• Title/Summary/Keyword: database access

Search Result 873, Processing Time 0.029 seconds

On The Full-Text Database Retrieval and Indexing Language

  • Chang, Hye-Rhan
    • Journal of the Korean Society for information Management
    • /
    • v.4 no.1
    • /
    • pp.24-46
    • /
    • 1987
  • The recent growth of full-text database operations has brought new opportunities for subject access. The fundamental problem of subject access in the online environment is the indexing language and technology. The purpose of this paper is to identify the characteristics and capabilities of full-text retrieval as compared to traditional bibliographic retrieval. Retrieval performance of indexing languages, full-text systems features achieved so far, and the new role of a controlled vocabulary, are examined. This paper also includes a review of the research on full-text retrieval performance.

  • PDF

Design of Data Encoding Algorithm for a Two Dimensional Bar Code (2차원 바코드를 위한 데이터 부호화 알고리즘 설계)

  • Jeon, Seong-Goo;Kim, Il-Hwan
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.171-174
    • /
    • 2005
  • In this paper, we propose a new data encoding algorithm for a two-dimensional bar code system. In general, the one-dimensional bar code is just a key which can access detailed information to the host computer database. But the two-dimensional bar code is a new technology which can obtain high density information without access to the host computer database. We implemented the encoding algorithm for Data Matrix bar code which is the most widely used among the many kinds of two-dimensional bar codes in the field of marking using Digital Signal Processor (TMS320C31). The performance of the proposed algorithm is verified by comparing the imprinted symbols on the steel surfaces with the codes which are decoded by a bar code reader.

  • PDF

Design of Data Encoding Algorithm for the Two Dimensional Barcode (2차원 바코드를 위한 데이터 부호화 알고리즘 설계)

  • Jeon, Seong-Goo;Her, Nam-Euk;Kim, Il-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.173-175
    • /
    • 2005
  • In this paper, we propose a data encoding algorithm for two-dimensional barcode system. In general, one-dimensional barcode is just a key which can access detailed information to the host computer database. But the two-dimensional barcode is a new technology which can obtain high density information without access to the host computer database. We implemented encoding algorithm for Data Matrix Barcode which is the most widely used among the many kind of two-dimensional barcodes. And we marked to a real object using Digital Signal Processor(DSP) Marking System. The performance of proposed algorithm is verified through the result of marking work.

  • PDF

Accessibility to Instances Regardless of Versions in Schema Evolution Environments in Object-Oriented Databases (객체지향 데이터베이스의 스키마진화 환경에서 버전에 무관한 인스턴스 접근)

  • Jin, Min
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.553-561
    • /
    • 1999
  • The facility of schema evolution is necessary in object-oriented database applications. There exist several versions of schema and instances created under different versions of the schema concurrently in the database. This base proposes a mechanism for supporting accessing instances regardless of versions of the schema in schema evolution environments in object oriented databases. There is trade-off between the flexibility of schema modification operations and the system overhead for supporting such schema modifications. Access handling routines are provided to the undefined attributes in each version of the class. Access handling routines are also defined for each pair of semantics rather than defining backdate/update functions for each pair of versions of a class. Thus, this mechanism supports the change of semantics with reduced user and system overhead.

  • PDF

Automatic Generation of Web-based Database Applications (웹 기반 데이타베이스 응용의 자동 생성)

  • Eum, Du-Heon;Yu, Eun-Ja
    • Journal of KIISE:Databases
    • /
    • v.29 no.3
    • /
    • pp.207-216
    • /
    • 2002
  • Nowadays, we can easily access a remote database as well as a local database with HTML forms. Although implementing a database application with HTML forms is much simpler than implementing it with a proprietary graphical user Interface system, HTML forms and CGI programs still must be coded. We implemented a software tool that automatically generates the SQL statements that create a database for an application, the forms that are used as a user interface, and the Java servlets that retrieve the data requested through the forms. The database tables to be treated and the forms to be generated are determined by the class diagram for the application. Our software tool, which we call WebSiteGen, thus simplifies the implementation of a Web-based database application.

