• Title/Summary/Keyword: ORACLE

Search Result 388, Processing Time 0.029 seconds

Developing an Evaluation Model for the CRM Level of Corporation Based on AHP Method. (AHP기법을 이용한 CRM 수준 평가 모형 개발에 관한 연구: 기업의 운영 성과를 중심으로)

  • 이규태;이주연;김영균
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2003.05a
    • /
    • pp.214-225
    • /
    • 2003
  • Now a day, the company must strengthen the contact-point of the customer who the company has and has to block the secession of the customer by providing services or goods on time. Under this market situation, the corporation extends the CRM for the customer management and strategic management, and set the CRM-strategies up for managing the customer relationship. For this, the present enterprise's level and the business-ability for the management of the customer relationship should be considered. Therefore, in this study, we will analyze the critical factors to set the CRM up as a strategy by studying the literature review. In the critical factors, the factors of enterprise level as well as the technical factor will be included. Secondly, as you know, the BSC is used to evaluate the corporation as a index. In this study the BSC model is changed and rearranged for the applied BSC model to measure the C3M level of companies. Thirdly, based on the model developed, the factors in the first step are classified by levels and weighted values are calculated by using AHP method. As a result, we will show the diagnostic model for check the operational performance of management, marketing and sales etc.

  • PDF

Trajectory Data Warehouses: Design and Implementation Issues

  • Orlando, Salvatore;Orsini, Renzo;Raffaeta, Alessandra;Roncato, Alessandro;Silvestri, Claudio
    • Journal of Computing Science and Engineering
    • /
    • v.1 no.2
    • /
    • pp.211-232
    • /
    • 2007
  • In this paper we investigate some issues and solutions related to the design of a Data Warehouse (DW), storing several aggregate measures about trajectories of moving objects. First we discuss the loading phase of our DW which has to deal with overwhelming streams of trajectory observations, possibly produced at different rates, and arriving in an unpredictable and unbounded way. Then, we focus on the measure presence, the most complex measure stored in our DW. Such a measure returns the number of distinct trajectories that lie in a spatial region during a given temporal interval. We devise a novel way to compute an approximate, but very accurate, presence aggregate function, which algebraically combines a bounded amount of measures stored in the base cells of the data cube. We conducted many experiments to show the effectiveness of our method to compute such an aggregate function. In addition, the feasibility of our innovative trajectory DW was validated with an implementation based on Oracle. We investigated the most challenging issues in realizing our trajectory DW using standard DW technologies: namely, the preprocessing and loading phase, and the aggregation functions to support OLAP operations.

Comparison of DBMS Performance for processing Small Scale Database (소용량 데이터베이스 처리를 위한 DBMS의 성능 비교)

  • Jang, Si-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1999-2004
    • /
    • 2008
  • While a lot of comparisons of DBMS performance for processing large scale database are given as results of bench-mark tests, there are few comparisons of DBMS performance for processing small scale database. Therefore, in this study, we compared and analyzed on the performance of commercial DBMS and public DBMS for small scale database. Analysis results show that while Oracle has low performance on the operations of update and insert due to the overhead of rollback for data safely, MySQL and MS-SOL have good performance without additional overhead.

Design and Implementation of GIS Based Automatic Terrain Analysis System for Field Operation

  • Kim, Kyoung-Ok;Yang, Young-Kyu;Lee, Jong-Hoon;Choi, Kyoung-Ho;Jung, In-Sook;Kim, Tae-Kyun
    • Korean Journal of Remote Sensing
    • /
    • v.10 no.2
    • /
    • pp.121-132
    • /
    • 1994
  • A GIS based tactical terrain analysis system named ATTAS(Army Tactical Terrain Analysis Software) has been designed and implemented to support the field commanders for enhancing the capabiliy of their unit and efficiency of weapon system. This system is designed to provide computer graphics environment in which the analyst can interactively operate the entire analyzing process such as selecting the area of interest, performing analysis functions, simulating required battlefield operation and display the results. This system can be divided into three major sections; the terrain analysis modules, utilites, and graphic editor. The terrain analysis module inclused surface analysis, line of sight analysis, enemy disposition, 3D display, radar coverage, logistic route analysis, shortest path analysis, atmospheric phenomena prediction, automated IPB (Inteligence preparation of Battlefield), and other applied analysis. A combination of 2D and 3D computer graphics techniques using the X-window system with OSF/Motif in UNIX workstation was adopted as the user interface. The integration technique of remotely sensed images and GIS data such as precision registration, overlay, and on-line editing was developed and implemented. An efficient image and GIS data management technique was also developed and implemented using Oracle Database Management System.

