• Title/Summary/Keyword: data access object

Search Result 217, Processing Time 0.024 seconds

An Evaluation of Access Performance of STEP-based CAD Database (STEP 기반 CAD 데이터베이스의 액세스 성능 평가 실험)

  • Kim, Junh-Wan;Han, Soon-Hung
    • IE interfaces
    • /
    • v.17 no.2
    • /
    • pp.226-232
    • /
    • 2004
  • In shipbuilding area, data sharing is one of the crucial issues. Recently, for collaborative design, ship structural CAD systems adopt the database as its primary storage. Database is useful to deal with the large amount of design information among the heterogeneous design department and design stage. To make the database-based CAD system object-oriented database(OODB) and object-relational database(ORDB) can be used. It is important to select proper database because the CAD system performance mainly depends on access performance of database. In this research, using prototype CAD system from other research, access performance of OODB and ORDB form CAD system was evaluated. STEP application protocol was used as the database schema and experiment was made in query by property and query by region. The results give some idea of how to choose the database for CAD systems.

An Enhancing Caching Technique by the SOP(Shared Object Page) for Content Adaptation Systems (콘텐츠 적응화 시스템에 SOP(Shared Object Page)를 도입한 개선된 캐싱 기법)

  • Jang, Seo-Young;Jeong, Ho-Yeong;Kang, Su-Yong;Cha, Jae-Hyeok
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.41-50
    • /
    • 2007
  • People access web contain via PC and many other devices. In other words, not only they access information by a PC connected internet, but also they get information through a mobile phone, a PDA even D-TV. In this article, to resolve the problem, we suppose new web caching mechanism called 'SOP(Shared Object Page)'based on applying of meta data of web page information and storing adapted objects.

  • PDF

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

MPI: A Practical Index Scheme for XML Data in Object Databases

  • Song Ha-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.6
    • /
    • pp.729-734
    • /
    • 2005
  • In order to access XML data stored in object databases, an efficient index scheme is inevitable. There have been several index schemes that can be used to efficiently retrieve XML data stored In object databases, but they are all the single path indexes that support indexing along a single schema path. Henee, if a query contains an extended path which is denoted by wild character ('*'), a query processor has to examine multiple index objects, resulting in poor performance and inconsistent index management. In this paper, we propose MPI (Multi-Path Index) scheme as a new index scheme that provides the functionality of multiple path indexes more efficiently, while it uses only one index structure. The proposed scheme is easy to manage since it considers the extended path as a logically single schema path. It is also practical since it can be implemented by little modification of the B -tree index structure.

  • PDF

An MIB Access Control Modeling for the Secure Management of Large Networks (대규모 망의 안전한 관리를 위한 관리 정보베이스의 접근 제어 모형화)

  • Seo, Jae-Hyeon;Lee, Chang-Jin;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.581-591
    • /
    • 1995
  • An MIB is the heart of a network management system and it stores all information that is necessary for network management. To operate networks safely, it is essential to control accesses to managed objects. This paper provides three-level architecture of managers so as to perform network management more efficiently in large networks. Moreover, mandatory access control(MAC) policy and role-based access control policy are adopted to ensure the secure access to the MIB. These policies are modeled by using the active object-oriented data model, which makes easy to map these access control models into the active object-oriented database.

  • PDF

RDB-based XML Access Control Model with XML Tree Levels (XML 트리 레벨을 고려한 관계형 데이터베이스 기반의 XML 접근 제어 모델)

  • Kim, Jin-Hyung;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.129-145
    • /
    • 2009
  • As the secure distribution and sharing of information over the World Wide Web becomes increasingly important, the needs for flexible and efficient support of access control systems naturally arise. Since the eXtensible Markup Language (XML) is emerging as the de-facto standard format of the Internet era for storing and exchanging information, there have been recently, many proposals to extend the XML model to incorporate security aspects. To the lesser or greater extent, however, such proposals neglect the fact that the data for XML documents will most likely reside in relational databases, and consequently do not utilize various security models proposed for and implemented in relational databases. In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases considering object perspective. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database, (3) Data are stored in relational databases, (4) Security check and query evaluation are also done in relational databases, and (5) Controlling access control is executed considering XML tree levels

