• Title/Summary/Keyword: database evaluation

Search Result 1,254, Processing Time 0.025 seconds

Performance Evaluation of I/O Intensive Stress Test in Cluster File System SANiqueTM (집중적인 입출력 스트레스 테스트를 통한 클러스터 파일 시스템 SANiqueTM의 성능평가)

  • Lee, Kyu-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.415-420
    • /
    • 2010
  • This paper describes the design overview of shared file system $SANique^{TM}$ and analyzes the performance evaluation results of I/O intensive stress test based on various cluster file system architectures. Especially, we illustrate the performance analysis for the comparison results between the $SANique^{TM}$ and the Linux file system EXT3 system that is used to generally in Unix world. In order to perform our evaluation, Oracle 10g database system is operated on the top of cluster file system, and we developed the various kinds of testing tools which are compiled by ESQL/C from Oracle. Three types of architectures are used in this performance evaluation. Those are the cluster file system $SANique^{TM}$, EXT3 and the combined architecture of $SANique^{TM}$ and EXT3. In this paper, we present that the results of $SANique^{TM}$ outperforms other cluster file systems in the overhead for providing the true sharing over the connecting server nodes.

Korean Pharmacogenomic Database: Pharmacogenomic Haplotype Analysis of the Korean Population and Ethnic Comparisons

  • Kang, Tae-Sun;Woo, Sun-Wook;Park, Hyun-Joo;Roh, Jae-Sook
    • Biomolecules & Therapeutics
    • /
    • v.16 no.2
    • /
    • pp.77-81
    • /
    • 2008
  • The major aim of the Korean Pharmacogenomic Database (KPD) is to offer to users a "bridging" function, making the search for useful information easier. This database has also been established to collect unique Korean genotype data from other databases and to directly link these data to other major databases that offer more informative data. In this way, searches for information about new drug developments and easier and faster evaluation of the more complex and larger databases are possible. The KPD is located at the National Institute of Toxicological Research homepage (http://www.nitr.go.kr/nitr/contents/m134700/view.do), and offers Korean single-nucleotide polymorphism (SNP) information for 154 genes and haplotype information. It also compares the Korean SNP and haplotype frequencies with those of the other ethnic groups registered in the International HapMap. Through the Pharmacogenomic Information and Education facility, we also provide evaluators and the public with information about the concept of pharmacogenomic information, research trends, and the drug regulations of other countries. Because the drug responses of Koreans are not necessarily the same as those of Chinese or Japanese people, it is expected that the systematic operation of the KPD will allow the definition of racial differences and various genomic biomarkers (haplotypes or SNPs) for use in bridging studies and in the approval of new drugs.

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

Implementation and Evaluation of Time Interval Partitioning Algorithm in Temporal Databases (시간 데이타베이스에서 시간 간격 분할 알고리즘의 구현 및 평가)

  • Lee, Kwang-Kyu;Shin, Ye-Ho;Ryu, Keun-Ho;Kim, Hong-Gi
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.9-16
    • /
    • 2002
  • Join operation exert a great effect on the performance of system in temporal database as in the relational database. Especially, as for the temporal join, the optimization of interval partition decides the performance of query processing. In this paper, to improve the efficiency of parallel join query in temporal database. I proposed Minimum Interval Partition(MIP) scheme that time interval partitioning. The validity of this MIP algorithm that decides minimum breakpoint of the partition is proved by example scenario and I confirmed improved efficiency as compared with existing partition algorithm.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

A study of data acquisition system of defense analysis & evaluation by systems engineering process (시스템엔지니어링 프로세스에 의한 국방 분석평가자료 수집체계 연구)

  • Choe, Sun-Hwang;Min, Seong-Gi
    • 시스템엔지니어링워크숍
    • /
    • s.4
    • /
    • pp.135-140
    • /
    • 2004
  • Defense analysis & evaluation includes menace analysis, validation analysis, problem analysis, scientific technical analysis, technical trad-off analysis, alternative analysis, cost analysis, etc. Reliable related data is required to perform these analysis activities efficiently. but in case of these defense analysis & evaluation data acquisition system, the data is insufficient and scattered about each organization. the data of database system is also not utilized sufficiently. abroad technical data is also low level data such as catalog or military officer's collection. therefore, this paper propose defense analysis & evaluation data acquisition system by systems engineering process. we also propose construction method of data acquisition system.

