• Title/Summary/Keyword: 레코드 파일 관리

Search Result 25, Processing Time 0.021 seconds

A Study on Duplicate Detection Algorithm in Union Catalog (종합목록의 중복레코드 검증을 위한 알고리즘 연구)

  • Cho, Sun-Yeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.4
    • /
    • pp.69-88
    • /
    • 2003
  • This study intends to develop a new duplicate detection algorithm to improve database quality. The new algorithm is developed to analyze by variables of language and bibliographic type, and it checks elements in bibliographic data not just MARC fields. The algorithm computes the degree of similarity and the weight values to avoid possible elimination of records by simple input error. The study was peformed on the 7,649 newly uploaded records during the last one year against the 210,000 sample master database. The findings show that the new algorithm has improved the duplicates recall rate by 36.2%.

A Study on the Applicability of ISNI for Authority Control (전거제어를 위한 국제표준이름식별자(ISNI)의 활용가능성에 관한 연구)

  • Lee, Mihwa
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.3
    • /
    • pp.133-151
    • /
    • 2014
  • This study was to investigate the concept of ISNI and to find its availability in authority control, realizing importance of ISNI as the bridge identifier including all the information media content industries. ISNI is needed for global and comprehensive name authority control as the bridge identifier for the identification of public identities of parties involved throughout the information media content industries in the creation, production, management and content distribution chains. First of all, it was to inquire ISNI concept, goal, terms and definitions, structure and syntax, allocation of ISNI, administration of the ISNI system, and metadata. Next, it was to suggest the applicability of ISNI in authority control. First, it should be needed to consider in applying ISNI for cooperative authority control. It is possible to interactively use the authority data created in library and other information industries area by constructing KISNI system. Second, it is possible to construct linked data by linking various identifier through ISNI identifier as bridge identifier. Third, it is needed to develop KORMARC for describing ISNI identifier in KORMARC bibliographic and authority record.

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

The Method of Recovery for Deleted Record in the Unallocated Space of SQLite Database (SQLite 데이터베이스의 비 할당 영역에 잔존하는 삭제된 레코드 복구 기법)

  • Jeon, Sang-Jun;Byun, Keun-Duck;Bang, Je-Wan;Lee, Guen-Gi;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.143-154
    • /
    • 2011
  • SQLite is a small sized database engine largely used in embedded devices and local application software. The availability of portable devices, such as smartphones, has been extended over the recent years and has contributed to growing adaptation of SQLite. This implies a high likelihood of digital evidences acquired during forensic investigations to include SQLite database files. Where intentional deletion of sensitive data can be made by a suspect, forensic investigators need to recover deleted records in SQLite at the best possible. This study analyzes data management rules used by SQLite and the structure of deleted data in the system, and in turn suggests a recovery Tool of deleted data. Further, the study examines major SQLite suited software as it validates feasible possibility of deleted data recovery.

Authority Control on the Web : Knowledge Organization Systems and Authority Control for Digital Libraries (웹에서의 전거통제:디지털 도서관의 지식조직 시스템(KOS)과 전거 통제)

  • Yoon, Cheong-Ok
    • Journal of Information Management
    • /
    • v.33 no.4
    • /
    • pp.85-105
    • /
    • 2002
  • The purpose of this study is to review the expanded role of authority files, which uses the Knowledge Organization System(KOS) to organize contents and manage the collections in digital libraries. The KOS plays a role as a bridge between the users' information needs and materials by providing links between catalogs and digital resources on the web and supporting retrieval of the relevant items. It is described how a KOS can be used to link a digital resource to related materials, to provide more descriptive records for entities, and access to relevant physical objects.

The Study on the Reliability Improvement of Bibliographic Database Using CD-ROM - With a Special Emphasis on Download and Upload - (CD-ROM을 이용(利用)한 서지정보(書誌情報) 데이터베이스의 신뢰성향상(信賴性向上) 기법연구(技法硏究) - 다운로드와 업로드를 중심(中心)으로 -)

  • Kim, Chang-Keun;Shin, Yong-Ju
    • Journal of Information Management
    • /
    • v.20 no.2
    • /
    • pp.69-99
    • /
    • 1989
  • With regard to system configuration, file structure and function, this study has compared and analyzed KITLAS developed by KIT Library and CD-ROM BiblioFile, which is selected among CD-ROM Catalog Production Products, the mass storage media, produced by the fast-growing laser technology and information technology. Furthurmore, this study illuminates how to improve the reliability of bibliographic database, implementing downloading and uploading processes which make possible the conversion and online, mass transmission of CD-ROM MARC records at once.

