• Title/Summary/Keyword: data access object

Search Result 217, Processing Time 0.031 seconds

Development and Performance Evaluation of a Concurrency Control Technique in Object-Oriented Database Systems

  • Jun, Woochun;Hong, Suk-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1899-1911
    • /
    • 2018
  • In this work, we propose a concurrency control scheme in object-oriented database (OODB). Since an OODB provides complex modeling power than the conventional relational databases, a concurrency control technique in OODB is also rather complicated and has influence on the overall performance. Thus, it is very important to develop a concurrency control technique with less overhead. The proposed scheme deals with class hierarchy that is a key concept in OODBs. The proposed scheme is developed on implicit locking scheme. Also, the proposed scheme is designed using data access frequency in order to reduce locking overhead than implicit locking. It means that, if access frequency information is not available, the proposed scheme works just like the existing implicit locking, In our work, the correctness of the proposed scheme is proved. The performance is analyzed depending on access types. Also, it is proved that our scheme performs works much better than the implicit locking does.

A Design of Web based GEM Using Single Object Access Protocol

  • Kang W. Joon;Park, H. Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.57.5-57
    • /
    • 2001
  • This paper presents an enhanced web-based distributed system with Single Access Object Protocol(SOAP), which uses HTTP as a communication protocol and XML as a data presentation. The suggested system is applied into a Generic Equipment Model (GEM) for exchanging specified messages(SECS-II), which are encoded into XML presentation, between Equipment and Host via the web sorrel. In this paper, the designed system architecture and its soap components are presented.

  • PDF

A Dual Mode Buffer Cache Management Policy for a Continuous Media Server (연속 미디어 서버를 위한 이중 모드 버퍼 캐쉬 관리 기법)

  • Seo, Won-Il;Park, Yong-Woon;Chung, Ki-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3642-3651
    • /
    • 1999
  • In this paper, we propose a new caching scheme for continuous media data where the buffer allocation unit is divided into two modes : interval and object. All of objects' access patterns are monitored and based on the results of monitoring, a request for an object is decided to cache its data with either interval mode or object mode. The results of our simulation show that our proposed caching scheme is better than the existing caching algorithms such as interval caching where the access patterns of the objects are changed with time.

  • PDF

Model Coupling Technique for Level Access in Hierarchical Simulation Models and Its Applications (계층의 구조를 갖는 시뮬레이션 모델에 있어서 단계적 접근을 위한 모델연결 방법론과 그 적용 예)

  • 조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.5 no.2
    • /
    • pp.25-40
    • /
    • 1996
  • Modeling of systems for intensive knowledge-based processing requires a modeling methodology that makes efficient access to the information in huge data base models. The proposed level access mothodology is a modeling approach applicable to systems where data is stored in a hierarchical and modular modules of active memory cells(processor/memory pairs). It significantly reduces the effort required to create discrete event simulation models constructed in hierarchical, modular fashion for above application. Level access mothodology achieves parallel access to models within the modular, hierarchical modules(clusters) by broadcasting the desired operations(e.g. querying information, storing data and so on) to all the cells below a certain desired hierarchical level. Level access methodology exploits the capabilities of object-oriented programming to provide a flexible communication paradigm that combines port-to-port coupling with name-directed massaging. Several examples are given to illustrate the utility of the methodology.

  • PDF

Object-Oriented Runoff Analysis Using DataBase (데이터베이스를 이용한 객체지향 유출해석(관개배수 \circled1))

  • 김상민;박승우
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2000.10a
    • /
    • pp.126-131
    • /
    • 2000
  • This paper presents a framework for developing an object-oriented system for runoff analysis. The objects include rainfall, meterorologic, watershed, reservoir, stream, DB management, and GUI. Data and method of each object were analyzed and defined. The database for runoff analysis were designed and DBMS MS-Access was chosen. The system design features and implementation are described, and an graphic user interface for flood runoff is presented

  • PDF

The Access Control System of Network Management Information Base (망관리 정보베이스 접근 제어 시스템)

  • Kim, Jong-Duk;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1246-1256
    • /
    • 1998
  • MIB(Management Information Base), one of the key components of network management system, is a conceptual repository for the information of the various managed objects. MIB stores and manages all the structural and operational data of each managed resources. Therefore, MIB should be protected properly from inadvertant user access or malicious attacks. International standard ISO/IEC 10164-9 describes several managed object classes for the enforcement of MIB security. Those managed object classes described access control rules for security policy. But the exact authorization procedures using those newly added managed object classes are not presented. In this paper, we divide managed object classes into two groups, explicit and implicit ones, and describe the access authorization procedure in Z specification language. Using Z as a description method for both authorization procedure and GDMO's action part, the behaviour of each managed object class and access authorization procedure is more precisely and formally defined than those of natural language form.