  • PDF

A Water Environment Management and Evaluation Systems for a Small Watershed (II) - Operation and Applications - (소유역에서의 수계환경관리 및 평가시스템의 개발(II) - 시스템의 운용과 적용 -)

  • Kang, Moon-Seong;Park, Seung-Woo;Her, Young-Gu
    • Journal of Korean Society of Rural Planning
    • /
    • v.7 no.1 s.13
    • /
    • pp.15-25
    • /
    • 2001
  • This paper described the overall operations and applications of the water environment management and evaluation systems (WEMES) for environmental management, conservation, and evaluation for a small watershed. WEMES was to be applied with field data from small watersheds ranging from 0.4 to 29.79km2 in size which have steep topography and complex landuses. WEMES was a computer aided decision support system, that was comprised of the database subsystem, the simulation model subsystem, the environmental evaluation model subsystem, and the graphic user interface subsystem that visualizes the simulated results. The water environment management and evaluation with WEMES was successfully performed.

  • PDF

A study of data acquisition system of defense analysis & evaluation by systems engineering process (시스템엔지니어링 프로세스에 의한 국방 분석평가자료 수집체계 연구)

  • Min, Sungki;Choi, Soonhwang
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.1 no.2
    • /
    • pp.69-76
    • /
    • 2005
  • Defense analysis & evaluation includes menace analysis, validation analysis, problem analysis, scientific technical analysis, technical trade-off analysis, alternative analysis, cost analysis, etc. Reliable related data is required to perform these analysis activities efficiently. but in case of these defense analysis & evaluation data acquisition system, the data is insufficient and scattered about each organization. The data of database system is also not utilized sufficiently. Abroad technical data is also low level data such as catalog or military officer's collection. Therefore, this paper propose defense analysis & evaluation data acquisition system by systems engineering process. we also propose construction method of data acquisition system.

  • PDF

A Study on the Evaluation Criteria for the Selection of Academic CD-ROM Products (CD-ROM 제품(製品) 선정을 위한 평가기준(評價基準))

  • Choi, Sang-Ki
    • Journal of Information Management
    • /
    • v.25 no.4
    • /
    • pp.36-55
    • /
    • 1994
  • This study discussed extensively the CD-ROM evaluation criteria that are necessary for library and information center to acquire the CD-ROM products. The evaluation criteria discussed in previous studies are divided into managerial and technical aspects, and especially the search software and user interface catagories in the technical aspect are investigated separately. Finally the basic checklist is suggested for the evaluation of CD-ROM product in appendix.

  • PDF

Development and Application of Evaluation Tool for Sexual Educational Materials (성교육 자료 평가도구 개발과 적용)

  • Yang Soon-Ok;Jeong Geum-Hee
    • Child Health Nursing Research
    • /
    • v.9 no.4
    • /
    • pp.408-419
    • /
    • 2003
  • Purpose: This study was done to develop a reliable and appropriate evaluation tool for sexual educational materials and to apply it to video materials for recommendation of excellent materials. Method: The items of the content for evaluation were based on the previous studies on the sexual education and evaluation tools. After testing validity and reliability of tool, final evaluation tool for sexual educational materials was developed. The evaluation tool was applied to 84 video materials and the excellent materials were recommended. Result: The final evaluation tool for sexual educational materials which consisted of two parts was developed. One is the evaluation of basic information which includes 8 items: target population, type of materials, producer, year of production, subject, theme, running time, and guide book. The other is the evaluation of content which includes 36 items related to characteristics of material, purpose, efficiency and scope of content. After applying the tool to 84 video materials, 39 excellent sexual education materials were suggested. Conclusion: The systematic development of materials for sexual education appropriate to the specific subjects should be done. Producers should describe the basic information on the outside of materials. For recommending the excellent materials, the periodical standardized evaluation of sexual educational materials should be done, and the database of the excellent materials should be provided for further utilization.

  • PDF