• Title/Summary/Keyword: DB Server

Search Result 280, Processing Time 0.025 seconds

Design and Implementation of Internet Spatial Data Service Component based Open GIS Specification (개방형 GIS 기반 인터넷 공간 데이터서비스 컴포넌트의 설계 및 구현)

  • Choi, Sang-Kil;Lee, Jin-Kyu;Lee, Jong-Won;Kim, Jang-Su
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.2 s.2
    • /
    • pp.21-31
    • /
    • 1999
  • In accordance with the completion of the spatial database building works in the central and/or local government authorities as well as the rapid popularization of various information services through internet, it is heavily required to provide spatial information services through World Wide Web. To provide a qualified spatial information service, it is crucial to have a Web-based GIS (Geographic Information Service) service system equipped with the publicity, the convenient accessibility, and the easy-to-use user interface. In this paper, we introduce a new component system for Web-based spatial information services based on the OpenGIS Simple Feature specification for OLE/COM[3] and OLE DB specification[4]. The important functionality of a Web-based spatial information service system includes its accessibility of various existing GIS server system and huge databases in addition to the resolution of response-time delay problems caused by transmitting a large amount of digital maps via internet[6]. To cope with these problems, our component system has been designed to access heterogeneous databases in transparent manner and to support vector-based and/or image-based image production techniques for shortening transmission time.

  • PDF

Analysis of Chemical Constituents of Agastachis Herba and in silico Investigation on Antidiabetic Target Proteins of its Major Compounds (곽향의 성분 분석 및 주요 성분들의 in silico 항당뇨 타겟 단백질 탐색)

  • Choi, Jongkeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.483-492
    • /
    • 2021
  • Agastachis Herba (AH) to treat anorexia and nausea and its antidiabetic efficacy was recently reported. This study examined the antioxidant activities and chemical constituents of AH and predicted the target proteins of each compound using in silico approaches. The results showed that EC50 values of AH methanol extract for DPPH and ABTS radical scavenging were 78.6 ㎍/mL and 31.0 ㎍/mL, respectively. Compared to the EC50 values of ascorbic acid (9.9 ㎍/mL, 5.2 ㎍/mL), the AH methanol extract possessed excellent antioxidant activities. Rosmarinic acid, tilianin, agastachoside, and acetin were confirmed as the major compounds of extracts by qualitative analysis performed with HPLC-PDA-MS/MS. The antidiabetic target proteins of these compounds were predicted by applying a structural similarity and inverse docking methodology using a DIA-DB server. The resulting target proteins were PPAR-γ, DPP IV, glucokinase, α-glucosidase, SGLT2, aldose reductase, and corticosteroid 11-beta-dehydrogenase, some of which have already been proven experimentally as target proteins. Therefore, the in silico methods can be considered valid. Finally, AH were extracted with various solvents to determine the optimal conditions for the extraction of active components. Methanol among organic solvents and 80% ethanol in ethanol-water mixtures were identified as the most effective solvent for the extraction.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

A Study on the Analysis and the Direction of Improvement of the Korean Military C4I System for the Application of the 4th Industrial Revolution Technology (4차 산업혁명 기술 적용을 위한 한국군 C4I 체계 분석 및 성능개선 방향에 관한 연구)

  • Sangjun Park;Jee-won Kim;Jungho Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.131-141
    • /
    • 2022
  • Future battlefield domains are expanding to ground, sea, air, space, and cyber, so future military operations are expected to be carried out simultaneously and complexly in various battlefield domains. In addition, the application of convergence technologies that create innovations in all fields of economy, society, and defense, such as artificial intelligence, IoT, and big data, is being promoted. However, since the current Korean military C4I system manages warfighting function DBs in one DB server, the efficiency of combat performance is reduced utilization and distribution speed of data and operation response time. To solve this problem, research is needed on how to apply the 4th industrial revolution technologies such as AI, IoT, 5G, big data, and cloud to the Korean military C4I system, but research on this is insufficient. Therefore, this paper analyzes the problems of the current Korean military C4I system and proposes to apply the 4th industrial revolution technology in terms of operational mission, network and data link, computing environment, cyber operation, interoperability and interlocking capabilities.

