• Title/Summary/Keyword: 중첩기법

Search Result 653, Processing Time 0.029 seconds

MD-TIX: Multidimensional Type Inheritance Indexing for Efficient Execution of XML Queries (MD-TIX: XML 질의의 효율적 처리를 위한 다차원 타입상속 색인기법)

  • Lee, Jong-Hak
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1093-1105
    • /
    • 2007
  • This paper presents a multidimensional type inheritance indexing technique (MD-TIX) for XML databases. We use a multidimensional file organization as the index structure. In conventional XML database indexing techniques using one-dimensional index structures, they do not efficiently handle complex queries involving both nested elements and type inheritance hierarchies. We extend a two-dimensional type hierarchy indexing technique(2D-THI) for indexing the nested elements of XML databases. 2D-THI is an indexing scheme that deals with the problem of clustering elements in a two-dimensional domain space consisting of the key value domain and the type identifier domain for indexing a simple element in a type hierarchy. In our extended scheme, we handle the clustering of the index entries in a multidimensional domain space consisting of a key value domain and multiple type identifier domains that include one type identifier domain per type hierarchy on a path expression. This scheme efficiently supports queries that involve search conditions on the nested element represented by an extended path expression. An extended path expression is a path expression in which every type hierarchy on a path can be substituted by an individual type or a subtype hierarchy.

  • PDF

Nested Virtualization Scheme for the Secure Cloud Computing Environment (안전한 클라우드 컴퓨팅 환경을 위한 중첩 가상화 기법)

  • Kim, Inhyeok;Kim, Junghan;Eom, Young Ik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.83-84
    • /
    • 2013
  • 클라우드 컴퓨팅을 이용하여 다양한 서비스가 생겨남에 따라 클라우드 컴퓨팅 환경에서의 보안이 더욱 중요해지고 있다. 이에 따라 클라우드 컴퓨팅을 구축하는 핵심 기술인 가상화 기술의 보안 또한 중요한 이슈가 되고 있다. 가상화 기술은 독립된 컴퓨팅 환경을 제공함으로써 기본적으로 안전한 컴퓨팅 환경을 제공하지만 가상화 기술의 보안 취약점을 이용하여 보안 공격하는 사례가 증가하고 있다. 이에 본 논문에서는 전가상화 기법과 운영체제 레벨 가상화 기법을 접목시켜 게스트 운영체제로부터 시작되는 보안 공격에 대해 대응할 수 있게 함으로써 보안성을 강화시키는 기법을 제안한다. 또한, 벤치마킹을 통해 이러한 접근방법이 기존의 컴퓨팅 성능에 거의 영향을 미치지 않음을 확인하였다.

  • PDF

A Study on the Pixel based Change Detection in Urban Area (도심지역 화소기반 변화탐지 적용에 관한 연구)

  • Kwon, Seung-Joon;Shin, Sung-Woong;Yoon, Chang-Rak
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.06a
    • /
    • pp.202-205
    • /
    • 2008
  • 건물이 밀집된 도심지역을 촬영한 두 시기 항공영상에 화소기반 변화탐지 기법인 영상대차(Image Differencing), 영상중첩 분석(Image Overlay)기법을 적용하여 넓은 대도심지역의 효율적인 변화탐지 가능성을 살펴보았다. 영상대차(Image Differencing) 기법은 알고리즘이 간단하고 정량적인 분석이 가능한 결과를 얻을 수 있다는 장점이 있으나 고층건물밀집지역을 보여주고 있는 고해상도 항공영상의 적용과정에서는 폐색영역, 그림자 등으로 인해 정확한 변화탐지 결과를 보여주지 못했다. 영상중첩 분석(Image Overlay)기법은 한 번에 두 개 또는 세 개의 영상을 비교 분석할 수 있다는 장점이 있으나 직관적인 분석만을 제공하고 정량적인 분석이 불가능하였다. 현재의 화소기반 영상변화탐지 기술수준으로는 고해상도 공간영상에 대한 신뢰도 높은 변화탐지 분석결과를 얻을 수 없다는 것을 확인하였다.

  • PDF

A Study on the Dynamic Impact Response Analysis of Cask by Modal Superposition Method (모드중첩기법을 이용한 CASK의 동적충격응답해석)

  • Lee Young-Shin;Kim Yong-Jae;Choi Young-Jin;Kim Wol-Tae
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.18 no.4 s.70
    • /
    • pp.373-383
    • /
    • 2005
  • The cask is used to transfer the radioactive material in various fields required to withstand hypothetical accident condition such as 9m drop impact in accordance with the requirement of the domestic requlations and IAEA. So far the impact force has been obtained by the finite element method with complex computational procedure. In this study, the dynamic impact response of the cask body is analyzed using the mode superposition method, and the analysis method is proposed. The results we also validated by comparing with previous experimental results and finite element analysis results. The present method Is simpler than finite element method and can be used to predict the global impact response of cask

A Shared Inlining Method for Resolving the Overlapping Problem of Elements (엘리먼트의 중첩 문제를 해결한 Shared Inlining 저장 기법)