A study on Production Process Definition through Problem Analysis of ERP System (ERP 시스템의 문제점 분석을 통한 생산관리 프로세스 정의에 관한 연구)

  • 남승돈;양광모;강경식
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.4
    • /
    • pp.97-106
    • /
    • 2003
  • At present, tendency of ERP(Enterprise Resource Planning) enterprises is that many ERP enterprises from abroad are rushing into capture of small and medium enterprises at home actively. SAP Korea and Korean Oracle have already showed their new product targeting domestic market of small or medium standing enterprise, and more, even MS(Micro Soft) also rushes into this market in earnest. The domestic business circle of ERP should prepare countermeasure by raising the perfection of product and having good command of minute marketing strategy to survive from aggressive strategy of SMB market. In addition, about the computerization of main affairs of business, ordering developing process was general that developing staffs analysed the affairs of each department that needed computerization and construct according to the operation process by using different tools, but condition is changing that businesses themselves are purchasing business application package from expert soft program enterprise and construct. Therefore, in this study, I try to grasp the problem of management, and define a new process that can help for more efficient management by making it an object producing and management module of enterprise 'K' that is one of domestic small and medium enterprise and that is operating ERP at present. As well, through the analysis of affair related producing, we are aiming to prepare for establishment of target, its range, and making the standard of result evaluation.

Workflow Change Prediction with Enterprise Ontology (Enterprise 온톨러지를 활용한 Workflow 변화 예측)

  • Kim, Min-Chan;Nam, Chul-Ki;Lim, Jung-Min;Kang, In-Su;Bae, Jae-Hak J.;Lee, Jong-Hyeok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.405-408
    • /
    • 2004
  • 기업 환경의 변화에 의해 비즈니스 프로세스는 변경되며, 따라서 워크플로우와 이에 영향을 받는 요소들의 변경도 수반된다. 이때 워크플로우 관리시스템(WfMS)이 워크플로우의 변경에 따라 영향을 받는 요소를 예측하고 동적으로 변경하는 것은 어려운 문제이다. 이를 위해 본 논문에서는 Enterprise 온톨러지를 활용하여 워크플로우 변경 시 영향을 받는 요소를 예측해 보았다

  • PDF

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Sales Forecasting Model for Apparel Products Using Machine Learning Technique - A Case Study on Forecasting Outerwear Items - (머신 러닝을 활용한 의류제품의 판매량 예측 모델 - 아우터웨어 품목을 중심으로 -)

  • Chae, Jin Mie;Kim, Eun Hie
    • Fashion & Textile Research Journal
    • /
    • v.23 no.4
    • /
    • pp.480-490
    • /
    • 2021
  • Sales forecasting is crucial for many retail operations. For apparel retailers, accurate sales forecast for the next season is critical to properly manage inventory and plan their supply chains. The challenge in this increases because apparel products are always new for the next season, have numerous variations, short life cycles, long lead times, and seasonal trends. In this study, a sales forecasting model is proposed for apparel products using machine learning techniques. The sales data pertaining to outerwear items for four years were collected from a Korean sports brand and filtered with outliers. Subsequently, the data were standardized by removing the effects of exogenous variables. The sales patterns of outerwear items were clustered by applying K-means clustering, and outerwear attributes associated with the specific sales-pattern type were determined by using a decision tree classifier. Six types of sales pattern clusters were derived and classified using a hybrid model of clustering and decision tree algorithm, and finally, the relationship between outerwear attributes and sales patterns was revealed. Each sales pattern can be used to predict stock-keeping-unit-level sales based on item attributes.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.