 은 Fact에 기반을 두어 튜닝 원칙을 지식의 형태로 표현한 것이다. Rule은 다시 시스템 모델링을 통해 사전에 정의되는 Rule와 튜닝 원칙을 추론하기 위해 사용되는 Rule의 두 가지 타업으로 나뉘며, 대부분의 Rule은 입력되는 값에 따라 다른 솔루션을 취하게 하는 분기의 역할을 수행한다. 사용자는 제한적으로 자동 생성된 Fact와 Rule을 통해 튜닝 원칙을 추론하여 데이터베이스 시스템에 적용할 수 있으며, 요구나 필요에 따라 GUI를 통해 상황에 맞는 Fact와 Rule을 수동으로 추가할 수도 었다. 지식 도매인에서 튜닝 원칙을 추론하기 위해 JAVA 기반의 추론 엔진인 JESS가 사용된다. JESS는 스크립트 언어를 사용하는 전문가 시스템[7]으로 선언적 룰(Declarative Rule)을 이용하여 지식을 표현 하고 추론을 수행하는 추론 엔진의 한 종류이다. JESS의 지식 표현 방식은 튜닝 원칙을 쉽게 표현하고 수용할 수 있는 구조를 가지고 있으며 작은 크기와 빠른 추론 성능을 가지기 때문에 실시간으로 처리 되는 어플리케이션 튜닝에 적합하다. 지식 기반 모률의 가장 큰 역할은 주어진 데이터베이스 시스템의 모델을 통하여 필요한 새로운 지식을 생성하고 저장하는 것이다. 이를 위하여 Fact와 Rule은 지식 표현 의 기본 단위인 트리플(Triple)의 형태로 표현된다, 트리플은 Subject, Property, Object의 3가지 요소로 구성되며, 대부분의 Fact와 Rule들은 트리플의 기본 형태 또는 트리플의 조합으로 이루어진 C Condition과 Action의 두 부분의 결합으로 구성된다. 이와 같이 데이터베이스 시스템 모델의 개체들과 속성, 그리고 연관 관계들을 표현함으로써 지식들이 추론 엔진의 Fact와 Rule로 기능할 수 있다. 본 시스템에서는 이를 구현 및 실험하기 위하여 웹 기반 서버-클라이언트 시스템을 가정하였다. 서버는 Process Controller, Parser, Rule Database, JESS Reasoning Engine으로 구성 되 어 있으며, 클라이 언트는 Rule Manager Interface와 Result Viewer로 구성되어 었다. 실험을 통해 얻어지는 튜닝 원칙 적용 전후의 실행 시간 측정 등 데이터베이스 시스템 성능 척도를 비교함으로써 시스템의 효용을 판단하였으며, 실험 결과 적용 전에 비하여 튜닝 원칙을 적용한 경우 최대 1초 미만의 전처리에 따른 부하 시간 추가와 최소 약 1.5배에서 최대 약 3배까지의 처리 시간 개선을 확인하였다. 본 논문에서 제안하는 시스템은 튜닝 원칙을 자동으로 생성하고 지식 형태로 변형시킴으로써 새로운 튜닝 원칙을 파생하여 제공하고, 성능에 영향을 미치는 요소와 함께 직접 Fact과 Rule을 추가함으로써 커스터마이정된 튜닝을 수행할 수 있게 하는 장점을 가진다. 추후 쿼리 자체의 튜닝 및 인텍스 최적화 등의 프로세스 자동화와 Rule을 효율적으로 정의하고 추가하는 방법 그리고 시스템 모델링을 효과적으로 구성하는 방법에 대한 연구를 통해 본 연구를 더욱 개선시킬 수 있을 것이다.

  • PDF

Design and Implementation of the Converged Platform for Geospaital and Maritime Information Service based on S-100 Standard (S-100 표준 기반 공간 및 항행정보 융합 서비스 플랫폼 설계 및 구현)

