• Title/Summary/Keyword: Transaction Log

Search Result 62, Processing Time 0.024 seconds

An Efficient Scheme of Performing Pending Actions for the Removal of Datavase Files (데이터베이스 파일의 삭제를 위한 미처리 연산의 효율적 수행 기법)

  • Park, Jun-Hyun;Park, Young-Chul
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.494-511
    • /
    • 2001
  • In the environment that database management systems manage disk spaces for storing databases directly, this paper proposes a correct and efficient scheme of performing pending actions for the removal of database files. As for performing pending actions, upon performing recovery, the recovery process must identify unperformed pending actions of not-yet-terminated transactions and then perform those actions completely. Making the recovery process identify those actions through the analysis of log records in the log file is the basic idea of this paper. This scheme, as an extension of the execution of transactions, fuzzy checkpoint, and recovery of ARIES, uses the following methods: First, to identify not-yet-terminated transactions during recovery, transactions perform pending actions after writing 'pa_start'log records that signify both the commit of transactions and the start of executing pending actions, and then write 'eng'log records. Second, to restore pending-actions-lists of not-yet-terminated transactions during recovery, each transaction records its pending-actions-list in 'pa_start'log record and the checkpoint process records pending-actions-lists of transactions that are decided to be committed in 'end_chkpt'log record. Third, to identify the next pending action to perform during recovery, whenever a page is updated during the execution of pending actions, transactions record the information that identifies the next pending action to perform in the log record that has the redo information against the page.

  • PDF

A Study on the Factors Determining Officetel Price in Busan (부산지역 오피스텔 가격 결정요인 분석)

  • Choi, Yeol;Kim, Hyeong Jun;Yeo, Jung Hoon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.3
    • /
    • pp.725-735
    • /
    • 2015
  • The aim of this study is to specifically understand the officetel market by empirical analysis for the determining factors that affect determining the price of the officetel in Busan. In my opinion, it can help officetel providers to select the appropriate size and location that analysis for the factors determining officetel price with market price, and also it can help customers officetel to choice depending on the purpose. So I was conducting this study. In this study, I analyzes the factors determining the price of Officetel using a OLS linear regression, semi-log model, and a robust regression-Busan area Officetel Real Transaction Price as the dependent variable and factors representing the physical characteristics, locational characteristics and regional characteristics as independent variables.

A Recovery Scheme of SSD-based Databases using Snapshot Log (스냅샷 로그를 사용한 SSD 기반 데이터베이스 복구 기법)

  • Lim, Seong-Chae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.85-91
    • /
    • 2019
  • In this paper, we propose a new logging and recovery scheme that is suited for the high-performance transaction processing system base on flash memory storage. The proposed scheme is designed by considering flash's I/O characteristic of asymmetric costs between page update/read operations. That is, we substitute the costly update operation with writing and real-time usage of snapshot log, which is for the page-level physical redo. From this, we can avoid costly rewriting of a dirty page when it is evicted form a buffering pool. while supporting efficient revery procedure. The proposed scheme would be not lucrative in the case of HDD-based system. However, the proposed scheme offers the performance advance sush as a reduced number of updates and the fast system recovery time, in the case of flash storage such as SSD (solid state drive). Because the proposed scheme can easily be applied to existing systems by saving our snapshot records and ordinary log records together, our scheme can be used for improving the performance of upcoming SSD-based database systems through a tiny modification to existing REDO algorithms.