  • PDF

A Service Discovery Scheme Based on NAPTR Resource Record (NAPTR 자원레코드 기반의 서비스 탐색기법)

  • 권성호;김희철
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.69-75
    • /
    • 2003
  • NAPRT(Naming Authority Pointer) is a type of resource record specified in IETF RFC 2915. NAPTR enables to register various services in the Domain Name Systems and thus provides a way to discover services available on specific hosts. This paper describes the design and implementation of a Proxy DNS system aimed at supporting NAPTRs. The goal of this work is to study on the feasibility of the service discovery registered in DNS via NAPTR records and provides the result for simplicity and extensibility of implementation through the implementation of a actual Test-bed system This research result can be applied to service discovery in the resource information management for high performance GRE environments as well as to the implementation of DNS infrastructure for the ENUM.

  • PDF

Issues of IPR Database Construction through Interdisciplinary Research (학제간 연구를 통한 IPR 데이터베이스 구축의 쟁점)

  • Kim, Dong Yong;Park, Young Chul
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.59-69
    • /
    • 2017
  • Humanities and social sciences researchers and database experts have teamed up to build a database of IPR materials prepared by the Institute of Pacific Relations (IPR). This paper presents the issues and solutions inherent in the database construction for ensuring the quality of IPR materials. For the accessibility of the database, we maintain the database on the Web so that researchers can access it via web browsers; for the convenience of the database construction, we provide an integrated interface that allows researchers to perform all tasks in it; for the completeness of IPR materials constructed, we support the responsible input and the responsible approval that identify responsibilities of each IPR material entered; and for the immediacy of the approval, we support an interactive approval process facilitating the input of researchers. We also use database design, query processing, transaction management, and search and sorting techniques to ensure the correctness of IPR materials entered. In particular, through concurrency control using existence dependency relationships between records, we ensure the correctness between the operating system files and their paths. Our future studies include content search, database download and upload, and copyright related work on IPR materials.

Archival Description and Access in Digital Age that Focuses on the Practices of The National Archives' (디지털 시대의 기록물 기술과 접근 - The National Archives 사례를 중심으로 -)

  • Park, Zi-young
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.4
    • /
    • pp.87-107
    • /
    • 2017
  • Because of the creation and transfer of born-digital records, file unit-based record description practices have changed fundamentally. In this study, we analyzed the archival description practices of The National Archives (TNA) to maintain intellectual control in the digital records management environment and to support the access to records of users. TNA has created an archival description based on ISAD(G) but, for describing born-digital records, it changed the guideline for descriptive cataloging practices. As the method of ISAD(G) cannot adhere to born-digital records, the next-generation descriptive standard, Records in Contexts (RiC), is still being developed by ICA. In addition to international efforts, we need to build an archival description system that fits our environment, especially because since the year 2000, TNA's online cataloging system has changed and ISAD(G) has been modified in this process. This study also proposed continuous monitoring of digital archival descriptions, provides an integrated approach to analog records and digital content and strengthens experimentation and cooperation toward an uncertain digital future.

Testing case analysis of Database Software (데이터베이스 소프트웨어의 시험 사례 분석)

  • Yang, Hae-Sool;Kang, Bae-Keun;Lee, Ha-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.167-174
    • /
    • 2009
  • The meaning of Database in order to manage the data which is huge in the meeting of the record which logically had become the fire tube or file 'efficiently' is widely used from the place which controls a many double meaning data. Like this data base it creates, it manages, the programs which send an answer back according to demand of the user as DBMS it calls. Like this it will be able to grasp the quality level of the data base software product which is important index from the research which index it buys it defined. Also, in order to produce the result of index it selects the collection item which is necessary and collection and analysis it leads and what kind of defect types occur substantially mainly, and it confirmed and the test and evaluation model in about data base software and a tentative instance it developed it analyzed.