  • Kim, Min Soo;Jang, In Sung;Lee, Chung Ho
    • Spatial Information Research
    • /
    • v.21 no.6
    • /
    • pp.23-32
    • /
    • 2013
  • Recently, there has been much interest in the converged platform that enables the harmonized collection, integration, exchange, presentation and analysis of various kinds of marine information by using the ICT means. Regarding such the converged platform, S-100 standards including the international hydrographic data model are being announced and various studies have been published based on the S-100 standards. However, the existing studies have presented simple solutions for only given problems on the converged service of the maritime information. They could not propose the design concept of the converged platform which makes it possible to provide the standardized and integrated services among the geospatial data, the real-time maritime data, and the next ENC. Therefore, we propose design and implementation details of the converged service platform for the geospatial and the maritime data based on the S-100, WMS, WMTS, WPS, SOS standards. The proposed platform has advantages of supporting both the S-57 and the S-101, supporting the converged services of heterogeneous geospatial data and ENC data, supporting the real-time services of sensor data such as weather, AIS, and CCTV, and supporting the development of various kinds of maritime systems such as ECDIS, ECS, VTS based on the WebApp service. Finally, we proved the effectiveness of our proposed platform through the actual implementation of the converged service of geospatial data, S-101 data, and KWeather data.

A Priority Analysis on E-Commerce Security Factors - Focused on Researchers and Practitioners (전자상거래를 위한 보안 항목 우선순위 분석: 연구자그룹과 실무자그룹을 중심으로)

  • Kim, Hyun-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.163-171
    • /
    • 2011
  • In e-commerce environment, security should be considered as an essential factor for success. In this paper, we analyze security requirements for e-commerce system, and it is focused on the practical usage, not theoretical contribution, in the field of e-commerce security. To identify the security requirements being specific to e-commerce environment, the researches related to e-commerce security are surveyed and a phase of Delphi method and Analytic Hierarchy Process(AHP) are used to determine the relative importance of e-commerce security factors. Since researchers and practitioners can have significantly different views because of each different work environment, we divide the professionals into two respondents' group. This survey result can be useful security guidelines in the development of e-commerce service system from the initial system development step to the completion.

Supporting Media using XML-based Messages on Online Conversational Activity (온라인 대화 행위에서 XML 기반 메시지를 이용한 미디어 지원)

  • Kim, Kyung-Deok
    • The KIPS Transactions:PartB
    • /
    • v.11B no.1
    • /
    • pp.91-98
    • /
    • 2004
  • This paper proposes how to support various media on online conversational activity using XML(extensible Markup Language). The method converts media information into XML based messages and handles alike conventional text based messages. The XML based messages are unified to an XML document, and then a HTML document is generated using the XML and an XSLT documents in a server. A user in each client can play or present media through the hyperlink that is associated media information on the HTML document. The suggested method supports use of various media (text, image, audio, video, documents, etc) and efficient maintenance of font size, color, and style on messages according to extension and modification of XML tags. For application, this paper implemented the system to support media that has client and server architecture on online conversational activity. A user in each client inputs text or media based message using JAVA applet and servlet on the system, and conversational messages on every users' interfaces are automatically updated whenever a user inputs new message. Media on conversational messages are played or presented according to a user's click on hyperlink. Applications for the media presentation are as follows : distance learning, online game, collaboration, etc.

Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files (삭제되거나 손상된 이벤트 로그(EVTX) 파일 복구 기술에 대한 연구)

  • Shin, Yonghak;Cheon, Junyoung;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.387-396
    • /
    • 2016
  • As the number of people using digital devices has increased, the digital forensic, which aims at finding clues for crimes in digital data, has been developed and become more important especially in court. Together with the development of the digital forensic, the anti-forensic which aims at thwarting the digital forensic has also been developed. As an example, with anti-forensic technology the criminal would delete an digital evidence without which the investigator would be hard to find any clue for crimes. In such a case, recovery techniques on deleted or damaged information will be very important in the field of digital forensic. Until now, even though EVTX(event log)-based recovery techniques on deleted files have been presented, but there has been no study to retrieve event log data itself, In this paper, we propose some recovery algorithms on deleted or damaged event log file and show that our recovery algorithms have high success rate through experiments.

Inter-frame vertex selection algorithm for lossy coding of shapes in video sequences (동영상에서의 모양 정보 부호화를 위한 정점 선택 알고리즘)

  • Suh, Jong-Yeul;Kim, Kyong-Joong;Kang, Moon-Gi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.4
    • /
    • pp.35-45
    • /
    • 2000
  • The vertex-based boundary encoding scheme is widely used in object-based video coding area and computer graphics due to its scalability with natural looking approximation. Existing single framebased vertex encoding algorithm is not efficient for temporally correlated video sequences because it does not remove temporal redundancy. In the proposed method, a vertex point is selected from not only the boundary points of the current frame but also the vertex points of the previous frame to remove temporal redundancy of shape information in video sequences. The problem of selecting optimal vertex points is modeled as finding shortest path in the directed acyclic graph with weight The boundary is approximated by a polygon which can be encoded with the smallest number of bits for maximum distortion. The temporal redundancy between two successive frames is efficiently removed with the proposed scheme, resulting in lower bit-rate than the conventional algorithms.

