• Title/Summary/Keyword: SQL-based

Search Result 410, Processing Time 0.022 seconds

Design and Implementation of a Spatial-Operation-Trigger for Supporting the Integrity of Meet-Spatial-Objects (상접한 공간 객체의 무결성 지원을 위한 공간 연산 트리거의 설계 및 구현)

  • Ahn, Jun-Soon;Cho, Sook-Kyoung;Chung, Bo-Hung;Lee, Jae-Dong;Bae, Hae-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.127-140
    • /
    • 2002
  • In a spatial database system, the semantic integrity should be supported for maintaining the data consistency. In the real world, spatial objects In boundary layer should always meet neighbor objects, and they cannot hold the same name. This characteristic is an implied concept in real world. So, when this characteristic is disobeyed due to the update operations of spatial objects, it is necessary to maintain the integrity of a layer. In this thesis, we propose a spatial-operation-trigger for supporting the integrity of spatial objects. The proposed method is defined a spatial-operation-trigger based on SQL-3 and executed when the constraint condition is violated. A spatial-operation-trigger have the strategy of execution. Firstly, for one layer, the spatial and aspatial data triggers are executed respectively. Secondly, the aspatial data trigger for the other layers is executed. Spatial-operation-trigger for one layer checks whether the executed operation updates only spatial data, aspatial data, or both of them, and determines the execution strategy of a spatial-operation-trigger. Finally, the aspatial data trigger for the other layers is executed. A spatial-operation-trigger is executed in three steps for the semantic integrity of the meet-property of spatial objects. And, it provides the semantic integrity of spatial objects and the convenience for users using automatic correcting operation.

WBI Design and Implementation for active instruction in high school curriculum information society and computer (능동적인 학습을 위한 고교 정보사회와 컴퓨터 교과의 WBI 설계 및 구현이동)

  • Bae, Seok-Chan;Du, Chang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.895-901
    • /
    • 2007
  • Currently the advancement of the computer and the Internet sees the direction of studying freely to do, it does not receive not to be, the student the environment it will be able to study oneself it is doing the direct help of the teacher and to be possible. Plan and it embodied the high school information society which it follows in 7th curriculum and the WBI of computer subject from the dissertation which it sees. In order to improve the qualify of curriculum ultimately, it endeavored. Territory it analyzes a subject contents first, especially it surveys, foundation it hardens, the actual training semester and pure with studying of self-evaluation do to become accomplished, studying oneself to sleep the possibility of doing own lead studying which is the possibility of studying spontaneously and integrated textbook studying in same tine it does to be with they are composing of the education paradigm the flag for a problem solving ability and an originality accident. In this dissertation used the php, Apache web server and the DBMS used the MySQL. To program member joining, the information society and computer curriculum take a course and test, it questions and, it is composed to data mourge. After taking a course, simultaneously lecturing a paper and online instruction, set up a foundation and quering that gratify one's curiosity thus it will be able to digest a study in once.

  • PDF

A Nonunique Composite Foreign Key-Based Approach to Fact Table Modeling and MDX Query Composing (비유일 외래키 조합 복합키 기반의 사실테이블 모델링과 MDX 쿼리문 작성법)

  • Yu, Han-Ju;Lee, Duck-Sung;Choi, In-Soo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.185-197
    • /
    • 2006
  • A star schema consists of a central fact table, which is surrounded by one or more dimension tables. Each row int the fact table contains a multi-part primary key(or a composite foreign key) along with one or more columns containing various facts about the data stored in the row Each of the composit foreign key components is related to a dimensional table. The combination of keys in the fact table creates a composite foreign key that is unique to the fact table record. The composite foreign key, however, is rarely unique to the fact table record in real-world applications, particularly in financial applications. In order to make the composite foreign key be the determinant in real-world application, some precalculation might be performed in the SQL relational database, and cached in the OLAP database. However, there are many drawbacks to this approach. In some cases, this approach might give users the wrong results. In this paper, an approach to fact table modeling and related MDX query composing, which can be used in real-world applications without performing any precalculation and gives users the correct results, is proposed.

