• Title/Summary/Keyword: SQL-based

Search Result 410, Processing Time 0.026 seconds

A Development of UDDI 3.0 Registry based on Relational DBMS (관계 DBMS에 기반한 UDDI 3.0 레지스트리의 개발)

  • 유수진;이경하;이규철
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.2
    • /
    • pp.163-181
    • /
    • 2004
  • Recently, it is to increase rapidly in people who do a private business through Web service. So, many companies have been developing part of businesses using Web Services. The greatest interest of companies developing Web Services was that users were easily discovering and using information on theirs. So, companies have been taking interest in a standard that supports registrations of information on Web service and discoveries of a registered Web services. Therefore UDDI 3.0 standard of the registry for Web service standardized by OASIS is in the spotlight. But, because of the complexity of it, there are no implementations developed in the inside of the country yet. And a development activity of it is faint. In outside of the country, IBM, Microsoft and SAP has developed it, but they do not perfectly support a standard of UDDI 3.0. This Paper shows the development of the Registry System which supports perfectly a standard of UDDI 3.0.

  • PDF

Design of Building Biomertic Big Data System using the Mi Band and MongoDB (Mi Band와 MongoDB를 사용한 생체정보 빅데이터 시스템의 설계)

  • Lee, Younghun;Kim, Yongil
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.124-130
    • /
    • 2016
  • Big data technologies are increasing the need for big data in many areas of the world. Recently, the health care industry has become increasingly aware of the importance of disease and health care services, as it has become increasingly immune to prevention and health care. To do this, we need a Big data system to collect and analyze the personal biometric data. In this paper, we design the biometric big data system using low cost wearable device. We collect basic biometric data, such as heart rate, step count and physical activity from Mi Band, and store the collected biometric data into MongoDB. Based on the results of this study, it is possible to build a big data system that can be used in actual medical environment by using Hadoop etc. and to use it in real medical service in connection with various wearable devices for medical information.

A Study of Quality Evaluation for SDR System Operating Software (SDR 시스템의 운용소프트웨어 품질평가에 관한 연구)

  • Kim, Min-Soo;Lee, Kun-Joon;Ha, Sung-Jae;Cho, Sang-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.657-664
    • /
    • 2014
  • In this paper, we described evaluation software that can propose rating scale and evaluate automatically on SDR(Software-Defined Radio) transmitter system. To deduct suitable rating scale, we extracted requirements based on the operating environment, operating application and operating method because SDR operating software is subordinative to the hardware. And we implementation evaluation software to automatically quality evaluation using rating scale draw from the requirements. The implemented evaluation software has automatically evaluation functions using script, can update the evaluation factor and show visual evaluation result. The implemented evaluation software is used to useful the high quality SDR operating software development.

An Integrated Maintenance in Injection Molding Processes (사출성형 공정에서의 통합정비방법에 관한 연구)

  • Park, Chulsoon;Moon, Dug Hee;Sung, Hongsuk;Song, Junyeop;Jung, Jongyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.100-107
    • /
    • 2015
  • Recently as the manufacturers want competitiveness in dynamically changing environment, they are trying a lot of efforts to be efficient with their production systems, which may be achieved by diminishing unplanned operation stops. The operation stops and maintenance cost are known to be significantly decreased by adopting proper maintenance strategy. Therefore, the manufacturers were more getting interested in scheduling of exact maintenance scheduling to keep smooth operation and prevent unexpected stops. In this paper, we proposedan integrated maintenance approach in injection molding manufacturing line. It consists of predictive and preventive maintenance approach. The predictive maintenance uses the statistical process control technique with the real-time data and the preventive maintenance is based on the checking period of machine components or equipment. For the predictive maintenance approach, firstly, we identified components or equipment that are required maintenance, and then machine parameters that are related with the identified components or equipment. Second, we performed regression analysis to select the machine parameters that affect the quality of the manufactured products and are significant to the quality of the products. By this analysis, we can exclude the insignificant parameters from monitoring parameters and focus on the significant parameters. Third, we developed the statistical prediction models for the selected machine parameters. Current models include regression, exponential smoothing and so on. We used these models to decide abnormal patternand to schedule maintenance. Finally, for other components or equipment which is not covered by predictive approach, we adoptedpreventive maintenance approach. To show feasibility we developed an integrated maintenance support system in LabView Watchdog Agent and SQL Server environment and validated our proposed methodology with experimental data.

