• 제목/요약/키워드: Local Database

검색결과 627건 처리시간 0.024초

주사본 권한을 이용한 동적 트랜잭션 분배 알고리즘 (A Dynamic Transaction Routing Algorithm with Primary Copy Authority)

  • 김기형;조행래;남영환
    • 정보처리학회논문지D
    • /
    • 제10D권7호
    • /
    • pp.1067-1076
    • /
    • 2003
  • 데이터베이스 공유 시스템(Database Sharing System: DSS)은 고성능 트랜잭션 처리를 위해 제안된 시스템이다. DSS에서 고속의 통신망으로 연결된 노드들은 별도의 메모리와 운영체제를 가지며, 데이터베이스를 저장하고 있는 디스크는 모든 노드에 의해 공유된다. 그리고 빈번한 디스크 액세스를 피하기 위해 각 노드는 자신의 메모리 버퍼에 최근에 액세스한 페이지들을 캐싱한다. 본 논문에서는 DSS를 구성하고 있는 각 노드의 부하를 효과적으로 분산한 수 있는 동적 트랜잭션 분배 알고리즘을 제안한다. 제안한 알고리즘은 각 노드에 할당된 주사본 권한을 이용함으로써 노드별 참조 지역성을 지원하고, 그 결과 캐쉬 이용률을 증가하여 디스크 액세스 수를 최소화한다. 뿐만 아니라, 노드의 현재 부하를 고려하여 트랜잭션 분배 정책을 결정함으로써 특정 노드에 트랜잭션이 집중되는 것을 피한다. 제안된 알고리즘의 성능평가를 위해 시뮬레이션 실험을 수행하였으며, 실험결과 제안된 알고리즘이 기존 알고리즘들보다 트랜잭션 처리율에서 높은 성능을 보였다. 특히 트랜잭션 부하량이 높은 경우와 편중된 데이터 참조를 보이는 경우에 좋은 성능을 보였다.

그리드 컴퓨팅을 이용한 BLAST 성능개선 및 유전체 서열분석 시스템 구현 (Performance Improvement of BLAST using Grid Computing and Implementation of Genome Sequence Analysis System)

  • 김동욱;최한석
    • 한국콘텐츠학회논문지
    • /
    • 제10권7호
    • /
    • pp.81-87
    • /
    • 2010
  • 본 논문에서는 현재 생물정보학 연구에서 가장 많이 사용하고 있는 BLAST의 문제점을 분석하고 이에 따른 해결책을 제시하기 위하여 그리드 컴퓨팅을 이용한 G-BLAST(Grid Computing을 이용한 Basic Local Alignment Search Tool)를 제안한다. 본 연구에서 제안하고 있는 G-BLAST을 이용한 시스템은 이기종 분산 환경에서 수행이 가능한 서열분석 통합 소프트웨어 패키지이며 기존 서열분석 서비스의 취약점인 검색 성능을 개선하여 BLAST 검색 기능을 강화 하였다. 또한, BLAST 결과를 사용자가 관리 및 분석이 용이하도록 데이터베이스 및 유전체 서열분석 서비스 시스템을 구현하였다. 본 논문에서는 G-BLAST시스템의 성능확인을 위하여 병렬컴퓨팅 성능테스트 기법을 도입하여 구현된 시스템을 기존 BLAST와 속도 및 효율부분에서 비교하여 성능개선을 확인하였으며 서열결과 분석에 필요한 자료를 사용자관점에서 제공해주고 있다.

