• Title/Summary/Keyword: ORACLE

Search Result 388, Processing Time 0.03 seconds

Comparison of DBMS Performance for processing Small Scale Database (소용량 데이터베이스 처리를 위한 DBMS의 성능 비교)

  • Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.139-142
    • /
    • 2008
  • While a lot of comparisons of DBMS performance for processing large scale database are given as results of bench-mark tests, there are few comparisons of DBMS performance for processing small scale database. Therefore, in this study, we compared and analyzed on the performance of commercial DBMS and public DBMS for small scale database. Analysis results show that while Oracle has low performance on the operations of update and insert due to the overhead of rollback for data safety, MySQL and MS-SQL have good performance without additional overhead.

  • PDF

Many-to-One Encryption and Authentication Scheme and Its Application

  • Lin, Xi-Jun;Wu, Chuan-Kun;Liu, Feng
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.18-27
    • /
    • 2008
  • This paper is to study a subclass of group-oriented cryptographic scheme: Many-to-one encryption and authentication scheme. The many-to-one encryption and authentication scheme is to solve a practical problem, i.e., the scenario that the number of the receivers is very small compared with the number of the senders and a receiver may serve millions of senders. Compared with the traditional methods, the burdens of the receiver and the KGC are reduced greatly. How to revoke a sender from his receiver's legitimate sender group is also proposed and it is efficient compared with some traditional methods. The proposed scheme is proven in the random oracle models. The computational complexity of our scheme is independent of the number of the senders. At the end of the paper, an example is given to show how to use our scheme in online software registration and update.

A Study on the Effects of Innovation Characteristics and Quality of Appliance Systems on Intention to Adopt (어플라이언스 시스템의 혁신특성과 품질이 채택의도에 미치는 영향에 관한 연구)

  • Yoo, Eungjoon;Kim, Yonghee;Park, Youngju;Choi, Jeongil
    • Journal of Korean Society for Quality Management
    • /
    • v.43 no.3
    • /
    • pp.421-438
    • /
    • 2015
  • Purpose: The purpose of this study was to grasp the level of effects innovative features and quality of the appliance system on organizational performance and ultimately analyze the willingness of the IT staff to adopt an appliance system. Methods: The survey was conducted on 350 vendors' clients and partners who currently use an appliance system from March to May 2014. A total of 331 effective questionnaires were collected and analyzed using PASW18 and SmartPLS. Results: The results show that relative advantage, facilitating condition and trialability and quality factors all had an effect on organizational performance expectations. Further, when an appliance system is adopted, it was shown that cost and reliability emphasized by a vendor did not produce any significant effects on organizational performance expectations. Conclusion: This study is significant as it is the first to combine such models as Innovation Diffusion Theory, Information Systems Success Model, and Unified Theory of Acceptance and Use of Technology with a new external variable. In addition, it illustrated how variables affect the adoption of an appliance system such as a new innovation system.

Applications of Java Computing Technology to GPS/GIS-based AVL(Automated Vehicle Location) System

  • Kim, Kwang-Soo;Kim, Min-Soo;Lee, Jae-Yeon;Lee, Ki-Won;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • 1998.09a
    • /
    • pp.149-152
    • /
    • 1998
  • Nowadays, GIS, as multi-discipline information system, is closely linked with GPS application in conjunction with GIS-T or Logistics GIS. With this R&D trend. CPS/GIS application system for AVL is newly developed in this study. This AVL is designed and implemented by using pure Java computing technology towards com ing Car-equipped wireless Internet PC age, and main features of Java are included at this system: Platform independence, Multi-thread processing, and Object-oriented paradigm. While, because core modules of this AVL are based on GIS spatial engine, unlike other commercial AVLs, large spatial database problem handling digital image/spatial information and attribute information and direct access problem of GIS data is easily dealt with. this system can directly access external database by using JDBC: MS Access for desktop version and Oracle for W/S version. Finally, it is thought that Java-based AVL, one of CPS/CIS applications, can be easily extended into other prospective GIS applications: Land surveyor supporting system, Flight tracking system, 3D facility management system with CPS, and so forth.

  • PDF

Site-, Domain-, Community- Limited Search, and Home Search in a Web Search System Using the ODYSSEUS Object-Relational DBMS (오디세우스 객체관계형 DBMS를 사용한 웹 검색 시스템에서의 사이트, 도메인, 커뮤니티 제한 검색 및 홈서치)

