2016 (266)
2015 (278)
2014 (298)
2013 (203)
2012 (72)
2011 (41)
2010 (25)
2009 (27)
2008 (39)
2007 (7)
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Sentiment Classification of Portuguese News Headlines
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.9-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper addresses the problem of classifying news headlines into sentiment categories. Using a supervised approach, we train a classifier for classifying each news headline as positive, negative, or neutral. A news headline is considered positive if it is associated with good things, negative if it is associated with bad things, and neutral in the remaining cases. The experiments show an accuracy that ranges from 59.00% to 63.50% when syntactic features (argument1-verb-argument2 relations) are combined with other features. The accuracy ranges from 57.50% to 62.5% when these relations are not used.
A Trace Mechanism of Change History in the Presence of Refactoring
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.19-28
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Nowadays, changes in software development are inevitable. Therefore, understanding and analysis of changes considered more important than anything else. The existing version control systems, which are used for effective change management, are impossible to trace changes in the presence of refactoring. There have been a number of approaches proposed for trace changes using operation-based mechanisms or rule-based mechanisms. However, it has many limitations with excessive recording or not sufficient coverage. In this approach, we define four rules based on M.Flower’s refactoring techniques and find an origin method matching the pattern of changed source code with the pre-defined rules. The case study shows that the proposed mechanism is effective Also, case study looking for open source project code changes about the origin method show the proposed mechanism’s effectiveness.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.29-40
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Songdo International City has currently developed a waterfront area for an eco-friendly green city, and the waterfront plan includes maintenance of certain water quality level by replacing the water with the inflowing clean seawater in the canal and circulation of the water by bringing in the seawater with the operation of floodgate to be installed outside the canal. This research used the Danish DHI MIKE 3 FM model for the 3D water quality modeling of future Songdo waterfront canal in order to simulate the annual change of water quality with and without Songdo Sewage Treatment Plant and to quantitatively analyze the influence of it through a WQI analysis. Most of canal water comes from the open sea; the canal water quality seems to have similar tendency with the one of open sea; there is considerable quality load due to the effluence of Songdo Sewage Treatment Plant; and the quality change is outstanding in a summer where there is high precipitation.In the result of annual simulation, the water quality evaluation index was relatively high for the southern canal, where the Songdo Sewage Treatment Plant is located, and eastern canal neighboring the outflow gate while the western and northern canals had low index because they are not influenced by the Songdo Sewage Treatment Plant so they would have clean water quality. In a summer, especially, all the canals have bad water quality of rating 4 because of water from the land. Even though the water quality is good for the water from the sea, the water quality of canal can be reduced due to the point and non-point pollution sources, and it will be necessary to make efforts to reduce the pollution load in a summer for the southern and eastern canals under influence of effluence of Songdo Sewage Treatment Plant.
Crowdsourced Software Development Process: Investigation and Modeling through Markov Decision Theory
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.41-54
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Crowdsourcing is a name given to a revolution that marks the rise of online community made up of like minded individuals who work together or compete with each other to deliver solutions to problems. It has been used for accomplishing various Human Intelligence Tasks in the past and is an emerging form of outsourcing software development as it has the potential to significantly lower the production cost. This paper analyses the process of software development at a Crowdsourced platform. The work investigates and identifies the phase wise deliverables in a competitive software development process. We propose the use of Markov Decision Process to model the dynamics of the development process and present an illustration of the proposed model.
