• Title/Summary/Keyword: In-database 분석

Search Result 3,730, Processing Time 0.031 seconds

Design and Implementation of Distributed In-Memory DBMS-based Parallel K-Means as In-database Analytics Function (분산 인 메모리 DBMS 기반 병렬 K-Means의 In-database 분석 함수로의 설계와 구현)

  • Kou, Heymo;Nam, Changmin;Lee, Woohyun;Lee, Yongjae;Kim, HyoungJoo
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.3
    • /
    • pp.105-112
    • /
    • 2018
  • As data size increase, a single database is not enough to serve current volume of tasks. Since data is partitioned and stored into multiple databases, analysis should also support parallelism in order to increase efficiency. However, traditional analysis requires data to be transferred out of database into nodes where analytic service is performed and user is required to know both database and analytic framework. In this paper, we propose an efficient way to perform K-means clustering algorithm inside the distributed column-based database and relational database. We also suggest an efficient way to optimize K-means algorithm within relational database.

Research of organized data extraction method for digital investigation in relational database system (데이터베이스 시스템에서 디지털 포렌식 조사를 위한 체계적인 데이터 추출 기법 연구)

  • Lee, Dong-Chan;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.565-573
    • /
    • 2012
  • To investigate the business corruption, the obtainments of the business data such as personnel, manufacture, accounting and distribution etc., is absolutely necessary. Futhermore, the investigator should have the systematic extraction solution from the business data of the enterprise database, because most company manage each business data through the distributed database system, In the general business environment, the database exists in the system with upper layer application and big size file server. Besides, original resource data which input by user are distributed and stored in one or more table following the normalized rule. The earlier researches of the database structure analysis mainly handled the table relation for database's optimization and visualization. But, in the point of the digital forensic, the data, itself analysis is more important than the table relation. This paper suggests the extraction technique from the table relation which already defined in the database. Moreover, by the systematic analysis process based on the domain knowledge, analyzes the original business data structure stored in the database and proposes the solution to extract table which is related incident.

Database Workload Analysis : An Empirical Study (데이타베이스 워크로드 분석 : 실험적 연구)

  • Oh, Jeong-Seok;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.747-754
    • /
    • 2004
  • Database administrators should be aware of performance characteristics of database systems in order to manage database system effectively. The usages of system resources in database systems could be quite different under database workloads. The objective of this paper is to identify and analyze performance characteristics of database systems in different workloads, which could help database tuners tune database systems Under the TPC-C and TPC-W workloads, which represent typical workloads of online transaction processing and electronic commerce respectively, we investigated usage types of resource that are determined by fourteen performance indicator, and are behaved in response to changes of four tuning parameters (data buffer, private memory, I/O process, shared memory). Eight out of the fourteen performance indicators cleary show the performance differences under the workloads. Changes of data buffer parameter give a influences to database system. The tuning parameter that affects the system performance significantly is the database buffer size in the both workloads.

A Study on the Development of Life Cycle Cost Database in Building (건축물의 LCC Database 구축에 관한 연구)

  • Jeon Chan-Min;Woo Kyung-Hun;Kim Joong-Hun;Kim Kyung-UP;Park Tae-Keun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.537-540
    • /
    • 2003
  • The importance of LCC analysis has been enlarged. Also, it would be necessary to computerize LCC analysis for accurate and logical analysis of LCC. In other papers, they showed LCC analysis model but the study of database development which could be applied in LCC analysis have been undeveloped. As a result, the final goal of this study is to develope LCC database. And this progress is devided 4 steps as design, construction, maintenance and disposal and derived the detailed cost item in the progresses. Futhermore, it would be possible to develope cost DB, fluent DB, general DB, building section DB, material DB and to propose database which would be applied in accurate and logical analysis of LCC.

  • PDF

A Log Analyzer for Database Tuning (데이타베이스 튜닝을 위한 로그 분석 도구)

  • Lee, Sang-Hyup;Kim, Sung-Jin;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1041-1048
    • /
    • 2004
  • Database logs contain various information on database operations, but they are used to recover database systems from failures generally. This paper proposes a log analysis tool that provides useful information for database tuning. This tool provides users with information on work-load organization, database schemas, and resources usages of queries. This paper describes the tool in views of its architecture, functions, implementation, and verification. The tool is verified by running the TPC-W benchmark, and representative analysis results are also presented.