  • PDF

Design and Implementation of Distributed QoS Management Architecture for Real-time Negotiation and Adaptation Control on CORBA Environments (CORBA 환경에서 실시간 협약 및 작응 제어를 위한 분사 QoS 관리 구조의 설계 및 구현)

  • Lee, Won-Jung;Shin, Chang-Sun;Jeong, Chang-Won;Joo, Su-Chong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.21-35
    • /
    • 2002
  • Nowadays, in accordance with increasing expectations of multimedia stream service on the internet, a lot of distributed applications are being required and developed. But the models of the existing systems have the problems that cannot support the extensibility and the reusability, when the QoS relating functions are being developed as an integrated modules which are suited on the centralized controlled specific-purpose application services. To cope with these problems, it is suggested in this paper to a distributed QoS management system on CORBA, an object-oriented middleware compliance. This systems we suggested can provides not only for efficient control of resources, various service QoS, and QoS control functions as the existing functions, but also QoS control real-time negotiation and dynamic adaptation in addition. This system consists of QoS Control Management Module(QoS CMM) in client side and QoS Management Module(QoS MM) in server side, respectively. These distributed modules are interfacing with each other via CORBA on different systems for distributed QoS management while serving distributed streaming applications. In phase of design of our system, we use UML(Unified Modeling Language) for designing each component in modules, their method calls and various detailed functions for controlling QoS of stream services. For implementation of our system, we used OrbixWeb 3.1c following CORBA specification on Solaris 2.5/2.7, Java language, Java Media Framework API 2.0 beta2, Mini-SQL 1.0.16 and the multimedia equipments, such as SunVideoPlus/Sun Video capture board and Sun Camera. Finally, we showed a numerical data controlled by real-time negotiation and adaptation procedures based on QoS map information to GUIs on client and server dynamically, while our distributed QoS management system is executing a given streaming service.

Design and Implementation of Indoor Air Hazardous Substance Detection Mobile System based on IoT Platform (IoT platform 기반 실내 대기 위험 물질 감지 모바일 시스템 설계 및 구현)

  • Yang, Oh-Seok;Kim, Yeong-Uk;Lee, Hong-Lo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.6
    • /
    • pp.43-53
    • /
    • 2019
  • In recent years, there have been many cases of damage to indoor air hazardous materials, and major damage due to the lack of quick action. In this regard, the system is intended to establish for sending push messages to the user's mobile when the concentration of hazardous substances is exceeded. This system extracts data with IoT system such as Arduino and Raspberry Pi and then constructs database through MongoDB and MySQL in cloud computing system. The database is imported through the application server using NodeJS and sent to the application for visualization. Also, when receiving signals about a dangerous situation in IoT system, push message is sent using Google FCM library. Mobile application is developed using Android Web view, and page to enter Web view is developed using HTML5 (HTML, Javascript CSS). The application of this system enables real-time monitoring of indoor air-dangerous substances. In addition, real-time information on indoor/outdoor detection location and concentration can be sent to the user's mobile in case of a risk situation, which can be expected to help the user respond quickly.

A Nonunique Composite Foreign Key-Based Approach to Fact Table Modeling and MDX Query Composing (비유일 외래키 조합 복합키 기반의 사실테이블 모델링과 MDX 쿼리문 작성법)

  • Yu, Han-Ju;Lee, Duck-Sung;Choi, In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.177-188
    • /
    • 2007
  • A star schema consists of a central fact table, which is surrounded by one or more dimension tables. Each row in the fact table contains a multi-part primary key(or a composite foreign key) along with one or more columns containing various facts about the data stored in the row. Each of the composit foreign key components is related to a dimensional table. The combination of keys in the fact table creates a composite foreign key that is unique to the fact table record. The composite foreign key, however, is rarely unique to the fact table retold in real-world applications, particularly in financial applications. In order to make the composite foreign key be the determinant in real-world application, some precalculation might be performed in the SQL relational database, and cached in the OLAP database. However, there are many drawbacks to this approach. In some cases, this approach might give users the wrong results. In this paper, an approach to fact table modeling and related MDX query composing, which can be used in real-world applications without performing any precalculation and gives users the correct results, is proposed.