  • Kim Min S.;Lee Jae-Gil;Kim Min-Soo;Whang Kyu-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.175-177
    • /
    • 2005
  • 인터넷이 널리 활용되면서 웹 사이트의 수가 기하급수적으로 증가하는 동시에, 각각의 웹 사이트에 저장된 정보의 양도 급속히 증가하고 있다. 사용자가 이러한 웹 환경에서 원하는 정보를 효과적으로 찾을 수 있도록 하기 위해서는 크게 두 가지 요소가 중요한데, 첫 번째는 웹 검색 사이트에서 다양한 제한 검색 기능들을 제공하는 것이고 두 번째는 일반적인 웹 사이트에서 홈서치 서비스를 제공하는 것이다. 제한 검색은 각 웹 사이트의 정보를 중앙 데이타베이스에 저장하고, 검색 범위를 특정 범위로 한정시켜 검색 결과를 제공하는 방법으로, 이를 활용하면 일반적인 웹 사이트들도 저렴한 비용으로 방문자들에게 홈서치 서비스를 제공할 수 있다. 본 논문에서는 이러한 제한 검색 기능들과 홈서치 기능을 오디세우스 정보검색용 객체관계형 DBMS를 사용하여 실제로 어떻게 구현할 수 있는지에 대해 SQL 및 HTML 레벨에서 설명한다. 따라서, 본 논문에서 제안하는 구현 방법은 Oracle, MySQL등의 정보검색 기능이 제공되는 관계형 DBMS들에 대해 모두 적용될 수 있다.

  • PDF

Methods of DICOM and Non-DICOM Interfacing for various Radiological Equipments with PACS (방사선 검사 관련 의료장비와 PACS 간의 연동을 위한 DICOM 및 Non-DICOM 인터페이스 방안)

  • Kim, H.C.
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.6 no.1
    • /
    • pp.51-64
    • /
    • 2003
  • This thesis describes the effective interfacing methods of PACS Modality based on the system installation andoperating experiences. PACS(Picture Archiving and Communication Systems) is a system for medical image archiving and communication using large storage device and high-speed network. The standard communication protocol of PACS is DICOM(Digital Imaging and Communication in Medicine) based on TCP/IP and point-to-point protocol. However, there are many Non-DICOM Modalities and DICOM Modalities having problems. First, we had interfaced almost modalities. Fuji CR, GE CT, MRI, Angio, Fluoro, Phillips Angio, Shimadzu Fluoro. Ultrasound PACS, with the main PACS in the Seoul S Hospital as large scale hospital. And we manipulated the intelligent image distribution and the CT. MRI Interfaces never experienced beforein the Anyang J Hospital and the Chungju C Hospital as mid or small scale hospital. Technically, we developed both the DICOM Interface and the Non-DICOM Interface. At the last, the DICOM Worklist and the DICOM Print Interface were implemented in the Seoul B Hospital, the Bucheon SJ Hospital and the Seoul K Hospital independently with PACS. The Oracle, Sybase and MS-SQL are used as database, and UNIX, Macintosh, MS Windows as operating systems. And the Visual C++ and UNIX C are the main programming tools. We have used UTP, coaxial and fiber optic cable under 10/100 mbps LAN for networking.

  • PDF

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

An Efficient Dynamic Group Signature with Non-frameability

  • Xie, Run;Xu, Chunxiang;He, Chanlian;Zhang, Xiaojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2407-2426
    • /
    • 2016
  • A group signature scheme allows any member to sign on behalf of a group. It is applied to practical distributed security communication environments, such as privacy-preserving, data mining. In particular, the excellent features of group signatures, including membership joining and revocation, anonymity, traceability, non-frameability and controllable linkability, make group signature scheme more attractive. Among these features, non-frameability can guarantee that a member's signature cannot be forged by any other (including issuer), and controllable linkability supports to confirm whether or not two group signatures are created by the same signer while preserving anonymity. Until now, only Hwang et al.'s group schemes (proposed in 2013 and 2015) can support all of these features. In this paper, we present a new dynamic group signature scheme which can achieve all of the above excellent features. Compared with their schemes, our scheme has the following advantages. Firstly, our scheme achieves more efficient membership revocation, signing and verifying. The cost of update key in our scheme is two-thirds of them. Secondly, the tracing algorithm is simpler, since the signer can be determined without the judging step. Furthermore, in our scheme, the size of group public key and member's private key are shorter. Lastly, we also prove security features of our scheme, such as anonymity, traceability, non-frameability, under a random oracle model.

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

  • Deng, Lunzhi;Yang, Yixian;Chen, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5625-5641
    • /
    • 2017
  • Certificateless public key cryptography resolves the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. In recent years, some good results have been achieved in speeding up the computation of bilinear pairing. However, the computation cost of the pairing is much higher than that of the scalar multiplication over the elliptic curve group. Therefore, it is still significant to design cryptosystem without pairing operations. A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature such that only the designated set of verifiers can verify it. Multi-signer universal designated multi-verifier signatures are suitable in many different practical applications such as electronic tenders, electronic voting and electronic auctions. In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. Our scheme does not use pairing operation. To the best of our knowledge, our scheme is the first certificateless multi-signer universal designated multi-verifier signature scheme.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.