  • PDF

Theorization and Utilization of Smart Tourism Ecosystems (스마트 관광 생태계의 이론화와 활용)

  • Koo, Chulmo;Kim, Jeong Hyeon;Chung, Namho
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.69-87
    • /
    • 2014
  • The integration of Tourism and Information Communication Technology (ICT) has been continued based on a drastic progress of ICT in the entire sectors of tourism industry. A variety of terminologies such as eTourism, Virtual Tourism, Smart Tourism have appeared during the last decades, however, tourism with Smartphones created a new paradigm has not discussed yet in tourism industry and academia. By investigating on the previous literature in the role of ICT in tourism, we have classified five major streams in the past such as end user perspective (tourist behaviour), Community, Multimedia and Web, Intelligent System, and Smart Tourism. At a result, we investigated the concept of smart tourism and extended to research on Smart Tourism Ecosystems. We suggest the concept of smart tourism ecosystems, which may create values by interacting among tourism players (tourist, distribution channel, supply channel, government, and local community). We propose the discussion of meaning of 'creating shared value' through 'Smart Tourism Ecosystems'.

A Method for Specifying the Access Control of XML Document using Process Algebra (프로세스 대수를 이용한 XML 문서의 접근권한 표현법)

  • Lee, Ji-Yeon;Kim, Il-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.251-258
    • /
    • 2007
  • With the increase of a web service technology, a new access control mechanism has developed for XML documents. As a result, as legacy access control systems, access control systems has become an active research topic. In this paper, we propose a methodology to translate access control policies for XML documents into formal specification language CSP. To do this, first, we introduce a method to translate a hierarchical access to XML documents using XPath language into CSP process algebra. Second, we explain a method to represent a XML schema as a formal model like automata. Third, we present a method for representing the semantics of access control policies such as the scope of rules and confliction resolution into a process algebra language. Finally, a CSP specification example of an XML schema and path expressions aye shown to illustrate the validity of our approach.

  • PDF

k-Bitmap Clustering Method for XML Data based on Relational DBMS (관계형 DBMS 기반의 XML 데이터를 위한 k-비트맵 클러스터링 기법)

  • Lee, Bum-Suk;Hwang, Byung-Yeon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.845-850
    • /
    • 2009
  • Use of XML data has been increased with growth of Web 2.0 environment. XML is recognized its advantages by using based technology of RSS or ATOM for transferring information from blogs and news feed. Bitmap clustering is a method to keep index in main memory based on Relational DBMS, and which performed better than the other XML indexing methods during the evaluation. Existing method generates too many clusters, and it causes deterioration of result of searching quality. This paper proposes k-Bitmap clustering method that can generate user defined k clusters to solve above-mentioned problem. The proposed method also keeps additional inverted index for searching excluded terms from representative bits of k-Bitmap. We performed evaluation and the result shows that the users can control the number of clusters. Also our method has high recall value in single term search, and it guarantees the searching result includes all related documents for its query with keeping two indices.

A Design and Implementation of System for Wireless Web Service in Multi-Platform Handhold Devices (멀티 플랫폼 이동단말기의 무선 웹 서비스를 위한 시스템 설계 및 구현)

  • Ryu, Dong-Yeop;Han, Seung-Hyun;Lee, Keun-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.355-364
    • /
    • 2005
  • An example of such a new device is a mobile phone. The demand for wireless data communication is growing rapidly. However, agencies have not yet completed the standardization of the markup language. Due to the evolution of the Mobile Device, the agencies in this field have provided different data formats with each Mobile Device Platform. Traditionally, contents are hand-tailored to suit the target devices. A key problem is that the characteristics and capabilities of mobile devices are too diverse to service the most suitable mobile contents. Owing to this problem, the need for a reusable document description language increases. In this paper, we defined Template file that is common data to service mobile devices. We proposed method that could be effective wireless web service though design and the implementation of the Call Manager & the XSL Generator. In the methodology, when requesting wireless internet service, the mobile device finds out Markup language and hardware specification of the mobile device through the Call Manager component supports. The XSL Generator component creates XSL file dynamically that is the most suitable to device. Finally, contents is serviced to each device by XSLT.

  • PDF