• 제목/요약/키워드: Data Constraints

검색결과 1,342건 처리시간 0.026초

STEP을 이용한 PDM/CE환경의 구축과 데이타 무결성 확인 (Building A PDM/CE Environment and Validating Integrity Using STEP)

  • 유상봉;서효원;고굉욱
    • 한국전자거래학회지
    • /
    • 제1권1호
    • /
    • pp.173-194
    • /
    • 1996
  • In order to adapt today's short product life cycle and rapid technology changes., integrated systems should be extended to support PDM (Product Data Management) or CE(Concurrent Engineering). A PDM/CE environment has been developed and a prototype is Presented in this paper. Features of the PDM/CE environment are 1) integrated product information model (IPIM) includes both data model and integrity constraints, 2) database systems are organized hierarchically so that working data C8Mot be referenced by other application systems until they are released into the global database, and 3) integrity constraints written in EXPRESS are validated both in the local databases and the global database. By keeping the integrity of the product data, undesirable propagation of illegal data to other application system can be prevented. For efficient validation, the constraints are distributed into the local and the global schemata. Separate triggering mechanisms are devised using the dependency of constraints to three different data operations, i.e., insertion, deletion, and update.

  • PDF

능동형 객체지향적 데이터베이스 모텔을 이용한 설계변경 개체 및 제약조건의 표현 (A Representation of Engineering Change Objects and Their Integrity Constraints Using an Active Object-Oriented Database Model)

  • 도남철
    • Journal of Information Technology Applications and Management
    • /
    • 제10권1호
    • /
    • pp.111-125
    • /
    • 2003
  • This paper proposes a product data model that can express and enforce integrity constraints on product structure during engineering changes (ECs). The model adopts and extends an active object-oriented database model in order to Integrate IC data and their integrity constraints. Tightly integrated with product structure, It will enable designers to maintain and exchange consistent EC data throughout the product life cycle. In order to properly support operations for ECs, the model provides the data, operations, and Event-Condition-Action rules for nested ECs and simultaneous EC applications to multiple options. in addition, the EC objects proposed In the model integrate the data and Integrity constraints into a unified repository. This repository enables designers to access all EC data and integrity constraints through the product structure and relationships between EC objects. This paper also describes a prototype product data management system based on the proposed model In order to demonstrate its effectiveness.

  • PDF

센서 네트워크를 이용한 질의 배분 기법 (The Scheme for Distributing the Query Constraints using the Sensor Networks)

  • 김동현
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.691-694
    • /
    • 2010
  • 센서 노드에서 수집되는 데이터는 지속적으로 삽입되는 스트림 데이터이기 때문에 효율적인 사용자 질의 처리를 위하여 노드별로 질의 색인을 구축해야 한다. 노드에서 최소 크기의 질의 색인을 구축하기 위해서는 질의 색인에 삽입되는 질의 조건을 수를 줄여야 할 필요가 있다. 이 논문에서는 삽입되는 질의 조건의 수를 줄이기 위하여 다차원 데이터 색인을 이용한 질의 조건 배분 기법에 대하여 제안한다.

  • PDF

Maintaining Integrity Constraints in Spatiotemporal Databases

  • Moon Kyung Do;Woo SungKu;Kim ByungCheol;Ryu KeunHo
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2004년도 Proceedings of ISRS 2004
    • /
    • pp.726-729
    • /
    • 2004
  • Spatiotemporal phenomena are ubiquitous aspects of real world. In the spatial and temporal databases, integrity constraints maintain the semantics of specific application domain and relationship between domains when proceed update in the database. Efficient maintenance of data integrity has become a critical problem, since testing the validity of a large number of constraints in a large database and after each transaction is an expensive task. Especially, in spatiotemporal domain, data is more complex than traditional domains and very active. Additionally, it is not considered that unified frameworks deal with both spatial and temporal properties to handle integrity constraints. Therefore, there need a model to maintain integrity constraints in the unified frameworks and enforcement and management techniques in order to preserve consistence.

  • PDF

ASIC 설계를 위한 스케쥴링 알고리듬 (A scheduling algorithm for ASIC design)

  • 김기현;정정화
    • 전자공학회논문지A
    • /
    • 제32A권7호
    • /
    • pp.104-114
    • /
    • 1995
  • In this paper, an intermediate representation HSFG(Hanyang Sequential Flow GRaph) and a new scheduling algorithm for the control-dominated ASIC design is presented. The HSFG represents control flow, data dependency and such constraints as resource constraints and timing constraints. The scheduling algorithm minimizes the total operating time by reducing the number of the constraints as maximal as possible, searching a few paths among all the paths produced by conditional branches. The constraints are substitute by subgraphs, and then the number of subgraphs (that is the number kof the constraints) is minimized by using the inclusion and overlap relation among subgraphs. The proposed algorithm has achieved the better results than the previous ones on the benchmark data.