Development of a distributed high-speed data acquisition and monitoring system based on a special data packet format for HUST RF negative ion source

  • Li, Dong;Yin, Ling;Wang, Sai;Zuo, Chen;Chen, Dezhi
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3587-3594
    • /
    • 2022
  • A distributed high-speed data acquisition and monitoring system for the RF negative ion source at Huazhong University of Science and Technology (HUST) is developed, which consists of data acquisition, data forwarding and data processing. Firstly, the data acquisition modules sample physical signals at high speed and upload the sampling data with corresponding absolute-time labels over UDP, which builds the time correlation among different signals. And a special data packet format is proposed for the data upload, which is convenient for packing or parsing a fixed-length packet, especially when the span of the time labels in a packet crosses an absolute second. The data forwarding modules then receive the UDP messages and distribute their data packets to the real-time display module and the data storage modules by PUB/SUB-pattern message queue of ZeroMQ. As for the data storage, a scheme combining the file server and MySQL database is adopted to increase the storage rate and facilitate the data query. The test results show that the loss rate of the data packets is within the range of 0-5% and the storage rate is higher than 20 Mbps, both acceptable for the HUST RF negative ion source.

Minimize Web Applications Vulnerabilities through the Early Detection of CRLF Injection

  • Md. Mijanur Rahman;Md. Asibul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.199-202
    • /
    • 2023
  • Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.

Evaluation of Edge-Based Data Collection System for Key-Value Store Utilizing Time-Series Data Optimization Techniques (시계열 데이터 최적화 기법을 활용한 Key-value store의 엣지 기반 데이터 수집 시스템 평가)

  • Woojin Cho;Hyung-ah Lee;Jae-hoi Gu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.911-917
    • /
    • 2023
  • In today's world, we find ourselves facing energy crises due to factors such as war and climate crises. To prepare for these energy crises, many researchers continue to study systems related to energy monitoring and conservation, such as energy management systems, energy monitoring, and energy conservation. In line with these efforts, nations are making it mandatory for energy-consuming facilities to implement these systems. However, these facilities, limited by space and energy constraints, are exploring ways to improve. This research explores the operation of a data collection system using low-performance embedded devices. In this context, it proves that an optimized version of RocksDB, a Key-Value store, outperforms traditional databases when it comes to time-series data. Furthermore, a comprehensive database evaluation tool was employed to assess various databases, including optimized RocksDB and regular RocksDB. In addition, heterogeneous databases and evaluations are conducted using a UD Benchmark tool to evaluate them. As a result, we were able to see that on devices with low performance, the time required was up to 11 times shorter than that of other databases.

Improving Bidirectional LSTM-CRF model Of Sequence Tagging by using Ontology knowledge based feature (온톨로지 지식 기반 특성치를 활용한 Bidirectional LSTM-CRF 모델의 시퀀스 태깅 성능 향상에 관한 연구)

  • Jin, Seunghee;Jang, Heewon;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.253-266
    • /
    • 2018
  • This paper proposes a methodology applying sequence tagging methodology to improve the performance of NER(Named Entity Recognition) used in QA system. In order to retrieve the correct answers stored in the database, it is necessary to switch the user's query into a language of the database such as SQL(Structured Query Language). Then, the computer can recognize the language of the user. This is the process of identifying the class or data name contained in the database. The method of retrieving the words contained in the query in the existing database and recognizing the object does not identify the homophone and the word phrases because it does not consider the context of the user's query. If there are multiple search results, all of them are returned as a result, so there can be many interpretations on the query and the time complexity for the calculation becomes large. To overcome these, this study aims to solve this problem by reflecting the contextual meaning of the query using Bidirectional LSTM-CRF. Also we tried to solve the disadvantages of the neural network model which can't identify the untrained words by using ontology knowledge based feature. Experiments were conducted on the ontology knowledge base of music domain and the performance was evaluated. In order to accurately evaluate the performance of the L-Bidirectional LSTM-CRF proposed in this study, we experimented with converting the words included in the learned query into untrained words in order to test whether the words were included in the database but correctly identified the untrained words. As a result, it was possible to recognize objects considering the context and can recognize the untrained words without re-training the L-Bidirectional LSTM-CRF mode, and it is confirmed that the performance of the object recognition as a whole is improved.