Financial Products Recommendation System Using Customer Behavior Information (고객의 투자상품 선호도를 활용한 금융상품 추천시스템 개발)

  • Hyojoong Kim;SeongBeom Kim;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.111-128
    • /
    • 2023
  • With the development of artificial intelligence technology, interest in data-based product preference estimation and personalized recommender systems is increasing. However, if the recommendation is not suitable, there is a risk that it may reduce the purchase intention of the customer and even extend to a huge financial loss due to the characteristics of the financial product. Therefore, developing a recommender system that comprehensively reflects customer characteristics and product preferences is very important for business performance creation and response to compliance issues. In the case of financial products, product preference is clearly divided according to individual investment propensity and risk aversion, so it is necessary to provide customized recommendation service by utilizing accumulated customer data. In addition to using these customer behavioral characteristics and transaction history data, we intend to solve the cold-start problem of the recommender system, including customer demographic information, asset information, and stock holding information. Therefore, this study found that the model proposed deep learning-based collaborative filtering by deriving customer latent preferences through characteristic information such as customer investment propensity, transaction history, and financial product information based on customer transaction log records was the best. Based on the customer's financial investment mechanism, this study is meaningful in developing a service that recommends a high-priority group by establishing a recommendation model that derives expected preferences for untraded financial products through financial product transaction data.

A Data Mining Technique for Customer Behavior Association Analysis in Cyber Shopping Malls (가상상점에서 고객 행위 연관성 분석을 위한 데이터 마이닝 기법)

  • 김종우;이병헌;이경미;한재룡;강태근;유관종
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.21-36
    • /
    • 1999
  • Using user monitoring techniques on web, marketing decision makers in cyber shopping malls can gather customer behavior data as well as sales transaction data and customer profiles. In this paper, we present a marketing rule extraction technique for customer behavior analysis in cyber shopping malls, The technique is an application of market basket analysis which is a representative data mining technique for extracting association rules. The market basket analysis technique is applied on a customer behavior log table, which provide association rules about web pages in a cyber shopping mall. The extracted association rules can be used for mall layout design, product packaging, web page link design, and product recommendation. A prototype cyber shopping mall with customer monitoring features and a customer behavior analysis algorithm is implemented using Java Web Server, Servlet, JDBC(Java Database Connectivity), and relational database on windows NT.

  • PDF

Analysis of Purchase Process Using Process Mining (프로세스 마이닝을 이용한 구매 프로세스 분석)

  • Kim, Seul-Gi;Jung, Jae-Yoon
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.47-54
    • /
    • 2018
  • Previous studies of business process analysis have analyzed various factors such as task, customer service, operator convenience, and execution time prediction. To accurately analyze these factors, it is effective to utilize actual historical data recorded in information systems. Process mining is a technique for analyzing various elements of a business process from event log data. In this case study, process mining was applied to the transaction data of a purchase agency to analyze the business process of their procurement process, the execution time, and the operators.

Page Logging System for Web Mining Systems (웹마이닝 시스템을 위한 페이지 로깅 시스템)

  • Yun, Seon-Hui;O, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.847-854
    • /
    • 2001
  • The Web continues to grow fast rate in both a large aclae volume of traffic and the size and complexity of Web sites. Along with growth, the complexity of tasks such as Web site design Web server design and of navigating simply through a Web site have increased. An important input to these design tasks is the analysis of how a web site is being used. The is paper proposes a Page logging System(PLS) identifying reliably user sessions required in Web mining system PLS consists of Page Logger acquiring all the page accesses of the user Log processor producing user session from these data, and statements to incorporate a call to page logger applet. Proposed PLS abbreviates several preprocessing tasks which spends a log of time and efforts that must be performed in Web mining systems. In particular, it simplifies the complexity of transaction identification phase through acquiring directly the amount of time a user stays on a page. Also PLS solves local cache hits and proxy IPs that create problems with identifying user sessions from Web sever log.

  • PDF

Relationships between Topological Structures of Traffic Flows on the Subway Networks and Land Use Patterns in the Metropolitan Seoul (수도권 지하철망 상 통행흐름의 위상학적 구조와 토지이용의 관계)