A Database Forensics Model based on Classification by Analysis Purposes (분석 목적별 분류기반의 데이터베이스 포렌식 모델)

  • Kim, Sung-Hye;Kim, Jang-Won;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.63-72
    • /
    • 2009
  • Digital forensics refers to finding electronic evidences related to crimes. As cyber crimes are increasing daily, digital forensics for finding electronic evidences is also becoming important. At present, various aspects of digital forensics have being researched including the overall process model and analysis techniques such as network forensics, system forensics and database forensics for digital forensics. Regarding database forensics, only analysis techniques dependent on specific vendors have been suggested. And general process models and analysis techniques which can be used in various databases have not been studied. This paper proposes an integrated process model and analysis technique for database forensics. The proposed database forensics model (DFM) allows us to solve problems and analyze databases according to the situation and purpose, and to use a standard model and techniques for various database analyses. In order to test our model(DFM), we applied it to various database analyses. And we confirmed the results of our experiment that it can be applicable to acquisition in the scene as well as analysis of data relationships.

A Study on Demand for Multimedia Database of Specialized Information (전문정보 멀티미디어 데이터베이스의 수요에 관한 연구)

  • Ko Young-Man
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.45-67
    • /
    • 1998
  • The tendency of multimedia services and market of specialized information is currently much debated issur in our country. Nevertheless, the systematic investigation of demand for multimedea database is nowadays nowhere to be found. The purpose of this study is to gain a general overview of market and demand of service relating to multimedea database. At first, various definitions of multimedia, multimedia content, and multimedia database are analysed and evaluated from the point of technical and practical views. For the study on the demand for multimedia database of specialized information, database catalogue of DPCK 1997 and multimedia database on internet are analysed. After that the results of expert survey to estimate an accurate tendency of multimedia services in Korea are analysed.

  • PDF

Database teaching and learning effects applying the situated learning theory (상황학습 이론을 적용한 데이터베이스 교수 학습 효과)

  • Shin, Soo-Bum
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.47-55
    • /
    • 2006
  • To determine efficient methods of database teaching, this paper applied the situated learning theory to the teaching and learning method and analyzed the effects. Previous related studies were also examined, with the essential contents in database analyzed based on Bloom's taxonomy of educational objectives. Moreover, this paper presented a strategy wherein the contents of database learning are classified into two categories: basic knowledge and technical and extended knowledge. Experimental and control groups were selected based on related studies, and the effects of database teaching and learning method, determined by technique and attitude area as well as knowledge area. After preparing and applying to the teaching and learning method the actual educational curriculum, the following results were drawn: (1) the experimental group showed better performance in terms of understanding the concept of database, operating database, and constructing a database table when the situated learning theory was applied to the teaching method, and; (2) the experimental group was also more receptive compared to the control group, which opted to take technique-oriented database courses. Therefore, various teaching and learning methods aside from the situated learning theory should be applied and analyzed in database and computer science fields for maximum effects.

  • PDF

Analysis of Encryption and Decryption Processes of Realm Database and Its Application (Realm 데이터베이스 암·복호화 프로세스 및 기반 애플리케이션 분석)

  • Youn, Byungchul;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.369-378
    • /
    • 2020
  • Due to the widespread use of mobile devices, smartphone penetration and usage rate continue to increase and there is also an increasing amount of data that need to be stored and managed in applications. Therefore, recent applications use mobile databases to store and manage user data. Realm database, developed in 2014, is attracting more attention from developers because of advantages of continuous updating, high speed, low memory usage, simplicity and readability of the code. It also supports an encryption to provide confidentiality and integrity of personal information stored in the database. However, since the encryption can be used as an anti-forensic technique, it is necessary to analyze the encryption and decryption processes provided by Realm Database. In this paper, we analyze the structure of Realm Database and its encryption and decryption process in detail, and analyze an application that supports an encryption to propose the use cases of the Realm Database.

The Design and Implementation of Meta database and manager (메타 데이타베이스와 관리기의 설계 및 구현-통계 데이타베이스를 중심으로)

  • Ahn, Sung-Ohk
    • The Journal of Natural Sciences
    • /
    • v.8 no.1
    • /
    • pp.109-114
    • /
    • 1995
  • For effective management of statistical database, statistical summary information must be provided by accessing directly the precomputed summary data from summary database to store and manage meta database for supporting statistical analysis and providing users with statistical summary information. In order to support effectively the use of summary database, we do the design and implementation of meta database and manager having a hierarchical structure as a data dictionary/directory and operation method is presented.

  • PDF