• Title/Summary/Keyword: 디지털정보서비스

Search Result 2,827, Processing Time 0.036 seconds

Comparative Evaluation of Data Processing Performance between MySQL and Redis (MySQL과 Redis의 데이터 처리 성능 비교 평가)

  • Hyeok Bang;Seo-Hyeon Kim;Sanghoon Jeon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.35-41
    • /
    • 2024
  • As online activities have rapidly increased due to recent digital changes and the impact of COVID-19, the importance of large-scale data processing and maintenance is increasing. This study compares the performance of the two main types of databases widely used for data storage and management: Relational Database Management Systems (RDBMS) and Non-Relational Databases (NoSQL). Specifically, we measured and evaluated the execution time of data insertion, query, and deletion functions using MySQL, a representative example of RDBMS, and Redis, a representative example of NoSQL. The experimental results showed that Redis showed performance about 5.84 times faster in data insertion, 6.61 times faster in query, and 12.33 times faster in deletion than MySQL. These results demonstrate that Redis provides superior performance, especially in environments requiring large-scale data processing and maintenance. Therefore, companies and online service providers can choose NoSQL databases such as Redis to ensure more efficient data management solutions. We hope this study will be an essential reference when selecting a database based on data processing performance.

Research on major technology trends in the field of financial security through Korea and foreign patent data analysis (국내외 특허 데이터 분석을 통한 금융보안 분야 주요 기술 동향 분석연구)

  • Chae, Ho-Kuen;Lee, Jooyeoun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.53-63
    • /
    • 2020
  • Electronic financial transactions are also actively increasing due to the rapid spread of information communication media such as the Internet, smart devices, and IoT, but as a derivative by-product, threats of financial security such as leakage of various personal information and hacking are also increasing. Therefore, the importance of financial security against this is increasing, but in Korea, financial security technology is relatively insufficient compared to advanced countries in the field of financial security, such as Active-X. Therefore, this study aims to present the major development direction in the domestic financial security field by comparing key technology trends with IPC classification frequency analysis, keyword frequency analysis, and keyword network analysis based on domestic and foreign financial security-related patent data. In conclusion, it seems that recent domestic and foreign trends have focused on the development of related technologies according to the development of smart device-based electronic financial services. Accordingly, it is intended to be used as the basis data for technology development of financial security by mapping the trend of financial security research trend and technology trend analysis through thesis data analysis that reflects the research of the preceding aspect as the technology of commercialization in the future.

A Study on the Direction of Ubiquitous Space Development through the Analysis on Case Studies (연구 사례 분석을 통한 유비쿼터스 공간 개발 방향에 관한 연구)

  • 홍관선;이혁수
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.391-400
    • /
    • 2003
  • As the change of information and digital technology progresses, ubiquitous space is attracting attention as a new space concept in which the physical and digital spaces are connected to each other. As its meaning in latin itself - 'there exist everywhere at the same time'- implies, however, the ubiquitous space has been mostly discussed in a non-physical aspect, such as in a technological area, rather than its physical intrinsic property until now. Although theories regarding a ubiquitous city have been rarity suggested, in most cases, technological aspects such as the systemization or networking of individual information service have been the focus. However, one of the intentions induced in the concept that scholars including Mark weiser and Sakamura Ken introduced was to place humans in the center of the space in which the technology has been placed instead of humans. For this purpose, the renovation of human interface must be required. As technology develops, the achievement of ubiquitous space may be possible, and efforts to apply this to real space are making an appearance. The examples of the present research are the spaces that have a characteristic of the laboratory separated from life in the city, and the construct scale is in the level of an individual facility; therefore, further studies should functionally and spaciously connect all subjects existing in space and effectively relate this to real world. The present research is intended to demonstrate the investigation on several projects that are currently underway and the developmental direction of new, ubiquitous space.

  • PDF

Sharing of DLNA Media Contents among Inter-homes based on DHCP or Private IP using Homeserver (동적 사설 IP 기반의 다중 홈간 DLNA 미디어 컨텐츠 공유)

  • Oh, Yeon-Joo;Lee, Hoon-Ki;Kim, Jung-Tae;Paik, Eui-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.709-716
    • /
    • 2006
  • According to the increase of various AV media devices and contents in the digital home, the DLNA becomes to play an important role as the interoperability standard between then Since this guideline only focuses on the interoperability among home networked devices, media players, and media contents existing inside of the homenetwork, there is no retrieval and transmission method for sharing multimedia contents located over several homes via Internet. Additionally, this guideline lets device-detection and notification messages to be transmitted using W multicast methods, and current Internet environment cannot guarantee consistent IP multicast services, it has the limitation that it cannot retrieve and control DLNA devices in other digital homes remotely via the Internet. Therefore, in this paper, we propose the IHM(Inter-Home Media) proxy system and its operating mechanism to provide a way of sharing media contents distributed over multiple DLNA-based homes, through analyzing these limitations and building up a sharing method for A/V media contents distributed over the DLNA homes based on the dynamic or private IP networks. Our method removes the limitation on the user locations through sharing distributed media contents, and also makes cost-downs for storing media contents, from the view point of individual residents.