The Operation of Administration Tool for Relatinships Management in the RBAC Security System (RBAC 보안시스템에서 관계관리를 위한 관리도구 동작)

  • 오석균;김성열
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.373-377
    • /
    • 1999
  • Role Based Access Control(RBAC) reduces the cost of administering access control policies as well as making the process less error-prone. The administration tool is most important component in the concept of RBAC. The administration tool for the RBAC security system is required the consistency of a relationships between user and role in the RBAC Database. In this paper, we propose formal specification in order to manage user-role and role-role relationships. The proposed formal specification leads to the consistency requirements for the RBAC database which are defined as a set of relationship. This paper can easily derive the implementation of the RBAC administration tool by formal specification of operations.

  • PDF

Dynamic Knowledge Map and RDB-based Knowledge Conceptualization in Medical Arena (동적지식도와 관계형 데이터베이스 기반의 의료영역 지식 개념화)

  • Kim, Jin-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.04a
    • /
    • pp.111-114
    • /
    • 2004
  • Management of human knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. Artificial intelligence and knowledge engineering has provided some degree of rigor to the study of knowledge systems and expert systems(ES) re able to use knowledge to solve the problems and answer questions. Therefore, the process of conceptualization and inference of knowledge are fundamental problem solving activities and hence, are essential activities for solving the problem of software ES construction Especially, the access to relevant, up-to-date and reliable knowledge is very important task in the daily work of physicians and nurses. In this study, we propose the conceptualization and inference mechanism for implicit knowledge management in medical diagnosis area. To this purpose, we combined the dynamic knowledge map(KM) and relational database(RDB) into a dynamic knowledge map(DKM). A graphical user-interface of DKM allows the conceptualization of the implicit knowledge of medical experts. After the conceptualization of implicit knowledge, we developed an RDB-based inference mechanism and prototype software ES to access and retrieve the implicit knowledge stored in RDB. Our proposed system allows the fast comfortable access to relevant knowledge fitting to the demands of the current task.

  • PDF

Applications of Java Computing Technology to GPS/GIS-based AVL(Automated Vehicle Location) System

  • Kim, Kwang-Soo;Kim, Min-Soo;Lee, Jae-Yeon;Lee, Ki-Won;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • 1998.09a
    • /
    • pp.149-152
    • /
    • 1998
  • Nowadays, GIS, as multi-discipline information system, is closely linked with GPS application in conjunction with GIS-T or Logistics GIS. With this R&D trend. CPS/GIS application system for AVL is newly developed in this study. This AVL is designed and implemented by using pure Java computing technology towards com ing Car-equipped wireless Internet PC age, and main features of Java are included at this system: Platform independence, Multi-thread processing, and Object-oriented paradigm. While, because core modules of this AVL are based on GIS spatial engine, unlike other commercial AVLs, large spatial database problem handling digital image/spatial information and attribute information and direct access problem of GIS data is easily dealt with. this system can directly access external database by using JDBC: MS Access for desktop version and Oracle for W/S version. Finally, it is thought that Java-based AVL, one of CPS/CIS applications, can be easily extended into other prospective GIS applications: Land surveyor supporting system, Flight tracking system, 3D facility management system with CPS, and so forth.

  • PDF

Design and Implementation of IDAO for Efficient Access of Database in EJB Based Application (EJB 기반 애플리케이션에서 데이터베이스의 효율적 액세스를 위한 IDAO의 설계 및 구현)

  • Choe, Seong-Man;Lee, Jeong-Yeol;Yu, Cheol-Jung;Jang, Ok-Bae
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.637-644
    • /
    • 2001
  • EJB, providing specification for development and deployment of component based application, permits distributed development as central element of J2EE environment that manages automatically transaction management, persistence, concurrency control that are the most complicated work in enterprise environment. In this paper, we wish to resolve DAO's transaction logic complexity and performance reduction of system in the EJB based legacy system. Therefore, this paper describes the design and implementation of IDAO that applies Iterator pattern. IDAO gets effect that reduces complexity of transaction logic, system overload by database connection, and reduction of performance through container managed transaction.

  • PDF

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.