2D - PCA와 영상분할을 이용한 얼굴인식 (Face Recognition using 2D-PCA and Image Partition)

  • 이현구;김동주
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.31-40
    • /
    • 2012
  • Face recognition refers to the process of identifying individuals based on their facial features. It has recently become one of the most popular research areas in the fields of computer vision, machine learning, and pattern recognition because it spans numerous consumer applications, such as access control, surveillance, security, credit-card verification, and criminal identification. However, illumination variation on face generally cause performance degradation of face recognition systems under practical environments. Thus, this paper proposes an novel face recognition system using a fusion approach based on local binary pattern and two-dimensional principal component analysis. To minimize illumination effects, the face image undergoes the local binary pattern operation, and the resultant image are divided into two sub-images. Then, two-dimensional principal component analysis algorithm is separately applied to each sub-images. The individual scores obtained from two sub-images are integrated using a weighted-summation rule, and the fused-score is utilized to classify the unknown user. The performance evaluation of the proposed system was performed using the Yale B database and CMU-PIE database, and the proposed method shows the better recognition results in comparison with existing face recognition techniques.

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

Shape Description and Retrieval Using Included-Angular Ternary Pattern

  • Xu, Guoqing;Xiao, Ke;Li, Chen
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.737-747
    • /
    • 2019
  • Shape description is an important and fundamental issue in content-based image retrieval (CBIR), and a number of shape description methods have been reported in the literature. For shape description, both global information and local contour variations play important roles. In this paper a new included-angular ternary pattern (IATP) based shape descriptor is proposed for shape image retrieval. For each point on the shape contour, IATP is derived from its neighbor points, and IATP has good properties for shape description. IATP is intrinsically invariant to rotation, translation and scaling. To enhance the description capability, multiscale IATP histogram is presented to describe both local and global information of shape. Then multiscale IATP histogram is combined with included-angular histogram for efficient shape retrieval. In the matching stage, cosine distance is used to measure shape features' similarity. Image retrieval experiments are conducted on the standard MPEG-7 shape database and Swedish leaf database. And the shape image retrieval performance of the proposed method is compared with other shape descriptors using the standard evaluation method. The experimental results of shape retrieval indicate that the proposed method reaches higher precision at the same recall value compared with other description method.

수질 및 토양오염 모니터링 결과를 이용한 카드뮴의 환경위해성평가 (Environmental Risk Assessment of Cadmium using National Monitoring Data)

  • 박광식;신동천
    • Environmental Analysis Health and Toxicology
    • /
    • 제19권1호
    • /
    • pp.65-72
    • /
    • 2004
  • Environmental risk assessment of cadmium compounds was conducted using national monitoring data of aquatic and terrestrial compartments of local area. Aquatic and terrestrial toxicities of cadmium compounds on algae, daphnid, fish, earthworm, springtails and other species were evaluated. The toxicity data evaluated in this study were mainly from ECOTOX database provided by US EPA. Assessment factors were determined according to the EU technical guidance document and/or OECD proposal. Predicted no effect concentration (PNEC) values of aquatic and terrestrial toxicity were 25$\mu\textrm{g}$/L and 0.2 mg/kg, respectively and they were compared with cadmium exposure data of several local areas, which were used as Predicted exposure concentration(PEC) values. Most of the local area were found to be not risky. However, the risk values (PEC/NEC) of some metropolitan areas were greater than 1 when the most conservative PNEC value was applied.

The Robust Derivative Code for Object Recognition

  • Wang, Hainan;Zhang, Baochang;Zheng, Hong;Cao, Yao;Guo, Zhenhua;Qian, Chengshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.272-287
    • /
    • 2017
  • This paper proposes new methods, named Derivative Code (DerivativeCode) and Derivative Code Pattern (DCP), for object recognition. The discriminative derivative code is used to capture the local relationship in the input image by concatenating binary results of the mathematical derivative value. Gabor based DerivativeCode is directly used to solve the palmprint recognition problem, which achieves a much better performance than the state-of-art results on the PolyU palmprint database. A new local pattern method, named Derivative Code Pattern (DCP), is further introduced to calculate the local pattern feature based on Dervativecode for object recognition. Similar to local binary pattern (LBP), DCP can be further combined with Gabor features and modeled by spatial histogram. To evaluate the performance of DCP and Gabor-DCP, we test them on the FERET and PolyU infrared face databases, and experimental results show that the proposed method achieves a better result than LBP and some state-of-the-arts.