The Study of Health Information on Recognition and Satisfaction of Their Blood Donation (헌혈자의 헌혈기록정보의 인식도 및 만족도 연구)

  • Choi, Hee-Sung
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.405-415
    • /
    • 2014
  • The purpose of this study is to investigate the knowledge and recognition about blood donation and satisfaction, look for ways to promote the idea that effective, was trying to get the plan to provide the basis for the expanding population of voluntary and continuous blood donation. A survey was from May 9, 2012 to May 24, 2012 and total 636 copies were used as final study data. The data collected analyzed with SPSS win 21.0 using descriptive methods, frequency analysis, chi-square test, t-test, ANOVA. The results were as follows. First, the rates of the blood donors were higher in the men, in the age group from 20 to 29, in the students and in the group that received college or higher education. Second, as for the knowledge and recognition of the blood donors on blood donation, many replied they didn't know well about it. Concerning satisfaction level, they gave higher marks to satisfaction with related service than with blood donation itself. Third, the necessity of sustained blood donation promotion and education was pointed out. TV was most preferred, followed by ads on the street and ads on the subway. To expedite an increase in the blood-doner population, prolonged education and promotion are required to change the way that people in general look at blood donation, and a variety of rewards should be provided for blood donors.

A study on the new Business Opportunity of E-Commerce (e-비즈니스의 기회창출 방안에 대한 연구)

  • Cho, Jae-Wan;Ko, Chang-Bae
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.191-208
    • /
    • 2002
  • In the area of new millennium of twenty first century, one of the urgent and critical research issues in commerce area is the regenerating of new business opportunities from the high value added perspectives. With this motivation, in this paper, we create new on-line e-businesses with the speed of lightning their affiliated supply, finance and business communities - which are involved in more and more tightly connected, open trading - we find that we need to deal with hundreds of business collaborative partners, millions of buyers and sellers while we have to face incompatible IT systems. Challenges of new business opportunities linking multi-enterprise data and processes cost effectively, reliably and securely in real time remains an open area in e-business. This challenge we shall describe as the problem of synchronization of multiple enterprise collaborative e-business opportunities (production related), value (finance related), business (operations related) in new business opportunity and infrastructure integrated all together over the off-line and online basis. It brings a new e-commerce opportunities infrastructure into this profitable challenge: by extracting and tracking new business information, new trends in the events of e-business processes. The transformation of the traditional commerce into this type of electronic based commerce can be interpreted as new Cultural Revolution. The revolution will be a new paradigm crossing over the geographical, and organizational zone, restructuring enterprise business process infrastructure.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

An Investigation on Core Competencies of Data Curator (데이터 큐레이터의 핵심 직무 요건 고찰에 관한 연구)

  • Lee, You-Kyoung;Chung, EunKyung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.3
    • /
    • pp.129-150
    • /
    • 2015
  • As the digital technologies and internet have advanced, data have centered in the process of meaningful scientific ramifications and policy making in a wide variety of fields. Data curator in charge of managing data plays a significant role in terms of improving the effectiveness and efficiency of data management and re-uses. The purpose of this study is to identify the core competencies for data curator. For achieving the purpose of this study, two sets of data were collected. First, a total of 255 job descriptions were collected from the web sites including ARL, Digital Curation Exchange, Code4lib, ASIS&T JobLine for the period of 2011-2014. Second, in-depth interviews with five data curators from four diverse organizations were collected. The two sets of data were analyzed into seven categories identified from the related studies. Findings of this study showed that core competencies for data curator were identified into four categories, communication skills, data management techniques, knowledge and strategies for data management, and instructions and service provisions for users. The implications of this study can be considered as integrated and professional curriculum developments for data curator with core competencies.

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.

Application of Photo-realistic Modeling and Visualization Using Digital Image Data in 3D GIS (디지털 영상자료를 이용한 3D GIS의 사실적 모델링 및 가시화)

  • Jung, Sung-Heuk;Lee, Jae-Kee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.1
    • /
    • pp.73-83
    • /
    • 2008
  • For spatial analysis and decision-making based on territorial and urban information, technologies on 3D GIS with digital image data and photo-realistic 3D image models to visualize 3D modeling are being rapidly developed. Currently, satellite images, aerial images and aerial LiDAR data are mostly used to build 3D models and textures from oblique aerial photographs or terrestrial photographs are used to create 3D image models. However, we are in need of quality 3D image models as current models cannot express topographic and features most elaborately and realistically. Thus, this study analyzed techniques to use aerial photographs, aerial LiDAR, terrestrial photographs and terrestrial LiDAR to create a 3D image model with artificial features and special topographic that emphasize spatial accuracy, delicate depiction and photo-realistic imaging. A 3D image model with spatial accuracy and photographic texture was built to be served via 3D image map services systems on the Internet. As it was necessary to consider intended use and display scale when building 3D image models, in this study, we applied the concept of LoD(Level of Detail) to define 3D image model of buildings in five levels and established the models by following the levels.