A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.55-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recent shifts in the water resource management paradigm and information and communication technologies (ICT) call for platform-based integrated operation management technology, which provides the multidimensional approach of two-way communication. To domestically prepare for such paradigm changes, research on the Smart Water Grid, which is intelligent water management that combines water resource management with ICT, remains ongoing. In this paper, we propose a framework for using the components of a variety of program modules to build an intelligent water-management-integrated operation system that is appropriate for the Smart Water Grid. In addition, we suggest a system development environment and integrated operation system implementation plan for using the Core-Platform framework
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.65-78
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cause-effect graphs can be used for specifying safety critical systems including avionics control software that are often intended to satisfy Boolean expression. Using cause-effect graphs for requirements-based testing demands the ability of dealing with various constraints in cause-effect graphs. Due to its rapid advance, Boolean Satisfiability (SAT) solving seems to be a promising approach for constraint handling. In this paper, we present three approaches using SAT solving for pairwise test generation from cause-effect graphs. One is an ideal approach that tries to obtain a minimal set of tests. Another approach focuses on breaking the problem to smaller solvable problems to scale the applicability of SAT solving. The other makes full use of a partial instance that forms a part of a solution known priori. We compare the three approaches in terms of the number of generated pairwise tests and fault detection capability. Comparison results show that an approach using partial instances can generate less number of pairwise tests than the other two approaches without degrading fault detection capability.
Scalable Scenario Specifications to Synthesize Component-centric Behaviour Models
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.79-106
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Several scenario description languages and associated behaviour synthesis processes have been developed. The goal of these is to synthesize behaviour models from system requirement specifications, in order to enable the early identification of weak design spots or code generation. To date, however, most of the scenario languages are poorly scaled with regards to system sizes. This is because scalability requires more expressive constructs that can help when writing a scenario specification in a concise and compact manner, thereby resulting in a reduced number of scenarios. Furthermore, due to a lack of expressiveness in scenario languages, synthesis algorithms may need to rely on global behaviour models to determine inter-scenario dependencies. The global model is an additional factor that limits the approaches’ scalability. The reason is that the construction of a global model becomes harder as the system specification increases. To tackle these issues, within this article is proposed an expressive scenario description language that provides a concise and compact approach to scenario description, and defines inter-scenario dependencies semantically. A new algorithm that can address the additional constructs of the language was defined, in order to synthesize component-centric behaviour models. The applicability of this work has been demonstrated through both an illustrative example and a real-world case study. The evaluation indicates that the proposed scenario description language is more scalable than existing languages.
The Impact of Telepresence Robot Types on the Perceived Presence of a Remote Sender
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.107-116
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As telepresence robots are developed for interpersonal communication between a remote sender and a receiver, conveying the presence of a remote sender to a receiver is an important issue. A telepresence robot could build its own presence unlike other media since it enables visual, auditory, and tactile communication having an in-space physical embodiment. Thus, in order to find effective ways to deliver the presence of a remote sender, we executed a 2 (Telepresence robot types: social medium vs. pure medium) within-participants experiment (N=30). In this study, two types of telepresence robots, a telepresence robot with high presence, a social medium, and that with low presence, a pure medium, provides the information of the conversation status to a receiver. The results show that participants felt more presence of a remote sender when interacting with a telepresence robot with high presence than a robot with low presence. Implications for design of a telepresence robot to increase the presence of a remote sender are discussed.
A Study on the Internet of Things (IoT) Applications
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.117-126
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The government has adopted the field of “Internet of Things” as a national strategic project, announcing the Internet of Things master plan to achieve a leading country of hyper-connected digital revolution last May. The government has the promotional strategy of reinforcing the competitiveness in software (SW) sensor components devices, training specialists that will lead Internet of Things (IoT) services and products, and internalizing security for Internet of Things products and services. Internet of Things, thus expected to grow from ₩2 trillion and 300 billion last year to ₩30 trillion by 2020 in the market, refers to the Internet environment where people, things around, data, etc. are all connected to the wired and wireless network to mutually create, collect, share, and utilize information. Internet of Things is the technology and service that includes generating information (sensor) - acquisition (parts, devices) - sharing (Clyde) - utilization (Big Data) - application software. Internet of Things is getting a lot of attention from the public due to the effect of increasing export businesses and jobs and has become a buzzword among businesses. The Internet of Things market has a tendency to grow in the future as it is extended from social infrastructure (utilities, transportation, automation, etc.) and safety management to the consumer sector centered on life services. Sophisticated wireless communication technology is expected to form a huge network connected to all object units as a communication function.
