• Title/Summary/Keyword: Data Constraints

Search Result 1,342, Processing Time 0.028 seconds

Building A PDM/CE Environment and Validating Integrity Using STEP (STEP을 이용한 PDM/CE환경의 구축과 데이타 무결성 확인)

  • 유상봉;서효원;고굉욱
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.173-194
    • /
    • 1996
  • In order to adapt today's short product life cycle and rapid technology changes., integrated systems should be extended to support PDM (Product Data Management) or CE(Concurrent Engineering). A PDM/CE environment has been developed and a prototype is Presented in this paper. Features of the PDM/CE environment are 1) integrated product information model (IPIM) includes both data model and integrity constraints, 2) database systems are organized hierarchically so that working data C8Mot be referenced by other application systems until they are released into the global database, and 3) integrity constraints written in EXPRESS are validated both in the local databases and the global database. By keeping the integrity of the product data, undesirable propagation of illegal data to other application system can be prevented. For efficient validation, the constraints are distributed into the local and the global schemata. Separate triggering mechanisms are devised using the dependency of constraints to three different data operations, i.e., insertion, deletion, and update.

  • PDF

A Representation of Engineering Change Objects and Their Integrity Constraints Using an Active Object-Oriented Database Model (능동형 객체지향적 데이터베이스 모텔을 이용한 설계변경 개체 및 제약조건의 표현)

  • 도남철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.1
    • /
    • pp.111-125
    • /
    • 2003
  • This paper proposes a product data model that can express and enforce integrity constraints on product structure during engineering changes (ECs). The model adopts and extends an active object-oriented database model in order to Integrate IC data and their integrity constraints. Tightly integrated with product structure, It will enable designers to maintain and exchange consistent EC data throughout the product life cycle. In order to properly support operations for ECs, the model provides the data, operations, and Event-Condition-Action rules for nested ECs and simultaneous EC applications to multiple options. in addition, the EC objects proposed In the model integrate the data and Integrity constraints into a unified repository. This repository enables designers to access all EC data and integrity constraints through the product structure and relationships between EC objects. This paper also describes a prototype product data management system based on the proposed model In order to demonstrate its effectiveness.

  • PDF

The Scheme for Distributing the Query Constraints using the Sensor Networks (센서 네트워크를 이용한 질의 배분 기법)

  • Kim, Dong-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.691-694
    • /
    • 2010
  • Since the data collected at a sensor node is the stream data, for processing efficiently user queries, the query index should be constructed at each node. To construct the minimized query index at the node, it is required to reduce the number of query constraints inserted into the query index. In this paper, we propose the scheme of the query constraints distribution using the multi-dimensional data index in order to diminish the number of the inserted query constraints.

  • PDF

Maintaining Integrity Constraints in Spatiotemporal Databases

  • Moon Kyung Do;Woo SungKu;Kim ByungCheol;Ryu KeunHo
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.726-729
    • /
    • 2004
  • Spatiotemporal phenomena are ubiquitous aspects of real world. In the spatial and temporal databases, integrity constraints maintain the semantics of specific application domain and relationship between domains when proceed update in the database. Efficient maintenance of data integrity has become a critical problem, since testing the validity of a large number of constraints in a large database and after each transaction is an expensive task. Especially, in spatiotemporal domain, data is more complex than traditional domains and very active. Additionally, it is not considered that unified frameworks deal with both spatial and temporal properties to handle integrity constraints. Therefore, there need a model to maintain integrity constraints in the unified frameworks and enforcement and management techniques in order to preserve consistence.

  • PDF

A scheduling algorithm for ASIC design (ASIC 설계를 위한 스케쥴링 알고리듬)

  • 김기현;정정화
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.7
    • /
    • pp.104-114
    • /
    • 1995
  • In this paper, an intermediate representation HSFG(Hanyang Sequential Flow GRaph) and a new scheduling algorithm for the control-dominated ASIC design is presented. The HSFG represents control flow, data dependency and such constraints as resource constraints and timing constraints. The scheduling algorithm minimizes the total operating time by reducing the number of the constraints as maximal as possible, searching a few paths among all the paths produced by conditional branches. The constraints are substitute by subgraphs, and then the number of subgraphs (that is the number kof the constraints) is minimized by using the inclusion and overlap relation among subgraphs. The proposed algorithm has achieved the better results than the previous ones on the benchmark data.