RAUT: An end-to-end tool for automated parsing and uploading river cross-sectional survey in AutoCAD format to river information system for supporting HEC-RAS operation (하천정비기본계획 CAD 형식 단면 측량자료 자동 추출 및 하천공간 데이터베이스 업로딩과 HEC-RAS 지원을 위한 RAUT 툴 개발)

  • Kim, Kyungdong;Kim, Dongsu;You, Hojun
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.12
    • /
    • pp.1339-1348
    • /
    • 2021
  • In accordance with the River Law, the basic river maintenance plan is established every 5-10 years with a considerable national budget for domestic rivers, and various river surveys such as the river section required for HEC-RAS simulation for flood level calculation are being conducted. However, river survey data are provided only in the form of a pdf report to the River Management Geographic Information System (RIMGIS), and the original data are distributedly owned by designers who performed the river maintenance plan in CAD format. It is a situation that the usability for other purposes is considerably lowered. In addition, when using surveyed CAD-type cross-sectional data for HEC-RAS, tools such as 'Dream' are used, but the reality is that time and cost are almost as close as manual work. In this study, RAUT (River Information Auto Upload Tool), a tool that can solve these problems, was developed. First, the RAUT tool attempted to automate the complicated steps of manually inputting CAD survey data and simulating the input data of the HEC-RAS one-dimensional model used in establishing the basic river plan in practice. Second, it is possible to directly read CAD survey data, which is river spatial information, and automatically upload it to the river spatial information DB based on the standard data model (ArcRiver), enabling the management of river survey data in the river maintenance plan at the national level. In other words, if RIMGIS uses a tool such as RAUT, it will be able to systematically manage national river survey data such as river section. The developed RAUT reads the river spatial information CAD data of the river maintenance master plan targeting the Jeju-do agar basin, builds it into a mySQL-based spatial DB, and automatically generates topographic data for HEC-RAS one-dimensional simulation from the built DB. A pilot process was implemented.

Construction of Internet Public Library Asia (아시아 인터넷 공공 도서관(Internet Public Library Asia) 구축에 관한 연구)

  • 이원숙;일본명;일본명;일본명;일본명
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.13 no.2
    • /
    • pp.59-73
    • /
    • 2002
  • Libraries, not only research libraries but also public libraries, have been fundamentally affected by the immense spread of the Internet and the World Wide Web. Many public libraries have their Web pages, through which they are providing their new and conventional services. There are also web sites which provide library-like services. This paper shows an experimental project named Internet Public Library Asia, which provides information in multiple languages of information resources published in Chinese, Japanese and Korean languages. This paper firstly overviews how traditional public libraries have been affected by the Internet. Then, it describes a few aspects from the viewpoint of crucial library function on the Internet and also from the viewpoint of Asian resources and users. This paper secondly proposes a model to serve information about valuable resources published in multiple Asian languages, and then shows the metadata schema and a few software tools developed for IPL-Asia The name of IPL is borrowed from Internet Public Library based at University of Michigan, since it is, in part, a collaborative activity with the IPL in Michigan. The metadata schema is defined based both on Dublin Core and IEEE LOM and adapted for parallel description in the four languages, i. e. , Chinese, Japanese, Korean and English. The software tools provide functions to support collaboration among people engaged in development of metadata database and metadata editing. These tools have been developed based on the XML technologies.

  • PDF