  • PDF

A cache placement algorithm based on comprehensive utility in big data multi-access edge computing

  • Liu, Yanpei;Huang, Wei;Han, Li;Wang, Liping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3892-3912
    • /
    • 2021
  • The recent rapid growth of mobile network traffic places multi-access edge computing in an important position to reduce network load and improve network capacity and service quality. Contrasting with traditional mobile cloud computing, multi-access edge computing includes a base station cooperative cache layer and user cooperative cache layer. Selecting the most appropriate cache content according to actual needs and determining the most appropriate location to optimize the cache performance have emerged as serious issues in multi-access edge computing that must be solved urgently. For this reason, a cache placement algorithm based on comprehensive utility in big data multi-access edge computing (CPBCU) is proposed in this work. Firstly, the cache value generated by cache placement is calculated using the cache capacity, data popularity, and node replacement rate. Secondly, the cache placement problem is then modeled according to the cache value, data object acquisition, and replacement cost. The cache placement model is then transformed into a combinatorial optimization problem and the cache objects are placed on the appropriate data nodes using tabu search algorithm. Finally, to verify the feasibility and effectiveness of the algorithm, a multi-access edge computing experimental environment is built. Experimental results show that CPBCU provides a significant improvement in cache service rate, data response time, and replacement number compared with other cache placement algorithms.

A Representation of Engineering Change Objects and Their Integrity Constraints Using an Active Object-Oriented Database Model (능동형 객체지향적 데이터베이스 모텔을 이용한 설계변경 개체 및 제약조건의 표현)

  • 도남철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.1
    • /
    • pp.111-125
    • /
    • 2003
  • This paper proposes a product data model that can express and enforce integrity constraints on product structure during engineering changes (ECs). The model adopts and extends an active object-oriented database model in order to Integrate IC data and their integrity constraints. Tightly integrated with product structure, It will enable designers to maintain and exchange consistent EC data throughout the product life cycle. In order to properly support operations for ECs, the model provides the data, operations, and Event-Condition-Action rules for nested ECs and simultaneous EC applications to multiple options. in addition, the EC objects proposed In the model integrate the data and Integrity constraints into a unified repository. This repository enables designers to access all EC data and integrity constraints through the product structure and relationships between EC objects. This paper also describes a prototype product data management system based on the proposed model In order to demonstrate its effectiveness.

  • PDF

The Design and Implementation of Interface in the Distributed Object Environment for the Object-Oriented Access of Relational Database (분산객체 환경에서 관계형 데이터베이스의 객체지향적 접근을 위한 인터페이스 설계 및 구현)

  • 정의천;박우창
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.315-317
    • /
    • 1998
  • 대규모 분산 데이터베이스 시스템을 구축하는데 있어 CORBA와 DBMS의 연동은 필수적이다. 특히 개방 분산 환경에서 기존 시스템 통합시 관계형 데이터베이스의 접근 문제를 해결해야 한다. 본 논문에서는 ORB 컴포넌트중의 하나인 BOA(Basic Object Adapter)를 확장하여 관계형 데이터베이스의 연동을 지원하는 관계 데이터베이스용 객체 어댑터(Relational Object Data base Adapter: RODA)의 구현과 이를 이용한 응용 개발에 관한 내용을 기술한다. 객체-관계 사상은 Tie 방식과 객체 포장기(Object Wrapper)를 사용하여 CORBA 객체와 튜플을 일대일 대응시켰다. RODA 는 CORBA 지속성 객체의 생성, 데이터베이스 객체의 생성, 지속성 객체의 해지 등과 같은 ODA(Object Data base Adapter)가 가지는 주요 기능 뿐 아니라 관계형 데이터베이스의 객체 포장 기능을 제공한다. 이를 통해 개발자 측면에서는 RODA클래스 라이브러리를 이용하여 소프트웨어 개발 생산성을 향상시킬 수 있고, 분산 응용에서 객체지향적 DB통합시 사용자에게 단일한 정보 처리 인터페이스를 제공하는 요소 기술로 활용할 수 있다.

Design and Implementation of Mobile RFID Middleware based Pet Management System (모바일 RFID 미들웨어 기반 Pet 관리시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.19-26
    • /
    • 2010
  • The most critical element in the real-time operation of RFID application programs that are suitable for the mobile environment is the RFID middleware, made exclusively for mobile handsets, which processes collected data on a real-time basis and sends only the useful information to the application client. In this paper, we intend to design and implement the Pet management system for optimized mobile RFID middleware that supports real-time data processing. The proposed Pet management system consists of registration module, retrieval module, communication module, and display module in order to display retrieval result from server. Also, the captured data in the PDA is transmitted to the server and another client system using the mobile application interface that supports the SOAP application access protocol.