  • PDF

Tramsmission Method of Periodic and Aperiodic Real-Time Data on a Timer-Controlled Network for Distributed Control Systems (분산제어시스템을 위한 타이머 제어형 통신망의 주기 및 실시간 비주기 데이터 전송 방식)

  • Moon, Hong-ju;Park, Hong-Seong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.7
    • /
    • pp.602-610
    • /
    • 2000
  • In communication networks used in safety-critical systems such as control systems in nuclear power plants there exist three types of data traffic : urgent or asynchronous hard real-time data hard real-time periodic data and soft real-time periodic data. it is necessary to allocate a suitable bandwidth to each data traffic in order to meet their real-time constraints. This paper proposes a method to meet the real-time constraints for the three types of data traffic simultaneously under a timer-controlled token bus protocol or the IEEE 802.4 token bus protocol and verifies the validity of the presented method by an example. This paper derives the proper region of the high priority token hold time and the target token rotation time for each station within which the real-time constraints for the three types of data traffic are met, Since the scheduling of the data traffic may reduce the possibility of the abrupt increase of the network load this paper proposes a brief heuristic method to make a scheduling table to satisfy their real-time constraints.

  • PDF

XML Schema Transformation Considering Semantic Constraint (의미적 제약조건을 고려한 XML 스키마의 변환)

  • Cho, Jung-Gil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.53-63
    • /
    • 2011
  • Many techniques have been proposed to store and query XML data efficiently. One way achieving this goal is using relational database by transforming XML data into relational format. It is important to transform schema to preserve the content, the structure and the constraints of the semantics information of the XML document. Especially, key constraints are an important part of database theory. Therefore, the proposal technique has considered the semantics of XML as expressed by primary keys and foreign keys. And, the proposal technique can preserve not only XML data constraints but also the content and the structure and the semantics of XML data thru transformation process. Transforming information is the content and the structure of the document(the parent-child relationship), the functional dependencies, semantics of the document as captured by XML key and keyref constraints. Because of XML schema transformation ensures that preserving semantic constraints, the advantages of these transformation techniques do not need to use the stored procedure or trigger which these data ensures data integrity in the relational database. In this paper, there is not chosen the ID/IDREF key which supported in DTD, the inheritance relationship, the implicit referential integrity.

3-L Model: A Model for Checking the Integrity Constraints of Mobile Databases

  • Ibrahim, Hamidah;Dzolkhifli, Zarina;Affendey, Lilly Suriani;Madiraju, Praveen
    • Journal of Computing Science and Engineering
    • /
    • v.3 no.4
    • /
    • pp.260-277
    • /
    • 2009
  • In this paper we propose a model for checking integrity constraints of mobile databases called Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity constraints are adopted. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host, and hence speeds up the checking process.

NECESSARY CONDITIONS FOR OPTIMAL CONTROL PROBLEM UNDER STATE CONSTRAINTS

  • KIM KYUNG-EUNG
    • Journal of the Korean Mathematical Society
    • /
    • v.42 no.1
    • /
    • pp.17-35
    • /
    • 2005
  • Necessary conditions for a deterministic optimal control problem which involves states constraints are derived in the form of a maximum principle. The conditions are similar to those of F.H. Clarke, R.B. Vinter and G. Pappas who assume that the problem's data are Lipschitz. On the other hand, our data are not continuously differentiable but only differentiable. Fermat's rule and Rockafellar's duality theory of convex analysis are the basic techniques in this paper.

Differences in Leisure Participation by Types of Leisure Constraints for Married employees (기혼취업자의 여가제약유형에 따른 여가활동참여의 차이)

  • Kim, Oi-Sook;Park, Eun Jung
    • Journal of Family Resource Management and Policy Review
    • /
    • v.17 no.1
    • /
    • pp.241-263
    • /
    • 2013
  • Time pressure and financial burden have been reported as the main constraints on leisure participation. The purpose of this study was to explore a typology of leisure constraints, investigate the characteristics of leisure constraint types, and analyze the differences in leisure participation by the types of leisure constraints for married employees. The data source for this research was the 2009 Time Use Survey conducted by the Korea National Statistical Office (KNSO). Married employees aged 20 to 59 years completed 13,476 time diaries (7,984 for male, 5,492 for female), which were analyzed using chi-square, cluster analysis, and ANOVA analysis. Leisure constraints were classified into five types in two categories, working time per week and personal income for both males and females respectively. The three types for both males and females were time-income constraints, income constraints, and general constraints, with an additional type for men, $time^+$-income constraints, and an additional type for women, time constraint. The most common type was general constraints, for both males and females. Each type was further differentiated by the following socio-economic variables: age, educational level, job type, and weekly day-off. The study found that participation in study, sports, and religious activities varied with the types of leisure constraints.

  • PDF