• 제목/요약/키워드: update system

검색결과 1,191건 처리시간 0.029초

관계형 데이터베이스에서 비정규화를 고려한 최적 데이터베이스 설계 (An Optimal Database Design Considering Denormalization in Relational Database)

  • 장영관;강맹규
    • 정보기술과데이타베이스저널
    • /
    • 제3권1호
    • /
    • pp.3-24
    • /
    • 1996
  • Databases are critical to business information systems, and RDBMS is most widely used for the database system. Normalization has been designed to control various anomalies(insert, update, and delete anomalies). However, normalized database design does not account for the tradeoffs necessary for the performance. In this research, we develop a model for database design by denormalization of duplicating attributes in order to reduce frequent join processes. In this mood, we consider insert, update, delete, and query costs. The anomaly and data inconsistency are removed by additional disk I/O which is necessary for each update and insert transaction. We propose a branch and bound method for this model, and show considerable cost reduction.

  • PDF

Sparse Second-Order Cone Programming for 3D Reconstruction

  • Lee, Hyun-Jung;Lee, Sang-Wook;Seo, Yong-Duek
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2009년도 IWAIT
    • /
    • pp.103-107
    • /
    • 2009
  • This paper presents how to minimize the second-order cone programming problem occurring in the 3D reconstruction of multiple views. The $L_{\infty}$-norm minimization is done by a series of the minimization of the maximum infeasibility. Since the problem has many inequality constraints, we have to adopt methods of the interior point algorithm, in which the inequalities are sequentially approximated by log-barrier functions. An initial feasible solution is found easily by the construction of the problem. Actual computing is done by an iterative Newton-style update. When we apply the interior point method to the problem of reconstructing the structure and motion, every Newton update requires to solve a very large system of linear equations. We show that the sparse bundle-adjustment technique can be utilized in the same way during the Newton update, and therefore we obtain a very efficient computation.

  • PDF

GPS 휴대폰을 이용한 차량경로용 도로망 데이터베이스 수정 방안 (A Road Database Update Method for Vehicle Routing Using GPS Cellular Phone)

  • 장영관
    • 대한안전경영과학회지
    • /
    • 제9권5호
    • /
    • pp.97-101
    • /
    • 2007
  • As the use of vehicle route application and LBS(location based service) are fast grew, the importance of maintaining road network data is also increased. To maintain road data accuracy, we can collect road data by driving real roads with probe vehicle, or using digital image processing for the extraction of roads from aerial imagery. After compare the new road data to current database, we can update the road database, but that job is mostly time and money consuming or can be inaccurate. In this paper, an updating method of using GPS(global positioning system) enabled cell phone is proposed. By using GPS phone, we can update road database easily and sufficiently accurately.

데이터마이닝에서 기존의 연관규칙을 갱신하는 분할 알고리즘 (Partition Algorithm for Updating Discovered Association Rules in Data Mining)

  • 이종섭;황종원;강맹규
    • 산업경영시스템학회지
    • /
    • 제23권54호
    • /
    • pp.1-11
    • /
    • 2000
  • This study suggests the partition algorithm for updating the discovered association rules in large database, because a database may allow frequent or occasional updates, and such update may not only invalidate some existing strong association rules, but also turn some weak rules into strong ones. the Partition algorithm updates strong association rules efficiently in the whole update database reuseing the information of the old large itemsets. Partition algorithms that is suggested in this study scans an incremental database in view of the fact that it is difficult to find the new set of large itemset in the whole updated database after an incremental database is added to the original database. This method of generating large itemsets is different from that of FUP(Fast Update) and KDP(Kim Dong Pil)

  • PDF

조작자 근육 활성도 기반 양팔 로봇의 임피던스 제어 파라미터 갱신 방법 (Impedance Parameter Update Method for Dual-arm Manipulator based on Operator's Muscle Activation)

  • 백찬렬;차광열;김준식;최영진
    • 로봇학회논문지
    • /
    • 제17권3호
    • /
    • pp.347-352
    • /
    • 2022
  • The paper presents how to update impedance control parameters for dual-arm manipulators using EMG signals and motions of the operator. Since the hand motions of the dual-arm are modeled to be the mass-spring-damper system in this paper, the impedance parameter update method is an important issue to reflect the operator's force. However, task space inertia to be used as the mass parameter goes to infinity if the manipulator approaches a kinematic singularity. To alleviate this issue, the impedance (stiffness and damping) parameters are divided with a diagonal element of the task space inertia. Also, the stiffness and damping matrices are updated using the normalized EMG signals captured from the operator's forearm. Through this process, the motion of the dual-arm manipulator is more stabilized even though it approaches the kinematic singularity.

