• Title/Summary/Keyword: Complex Database

Search Result 608, Processing Time 0.025 seconds

Manipulation of Memory Data Using SQL (SQL을 이용한 메모리 데이터 조작)

  • Ra, Young-Gook;Woo, Won-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.597-610
    • /
    • 2011
  • In database application developments, data coexists in memory and disk spaces. To manipulate the memory data, the general programing languages are used and to manipulate the disk data, SQL is used. In particular, the procedural languages for the memory manipulation are difficult to create and manage than declarative languages such as SQL. Thus, this paper shows that a particular structure of memory data, tree structured, can be manipulated by SQL. Most of all, the model data of the user interfaces can be represented by a tree structure and thus, it can be processed by SQL except non set computations. The non set computations could be done by helper classes. The SQL memory data manipulation is more suited to the database application developments which have few complex computations.

Comparison of network pharmacology based analysis on White Ginseng and Red Ginseng (인삼(人蔘)과 홍삼(紅蔘)의 네트워크 약리학적 분석 결과 비교)

  • Park, Sohyun;Lee, Byoungho;Jin, Myungho;Cho, Suin
    • Herbal Formula Science
    • /
    • v.28 no.3
    • /
    • pp.243-254
    • /
    • 2020
  • Objectives : Network pharmacology analysis is commonly used to investigate the synergies and potential mechanisms of multiple compounds by analyzing complex, multi-layered networks. We used TCMSP and BATMAN-TCM databases to compare results of network pharmacological analysis between White Ginseng(WG) and Red Ginseng(RG). Methods : WG and RG were compared with components and their target molecules using TCMSP database, and compound-target-pathway/disease networks were compared using BATMAN-TCM database. Results : Through TCMSP, 104 kinds of target molecules were derived from WG and 38 kinds were derived from RG. Using the BATMAN-TCM database, target pathways and diseases were screened, and more target pathways and diseases were screened compared to RG due to the high composition of WG ingredients. Analysis of component-target-pathway/disease network using network analysis tools provided by BATMAN-TCM showed that WG formed more networks than RG. Conclusions : Network pharmacology analysis can be effectively performed using various databases used in system biology research, and although the materials that have been reported in the past can be used efficiently for research on diseases related to targets, the results are unreliable if prior studies are focused on limited or narrow research areas.

Design of Environmental Information Systems Architecture Based on the Internet : The Building of a Database for Environmental Factors and GIS (인터넷 환경에 기반한 환경정보시스템 아키텍쳐 설계 : 환경요인을 Database 구축과 이를 이용한 GIS 구축)

  • Suh, Eui-Ho;Lee, Dae-Ho;Yu, Sung-Ho
    • Asia pacific journal of information systems
    • /
    • v.8 no.2
    • /
    • pp.1-18
    • /
    • 1998
  • As the management and preservation of the environment become an important social issue, information required to support environmental task is required. So, there is an increasing demand for environmental information and appropriate systems to manage it. The vast volume of environmental data is distributed in different knowledge domains and systems. Environmental data objects have the complex structure containing environmental quality data and attribute data. Environmental information systems must be able to address these properties. This research has aimed at constructing well-defined schema design of environmental data, and making system architecture that environmental data kept by authorities should be made available to the public user. There are 3 major components in environmental information systems architecture ; User interface, Catalog libraries, Communication Provider. Web browsers provide consistent and intuitive user interfaces on Internet. The communication provider is a collection of diverse CGI functions. The main roles of the CGIs are to build interfaces between the Web, databases. Catalog libraries is libraries of various matadata including administration matadata. Administration matadata support the environmental administration and the managerial aspects of environmental data rather than explain a database itself or its properties.

  • PDF

Research on the Investigation of ΔV (Delta-V) for the Quality Improvement of Korean In-Depth Accident Study (KIDAS) Database (한국형 실사고 심층조사 데이터베이스 질향상을 위한 차량속도(ΔV) 측정방법에 관한 연구)

  • Choo, Yeon Il;Lee, Kang Hyun;Kong, Joon Seok;Lee, Hee Young;Jeon, Joon Ho;Park, Jong Jin;Kim, Sang Chul
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.2
    • /
    • pp.40-46
    • /
    • 2020
  • Modern traffic accidents are a complex occurrence. Various indicators are needed to analyze traffic accidents. Countries that have been investigating traffic accidents for a long time accumulate various data to analyze traffic accidents. The Korean In-Depth Accident Study (KIDAS) database collected damaged vehicles and severity of injury caused by Collision Deformation Classification code (CDC code), Abbreviated Injury Scale (AIS), and Injury Severity Score (ISS). As a result of the investigation, data relating to the injuries of the occupants can be easily obtained, but it was difficult to analyze human severity based on the information of the damaged vehicle. This study suggests a method to measure the speed change at the time of an accident, which is one of the most important indicators in the vehicle crash database, to help advance KIDAS research.