  • PDF

Design and Implementation of IDAO for Efficient Access of Database in EJB Based Application (EJB 기반 애플리케이션에서 데이터베이스의 효율적 액세스를 위한 IDAO의 설계 및 구현)

  • Choe, Seong-Man;Lee, Jeong-Yeol;Yu, Cheol-Jung;Jang, Ok-Bae
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.637-644
    • /
    • 2001
  • EJB, providing specification for development and deployment of component based application, permits distributed development as central element of J2EE environment that manages automatically transaction management, persistence, concurrency control that are the most complicated work in enterprise environment. In this paper, we wish to resolve DAO's transaction logic complexity and performance reduction of system in the EJB based legacy system. Therefore, this paper describes the design and implementation of IDAO that applies Iterator pattern. IDAO gets effect that reduces complexity of transaction logic, system overload by database connection, and reduction of performance through container managed transaction.

  • PDF

DeepSDO: Solar event detection using deep-learning-based object detection methods

  • Baek, Ji-Hye;Kim, Sujin;Choi, Seonghwan;Park, Jongyeob;Kim, Jihun;Jo, Wonkeum;Kim, Dongil
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.46.2-46.2
    • /
    • 2021
  • We present solar event auto detection using deep-learning-based object detection algorithms and DeepSDO event dataset. DeepSDO event dataset is a new detection dataset with bounding boxed as ground-truth for three solar event (coronal holes, sunspots and prominences) features using Solar Dynamics Observatory data. To access the reliability of DeepSDO event dataset, we compared to HEK data. We train two representative object detection models, the Single Shot MultiBox Detector (SSD) and the Faster Region-based Convolutional Neural Network (R-CNN) with DeepSDO event dataset. We compared the performance of the two models for three solar events and this study demonstrates that deep learning-based object detection can successfully detect multiple types of solar events. In addition, we provide DeepSDO event dataset for further achievements event detection in solar physics.

  • PDF

The Study of the Object Replication Management using Adaptive Duplication Object Algorithm (적응적 중복 객체 알고리즘을 이용한 객체 복제본 관리 연구)

  • 박종선;장용철;오수열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.51-59
    • /
    • 2003
  • It is effective to be located in the double nodes in the distributed object replication systems, then object which nodes share is the same contents. The nodes store an access information on their local cache as it access to the system. and then the nodes fetch and use it, when it needed. But with time the coherence Problems will happen because a data carl be updated by other nodes. So keeping the coherence of the system we need a mechanism that we managed the to improve to improve the performance and availability of the system effectively. In this paper to keep coherence in the shared memory condition, we can set the limited parallel performance without the additional cost except the coherence cost using it to keep the object at the proposed adaptive duplication object(ADO) algorithms. Also to minimize the coherence maintenance cost which is the bi99est overhead in the duplication method, we must manage the object effectively for the number of replication and location of the object replica which is the most important points, and then it determines the cos. And that we must study the adaptive duplication object management mechanism which will improve the entire run time.

  • PDF

XDOM: The Extensible and Light-Weight XML Object Repository (XDOM: 확장성 기반의 경량 XML객체 정보 저장소)

  • 오동일;최일환;박상원;김형주
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.332-340
    • /
    • 2003
  • XML is an emerging internet standard for data representation and exchange on the web. Recently, many researches on storing XML documents are in progress. Since XML documents have an implicit semantic schema, it is difficult to store XML data into a DBMS or File System. This paper introduces XDOM, object repositories for the DOM object, which stores an object for persistency support. As XDOM does not require the burdensome design of a fixed schema unlike the legacy DBMS, can store schema-less XML documents. And it can help XML applications to access the DOM object transparently from the object repositories below memory. XDOM introduced in this paper is implemented in pure Java and evaluated using experiments.