• Title/Summary/Keyword: SQL analysis

Search Result 142, Processing Time 0.03 seconds

InTouch HMI Development to Real-Time Power System Analysis (실시간 전력 계통 해석을 위한 InTouch HMI 구현)

  • Ahn, Chang-Han;Lee, Sang-Deok;Park, Ji-Ho;Chang, Byung-Hoon;Lee, Hyun-Chul;Lee, Geun-Joon;Baek, Young-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.12
    • /
    • pp.2322-2327
    • /
    • 2009
  • Uncertainty of power system operation increases due to complexity and facilities diversification in the power system. Therefore the importance of SCADA(Supervisory Control and Data Acquisition) system which obtain and manage the actual data in real-time is very important. Accordingly in the studies of power system analysis, the efforts to include real-time power system analysis in simulation and applications are made in many ways. The real-time communication characteristics of SCADA system is considered so as to develop the power system analysis program that matches actual system conditions. The observation and management of SCADA system is realized by Intouch which is mainly used for factory automation and PSS/E(Power System Simulator for Engineers) provides real time system data. SQL DB and Python language is used for real-time communication between the softwares. It is very comfortable to use the various functions in Intouch WindowMaker.

An Efficient Method for Design and Implementation of Tweet Analysis System (효율적인 트윗 분석 시스템 설계 및 구현 방법)

  • Choi, Minseok
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.43-50
    • /
    • 2015
  • Since the popularity of social network services (SNS) rise, the data produced from them is rapidly increased. The SNS data includes personal propensity or interest and propagates rapidly so there are many requests on analyzing the data for applying the analytic results to various fields. New technologies and services for processing and analyzing big data in the real-time are introduced but it is hard to apply them in a short time and low coast. In this paper, an efficient method to build a tweet analysis system without inducing new technologies or service platforms for handling big data is proposed. The proposed method was verified through building a prototype monitoring system to collect and analyze tweets using the MySQL database and the PHP scripts.

Implementation of Source Analysis Tool for Vulnerability Search of Web Program (웹 프로그램의 취약점 검색을 위한 소스분석 툴 구현)

  • Kim, Soung-Uk;Hoang, Tae-Moon;Kim, Pan-Kyu;Park, Sang-Su;Lee, Jong-Hyeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.776-779
    • /
    • 2005
  • The Program language for web, such as PHP, JSP, ASP and so on, make it possible to offer more user interactive page by using with HTML. These language and program have been developed with great speed, but security part could not catch up with this development. As a result, it has brought a problem which is expose many server systems to the outside. In this research, we implement Web and SQL analysis program which can analysis hacking causing factor. With this analysis program, we will show you how much efficient it has compared with security patch for server system.

  • PDF

Analysis of the Hashing and Encryption Algorithms Applied to the Linux (리눅스에 적용된 해시 및 암호화 알고리즘 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae;Soh, Wooyoung
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.72-78
    • /
    • 2016
  • MD-5 has been the hash algorithm to encrypt the user's password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.

System Implementation and Analysis of Job Analysis for University Curriculum (교육과정체계 수립을 위한 직무분석 시스템 구현 및 적용사레 분석)

  • Hyun, Seung-Ryul;Lee, Sang-Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.127-134
    • /
    • 2009
  • Universities or job training institutes need to develop training courses that match up with requirements of enterprises. Therefore, job analysis system that analyzes skills which are needed for job performing and makes it possible to be reflected in the curriculums is requested for deriving generalized curriculum system. In this paper, to develop a curriculum that fulfills the requirements of enterprises, we implemented a series of DACUM(Developing A CurriculUM) based process that performs verification of tasks for workers and roadmap for curriculum, etc. And, we analyzed a instance of this application system. The proposed system is implemented by Java and MS Access database. The system is possible to work with central database realized by MS SQL Server through the Internet.

Image Detecting System for Pinhole with Photoelectric Sensors (광전(光電)센서를 활용한 핀홀의 영상검출시스템)

  • Kang, Min-Goo;Zo, Moon-Shin;Jeon, Jong-Suh
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.17-22
    • /
    • 2012
  • In this paper, a photoelectric image detection system is proposed using an APD(Avalanche Photodiode) sensor, a LED illuminator, and fiberoptic waveguides. This proposed pinhole detection system can detect the pinholes of 100 micron with the speed rate of 1,000mpm(meter per minute). And detecting performance of image system is improved by the SQL based DB analysis of classifying pinhole's detected location and size using image detection algorithms.

