• Title/Summary/Keyword: Storing method

Search Result 594, Processing Time 0.027 seconds

An Integrated Method of Iterative and Incremental Requirement Analysis for Large-Scale Systems (시스템 요구사항 분석을 위한 순환적-점진적 복합 분석방법)

  • Park, Jisung;Lee, Jaeho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.4
    • /
    • pp.193-202
    • /
    • 2017
  • Development of Intelligent Systems involves effective integration of large-scaled knowledge processing and understanding, human-machine interaction, and intelligent services. Especially, in our project for development of a self-growing knowledge-based system with inference methodologies utilizing the big data technology, we are building a platform called WiseKB as the central knowledge base for storing massive amount of knowledge and enabling question-answering by inferences. WiseKB thus requires an effective methodology to analyze diverse requirements convoluted with the integration of various components of knowledge representation, resource management, knowledge storing, complex hybrid inference, and knowledge learning, In this paper, we propose an integrated requirement analysis method that blends the traditional sequential method and the iterative-incremental method to achieve an efficient requirement analysis for large-scale systems.

A Study on the Improvement Method of Deleted Record Recovery in MySQL InnoDB (MySQL InnoDB의 삭제된 레코드 복구 기법 개선방안에 관한 연구)

  • Jung, Sung Kyun;Jang, Jee Won;Jeoung, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.12
    • /
    • pp.487-496
    • /
    • 2017
  • In MySQL InnoDB, there are two ways of storing data. One is to create a separate tablespace for each table and store it separately. Another is to store all table and index information in a single system tablespace. You can use this information to recover deleted data from the record. However, in most of the current database forensic studies, the former is actively researched and its structure is analyzed, whereas the latter is not enough to be used for forensics. Both approaches must be analyzed in terms of database forensics because their storage structures are different from each other. In this paper, we propose a method for recovering deleted records in a method of storing records in IBDATA file, which is a single system tablespace. First, we analyze the IBDATA file to reveal its structure. And introduce delete record recovery algorithm which extended to an unallocated page area which was not considered in the past. In addition, we show that the recovery rate is improved up to 68% compared with the existing method through verification using real data by implementing the algorithm as a tool.

Development of Trigger for Signal Storage Reflecting the Behavior Characteristics of the Free-Fall Cone Penetration Test System (자유낙하식 콘관입시험 시스템의 거동특성을 반영한 신호저장용 트리거 개발)

  • Kang, Hyoun;Shin, Changjoo;Kwon, OSoon;Jang, In Sung;Baek, Seungjae;Seo, Jung-min;Won, Sung Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.16-22
    • /
    • 2020
  • The Korea Institute of Ocean Science & Technology is developing a free-fall cone penetration test system (FFCPT) that can acquire the characteristics of the seabed surface soil. To obtain the data through the FFCPT, a method of storing the signals for the entire time or a method of storing the signal for user-defined time can be considered. For efficient data storage and management, it is advantageous that data be stored by user definition. Therefore, this study analyzed the basic behavior using the signal acquired through a sensor mounted in the FFCPT and developed a trigger method to recognize the start and end of data storage using a depth sensor. The start and endpoints of the fall were determined using the moving average difference of 3 and 0.03 seconds of the depth signal. A real sea-trial test was performed using the FFCPT, and the developed trigger was operated normally.

Approximation of the smooth functions by using fuzzy systems: A review of the advantages (퍼지 시스템을 이용한 함수표현의 장점; A REVIEW)

  • Moon B. S.;Lee J. S.;Lee D. Y.;Kwon K. C.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.276-279
    • /
    • 2005
  • A review of how the functions of two or more independent variables can be approximated by using fuzzy systems is provided in this paper. We start with an exact represention of a linear interpolation function of two independent variables by using a fuzzy system. Next, we describe how this function can be approximated by another fuzzy system with a lesser number or with a desired number of output fuzzy sets. Thus, a reduction of the storage needed is achieved by storing the fuzzy rules or equivalently the output fuzzy set numbers instead of storing the whole discrete function values. A description on how the cubic spl me interpolation function can be represented exactly by using the fuzzy system method is provided, along with a few examples where fuzzy rule tables with a size of 7$\times$7 provide a representation of the functions with relative errors of the order of $10^{2}$ or less.