  • Hong, Eun-Il;Lee, Young-Ho
    • Journal of KIISE:Databases
    • /
    • v.35 no.5
    • /
    • pp.411-420
    • /
    • 2008
  • The number of XML documents, which are widely used as a standard method for information expression and exchange in the web-based environment, increases rapidly along with the growing production of large XML documents. Many studies have been made to store and retrieve these XML documents on RDBMS, among which Shared Inlining storage method has a higher level of retrieval efficiency. The Shared Inlining method is the technique that analyzes the DTD information and stores the XML document in RDBMS by dividing for each node component. This study proposes the technique to resolve the overlapping problem that occurs in the element with several child nodes in the existing Shared Inlining method. The suggested method stores the XML document in the Shared Inlining structures appropriate to the DTD definition and enhances the accuracy of retrieval.

Multiplier Using CRT and Overlapped Multiple-bit Scanning Method (CRT와 중첩다중비트 주사기법을 접목한 승산기)

  • 김우완;장상동
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.749-755
    • /
    • 2003
  • Digital signal processing hardware based in RNS is currently considered as an important method for high speed and low cost hardware realization. This research designs and implements the method for conversion from a specific residue number system with moduli of the from $(2^k-1, 2^k, 2^k+1)$ to a weighted number system. Then, it simulates the implementation using a overlapped multiple-bit scanning method in the process of CRT conversion. In conclusion, the simulation shows that the CRT method which is adopted in this research, performs arithmetic operations faster than the traditional approaches, due to advantages of parallel processing and carry-free arithmetic operation.

An Unstructured 3-D Chimera Technique for Overlapped Bodies inRelative Motion (3차원 비정렬 중첩격자계를 이용한 서로 겹쳐진 물체들 간의 상대운동 해석기법에 관한 연구)

  • 안상준;권오준;정문승
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.8
    • /
    • pp.1-7
    • /
    • 2006
  • In the present study, A 3-D chimera technique for overlapped bodies in relative motion is studied using unstructured meshes. If all node points of a mesh element at solid boundary are in another body, this element is excluded from computational domain. For computation of unsteady flow, non-active cells have proper variables using interpolation and extrapolation. These variables are used in next time step. The motion of a launching trajectory ejected from a wing and the motion of deploying fins of a trajectory which have not been simulated are computed to conform practicality of this technique.

Lossless Non-SIC NOMA Implementation (Part II): 3-user Scheme Study (무손실 Non-SIC 비직교 다중 접속 구현 (II 편): 삼중 사용자 기법 연구)

  • Chung, Kyu-Hyuk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1029-1036
    • /
    • 2021
  • Recently it has been proposed that lossless 2-user non-orthogonal multiple access (NOMA) can be implemented without successive interference cancellation (SIC) via correlated superposition coding (CSC). However only the 2-user case was considered. Thus this paper proposes a lossless 3-user non-SIC NOMA scheme. This can be achieved via the 3-user CSC scheme. Simulations show that the lossless 3-user non-SIC NOMA scheme can be implemented over power allocation ranges of user-fairness.

Overlay Rendering of Multiple Geo-Based Images Using WebGL Blending Technique (WebGL 블렌딩 기법을 이용한 다중 공간영상정보 중첩 가시화)

  • Kim, Kwang-Seob;Lee, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.4
    • /
    • pp.104-113
    • /
    • 2012
  • Followed by that HTML5(Hypertext Markup Language5) was introduced, many kinds of program and services based on this have been developed and released. HTML5 is technical standard specifications for cross platform for personal computers and mobile devices so that it is expected that continuing progress and wide application in the both sides of the academic and the industrial fields increase. This study is to design and implement a mobile application program for overlay rendering with DEM and other geo-based image sets using HTML5 WebGL for 3D graphic processing on web environment. Particularly, the blending technique was used for overlay processing with multiple images. Among available WebGL frameworks, CubicVR.js was adopted, and various blending techniques were provided in the user interface for general users. For the actual application in the study area around the Sejong city, serveral types of geo-based data sets were used and processed: KOMPSAT-2 images, ALOS PALSAR SAR images, and grid data by environment measurements. While, DEM for 3D viewing with these geo-based images was produced using contour information of the digital map sets. This work demonstrates possibilities that new types of contents and service system using geo-based images can be extracted and applied.

Tree based Route Optimization in Nested NEMO Environment (중첩 NEMO 환경에서 트리 기반 라우트 최적화 기법)

  • Lim, Hyung-Jin;Chung, Tai-Myoung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.9-19
    • /
    • 2008
  • This paper propose the issue of connecting nested NEMO (Network Nobility) networks to global IPv6 networks, while supporting IPv6 mobility. Specifically, we consider a self-addressing including topology information IPv6-enabled NEMO infrastructure. The proposed self-organization addressing protocol automatically organized mobile routers into free architecture and configuration their global IPv6 addresses. BU(binding update) to MR own HA and internal rouging, hosed on longest prefix matching and soft state routing cache, are specially designed for IPv6-based NEMO. In conclusion, numeric analysis ore conducted to show more efficiency of the proposed routing protocols than other RO (Route Optimization) approaches.

  • PDF