  • Lee, Keum-Sook;Hong, Ji-Yeon;Min, Hee-Hwa;Park, Jong-Soo
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.10 no.4
    • /
    • pp.427-443
    • /
    • 2007
  • The purpose of this study is to investigate spacio-temporal structures of traffic flows on the subway network in the Metropolitan Seoul, and the relationships between topological structures of traffic flows and land use patterns. In particular we analyze in the topological structures of traffic flows on the subway network in time dimension as well as in spatial dimension. For the purpose, this study utilizes data mining techniques to the one day T-card transaction data of the last four years, which has developed for exploring the characteristics of traffic flows from large scale trip-transaction databases. The topological structures of traffic flows on the subway network has changed considerably during the last four years. The volumes of traffic flows, the travel time and stops per trip have increased until 2006 and decreased again in 2007. The results are visualized by utilizing GIS and analyzed, and thus the spatial patterns of traffic flows are analyzed. The spatial distribution patterns of trip origins and destinations show substantial differences among time zones during a day. We analyze the relationships between traffic flows at subway stops and the geographical variables reflecting land use around them. We obtain 6 log-linear functions from stepwise multiple regression analysis. We test multicollinearity among the variables and autocollelation for the residuals.

  • PDF

A Comparison of User Search Behavior on PC and Mobile Phone: A Log Analysis of 1300K Site (이용자들의 PC 검색 행태와 모바일 검색 행태 비교: 1300K 로그 분석을 중심으로)

  • Park, Soyeon;Cho, Kihun;Choi, Kirin
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.89-107
    • /
    • 2017
  • This study aims to compare information seeking behavior of 1300K users on PC and mobile phone. Transaction logs of 1300K, a major Korean shopping search engine, were analyzed. These transaction logs were collected over 1 month period, from April 1 to April 31, 2016. The results of this study show that there are a little more mobile sessions than PC sessions. Users conducted slightly more browsing on PCs than mobile phones, whereas users submitted queries more than two times on mobile phones than on PCs. Users clicked more search results on PCs than mobile phones, whereas users made important decision makings such as product purchases more on mobile phones than PCs. Top queries and categories were similar between PCs and mobile phones. Queries and categories on mobile phones were more focused than queries on PCs. Overall, mobile search behavior is more simple, passive, and focused than PC search behavior. The results of this study can be implemented to the effective improvement and development of search services for different devices.

A Study on about Securing Safe Sailing on the Sea Route of the North Pacific Ocean in Winter Season (북태평양에서의 동계항해안전에 관한 연구)

  • 윤점동;권종호;주재훈;허용범;최명식
    • Journal of the Korean Institute of Navigation
    • /
    • v.11 no.2
    • /
    • pp.1-31
    • /
    • 1987
  • Nowadays, the transportation of almost all cargoes depends on sea routes in international trade. In the transaction of trade, cargo transportation must be completed on the base of two contrary objectives, one of which is to protect the vessel, cargoes and crew aborad her safely through every step of the transportation and the other is to pursue profits from the transaction of the trade. In spite of the great development of the modern techniques in shipbuilding today, many sea disaters of big merchant vessels have been occurring successively in winter seasons every year on the sea routes of the North Pacific Ocean. Whenever the accident of losing a vessel in rough sea occurred , many experts of the country to which the vessel belonged had tried to take out the reason of the missing without manifesting the exact cause of the unhappy occurrence. In this paper, we calculated ocean wave status along the route of the North Pacific Ocean theoretically concluded by us as optimum on the basis of weather and sea conditions. In the calculation, we used ITTC wave spectrum formula and meteorological data of "Winds '||'&'||' Waves of the north Pacific Ocean" edited by Ship Research Institute of Japan on the basic data assembled by World Meterological Organization through past 10 years. We selected three sample vessels of most common size in the North Pacific Ocean Routes, a container, a log carrier and a bulk carrier and applied tree sample vessels to the calculated sea conditions for getting the rolling angles of the vessels and stress exerting on the hulls. Examining the calculated results, we concluded as follows; 1. Under the condition of these status7 by beaufort scale, "heave to" maneuvering is the best and safest way to steer every vessel. 2. The most dangerous part of sea area along the west bound optimum route of the North Pacific Ocean in winter season, is the southern sea area of the Kamchatka peninsula.a peninsula.

  • PDF