  • PDF

A Unified Design Methodology Development For XML Application based on Relational Database using UML Class (UML 클래스를 이용한, 관계형 데이터베이스 기반의 XML 응용을 위한 통합 설계 방법론 개발)

  • 방승윤;주경수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.1
    • /
    • pp.85-102
    • /
    • 2003
  • Nowadays an information exchange on XML such as B2B electronic commerce is spreading. Therefore the systematic and stable management mechanism for storing the exchanged information is needed. For this goal there are many research activities for connection between XML application and relational database. But because XML data have hierarchical structures and relational database can store only flat-structured data, we need to make the conversion rule which changes the hierarchical architecture to 2-dimensional information. Accordingly the modeling methodology for storing each structured information in relational database is needed. In this paper, we introduce a XML modeling methodology to design W3C XML schema using UML and we propose a unified design methodology for relational database schema to store XML data efficiently in relational databases. In the second place, in order to verify objectivity of a unified design methodology. By the way of Ronald Bourret, First we introduce the method of the transformation from XML schema to object model and second we translate object model into relational database schema. Therefore we show the mutual consistency between those consequence, and so can verify a unified design methodology.

  • PDF

Interpretation of the Nok-U-dang, Traditional Upper-Class Mansion in Haenam -with Dweller's Life and Agricultural Production- (상류(上流) 전통주거(傳統住居) 해남(海南) 녹우당(綠雨堂)의 해석(解釋) -거주자(居住者) 생활(生活)과 농업경영(農業經營)으로-)

  • Lee, Hee-Bong;Lee, Hyang-Mee
    • Journal of architectural history
    • /
    • v.11 no.1 s.29
    • /
    • pp.65-84
    • /
    • 2002
  • This study has main purpose to understand and interpret the house Nok-U-dang, an upper class built in Chosun dynasty, not by outsider researcher's view but insider dweller's view. To interpret correctly, dweller's everyday life in the space and form is examined on a microscale beyond the physical space and form of the house, main object of architectural history To understand the present form exactly, the study restore traditional life in past era, 1940s. Main method of restoration is the ethnographic interview, based on cultural anthropology. Like any other upper-class house, the house has been influenced under ruling Confucian ideology in Chosun dynasty: separation of man's and woman's quarters and hierachical arrangement by generation, and worshipping ceremony for ancestor. However, it is by practical management for agricultural production that every court and building of the Noku-Dang can be explained correctly; preparing seed for sowing, tool storing, preparing and serving meal for laborers, making manure, harvesting, threshing grain, storing grain and so on. Precedent studies interpreted the house by the Confucian principle too much and made conclusion of dignity and austerity of ritual: woman's quarter, is closed and serene space. However this study shows that the space is semi-opened and composite space by agricultural works. And the Sarangchae, master's quarter, is located properly at visual center to control every agricultural activity.

  • PDF

Study on the food control system of the five-star hotels in Gyeong-Ju area (경주지역 특급호텔 식자재 관리시스템의 실태와 개선 방안(H호텔을 중심으로))

  • 최수근
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.14 no.1
    • /
    • pp.95-110
    • /
    • 2003
  • Although Korea has just passed the IMF intervention, the hotel business in Gyeongju does not seem to entirely recover from the econmic recession. In particular, the sales of food and beverage dominantly on domestic demand are still in difficulty. This research was undertaken in order to identify the problems of food control in the five-star hotels in Gyeongju area, and to recommend some suggestion of enhancing the current system to boost the revenue. It is revealed that most of the hotels in question are poorly operating for the food control. In particular, they have spent too much unnecessary cost for the ordering, inspecting, issuing and storing food. A five-star hotel is selected for the survey, and the data obtained from the survey are properly manipulated for the analysis. The problems of the food control system are as follows : Firstly, it hasn't developed a standardized manual for the ordering, inspecting, issuing and storing food. Secondly, an appropriate food control system incorporating the unique Gyeongju environment should be developed. Thirdly, 'first ordered, first issued' method should be applied to reduce to reduce the cost Lastly, few managers recognizes the importance of food control.