Virtual Laboratory of Bottling Process with Temperature Control in an Autoclave
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.127-136
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Technological advances in the area of virtual laboratories in recent years, have made possible the implementation of industrial processes in virtual environments for different purposes, such as monitoring and control of these processes, and as a didactic aid in the education field at professional level. This development offers the capability to navigate and control a graphical environment of a bottling process in the brewery industry. As well as being accessible from any virtual platform with internet access.
Impact of M-ary Data Symbol Burst Transmission on Averaged Channel Capacity for ADF Relay Systems
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.137-152
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we consider M-ary phase shifting keying (MPSK) and M-ary quadrature amplitude modulation (MQAM) data symbol burst transmission for adaptive decode-and-forward (ADF) relay systems over quasi-static Rayleigh fading channels. A burst has pilot symbols and data symbols. From pilot symbols, we can estimate the channel gain and detect each relay node’s transmission mode for ADF schemes. At first, we focus on the derivation of the received signal to noise ratio’s (SNR’s) probability density function (PDF) for ADF relay systems, in which error events at relay nodes and channel estimation errors are considered. Then, we derived the averaged channel capacity as an approximated closed-form for an arbitrary link signal-to-noise ratio (SNR) for different modulation orders. We verified its accuracy by comparison with simulation results.
Multi-Agent System for Hadith Processing
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.153-166
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Hadith is everything attributed to Prophet Muhammad Peace Be Upon Him (PBUH) such as says, deeds, explanations, decisions or characteristics of his creation. Each Hadith is composed of two main parts: Isnad and Matn. Isnad processing is one of the unique features of Islam nation, which concentrates on the narrations of the prophet. Before 1400 years, Hadith scholars set the rules and wrote the books to distinguish between the right narrations that really related to the prophet and the lied one. All Hadiths are texts written in Arabic classical language. Processing the Arabic language is a difficult task due to the specificities of this language and the scarcity of the digital resources (grammars, lexicon and corpus). In this paper, we suggest a method for Hadith Isnad processing based on the Multi-Agent approach. We designed and implemented a system composed of five agents, which are: preprocessing agent, lexical agent, morphological agent, replacing agent and syntactical agent. These agents cooperate to analyze Hadith Isnad and to provide the parse tree, Isnad tree and the received method. This system is based on a large database that we created using XML technology to ensure the re-usability, the scalability and the interoperability.
Effect of Selection Diversity on Capacity of Dual-Polarized Antenna Systems
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.167-176
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In line-of-sight (LoS) channel environments, two data stream transmissions can be independently made by adopting dual-polarized antenna (DPA) system. The capacity of the DPA system is mainly affected by a rotation angle between the transmitter and receiver DPAs and channel gains of vertical and horizontal receiver antennas, which results in signal to interference and noise (SINR) ratio. In this paper, SINR is defined in the DPA system. Then, in order to improve the capacity of the DPA system, selection diversity is propsed. In the proposed scheme, the best DPA user in terms of SINR is selected based on both the rotation angle and the channel gains. The resultant capacity of the DPA system increases two times when the selection order is three. The selected best user can even achieve 3 times the capacity when the selection order is six. In addition to that, the average rotation angle of the selected user is also analyzed and provided.
Distributed Cell Configuration Strategy for Macro/Micro Overlaid Hierarchical Cellular Systems
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.177-188
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents cell configuration strategies for orthogonal frequency division multiple access (OFDMA) based hierarchical cellular systems (HCS). We consider two cases: the symmetric case that HCS is used to extend the data rate coverage and the asymmetric case that HCS is applied to cover the hot spot. We formulate the cell configuration strategy problem with spectral reuse planning and channel allocation constraints, and suggest solutions for each case. The numerical results show that HCS can improve the system stability in the symmetric case and enhance the system performance about two times rather than that of the conventional cellular system, when the hot spot is created at the macro-cell edge in the asymmetric case. In addition, we describe that the co-channel interference from macro-cell base stations (BSs) are the dominant factor of system performance, but that from microcell, BSs can be negligible.
