• Title/Summary/Keyword: database access

Search Result 873, Processing Time 0.118 seconds

Development of knapsack problem solver using relational DBMS (관계형 데이터베이스를 이용한 배낭문제 해법기의 구현)

  • 서창교;송구선
    • Korean Management Science Review
    • /
    • v.13 no.2
    • /
    • pp.73-94
    • /
    • 1996
  • Knapsack problems represent many business application such as cargo loading, project selection, and capital budgeting. In this research we developed a knapsack problem solver based on Martello-Toth algorithm using a relational database management system on the PC platform. The solver used the menu-driven user interface. The solver can be easily integrated with the database of decision support system because the solver can access the database to retrieve the data for the model and to store the result directly.

  • PDF

WebChemDB: An Integrated Chemical Database Retrieval System

  • Hou, Bo-Kyeng;Moon, Eun-Joung;Moon, Sung-Chul;Kim, Hae-Jin
    • Genomics & Informatics
    • /
    • v.7 no.4
    • /
    • pp.212-216
    • /
    • 2009
  • WebChemDB is an integrated chemical database retrieval system that provides access to over 8 million publicly available chemical structures, including related information on their biological activities and direct links to other public chemical resources, such as PubChem, ChEBI, and DrugBank. The data are publicly available over the web, using two-dimensional (2D) and three-dimensional (3D) structure retrieval systems with various filters and molecular descriptors. The web services API also provides researchers with functionalities to programmatically manipulate, search, and analyze the data.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

Face Recognition Using Automatic Face Enrollment and Update for Access Control in Apartment Building Entrance (아파트 공동현관 출입 통제를 위한 자동 얼굴 등록 및 갱신 기반 얼굴인식)

  • Lee, Seung Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1152-1157
    • /
    • 2021
  • This paper proposes a face recognition method for access control of apartment building. Different from most existing face recognition methods, the proposed one does not require any manual process for face enrollment. When a person is exiting through the main entrance door, his/her face data (i.e., face image and face feature) are automatically extracted from the captured video and registered in the database. When the person needs to enter the building again, the face data are extracted and the corresponding face feature is compared with the face features registered in the database. If a matching person exists, the entrance door opens and his/her access is allowed. The face data of the matching person are immediately deleted and the database has the latest face data of outgoing person. Thus, a higher recognition accuracy could be expected. To verify the feasibility of the proposed method, Python based face recognition has been implemented and the cloud service provided by a web portal.

Performance of Distributed Database System built on Multicore Systems

  • Kim, Kangseok
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.47-53
    • /
    • 2017
  • Recently, huge datasets have been generating rapidly in a variety of fields. Then, there is an urgent need for technologies that will allow efficient and effective processing of huge datasets. Therefore the problems of partitioning a huge dataset effectively and alleviating the processing overhead of the partitioned data efficiently have been a critical factor for scalability and performance in distributed database system. In our work we utilized multicore servers to provide scalable service to our distributed system. The partitioning of database over multicore servers have emerged from a need for new architectural design of distributed database system from scalability and performance concerns in today's data deluge. The system allows uniform access through a web service interface to concurrently distributed databases over multicore servers, using SQMD (Single Query Multiple Database) mechanism based on publish/subscribe paradigm. We will present performance results with the distributed database system built on multicore server, which is time intensive with traditional architectures. We will also discuss future works.

A Framework for Electronic Navigational Chart Systems Based on the Web (웹 기반의 전자해도 시스템을 위한 프레임워크)

  • Lee Seong-Dae;Park Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1449-1458
    • /
    • 2006
  • Electronic Navigational Charts (ENCs) are digital charts which contain a great variety of data on coast and sea regions. Although they contain much information that ordinary people are interested in, there is no easy way to access because they are coded in the specialized data forma, and can be visualized by using specialized system. Therefore, supporting systems need to be developed for ordinary people to easily access ENCs. This paper proposes a framework for the ENC systems based on the Web. It relies on quite general standards such as Ceography Markup Language (GML) and Scalable Vector Graphics (SVG). In the framework, ENCs coded in S-57 format are first translated into GML to be stored in a database. Once the database is built, users can request to the database what they want. According to the user request, relevant data are retrieved, and then translated into SVG to be displayed on the Web browser. By using the framework, ordinary people may easily access coast and sea information contained in the ENCs. Furthermore, the framework may provide interoperability by virtue of XML-based standards such as GML and SVG, and efficiency by virtue of database. To validate the feasibility of proposed framework, a prototype system is developed and tested.

An Example-Based Natural Language Dialogue System for EPG Information Access (EPG 정보 검색을 위한 예제 기반 자연어 대화 시스템)

  • Kim, Seok-Hwan;Lee, Cheong-Jae;Jung, Sang-Keun;Lee, GaryGeun-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.2
    • /
    • pp.123-130
    • /
    • 2007
  • In this paper, we present an example-based natural language dialogue system for Electronic Program Guide Information Access. We introduce an effective and practical dialogue management technique incorporating dialogue examples and situation-based rules. In order to generate cooperative responses to smoothly lead the dialogue with users, our natural language dialogue system consists of natural language understanding, dialogue manager, system utterance generator. and EPG database manager. Each module is designed and implemented to make an effective and practical natural language dialogue system. In particular, in order to reflect the up-to-date EPG information which is updated frequently and periodically, we applied a web-mining technology to the EPG database manager, which builds the content database based on automatically extracted information from popular EPG websites. The automatically generated content database is used by other modules in the system for building their own resources. Evaluations show that our system performs EPG access task in high performance and can be managed with low cost.

An RDF Ontology Access Control Model based on Relational Database (관계형 데이타베이스 기반의 RDF 온톨로지 접근 제어 모델)

  • Jeong, Dong-Won
    • Journal of KIISE:Databases
    • /
    • v.35 no.2
    • /
    • pp.155-168
    • /
    • 2008
  • This paper proposes a relational security model-based RDF Web ontology access control model. The Semantic Web is recognized as a next generation Web and RDF is a Web ontology description language to realize the Semantic Web. Much effort has been on the RDF and most research has been focused on the editor, storage, and inference engine. However, little attention has been given to the security issue, which is one of the most important requirements for information systems. Even though several researches on the RDF ontology security have been proposed, they have overhead to load all relevant data to memory and neglect the situation that most ontology storages are being developed based on relational database. This paper proposes a novel RDF Web ontology security model based on relational database to resolve the issues. The proposed security model provides high practicality and usability, and also we can easily make it stable owing to the stability of the relational database security model.

The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database

  • Choi, Jeongseok;Kim, Jaekwon;Lee, Dong Kyun;Jang, Kwang Soo;Kim, Dai-Jin;Choi, In Young
    • Genomics & Informatics
    • /
    • v.14 no.1
    • /
    • pp.20-28
    • /
    • 2016
  • Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

Smartphone NFC based Access Control System (스마트폰 NFC 기반의 출입관리 시스템)

  • Bae, Sang-Jung;Jeon, Soon-Yeong;Lee, Sang-Hwa;Lee, Chan-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.596-597
    • /
    • 2016
  • Recently a variety of companies as the growing importance of big data are in the process of research and development for large-scale data collection and management. In addition, a situation that collects all necessary data inside and outside the enterprise to improve the manufacturing environment and the service environment. In this paper, we collect to ingest the mouth-time work for companies within the temple. Also, in conjunction with the NFC tag of the smart phone and employee information stored in the database. Utilizing this determines whether or not the employee attendance and the authority to automatically access to the database or resource within the enterprise. The proposed system is considered to be able to increase the accessibility and efficiency of a database or a resource in the enterprise.

  • PDF