• Title/Summary/Keyword: ORACLE

Search Result 388, Processing Time 0.028 seconds

Construction of Rulebase and Its Inference Method for Protective Relay Setting Using Oracle Database (Oracle DB를 이용한 송전계통 보호 계전기 정정 Rule base구축 및 추론)

  • Joo, H.J.;Min, B.W.;Lee, S.J.;Kang, S.H.;Choi, D.S.;Cho, B.S.;Lee, W.H.;Choi, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.119-121
    • /
    • 2000
  • The protective relay setting of transmission systems has to consider various factors such as the protrected device, relay type and system conditions and it requires the empirical knowledge of experts. In this study. The setting rules have been accumulated in Oracle DB and its inference scheme has been devised. Their applications to relay setting system are expected to refine the setting knowledge enhancing the accuracy and consistency of the relay setting.

  • PDF

Implementation of Modification Performance Comparison of SQLite3 Mobile Databases (SQLite3 모바일 데이터베이스의 갱신 성능 비교 구현)

  • Choi, Jin-oh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.108-110
    • /
    • 2018
  • In mobile IT device environments, it is becoming common to use database engine, and new mobile databases are continuously developed and announced. In this paper, the most common mobile database, SQLite3 is selected and experimented to test and understand the update performance and characteristics. The results of experiment are compared with the one of Oracle database at the same condition to evaluate the experiment.

  • PDF

The Study of Ancient Hat on The Oracle Bone Inscription and Bronzeware Script (갑골문(甲骨文)과 금문(金文)의 고대(古代) 관모(冠帽) 고찰(考察))

  • Kim, Jin Seon;Cho, Woo Hyun
    • Journal of the Korean Society of Costume
    • /
    • v.67 no.2
    • /
    • pp.101-115
    • /
    • 2017
  • Ancient documents, characters, and relics are the utmost important materials when it comes to researching ancient clothing. Of these, the ancient characters explain the contents of the time, which makes it an objective historical record. China has hieroglyphics, such as oracle bone inscription and bronzeware script, which existed in Sang[Eun] Ju era. This character is formed by a simple line and detailed drawing, showing the object or the concrete form and characteristics, so the reader can understand the meaning. Oracle bone inscription and bronzeware script, which are written in pictograph, include contents that help to grasp the original shape and form of ancient official hats. Chinese characters Geon(巾, 건) Byun(㝸, 변) Myun(免, 면) Mo(冒, 모) Ju(冑, 주) and Kwan(冠, 관), which are the names of the official hats, have been researched, and Mi(美, 미) Ryung(令, 령) Wang(王, 왕) and Hwang(皇, 황), which are the characters related to the official hats, have been studied. Geon(巾, 건) switched its form from shape of material around waist to wraping wearer's head. Byun(㝸, 변) is a hat with decoration, and Myun(免, 면) is in form of a helmet with ornaments. Mo(冒, 모) in bone script looks like a hat with decorations on each sides, but in bronzeware script, it is more like a simple round hat Ju(冑, 주) covers one's head and has decorated ornaments, and The Kwan(冠, 관), which is now a common name of official hats, is not shown in oracle bone inscription or bronzeware script, It might have been used later than the other two types of hats. As for the related Chinese characters, Mi(美, 미) is in the shape of a feather decoration, Ryung(令, 령) is similar in shape to the letter 'A', and Wang(王, 왕) is in shape of simple hat from 령 with decorations. Hwang(皇, 황) is like a Wang(王, 왕) hat, but with fancier decorations. Oracle bone inscription and bronzeware script show the original form and shape of ancient hats.

Design and Implementation of GIS using Servlet on the Internet (인터넷에서 서블릿을 이용한 지리정보시스템의 설계 및 구현)

  • 김병학
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2001.06a
    • /
    • pp.49-52
    • /
    • 2001
  • In this paper, the design and implementation of the Geographic Information Retrieval System for the ArcView is described. The environments for the system configurations include a PC server under Linux Operating System, Apache Web-server, and Oracle as database engine. In addition, JSP(Java Server page) and Servlet is used to view database and Map-Image.