GHL Algorithm Extension Based on a New Technique of Reducing Congestion in OBS Networks
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.189-196
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Optical networks have known a great attention from researchers in the field of telecommunication due to the bandwidth offered. OBS compared to OCS and OPS allow a better use of bandwidth and an effective management of resources. Despite the advantages of OBS networks, they suffer from data loss due to contention and congestion. Given a number of channels on a link, choosing the erroneous number of control channels – depending on the traffic load – can lead to congestion in the control channels; whereas a good choice of the number of control channels allows increasing the rate of the control packet service. In this work, we propose to improve the GHL algorithm into a new one called “GHL +” based on a new congestion reduction technique in the control channels.
A Wireless Triggered Method of Digital Signage Based on Periodic Scans of a Smartphone
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.197-204
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
There are lots of digital signages around us that are focused on advertising and providing information. However, this display is not effective since it is not proactive to the person approaching it. By introducing the IoT, various devices will be connected through wireless communication with each device’s own MAC address, and the wireless sensitivity can be used to estimate the distance between communicating devices. In this paper, I propose a wireless MAC and RSSI correlated method, which will be applicable to the digital signage to perceive every person passing by. According to the experiment, the MAC and RSSI correlated reaction remarkably improved personal attention to the digital signage.
Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.205-216
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, due to the increase in social intertest for advanced wireless telecommunication techniques, activated ubiquitous environments and healthcare, the application range of WBSN has been consistently expanding. WBSN environment has objective of collecting various bio-signals created directly or indirectly from in and out of the body, connecting with external networks and monitoring the display tool. Various bio-signals created in WBSN environment have unpredictable rate of emergency data occurrence by its nature. Such emergency data should be transmitted with priority compared to other periodic signals for prompt handling according to the condition of the patient. MAC protocol proposed in this thesis is in form of TDMA based on competitive reserved allocation by time-slot in CSMA/CA environment. This MAC protocol classifies the types of bio-signals with each different characteristic and settles the priority by type and the minimum transmission delay time of data accordingly. Especially for transmission of emergency data, MAC protocol reduces the transmission delay of emergency data and packet loss by setting priority.
Emergency Rescue Localization (ERL) using GPS, Wireless LAN and Camera
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.217-232
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Congestion avoidance in emergency situations is among one of many overlooked localization issues. During emergency situations (such as fires), sometimes the rescuers find it hard to find the best exit route from the inside to the outside of a building. Any time delay in decision making will risk the loss of lives. Therefore, an efficient Emergency Rescue Localization (ERL) system is needed to help rescuers find the best route from the inside to the outside of a building. Thus, we propose a new ERL that is based on the integration of a Global Positioning System (GPS), Wireless LAN and camera. In this proposed ERL, the integrated Wireless LAN (WLAN) and Camera are used to retrieve location information inside a building. Then, localization methods will be adapted to GPS-based localization when subjects are in open areas outside the building. Finally, we present our experimental results to illustrate the performance of the localization system for indoor and outdoor environment set-up.
Adolescents’ Subjective Views on Smartphone Pornography : Q Methodology
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.233-244
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The purpose of this study is to explore adolescents’ perceptions and attitudes toward smartphone pornography. This study investigates the subjective factors influencing the perceptions and attitudes of adolescents who have watched smartphone pornography. Adolescents’ perspectives on experiencing smartphone pornography were collected through interviews and classified using Q methodology. The participants in this study are fifty Korean middle school students who have had the experience of watching pornography on smartphones. A total of forty Q samples were sorted in accordance with a Q sorting distribution. The Q analysis using a QUANL program produced four distinct factors. Factor A shows conservative inclinations against the use of pornography based on moral principles. Factor B demonstrates an intriguing bipolar factor, representing a dichotomy of views that can be assimilated to oversusceptible asceticism. Factor C includes those who are willing to control the viewing of pornography by themselves, but also enlisting social and institutional support. Factor D is comprised of those who use pornography on smartphones without scruples. The results suggest that adolescents’ perceptions and attitudes toward smartphone pornography vary, but can be categorized according to predominant features. This study determines that there is an undeniable need for continuous discussions with respect to adolescents’ use of smartphone pornography.