  • PDF

Change of Furniture for Rural House in the Vicinity of Seoul (서울근교 농촌 주택의 수납가구 변화에 관한 연구 - 경기도 용인군 용인읍 삼가3리 마을의 현지조사를 중심으로-)

  • 박영순
    • Journal of the Korean Home Economics Association
    • /
    • v.27 no.2
    • /
    • pp.97-114
    • /
    • 1989
  • The purpose of this study is to analyze style and usage of furniture for rural house and to organize the changing process of the furniture. The data were collected from 32 residences in Samga 3-ri village in Youngin Kyungkido by field survey measuring and sketching the furniture were also performed as a supplement of investigation. Qualitative analysis were done by discriptive method. 1) It was found that the major furniture for rural household were storing furniture such as wardrobes, blanket chests, drawer chests, cupboards until 1976. The time when the supportive furniture such as sofa sets and dining sets were purchased on the rural area was after late 1970's. 2) The style of the furniture was investigated through the analysis of the size, material, structure, finishing and ornamentation. The changing process of style was from luxurious look to natural look. Therefore the storing furniture of the rural household showed a state of transition between traditional and modern style. 3) As a result of analyzing the place where the furniture were used, the cupboards showed to move from Marus (the living room area) to Buauks (the kitchens). The wardrobes were mainly used in An-Bangs(the master bedrooms) and Kuhnnun-Bangs(the room opposite the master bedrooms), but the style of those wardrobes were different each other.

  • PDF

Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies (개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석)

  • Lee, Jae-Geun;Kang, Sang-Ug;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.767-779
    • /
    • 2013
  • A field of privacy protection lacks statistical information about the current status, compared to other fields. On top of that, since it has not been classified as a concrete separate field, the related survey is only conducted as a part of such concrete areas. Furthermore, this trend of being regarded as a part of fields such as informatization, information protection and law will continue in the near future. In this paper, a novel and practical way for collecting and storing a big amout of data from 110,000 privacy policies by data controller is proposed and the real analysis results is also shown. The proposed method can save time and cost compared with the traditional survey-based method while maintaining or even advancing the accuracy of results and speediness of process. The collected big personal data can be used to set up various kinds of statistical models and they will play an important role as a breakthrough of observing the present status of privacy information protection policy. The big data concept is incorporated into the privacy protection and we can observe the method and some results throughout the paper.

Automatic Extraction and Preferred Processing of ROI in JPEG2000 (JPEG2000에서 ROI의 자동 추출과 우선적 처리)

  • Park, Jae-Heung;Seo, Yeong-Geon;Kim, Sang-Bok;Kang, Ki-Jun;Kim, Ho-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.127-136
    • /
    • 2008
  • A digitized image passes by encoding, storing or transmitting to show it to users. In this process, may be users would want to see a specific region of the image. And depending on the system features or in the case that the resolution of the image is large, it will take a huge time that the image show to the users. In this time, it will be resonable that the part users want to see shows earlier and afterward the other parts show. For this, JPEG2000 standards provide ROI. Although ROI extraction that users specify ROI arbitrarily is the best, people not always participate in doing all the images. There needs an automatic ROI extracting and storing in some images. JPEG2000 should extract and send an ROI automatically when the images is encoded without ROI. This study proposes a method that automatically extracts an ROI, makes the ROI masks, transfers the masked image preferentially and the background. And the study compares and experiments the proposed method and the method not having ROI.

  • PDF