  • PDF

Transforming XML DTD to SQL Schema based on JDBC (XML DTD의 JDBC 기반 SQL 스키마로의 변환)

  • 이상태;주경수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.29-40
    • /
    • 2002
  • The information exchange on the using of XML such as B2B electronic is common. So the efficient method to store XML message in database is needed. Because the ORDBMS is extended to ORDBMS for supporting multimedia application such as Oracle8i, 9i, Informix and SQL2000 server, SQL2, the standard RDB is extended to SQL3 for ORDB, And the XML application based on java such as J2EE is extended. Therefor it is necessary for the efficient connection methods based on JDBC between XML application and database system. In this paper, the methodology a transformation XML DTD to SQL3 schema is proposed. For the transformation, first the methods of transformation XML DTD to object model in UML class diagram are proposed. And then the methods of mapping transferred object models to SQL3 schema are proposed. This approach for transform::1lion XML. DTD to SQL3 schema such as Oracle8i, 9i, Informix and SQL2000 server based on java is proposed in this paper, can be used in database design to build XML applications based on ORDB.

  • PDF

The Node Scheduling of Multi-Threaded Process for CC-NUMA System (CC-NUMA 시스템을 위한 다중 스레드 프로세스의 노드 스케줄링 설계 및 구현)

  • Kim, Jeong-Nyeo;Kim, Hae-Jin;Lee, Cheol-Hoon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.488-496
    • /
    • 2000
  • this paper describes the design and implementation of node scheduling for MX Server that is CC-NUMA System COMSIX, the operating system of MX Server, is designed to suit for CC-NUMA Architecture. MX Server consists of up to 8 nodes, and each node is connected by SCI ring. This node scheduling scheme considers data locality for performance improvement of Oracle8i DBMS on the CC-NUMA architecture. For DBMS such as Oracle8i, a multi-threaded process may be run to tie on particular disk. We have developed a CG binding function that the multi-threaded process bound the node. Currently, We don't have an available CC-NUMA Platform. Instead of MX Server, we developed the Node scheduling scheme for multi-threaded process to suit server platform on the PC test-bed and tested completely.

  • PDF

Feature Extraction for Content-based Image Retrievaland Implementation of Image Database Retrieval System (내용기반 영상 검색을 위한 특징 추출 및 영상 데이터베이스 검색 시스템 구현)

  • Kim, Jin-Ah;Lee, Seung-Hoon;Woo, Yong-Tae;Jung, Sung-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.8
    • /
    • pp.1951-1959
    • /
    • 1998
  • In this paper, we propose an efficient feature extaetion method for content-based approach and implement an image retrieval system in the Oracle database. First, we estract color feature by the modified Stricker's method from input images, and this color feature and ART2 neural network are used for the rough classification of images. Next, we extract texture feature using wavelet transform, and finally exeute the detailed classification on the rough classified images from the previous step. Exsing the proposed feature extraction methods, we implement a useful image retrieval system by Extended SQI, statement on the relational database. The proposed system is implemented on the Oracle DBMS, and in the experimental results with 200 sample images, it shows the retrieval rate 90% and 81% in Recall and Precision, respectively.

  • PDF

Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD (BOZ-PAD 방법을 사용하는 블록암호 기반 CBC|CBC 이중 모드에 대한 패딩 오라클 공격)

  • Hwang, Seongjin;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.89-97
    • /
    • 2015
  • In the various application environments on the internet, we use verified cipher algorithm to protect personal information of electronic commerce or application environments. Even so, if an application method isn't proper, the information you want to keep can be intercepted. This thesis studied about result of Padding Oracle Attack, an application environment which apply CBC|CBC operational mode based on block cipher and BOZ padding method.