A Study on the Advanced Association Rules Algorithm of n-Items (개선된 n-항목 연관 규칙 알고리즘 연구)

  • 황현숙;어윤양
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.4
    • /
    • pp.29-39
    • /
    • 2002
  • The transaction tables of the existing association algorithms have two column attributes : It is composed of transaction identifier (Transaction_id) and an item identifier (item). In this kind of structure, as the volume of data becomes larger, the performance for the SQL query statements came applicable decreases. Therefore, we propose advanced association rules algorithm of n-items which can transact multiple items (Transaction_id, Item 1, Item 2…, Item n). In this structure, performance hours can be contracted more than the single item structures, because count can be computed by query of the input transaction tables. Our experimental results indicate that performance of the n items structure is up to 2 times better than the single item. As a result of this paper, the proposed algorithm can be applied to internet shopping, searching engine and etc.

Analysis of Foreign Tourists' Credit Card Data through MS SQL and R Studio and Identifying Tourism Consumption Trends (MS SQL과 R Studio를 통한 외국 관광객 신용 카드 사용 데이터 분석과 그에 따른 관광소비동향 파악)

  • Kim, Jun-Mok;Kang, Su-Jeong;Park, Jee-Meen;Lee, Seung-Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.595-598
    • /
    • 2016
  • 외국관광객의 신용카드 거래내역을 통해 지역별, 국적별, 업종별 소비 형태와 동향을 파악하고, 이에 따른 여러 이해관계자들의 전략을 수립하는데 필요한 정보를 제공한다.

A PageRank based Data Indexing Method for Designing Natural Language Interface to CRM Databases (분석 CRM 실무자의 자연어 질의 처리를 위한 기업 데이터베이스 구성요소 인덱싱 방법론)

  • Park, Sung-Hyuk;Hwang, Kyeong-Seo;Lee, Dong-Won
    • CRM연구
    • /
    • v.2 no.2
    • /
    • pp.53-70
    • /
    • 2009
  • Understanding consumer behavior based on the analysis of the customer data is one essential part of analytic CRM. To do this, the analytic skills for data extraction and data processing are required to users. As a user has various kinds of questions for the consumer data analysis, the user should use database language such as SQL. However, for the firm's user, to generate SQL statements is not easy because the accuracy of the query result is hugely influenced by the knowledge of work-site operation and the firm's database. This paper proposes a natural language based database search framework finding relevant database elements. Specifically, we describe how our TableRank method can understand the user's natural query language and provide proper relations and attributes of data records to the user. Through several experiments, it is supported that the TableRank provides accurate database elements related to the user's natural query. We also show that the close distance among relations in the database represents the high data connectivity which guarantees matching with a search query from a user.

  • PDF

A study on data collection environment and analysis using virtual server hosting of Azure cloud platform (Azure 클라우드 플랫폼의 가상서버 호스팅을 이용한 데이터 수집환경 및 분석에 관한 연구)

  • Lee, Jaekyu;Cho, Inpyo;Lee, Sangyub
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.329-330
    • /
    • 2020
  • 본 논문에서는 Azure 클라우드 플랫폼의 가상서버 호스팅을 이용해 데이터 수집 환경을 구축하고, Azure에서 제공하는 자동화된 기계학습(Automated Machine Learning, AutoML)을 기반으로 데이터 분석 방법에 관한 연구를 수행했다. 가상 서버 호스팅 환경에 LAMP(Linux, Apache, MySQL, PHP)를 설치하여 데이터 수집환경을 구축했으며, 수집된 데이터를 Azure AutoML에 적용하여 자동화된 기계학습을 수행했다. Azure AutoML은 소모적이고 반복적인 기계학습 모델 개발을 자동화하는 프로세스로써 기계학습 솔루션 구현하는데 시간과 자원(Resource)를 절약할 수 있다. 특히, AutoML은 수집된 데이터를 분류와 회귀 및 예측하는데 있어서 학습점수(Training Score)를 기반으로 보유한 데이터에 가장 적합한 기계학습 모델의 순위를 제공한다. 이는 데이터 분석에 필요한 기계학습 모델을 개발하는데 있어서 개발 초기 단계부터 코드를 설계하지 않아도 되며, 전체 기계학습 시스템을 개발 및 구현하기 전에 모델의 구성과 시스템을 설계해볼 수 있기 때문에 매우 효율적으로 활용될 수 있다. 본 논문에서는 NPU(Neural Processing Unit) 학습에 필요한 데이터 수집 환경에 관한 연구를 수행했으며, Azure AutoML을 기반으로 데이터 분류와 회귀 등 가장 효율적인 알고리즘 선정에 관한 연구를 수행했다.

  • PDF