• Title/Summary/Keyword: DB Server

Search Result 281, Processing Time 0.028 seconds

Design of RFID Mutual Authentication Protocol using One Time Random Number (일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계)

  • Kim, Dae-Jung;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2008
  • Recently, researched RFID authentication protocols still have vulnerability of attack, such as location tracking attack, replay attack. spoofing attack etc. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

Development of Web Based Mold Discrimination System using the Matching Process for Vision Information and CAD DB (비전정보와 캐드DB 매칭을 통한 웹 기반 금형 판별 시스템 개발)

  • Choi, Jin-Hwa;Jeon, Byung-Cheol;Cho, Myeong-Woo
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.15 no.5
    • /
    • pp.37-43
    • /
    • 2006
  • The target of this study is development of web based mold discrimination system by matching vision information with CAD database. The use of 2D vision image makes possible speedy mold discrimination from many databases. The image processing such as preprocessing, cleaning is done for obtaining vivid image with object information. The web-based system is a program which runs to exchange messages between a server and a client by making of ActiveX control and the result of mold discrimination is shown on web-browser. For effective feature classification and extraction, signature method is used to make sensible information from 2D data. As a result, the possibility of proposed system is shown as matching feature information from vision image with CAD database samples.

Design of RFID Mutual Authentication Protocol for Mobile RFID (모바일 RFID를 위한 보안 RFID 상호인증 프로토콜 설계)

  • Lee, Seung-Min;Kim, Eun-Hwan;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.183-190
    • /
    • 2010
  • Recently, there is still vulnerability of attack, such as location tracking attack, replay attack, spoofing attack etc for all that is much research for Mobile RFID authentication. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

Extended Web Log Processing System by using Click-Stream and Server Side Events (클릭스트림과 서버사이드 이벤트에 의한 확장된 웹 로그 처리시스템)

  • 강미정;조동섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04b
    • /
    • pp.460-462
    • /
    • 2001
  • 인터넷 사용자가 급증하고, 인터넷을 통한 비즈니스에 수익 모델에 대한 관심이 높아지면서 방문자별로 맞춤 정보를 제공하는 퍼스널라이제이션이 인터넷 개발자 및 사용자들의 관심을 모으고 있다. 이러한 퍼스널라이제이션을 위해서 전처리과정인 사용자 프로파일 생성과정을 확장된 웹 로그 처리 시스템을 통해서 구현해본다. 웹사이트 서버의 확장된 이벤트 처리, 즉 사용자의 행위정보를 로그에 포함시켜 로그정보를 웹 로그 서버에 전송하도록 설계하였다. 그리고 이 웹 로그 정보를 쉽게 분석할 수 있다. 이때 데이터베이스 저장 기술로 OLE DB Provider상에서 수행되는 ADO 기술을 사용함으로써 확장된 웹 로그 처리 시스템을 설계하였다. 확장된 웹 로그 DB를 패턴분석, 군집분석 등의 마이닝(Mining) 기법을 통하여 맞춤 서비스에 대한 사용자 프로파일을 구축할 수 있다.

  • PDF

Development of CAPP(Computer Aided Process Planning) Expert System using manufacturing process DB (생산공정 DB를 이용한 CAPP 전문가시스템 개발)

  • Ban C.W.;Jang D.Y.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.623-624
    • /
    • 2006
  • Over the past decade, changes in product development processes and increased consumer demands have dramatically influenced engineering working practices and targets. The information technology revolution has made its appearance concurrent to this relentless escalation in product engineering requirement. It has offered hopes for improved productivity despite these increasing demands. The wide availability of personal computing power, virtually inexhaustible sources of information and an abundance of computerized engineering tools have created great expectations. CAPP (Computer Aided Process Planning) Expert system and database were developed using VB.NET and Microsoft SQL 2000 Server.