A Change Impact Analysis Tool for Software Development Phase
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.245-256
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Accepting too many software change requests could contribute to expense and delay in project delivery. On the other hand rejecting the changes may increase customer dissatisfaction. Software project management might use a reliable estimation on potential impacted artifacts to decide whether to accept or reject the changes. In software development phase, an assumption that all classes in the class artifact are completely developed is impractical compared to software maintenance phase. This is due to some classes in the class artifact are still under development or partially developed. This paper extends our previous works on developing an impact analysis approach for the software development phase in automating the approach which we call it CIAT (Change Impact Analysis Tool). The significant achievements of the tool are demonstrated through an extensive experimental validation using several case studies. The experimental analysis shows improvement in the accuracy over current impact analysis results.
Hybrid Advanced Metering Infrastructure Design for Micro Grid Using the Game Theory Model
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.257-268
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The recent interests in the IoT-applied Smart Homes have also affected other areas of IT technology. In addition to hardware and software developments, it is required to establish some sort of intelligent power grids which enable low-cost and efficient communications. The Smart grid and its sub-network, the micro grids, have been considered to be suitable for such a goal but the logic which would bring out more efficiency in the power networks was not easily found as there were many tradeoffs to be dealt with. Thus, in this paper, we’ve proposed the Hybrid Advanced Metering Infrastructure (AMI) through the mathematical model which adopts a pool model of the game theory to show a systemic relationship between the electricity (power) prices that have been determined by the management policy and power output of the micro grids. We expect that the Hybrid AMI will become a fundamental technology for the micro grids.
A Study on EKF-SLAM Simulation of Autonomous Flight Control of Quadcopter
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.269-282
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the field of autonomous navigation control of unmanned vehicles, it is most essential to estimate the location of the controlled vehicle. In this paper, a method for estimating the location of a quadcopter is proposed to autonomously control the flight of an unmanned quadcopter. The algorithm for estimating the location of a quadcopter is proposed by applying the EKF-SLAM, and the algorithm is simulated for the system to estimate and control the flight trajectories of the quadcopter. Prior to simulation, a dynamic model for the quadcopter is introduced, and simulations are carried out to determine the manner in which the quadcopter changes with respect to the thrust. Moreover, the leveling control and posture control are simulated through a PD controller, and the flight trajectories of the quadcopter are analyzed through the posture control. Furthermore, a virtual landmark is established for applying the EKF-SLAM based on a fabricated quadcopter simulator. Moreover, an observation model for observing the landmark is proposed for estimating the flight trajectories of the quadcopter, along with a state equation and a Jacobian matrix. Finally, potential advancement in the simultaneous location estimation and mapping technology of the quadcopter is presented by simulating the quadcopter EKF-SLAM and validating its performance.
A Robust Multimedia Contents Distribution over IP based Mobile Networks
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.283-288
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Multimedia contents distribution over open networks such as the Internet poses numerous issues as to security and mobility. This paper deals with the design of a robust multimedia contents distribution scheme to which it implements both security and mobility. The architecture for its distribution is presented and discussed. The operational functions have been identified that presents security and mobility for its distribution over IP based mobile networks.
HHB+tree Index for Functional Enhancement of NAND Flash Memory-Based Database
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.9 2015.09 pp.289-294
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Unlike disk-based database, memory-based database mostly uses memories with small capacity and NAND flash memories for rapid data processing in low power battery environments. NAND flash memories are strong against physical shocks and have an advantage of rapid access speed, but it also has a shortcoming of functional deterioration due to a slow processing speed because of its structural impossibility of in-place-update. In order to solve such functional deterioration problem of NAND flash memories, the hybrid hash index technique, which minimizes split operations of overflow bucket using expanded hash index, is suggested. The technique immediately allocates overflow bucket as soon as split operation occurs, to solve the functional deterioration problem by reducing occurrence of additional operations. However, such technique also has a shortcoming of functional deterioration as it processes search or editing operations on additional overflow bucket in an order as it processes sequential files. Therefore, this study proposes a hybrid hash B+tree index technique of which the function has been enhanced by saving information of overflow bucket at B+tree index. Lastly this paper proves that the proposed technique is more favorable than the previous technique through experiments and analysis.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.