  • PDF

분산제어시스템을 위한 타이머 제어형 통신망의 주기 및 실시간 비주기 데이터 전송 방식 (Tramsmission Method of Periodic and Aperiodic Real-Time Data on a Timer-Controlled Network for Distributed Control Systems)

  • 문홍주;박홍성
    • 제어로봇시스템학회논문지
    • /
    • 제6권7호
    • /
    • pp.602-610
    • /
    • 2000
  • In communication networks used in safety-critical systems such as control systems in nuclear power plants there exist three types of data traffic : urgent or asynchronous hard real-time data hard real-time periodic data and soft real-time periodic data. it is necessary to allocate a suitable bandwidth to each data traffic in order to meet their real-time constraints. This paper proposes a method to meet the real-time constraints for the three types of data traffic simultaneously under a timer-controlled token bus protocol or the IEEE 802.4 token bus protocol and verifies the validity of the presented method by an example. This paper derives the proper region of the high priority token hold time and the target token rotation time for each station within which the real-time constraints for the three types of data traffic are met, Since the scheduling of the data traffic may reduce the possibility of the abrupt increase of the network load this paper proposes a brief heuristic method to make a scheduling table to satisfy their real-time constraints.

  • PDF

의미적 제약조건을 고려한 XML 스키마의 변환 (XML Schema Transformation Considering Semantic Constraint)

  • 조정길
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권3호
    • /
    • pp.53-63
    • /
    • 2011
  • XML 데이터를 효율적으로 저장하고 질의하기 위하여 많은 기법들이 제안되었다. 이러한 목표를 위한 한 가지 방법은 XML 데이터를 관계형 형식으로 변환하여 관계형 데이터베이스를 사용하는 것이다. XML 문서의 내용, 구조, 의미 정보인 제약조건 보존은 스키마를 변환하는 과정에서 매우 중요하다. 특히 키 제약조건은 데이터베이스 이론의 중요한 부분을 차지한다. 따라서 제안된 기법은 주키와 외래키를 표현함으로써 XML의 의미를 반영하며, 변환하는 데에 XML 데이터의 키 제약조건뿐만 아니라 데이터의 내용과 구조와 의미도 보존한다. 변환 정보는 문서의 내용, 문서의 구조(부모-자식 관계), 함수적 종속성, XML key와 keyref 제약조건에 의해 포착한 문서의 의미이다. 제안된 기법은 XML 스키마를 변환할 때에 의미적 제약조건들의 보존을 보장함으로써 관계형 데이터베이스에서 데이터 무결성을 보장하기 위한 저장 프로시저나 트리거를 사용할 필요가 없는 이점이 있다. 이러한 변환은 산업체에서 필요한 데이터 관리의 한 부분으로, 이미 웹에 저장되어있는 데이터를 데이터베이스에 저장하여 다른 업무에 활용할 수가 있을 것이다. 본 논문에서는 DTD에서 지원하는 ID/IDREF 키, 상속 관계, 묵시적 참조 무결성은 반영하지 못하였다.

3-L Model: A Model for Checking the Integrity Constraints of Mobile Databases

  • Ibrahim, Hamidah;Dzolkhifli, Zarina;Affendey, Lilly Suriani;Madiraju, Praveen
    • Journal of Computing Science and Engineering
    • /
    • 제3권4호
    • /
    • pp.260-277
    • /
    • 2009
  • In this paper we propose a model for checking integrity constraints of mobile databases called Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity constraints are adopted. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host, and hence speeds up the checking process.

NECESSARY CONDITIONS FOR OPTIMAL CONTROL PROBLEM UNDER STATE CONSTRAINTS

  • KIM KYUNG-EUNG
    • 대한수학회지
    • /
    • 제42권1호
    • /
    • pp.17-35
    • /
    • 2005
  • Necessary conditions for a deterministic optimal control problem which involves states constraints are derived in the form of a maximum principle. The conditions are similar to those of F.H. Clarke, R.B. Vinter and G. Pappas who assume that the problem's data are Lipschitz. On the other hand, our data are not continuously differentiable but only differentiable. Fermat's rule and Rockafellar's duality theory of convex analysis are the basic techniques in this paper.

기혼취업자의 여가제약유형에 따른 여가활동참여의 차이 (Differences in Leisure Participation by Types of Leisure Constraints for Married employees)

  • 김외숙;박은정
    • 가족자원경영과 정책
    • /
    • 제17권1호
    • /
    • pp.241-263
    • /
    • 2013
  • Time pressure and financial burden have been reported as the main constraints on leisure participation. The purpose of this study was to explore a typology of leisure constraints, investigate the characteristics of leisure constraint types, and analyze the differences in leisure participation by the types of leisure constraints for married employees. The data source for this research was the 2009 Time Use Survey conducted by the Korea National Statistical Office (KNSO). Married employees aged 20 to 59 years completed 13,476 time diaries (7,984 for male, 5,492 for female), which were analyzed using chi-square, cluster analysis, and ANOVA analysis. Leisure constraints were classified into five types in two categories, working time per week and personal income for both males and females respectively. The three types for both males and females were time-income constraints, income constraints, and general constraints, with an additional type for men, $time^+$-income constraints, and an additional type for women, time constraint. The most common type was general constraints, for both males and females. Each type was further differentiated by the following socio-economic variables: age, educational level, job type, and weekly day-off. The study found that participation in study, sports, and religious activities varied with the types of leisure constraints.

  • PDF