  • PDF

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

A Self-Service Business Intelligence System for Recommending New Crops (재배 작물 추천을 위한 셀프서비스 비즈니스 인텔리전스 시스템)

  • Kim, Sam-Keun;Kim, Kwang-Chae;Kim, Hyeon-Woo;Jeong, Woo-Jin;Ahn, Jae-Geun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.527-535
    • /
    • 2021
  • Traditional business intelligence (BI) systems have been used widely as tools for better decision-making on time. On the other hand, building a data warehouse (DW) for the efficient analysis of rapidly growing data is time-consuming and complex. In particular, the ETL (Extract, Transform, and Load) process required to build a data warehouse has become much more complex as the BI platform moves to a cloud environment. Various BI solutions based on the NoSQL database, such as MongoDB, have been proposed to overcome these ETL issues. Decision-makers want easy access to data without the help of IT departments or BI experts. Recently, self-service BI (SSBI) has emerged as a way to solve these BI issues. This paper proposes a self-service BI system with farming data using the MongoDB cloud as DW to support the selection of new crops by return-farmers. The proposed system includes functions to provide insights to decision-makers, including data visualization using MongoDB charts, reporting for advanced data search, and monitoring for real-time data analysis. Decision makers can access data directly in various ways and can analyze data in a self-service method using the functions of the proposed system.

A study on the selection of the target scope for destruction of personal credit information of customers whose financial transaction effect has ended (금융거래 효과가 종료된 고객의 개인신용정보 파기 대상 범위 선정에 관한 연구)

  • Baek, Song-Yi;Lim, Young-Bin;Lee, Chang-Gil;Chun, Sam-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.163-169
    • /
    • 2022
  • According to the Credit Information Act, in order to protect customer information by relationship of credit information subjects, it is destroyed and stored separately in two stages according to the period after the financial transaction effect is over. However, there is a limitation in that the destruction of personal credit information of customers whose financial transaction effect has expired cannot be collectively destroyed when the transaction has been terminated, depending on the nature of the financial product and transaction. To this end, the IT person in charge is developing a computerized program according to the target and order of destruction by investigating the business relationship by transaction type in advance. In this process, if the identification of the upper relation between tables is unclear, a compliance issue arises in which personal credit information cannot be destroyed or even information that should not be destroyed because it depends on the subjective judgment of the IT person in charge. Therefore, in this paper, we propose a model and algorithm for identifying the referenced table based on SQL executed in the computer program, analyzing the upper relation between tables with the primary key information of the table, and visualizing and objectively selecting the range to be destroyed. presented and implemented.

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud

  • Zhu, Taipeng;Zou, Xianxia;Pan, Jiuhui
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.573-589
    • /
    • 2017
  • Cloud computing is an attractive solution that can provide low cost storage and powerful processing capabilities for government agencies or enterprises of small and medium size. Yet the confidentiality of information should be considered by any organization migrating to cloud, which makes the research on relational database system based on encryption schemes to preserve the integrity and confidentiality of data in cloud be an interesting subject. So far there have been various solutions for realizing SQL queries on encrypted data in cloud without decryption in advance, where generally homomorphic encryption algorithm is applied to support queries with aggregate functions or numerical computation. But the existing homomorphic encryption algorithms cannot encrypt floating-point numbers. So in this paper, we present a mechanism to enable the trusted party to encrypt the floating-points by homomorphic encryption algorithm and partial trusty server to perform summation on their ciphertexts without revealing the data itself. In the first step, we encode floating-point numbers to hide the decimal points and the positive or negative signs. Then, the codes of floating-point numbers are encrypted by homomorphic encryption algorithm and stored as sequences in cloud. Finally, we use the data structure of DoubleListTree to implement the aggregate function of SUM and later do some extra processes to accomplish the summation.