교육훈련기관 유형별 청년층 취업률 분석 (Employment Rate of the Youth in Korea: An Analysis by Types of Education and Training Institutes)

  • 채창균
    • 노동경제논집
    • /
    • 제28권2호
    • /
    • pp.93-117
    • /
    • 2005
  • 이 글에서는 청년층의 노동시장 이행 실태를 취업률에 국한하여 교육훈련기관 유형별로 비교 분석하였다. 이를 위해 각급 교육훈련기관의 졸업생 명단과 고용보험 DB를 결합, 직업력 자료를 구축하여 활용하였다. 또한 4년제대학과 전문대학의 경우에는 수능점수를 확보하여 분석에 이용함으로써, 개인의 능력을 나타내는 주요 변수로서의 수능점수의 노동시장 효과에 대한 검토가 가능하였다. 실증 결과에 따르면, 교육훈련기관간에 취업률의 차이가 존재하며 교육기간이 길어질수록 취업 성과가 양호한 것으로 확인되었다. 또한 4년제 대학의 경우 수도권 소재 여부가 취업률에 큰 영향을 미치는 것으로 나타났고, 수능점수가 노동시장 성과에 미치는 효과가 큰 것으로 확인되었다. 한편 전공에 따라 취업성과에 유의한 차이가 있음을 알 수 있었다.

  • PDF

GEDA: New Knowledge Base of Gene Expression in Drug Addiction

  • Suh, Young-Ju;Yang, Moon-Hee;Yoon, Suk-Joon;Park, Jong-Hoon
    • BMB Reports
    • /
    • 제39권4호
    • /
    • pp.441-447
    • /
    • 2006
  • Abuse of drugs can elicit compulsive drug seeking behaviors upon repeated administration, and ultimately leads to the phenomenon of addiction. We developed a procedure for the standardization of microarray gene expression data of rat brain in drug addiction and stored them in a single integrated database system, focusing on more effective data processing and interpretation. Another characteristic of the present database is that it has a systematic flexibility for statistical analysis and linking with other databases. Basically, we adopt an intelligent SQL querying system, as the foundation of our DB, in order to set up an interactive module which can automatically read the raw gene expression data in the standardized format. We maximize the usability of this DB, helping users study significant gene expression and identify biological function of the genes through integrated up-to-date gene information such as GO annotation and metabolic pathway. For collecting the latest information of selected gene from the database, we also set up the local BLAST search engine and non-redundant sequence database updated by NCBI server on a daily basis. We find that the present database is a useful query interface and data-mining tool, specifically for finding out the genes related to drug addiction. We apply this system to the identification and characterization of methamphetamine-induced genes' behavior in rat brain.

GIS를 이용한 은행마케팅 데이터베이스의 구축과 과제 (Construction and Evaluation of Bank Marketing Database using Geographic Information Systems)

  • 조명희;부기동;김광주;서준석
    • 한국지리정보학회지
    • /
    • 제1권1호
    • /
    • pp.52-69
    • /
    • 1998
  • 마케팅 GIS의 대표적인 분야인 은행마케팅에 있어서의 고객 및 점포관리를 위한 DB를 지방은행인 대구은행을 대상으로 GIS를 이용하여 구축하였다. 이를 위하여 area marketing의 기본개념과 전개방안을 검토하고 수치도로지도, 행정경계, 우편동경계 등의 위치자료와 상공인명감, 지가, 토지이용 등의 속성자료를 포함하는 은행외부자료 및 마케팅과 관련된 은행내부자료를 중심으로 구축하고, 이를 기초로 간단한 공간검색과 분석기능을 지닌 사용자 인터페이스중심의 은행 GIS 시스템을 개발하였다. GIS 기본 패키지는 Map/Info, 인터페이스를 위한 언어로는 Delphi가 각각 사용되었으며, 아울러 구축과정에 있어서의 위치 및 속성자료에 관련된 여러 가지 문제점을 종합적으로 검토 평가하였다.