• Title/Summary/Keyword: Database System

Search Result 7,019, Processing Time 0.037 seconds

An Intelligent Search Modeling using Avatar Agent

  • Kim, Dae Su
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.288-291
    • /
    • 2004
  • This paper proposes an intelligent search modeling using avatar agent. This system consists of some modules such as agent interface, agent management, preprocessor, interface machine. Core-Symbol Database and Spell Checker are related to the preprocessor module and Interface Machine is connected with Best Aggregate Designer. Our avatar agent system does the indexing work that converts user's natural language type sentence to the proper words that is suitable for the specific branch information retrieval. Indexing is one of the preprocessing steps that make it possible to guarantee the specialty of user's input and increases the reliability of the result. It references a database that consists of synonym and specific branch dictionary. The resulting symbol after indexing is used for draft search by the internet search engine. The retrieval page position and link information are stored in the database. We experimented our system with the stock market keyword SAMSUNG_SDI, IBM, and SONY and compared the result with that of Altavista and Google search engine. It showed quite excellent results.

Study on Construction Method of Satellite Radio Interferer Search System (위성전파 혼신원 탐색 시스템 구축 방안 연구)

  • Kang, Chul-Gyu;Park, Chul-Sun;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.343-348
    • /
    • 2011
  • In this paper, we propose the construction and reconstruction method of satellite radio interferer search system to deal with the keen competition among nations to acquire the limited satellite sources. To construct the satellite interferer search system, whole TLS system construction, part of TLS system construction, and domestic system construction methods are proposed. After that characteristics, advantages, and disadvantages of the system are analyzed when these proposed systems are constructed. In addition, database problems are analyzed in case of the reliability of the operating database, the convergence management between database management systems, and public database service then the solution are proposed.

Web Expert System for Nutrition Counseling and Menu Management

  • Hong Soon-Myung;Kim Gon
    • Journal of Community Nutrition
    • /
    • v.7 no.2
    • /
    • pp.107-113
    • /
    • 2005
  • This study was conducted to develop a web expert system for nutrition counseling and menu management. This program manipulates a food, dish and menu and search database that has been developed. Clients can select a recommended general and therapeutic menu using this system. The web expert system can analyze nutrients in menus and compare nutrient contents of menus with Korean Recommended Dietary Allowances. It can access the food, dish and menu database. The expert menu database can insert, store and generate the synthetic information of age, sex, and therapeutic purpose of disease. With investigation and analysis of the client's needs, the menu planning program on the internet has been continuously developed. This system consists of the database that reaches to the food composition, the dishes and the menu. Clients can search food composition and conditional food based on nutrient name and amounts. This system is able to draw up the food with its order in dish. The menu planning can be organized and nutrients analysis can be compared with Korea Recommended Allowance. This system is able to read the nutrient composition of the each food, the dish and the menu. The results of analysis is presented quickly and accurately. Therefore it can be used by not only usual people but also dietitians and nutritionists who take charge of making a menu and experts in the field of food and nutrition. It is expected that the web expert system can be useful of nutrition education, nutrition counseling and expert menu management.

Formalized Web-based Data Searching System for GRID Environment (그리드 환경을 위한 정형화된 웹 기반 데이터 검색 시스템)

  • Lee, Sang-keon;Hwang, Seog-chan;Choi, Jae-young;No, Kyoung-Tai
    • The KIPS Transactions:PartA
    • /
    • v.11A no.1
    • /
    • pp.75-80
    • /
    • 2004
  • To interact database data with GRID system, implementation and installation of data manipulation module which manipulates database data and its index is required. Developing a search system searching data on web-based database, and integrating it with grid system, it is possible that searching data on web and use it directly on GRID system without independent data module. So, we can build easy and effective grid system, and the system could have more flexible architecture adapting data change. In this paper, we propose a searching system which interacting web-based database with GRID systems. We integrated the searching system with a bio god system which runs virtual screening jobs. As a result, UB Grid (Universal Bio Grid) is constructed. Developer could reduce time and effort required to integrate web data to GRID system, and user could use UB Grid system easily and effectively.

A Database Security System for Detailed Access Control and Safe Data Management (상세 접근 통제와 안전한 데이터 관리를 위한 데이터베이스 보안 시스템)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Hong, Sung-Jin;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.352-365
    • /
    • 2009
  • Recently, data access control policies have not been applied for authorized or unauthorized persons properly and information leakage incidents have occurred due to database security vulnerabilities. In the traditional database access control methods, administrators grant permissions for accessing database objects to users. However, these methods couldn't be applied for diverse access control policies to the database. In addition, another database security method which uses data encryption is difficult to utilize data indexing. Thus, this paper proposes an enhanced database access control system via a packet analysis method between client and database server in network to apply diverse security policies. The proposed security system can be applied the applications with access control policies related to specific factors such as date, time, SQL string, the number of result data and etc. And it also assures integrity via a public key certificate and MAC (Message Authentication Code) to prevent modification of user information and query sentences.