Efficient Fine-grained Log Auditing using Correlation Method based on Secure OS (Secure OS 기반에서 상호연관 기법을 통한 효과적 상세 로그 감사)

  • Koo, Ha-Sung;Park, Tae-Kyou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2381-2390
    • /
    • 2011
  • This paper presents the effective and detailed secure monitoring method being used based on Secure OS. For this, the detailed secure log of process, object, user's command and database query in task server are collected by 3 kinds of log collecting module. The log collecting modules are developed by ourselves and contained as constituents of security system. Secure OS module collects process and system secure log of objective unit, Backtracker module collects user's command session log, SQLtracker module collects database query in details. When a system auditor monitors and traces the behaviour of specified user or individual user, the mutual connection method between the secure logs can support detailed auditing and monitering effectively.

The method of evaluating the validity in making the checklist of statistical method (통계기법 점검표 작성시 타당성 평가방법)

  • Lee, Sang-Bock;Kim, Mal-Sook
    • Journal of the Korean Data and Information Science Society
    • /
    • v.9 no.2
    • /
    • pp.323-336
    • /
    • 1998
  • This thesis is to propose the method of evaluating the validity in stages on the design of a checklist based on the estimate theory of the validity on the design of a checklist and the method of evaluating the validity accordy to the purpose for usiug checklist and establish the standards of estimating the validity in stages on the checklist owing to the estimate theory with the journal, Journal of the Korean Society of Clothing and Textiles. We are emboding the statistical consulting server using the proposed estimate method of the validity and the followings we the questions to solve in future. First, there are many kinds of the statistical methods used in the fields of learing and applied technalogy. So we must establish the statistical standars required in each field and study and develope the special statistical checklists. Second, it is neded to systemize the estimate methods and standard on the validity by building the statistical consult DB, evaluate the researchers according to the degrees of statistical knowledge the validity of study design iud propose the delicate and generalized statistical methods appropriate to the ability of researchers.

  • PDF

A Design of Messenger Protocol for Secure Communication (안전한 통신을 위한 메신저 프로토콜 설계)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3958-3963
    • /
    • 2010
  • Internet messenger applications are utilized not only by individuals but also in corporate environments since it provides many convenient functions such as email, chatting and SMS services. However convenient they may be, current messenger applications have revealed a great deal of security problems. For instance, the existing Nate-on messenger is exposed to internal threats since it stores sensitive information in the database of its server and transmits communication data through the network without any safety measures intact. In order to solve such problematic issues of existing messenger applications, we propose the following protocol.

A Implementation of Messenger using Hybrid Cryptosystem (하이브리드 암호 시스템을 이용한 메신저 구현)

  • Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3942-3949
    • /
    • 2010
  • Since existing Nate-on Messenger application stores users' personal information in the database of its server, it is extremely venerable to internal threats, not to mention the communication data being transmitted without any safety measures. To solve such problematic areas of the existing application, we have developed a safer messenger application. The messenger application proposed in this paper discloses only the least required personal information of its users and the rest of the personal information is safely encrypted in the database using private passwords. This protective measure prevents the administrator or a third party from misusing the information since he/she will not be able access the information. In addition, users will be able to freely and safely communicate using this new messenger since transmitted data will also be encrypted.

Design and Implementation of The Spam I-Mail filtering System (컨텐츠 필터를 이용한 스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.465-468
    • /
    • 2003
  • E-mail, one of the oldest services in internet becomes very important and essential way to communicate with development of internet. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or bad things, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Design and Implementation of Multiple DataBase Access using Choice Method for EJB Bean Class Based on J2EE Pattern (J2EE 패턴기반 EJB 빈 클래스의 다중 DB 연동에 대한 설계 및 구현)

  • Lee, Don-Yang;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.143-152
    • /
    • 2004
  • Recently, software programming method based on EJB for object oriented software design and implement has been used frequently. Usually, case that use permanent data that use Database in EJB base application is most. Part connected with Database-Access that take charge in Entity Bean class of server side creation program. In this paper using J2EE relationship DAO pattern class each separate. This is no much difference with existent pattern method, but in same pattern common classes are designed so that composition may be possible. And as well as use Entity Bean class that created each DBMS classes are different, is doing Rata Source so that connection work is available without alteration or creation of additional program in several DBMS environments.