• Title/Summary/Keyword: active database

Search Result 387, Processing Time 0.022 seconds

Design and Implementation of Web Server for Analyzing Clickstream (클릭스트림 분석을 위한 웹 서버 시스템의 설계 및 구현)

  • Kang, Mi-Jung;Jeong, Ok-Ran;Cho, Dong-Sub
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.945-954
    • /
    • 2002
  • Clickstream is the information which demonstrate users' path through web sites. Analysis of clickstream shows how web sites are navigated and used by users. Clickstream of online web sites contains effective information of web marketing and to offers usefully personalized services to users, and helps us understand how users find web sites, what products they see, and what products they purchase. In this paper, we present an extended web log system that add to module of collection of clickstream to understand users' behavior patterns In web sites. This system offers the users clickstream information to database which can then analyze it with ease. Using ADO technology in store of database constructs extended web log server system. The process of making clickstreaming into database can facilitate analysis of various user patterns and generates aggregate profiles to offer personalized web service. In particular, our results indicate that by using the users' clickstream. We can achieve effective personalization of web sites.

Application of Flipped Learning in Database Course (데이터베이스 교과목에서 플립러닝 적용 사례)

  • Kim, Eun-Gyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.847-856
    • /
    • 2016
  • Flipped learning is a pedagogic model in which the typical lecture and homework elements of a course are reversed. Short video lectures or e-learning contents or other learning materials are viewed by students at home before the in-class session, while students are mainly carried out diverse active learning activities such as the discussions, exercises, team projects and so on in class time. Recently flipped learning has been emerging as an effective teaching-learning method that can train the 21st century talents who can create creative values based on fusion competencies. Based on the experience in applying the flipped learning to the database class that is an elective course of the school of computer engineering through three semesters, this paper proposes a flipped learning model consists of 7 steps in detail. Also, this paper analyzes the effects and weak points of the flipped learning and proposes several things for the successful flipped learning application.

Empirical ground motion model for Vrancea intermediate-depth seismic source

  • Vacareanu, Radu;Demetriu, Sorin;Lungu, Dan;Pavel, Florin;Arion, Cristian;Iancovici, Mihail;Aldea, Alexandru;Neagu, Cristian
    • Earthquakes and Structures
    • /
    • v.6 no.2
    • /
    • pp.141-161
    • /
    • 2014
  • This article presents a new generation of empirical ground motion models for the prediction of response spectral accelerations in soil conditions, specifically developed for the Vrancea intermediate-depth seismic source. The strong ground motion database from which the ground motion prediction model is derived consists of over 800 horizontal components of acceleration recorded from nine Vrancea intermediate-depth seismic events as well as from other seventeen intermediate-depth earthquakes produced in other seismically active regions in the world. Among the main features of the new ground motion model are the prediction of spectral ordinates values (besides the prediction of the peak ground acceleration), the extension of the magnitudes range applicability, the use of consistent metrics (epicentral distance) for this type of seismic source, the extension of the distance range applicability to 300 km, the partition of total standard deviation in intra- and inter-event standard deviations and the use of a national strong ground motion database more than two times larger than in the previous studies. The results suggest that this model is an improvement of the previous generation of ground motion prediction models and can be properly employed in the analysis of the seismic hazard of Romania.

Efficient Multicasting Mechanism for Mobile Computing Environment (무선 AP 정보를 이용한 실외 측위 시스템 설계)

  • Yi, Hyoun-Sup;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.411-413
    • /
    • 2010
  • The wireless AP positioning system is under active progress regarding research and commercialization due to its merit of being able to overcome the representing demerits of existing GPS positioning, which are signal distortion and poor signal reception. This system's feature is to collect AP information distributed throughout the real world, store it on database, and execute positioning by comparing with searched AP information. The positioning process uses collected data, whereas comparison of database data uses the fingerprinting method. The fingerprinting method is a probabilistic modeling method that acquires as much of the data collected from one location upon database composition, to store the value's average value and use it in positioning. Yet, using the average value may contain the probability of errors. Such errors are fatal weaknesses for services based on the background of accurate positioning. This paper deals with the characteristics and problems of the previously used wireless AP positioning system, and proposes measures of using AP information for outdoor positioning in order to solve the aforementioned problems.

  • PDF

A visual query database system for the Sample Research DB of the National Health Insurance Service (국민건강보험공단의 표본연구DB를 위한 비주얼 쿼리 데이터베이스 시스템 개발 연구)

  • Cho, Sang-Hoon;Kim, HeeChan;Kang, Gunseog
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.1
    • /
    • pp.13-24
    • /
    • 2017
  • The Sample Cohort DB supplied by the National Health Insurance Service is a valuable resource for statistical studies as well as for health and medical studies. It takes significant time and effort to extract data from this Cohort DB having a large size. As such, we introduce a database system, conveniently called the National Health Insurance Service Cohort DB Extract Tool (NICE Tool), which supports several useful operations for effectively and efficiently managing the Cohort DB. For example, researchers can extract variables and cases related with study by simply clicking a computer mouse without any prior knowledge regarding SAS DATA step or SQL. We expect that NICE Tool will facilitate the faster extraction of data and eventually lead to the active use of the Cohort DB for research purposes.