Design of a Database Query Language for Multimedia Presentation (멀티미디어 프리젠테이션을 위한 데이타베이스 질의어 설계)

  • 이중화
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.213-225
    • /
    • 2003
  • In multimedia database system, it is very important issue how to query multimedia data and present the result of query. Also, in order to reuse the query result in other applications, multimedia database system must be considered to provide the query result which is more generalized form. In this paper, I propose a presentation model for presenting query result in multimedia database system and MMSQL based on the developed model for processing multimedia database query. This paper includes the design and implementation of MMSQL query processor. MMSQL query processor provides the presentation of query result which is SMIL (Synchronized Multimedia Integration Language) document. Therefore, MMSQL query result in this paper can be use to variant multimedia applications.

Modeling Components for mapping from XML DTD to RDB schema (XML DTD의 관계형 데이터베이스 스키마로의 자동변환을 위한 컴포넌트 모델링)

  • 이정수;방승윤;주경수
    • Journal of Internet Computing and Services
    • /
    • v.2 no.5
    • /
    • pp.81-91
    • /
    • 2001
  • XML is a standard markup language for exchange and storage of formed or well-formed information in World Wide Web, Because the source data of XML message for exchange of information in World Woo Web Is stored in legacy database systems. it is necessary the easier connection between XML application and database systems, In Oracle8i. 9i. informix and SQL2000. DBMS vendors extend their DBMSs for XML. This approach for the connection between XML application and database system is Platform-dependent and DBMS-dependent. Therefore it is necessary the platform- and DBMS-independent approach for the connection between XML application and database system, In this paper. we modeled a set of middleware components for relational database design based on XML DTD is modeled, Those components are modeled on object-based algorithm for connection between XML application and database system.

  • PDF

A Study On the Improvement Of Proset2000 by a Design Method Using the Uinfied Modelling Language (UML을 사용한 디자인 방법에 의한 계통보호 종합전산 프로그램의 개선에 관한 연구)

  • 최면송;현승호;오성민;오태욱
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.1
    • /
    • pp.7-12
    • /
    • 2004
  • The role of protective relay with correct setting value is very important for the reliable operation of power : system. The setting process of a protective relay is difficult and requires hard work of calculations. Therefore, KEPCO as been using PROSET2000, a computer program system, in order to automate the setting process of protective relays in power transmission network since 2000. This system has a database and relay setting modules for each type of realy with coresponding Human and Computer Interaction(HCI). For the setting of a new type of relay, it require a new module, a HCI and a database table corresponding to the new relay. But it's update is not easy in case of new type of relay. This paper discussed the update method introducing a concept of Open Interface. It addressd a method to make a new HCI for new relay in view of object-oriented method using UML(Unified Modeling Language). Using the UML, we updated the PROSET2000. HCI screens for a new relay is generated automatically using the information of the new relay stored in the database. And, the database management module is upgraded to solve problems in manage and maintain the database in view of Open Interface.

Construction of The Urban Disaster Management System Using the Wireless Internet GIS (무선 인터넷 GIS를 이용한 도시재해관리시스템구축)

  • 유환희;안기원;이민우
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.19 no.1
    • /
    • pp.55-66
    • /
    • 2001
  • All kinds of disasters are occurring for several reasons in modern cities. So, We need the disaster management system to deal with them at this point that Those disasters are getting larger and more frequent. We organized the database into three categories; the traffic accident database on traffic accidents that is recognized as a typical disaster resulting from vehicles's increasement rapidly in modern urban life, the gas explosion disaster database on gas explosion that causes to fatal damage through broad areas, and the bridge management database that contains bridge resource information and repair record. In this study, we developed the Disaster Management System using the wireless internet GIS that can access the database and identify field information for the accident area in emergency situation as well as can modify and update the database in field directly, so that can cope with the disaster situations effectively.

  • PDF

A Protection Profile for Access Control Based Database Security System (접근제어형 데이터베이스 보안 시스템의 보호프로파일)

  • Jeon, Woong-Ryul;Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.109-113
    • /
    • 2007
  • With increasing the mont of processed information over the network, the importance of database system increases rapidly. There are two types of security system for database, access control and data encryption. However, it is hard to evaluate security of database systems using the Common Criteria(CC) as there is no protection profile(PP) for these systems. In this paper, we propose a protection profile for secure database systems which can be used in formal evaluation using the Common Criteria. The proposed protection profile can be used by both developer and consumer to evaluate security of database systems.