The Query Optimization Techniques for XML Data using DTDs (DTD를 이용한 XML 데이타에 대한 질의 최적화 기법)

  • Chung, Tae-Sun;Kim, Hyoung-Joo
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.723-731
    • /
    • 2001
  • As XML has become and emerging standard for information exchange on the World Wide Web it has gained attention in database communities of extract information from XML seen as a database model. Data in XML can be mapped to semistructured dta model based on edge-labeled graph and queries can be processed against it Here we propose new query optimization techniques using DTDs(Document Type Definitions) which have the schema information about XML data. Our techniques reduce traditional index techniques Also, as they preserve source database structure, they can process many kinds of complex queries. we implemented our techniques and provided preliminary performance results.

  • PDF

HBase based Business Process Event Log Schema Design of Hadoop Framework

  • Ham, Seonghun;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.49-55
    • /
    • 2019
  • Organizations design and operate business process models to achieve their goals efficiently and systematically. With the advancement of IT technology, the number of items that computer systems can participate in and the process becomes huge and complicated. This phenomenon created a more complex and subdivide flow of business process.The process instances that contain workcase and events are larger and have more data. This is an essential resource for process mining and is used directly in model discovery, analysis, and improvement of processes. This event log is getting bigger and broader, which leads to problems such as capacity management and I / O load in management of existing row level program or management through a relational database. In this paper, as the event log becomes big data, we have found the problem of management limit based on the existing original file or relational database. Design and apply schemes to archive and analyze large event logs through Hadoop, an open source distributed file system, and HBase, a NoSQL database system.

Graph Database Design and Implementation for Ransomware Detection (랜섬웨어 탐지를 위한 그래프 데이터베이스 설계 및 구현)

  • Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.24-32
    • /
    • 2021
  • Recently, ransomware attacks have been infected through various channels such as e-mail, phishing, and device hacking, and the extent of the damage is increasing rapidly. However, existing known malware (static/dynamic) analysis engines are very difficult to detect/block against novel ransomware that has evolved like Advanced Persistent Threat (APT) attacks. This work proposes a method for modeling ransomware malicious behavior based on graph databases and detecting novel multi-complex malicious behavior for ransomware. Studies confirm that pattern detection of ransomware is possible in novel graph database environments that differ from existing relational databases. Furthermore, we prove that the associative analysis technique of graph theory is significantly efficient for ransomware analysis performance.

Construction of Tap Water Management System for Subset Area of Hamyang Gun Using GIS (GIS를 이용한 함양군 일부지역의 상수도 관리 시스템 구축)

  • 김재명;안기원;신석효;김상철
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2003.10a
    • /
    • pp.347-352
    • /
    • 2003
  • This study attempts to develop the management and control system of water pipe on the footing of database builded by the research on the pipe of water supply equipped over 48.809km within district of Hamyang-up by Hamyang-Gun, and to apply it to the work of self-governing body. And, since the structure and equipment of facilities of underground water supply pipe ate so complex, the maintenance and management of function of facilities are needed for long-term. This study has the purpose to build the database per self-governing body which can be connected with the future NGIS project, and to promote the efficiency of management and control of facilities and equipment.

  • PDF

Implementation Of Client Management Database Program For Digital Hearing Aids Fitting System

  • Lee Gun Jae;Park Byoung Uk;Yoo Dong Gu;Kim Hack Yoon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.755-758
    • /
    • 2004
  • A hearing aid performs the role of fitting in order to provide those with a hearing problem with a better hearing ability in ordinary circumstances. The existing Fitting system in the hearing aid is consisted somewhat complex, and simply performs the role of Fitting without any supervisions of those with a hearing problem. Such is these methods makes it unable to establish an organized supervision, and shows a problem in making high efficiency. In order to solve this problem mentioned as above, the based thesis have connected the Fitting program and the patient-management database program for the easy use by the user.

  • PDF

Recognition of Unconstrained Handwritten Numerals using Chaotic Neural Network (카오틱 신경망을 이용한 서체 숫자 인식)

  • 조재홍;성정원
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.1301-1304
    • /
    • 1998
  • Several neural networks have been successfully used to classify complex patterns such as handwritten numerals or words. This paper describes the discrimination of totally unconstrained handwritten numerals using the proposed chaotic neural network (CNN) to improve the recognition rate. The recognition system in the paper consists of the preprocessing stage to extract features using Kirsch mask and the classification stage to recognize numerals using the CNN. In order to evaluate the performance of the proposed network, we performed the recognition with unconstrained handwritten numeral database of Concordia university, Canada. Experimental results show that the CNN based recognizer performs higher recognition rate than other neural network-based methods reported using same database.

  • PDF