Study on the Effectiveness of Korean Active Labour Market Polices (재정지원 일자리사업의 정책효과성 추정)

  • Chon, Joo-Yong;Jun, Jaesik
    • Journal of Labour Economics
    • /
    • v.40 no.1
    • /
    • pp.99-132
    • /
    • 2017
  • This study examines the employability of participants and employment outcomes in the Korean active labor market policies(ALMPs). The data used in empirical testing is Korea Labor and Income Panel Study 1~15th survey data, participants database in ALMPs and Unemployment Insurance database. The main results are as follows. Level of employability in participants with ALMPs is about 56.3 and that of participants with direct job creation(DJC) programs shows the most low level in sub-type of ALMPs. About 30.8% of all people participating in ALMPs belongs to vulnerable group and 71.5% of participants in DJC programs is in vulnerable group. In DJC programs, the participants with low level of employability are some more likely to be in vulnerable group. As the level of employability in participants with DJC programs increases, their job-search time after moved in labor market reduces and their duration of employment increases. To summarize, one can imply that the DJC programs are effective to transit vulnerable groups in labour market and improve the labor market outcomes by enhancing the employability of participants.

  • PDF

In Silico Molecular Docking Comparison of Tubocurarine and the Active Ingredients of Cimicifugae rhizoma on Acetylcholine Binding Proteins (In Silico 분자결합 분석방법을 활용한 tubocurarine과 승마 추출성분 actein의 아세틸콜린 결합 단백질 활성 부위에 대한 결합 친화도 비교 분석)

  • Kim, Dong-Chan
    • Journal of Life Science
    • /
    • v.28 no.4
    • /
    • pp.408-414
    • /
    • 2018
  • Actein is the well-known active ingredient of Cimicifugae rhizoma (Black cohosh). In this study, we investigated and compared the binding affinity of tubocurarine, actein, and actein derivatives on the B&C domain of the acetylcholine binding protein through in silico computational docking studies. The three-dimensional crystallographic structure of the acetylcholine binding protein B&C domain was obtained from the PDB database (PDB ID: 2XYT). An in silico computational autodocking analysis was performed using PyRx, Autodock Vina, Discovery Studio Version 4.5, and NX-QuickPharm based on scoring functions. The actein showed an optimum binding affinity (docking energy), with the acetylcholine binding protein at -10.50 kcal/mol as compared to the tubocurarine (-9.80 kcal/mol). The interacting amino acids tryptophan 84 and tryptophan 147, in the B domain of the acetylcholine binding protein active site, significantly interacted with the actein and 27-deoxyactein, and (26R)-actein. The centroid XYZ grid position of the tubocurarine was X=38.300689, Y=112.053467, and Z=51.991022, but the actein and its derivatives showed values around X=26.4, Y=127.3, Z=43.7. These results clearly indicated that actein and its derivatives could be a more potent antagonist to the acetylcholine binding protein than tubocurarine. Therefore, the extract of Cimicifugae rhizoma or actein containing biomaterials can substitute for the botulinum toxin-mediated acetylcholine receptor regulation, and be applied to the anti-wrinkle cosmetics industry.

An MIB Access Control Modeling for the Secure Management of Large Networks (대규모 망의 안전한 관리를 위한 관리 정보베이스의 접근 제어 모형화)

  • Seo, Jae-Hyeon;Lee, Chang-Jin;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.581-591
    • /
    • 1995
  • An MIB is the heart of a network management system and it stores all information that is necessary for network management. To operate networks safely, it is essential to control accesses to managed objects. This paper provides three-level architecture of managers so as to perform network management more efficiently in large networks. Moreover, mandatory access control(MAC) policy and role-based access control policy are adopted to ensure the secure access to the MIB. These policies are modeled by using the active object-oriented data model, which makes easy to map these access control models into the active object-oriented database.

  • PDF

Strategy based PSO for Dynamic Control of UPFC to Enhance Power System Security

  • Mahdad, Belkacem;Bouktir, T.;Srairi, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.315-322
    • /
    • 2009
  • Penetration and installation of a new dynamic technology known as Flexible AC Transmission Systems (FACTS) in a practical and dynamic network requires and force expert engineer to develop robust and flexible strategy for planning and control. Unified Power Flow Controller (UPFC) is one of the recent and effective FACTS devices designed for multi control operation to enhance the power system security. This paper presents a dynamic strategy based on Particle Swarm Optimization (PSO) for optimal parameters setting of UPFC to enhance the system loadability. Firstly, we perform a multi power flow analysis with load incrementation to construct a global database to determine the initial efficient bounds associated to active power and reactive power target vector. Secondly a PSO technique applied to search the new parameters setting of the UPFC within the initial new active power and reactive power target bounds. The proposed approach is implemented with Matlab program and verified with IEEE 30-Bus test network. The results show that the proposed approach can converge to the near optimum solution with accuracy, and confirm that flexible multi-control of this device coordinated with efficient location enhance the system security of power system by eliminating the overloaded lines and the bus voltage violation.

The Etrance Authentication Systems Using Real-Time Object Extraction and the RFID Tag (얼굴 인식과 RFID를 이용한 실시간 객체 추적 및 인증 시스템)

  • Jung, Young Hoon;Lee, Chang Soo;Lee, Kwang Hyung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.51-62
    • /
    • 2008
  • In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.