  • PDF

Design of Recovery Protocol for Synchronization of Spatio-Temporal Data on a Mobile Environments (모바일 환경에서 시공간데이터의 동기화를 위한 회복프로토콜 설계)

  • Kim, Hong-Ki;Kim, Dong-yun;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.253-256
    • /
    • 2009
  • Synchronization system which applies to two-way synchronization of spatio-temporal in the mobile environment maintains a consistence of DB from some defect during synchronization. This study analyzes defects that are generated at the mobile client-server environment and proposes recovery protocol which can rerun consistence of DB and synchronization.

  • PDF

An XML Document Data Synchronization System Based on Embedded XML Database (내장형 XML 데이터베이스를 기반으로 한 XML 문서 데이터 동기화 시스템)

  • Sim Myoung-Sun;Bae Byoung-Jin;Min Jeong-Hoon;Ahn Byoung-Tae;Kang Hyun-Syug
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1153-1162
    • /
    • 2005
  • In this paper, we developed an XML Document Data Synchronization System for java(XDS4j) based on both SyncML(Synchronization Markup Language) framework Sync4j and embedded database system Berkeley DB XML. Because most existing data synchronization systems are based on file systems, data synchronization times at Fast Sync in those systems are very delayed. In the XDS4j, however, XML documents data produced at SyncML client and SyncML server are managed by embedded database system, and also synchronization time at Fast Sync is reduced because only partial elements are accessed by applying to XPath.

  • PDF

The Implementation of the Index Search System in a Encrypted Data-base (암호화된 데이터베이스에서 인덱스 검색 시스템 구현)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1653-1660
    • /
    • 2010
  • The user information stored in database have been leaked frequently. To protect information against malevolent manager on the inside or outside aggressor, it is one of the most efficient way to encrypt information and store to database. It is better to destruct information than not to use encrypted information stored in database. The encrypted database search system is developed variously, and used widely in many fields. In this paper, we implemented the scheme that can search encrypted document without exposing user's information to the untrusted server in mobile device. We compared and analyzed the result embodied with DES, AES, and ARIA based on symmetric key by searching time.

HorseDB; an Integrated Horse Resource and Web Service (말 데이터베이스 구축)

  • Kim Dae-Soo;Jo Un-Jong;Huh Jae-Won;Choe Eun-Sang;Cho Byung-Wook;Kim Heui-Soo
    • Journal of Life Science
    • /
    • v.16 no.3 s.76
    • /
    • pp.472-476
    • /
    • 2006
  • We have built a database server called HorseDB which contains the genome annotation information and biological information for horse from public database entries. The aims of HorseDB are the integration of biological information and horse genome data on genome scale using bioinformatic methods. To facilitate the extraction of useful information among collected horse genome and biological data, we developed a user-friendly interface system, HorseDB; an Integrated Horse Resource and web Service. The database is categorized by the general horse information data, a sequence annotation data, and a world-wide web analysis program interface. The database also provides an easy access for user to find out the useful information within horse genomes and support analyzed information, such as sequence alignment and gene annotation results. HorseDB can be accessed at http://www.primate.or.kr./horse.

A Study on the cleansing of water data using LSTM algorithm (LSTM 알고리즘을 이용한 수도데이터 정제기법)

  • Yoo, Gi Hyun;Kim, Jong Rib;Shin, Gang Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.501-503
    • /
    • 2017
  • In the water sector, various data such as flow rate, pressure, water quality and water level are collected during the whole process of water purification plant and piping system. The collected data is stored in each water treatment plant's DB, and the collected data are combined in the regional DB and finally stored in the database server of the head office of the Korea Water Resources Corporation. Various abnormal data can be generated when a measuring instrument measures data or data is communicated over various processes, and it can be classified into missing data and wrong data. The cause of each abnormal data is different. Therefore, there is a difference in the method of detecting the wrong side and the missing side data, but the method of cleansing the data is the same. In this study, a program that can automatically refine missing or wrong data by applying deep learning LSTM (Long Short Term Memory) algorithm will be studied.

  • PDF