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • 인터넷정보학회논문지
    • /
    • 제25권3호
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.

분산 웹 서버 시스템에서의 DNS 기반 동적 부하분산 기법 (DNS-based Dynamic Load Balancing Method on a Distributed Web-server System)

  • 문종배;김명호
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제33권3호
    • /
    • pp.193-204
    • /
    • 2006
  • 대부분의 분산 웹 시스템은 Domain Name System(DNS)을 이용하여 사용자 요청을 분산한다. DNS 기반 부하분산 시스템은 구성하기 쉬운 장점이 있지만, 주소 캐싱 매커니즘에 의해 서버들 사이의 부하 불균형이 발생한다. 또한, 서버의 상태를 파악하기 위해서 DNS의 수정이 필요하다. 본 논문에서는 DNS의 동적 갱신(dynamic update)과 라운드로빈 방법을 이용한 새로운 부하분산 기법을 제안한다. 본 논문에서 제안하는 방법은 DNS의 수정 없이 동적인 부하분산을 한다. 본 논문에서 제안하는 시스템은 서버의 부하량에 따라 서버를 DNS 리스트에 동적으로 추가, 삭제한다. 부하가 많은 서버를 DNS 리스트에서 제거함으로써 사용자 응답시간이 빠르다. 동적인 부하분산을 위하여 CPU와 메토리 네트워크 자원의 사용률에 따른 부하분산 알고리즘을 제안한다. GUI 기반의 관리도구를 이용하여 손쉽게 제안하는 시스템을 관리할 수 있다. 실험을 통하여 본 논문에서 구현한 모듈들이 제안된 시스템의 성능에 많은 영향을 주지 않는다는 것을 보여준다. 또한 기존 라운드로빈 DNS와의 비교실험을 통하여 사용자 응답시간과 파일전송률이 더 빠르다는 것을 보여준다.

Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System

  • Xu, Wanshan;Zhang, Jianbiao;Yuan, Yilin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권4호
    • /
    • pp.1286-1306
    • /
    • 2022
  • Searchable symmetric encryption (SSE) provides a safe and effective solution for retrieving encrypted data on cloud servers. However, the existing SSE schemes mainly focus on single keyword search in single client, which is inefficient for multiple keywords and cannot meet the needs for multiple clients. Considering the above drawbacks, we propose a scheme enabling dynamic multi-client and Boolean query in searchable symmetric encryption for cloud storage system (DMC-SSE). DMC-SSE realizes the fine-grained access control of multi-client in SSE by attribute-based encryption (ABE) and novel access control list (ACL), and supports Boolean query of multiple keywords. In addition, DMC-SSE realizes the full dynamic update of client and file. Compared with the existing multi-client schemes, our scheme has the following advantages: 1) Dynamic. DMC-SSE not only supports the dynamic addition or deletion of multiple clients, but also realizes the dynamic update of files. 2) Non-interactivity. After being authorized, the client can query keywords without the help of the data owner and the data owner can dynamically update client's permissions without requiring the client to stay online. At last, the security analysis and experiments results demonstrate that our scheme is safe and efficient.

Three Effective Top-Down Clustering Algorithms for Location Database Systems

  • Lee, Kwang-Jo;Yang, Sung-Bong
    • Journal of Computing Science and Engineering
    • /
    • 제4권2호
    • /
    • pp.173-187
    • /
    • 2010
  • Recent technological advances in mobile communication systems have made explosive growth in the number of mobile device users worldwide. One of the most important issues in designing a mobile computing system is location management of users. The hierarchical systems had been proposed to solve the scalability problem in location management. The scalability problem occurs when there are too many users for a mobile system to handle, as the system is likely to react slow or even get down due to late updates of the location databases. In this paper, we propose a top-down clustering algorithm for hierarchical location database systems in a wireless network. A hierarchical location database system employs a tree structure. The proposed algorithm uses a top-down approach and utilizes the number of visits to each cell made by the users along with the movement information between a pair of adjacent cells. We then present a modified algorithm by incorporating the exhaustive method when there remain a few levels of the tree to be processed. We also propose a capacity constraint top-down clustering algorithm for more realistic environments where a database has a capacity limit. By the capacity of a database we mean the maximum number of mobile device users in the cells that can be handled by the database. This algorithm reduces a number of databases used for the system and improves the update performance. The experimental results show that the proposed, top-down, modified top-down, and capacity constraint top-down clustering algorithms reduce the update cost by 17.0%, 18.0%, 24.1%, the update time by about 43.0%, 39.0%, 42.3%, respectively. The capacity constraint algorithm reduces the average number of databases used for the system by 23.9% over other algorithms.