• Title/Summary/Keyword: Data schema

Search Result 690, Processing Time 0.027 seconds

Automatic Construction of SHACL Schemas for RDF Knowledge Graphs Generated by Direct Mappings

  • Choi, Ji-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.23-34
    • /
    • 2020
  • In this paper, we proposes a method to automatically construct SHACL schemas for RDF knowledge graphs(KGs) generated by Direct Mapping(DM). DM and SHACL are all W3C recommendations. DM consists of rules to transform the data in an RDB into an RDF graph. SHACL is a language to describe and validate the structure of RDF graphs. The proposed method automatically translates the integrity constraints as well as the structure information in an RDB schema into SHACL. Thus, our SHACL schemas are able to check integrity instead of RDBMSs. This is a consideration to assure database consistency even when RDBs are served as virtual RDF KGs. We tested our results on 24 DM test cases, published by W3C. It was shown that they are effective in describing and validating RDF KGs.

A Methodology for the Establishment of CityGML Based 3D Drainage Facility Information Model for Runoff Analysis (강우우수 유출해석을 위한 CityGML 기반 3차원 도시 배수시설 정보모델 구축 방안)

  • Lee, Sang-Ho;Jang, Young-Hoon;Kim, Jong Myung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.77-86
    • /
    • 2016
  • In this study, we have created CityGML based 3D information model for drainage facility, manhole and terrain. It conducted analysis of the rainfall-runoff leak through the information model for obtaining interoperability for information integration between city models. The models have advantages to manage the infrastructure information in point of semantic meaning and geometric information by converting the original 2D GIS construction information into the 3D information model. The input values can be automatically generated through the 3D information model of this study, while the values should be entered manually in the conventional method. Also, it can be useful to check the flooding level and related locations by connecting the result of rainfall interpretation and information model.

Design and Implementation of Statistics System for Traditional Korean Medicine (한방 통계 시스템의 설계 및 구현)

  • Yea, Sang-Jun;Kim, Chul;Jang, Hyun-Chul;Kim, Sang-Kyun;Kim, Jin-Hyun;Song, Mi-Young
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.332-338
    • /
    • 2009
  • The statistics of traditional korean medicine is essential aspects for the information based policy establishment and the evidence based traditional korean medicine research. But because the integrated statistics service of traditional korean medicine is not provided, people are hard to find out suitable statistics. Thus we analyzed the produced statistics from many ministries, classified it into 7 categories and extracted common fields from it. We designed the database schema by summary table dynamic production method from the analysis of statistics and designed the system composed of excel import, statistics analysis, chart creation and search engine. Finally we implemented the statistics system of traditional korean medicine which users are capable of modifying the statistics data freely. We hope that the implemented system will provide pliability in searching and finding statistical information.

Development of an OODBMS Functionality Testing Tool Prototype. (객체지향 DBMS 기능 시험 도구의 프로토타입 개발)

  • 김은영;이상호;전성택
    • The Journal of Information Technology and Database
    • /
    • v.2 no.2
    • /
    • pp.25-34
    • /
    • 1995
  • In this paper, we present design philosophy and implementation issues of a functionality testing tool for object-oriented database systems. A testing tool has been developed to validate UniSQL/X functionalities with C++ interface. A testing tool is designed under consideration of scaleability, simplicity and extendibility. The schema is deliberately constructed to verify the object-oriented functionalities such as abstraction, inheritance and aggregation. Each test item has been derived under various black box techniques such as equivalent partitioning and boundary-value analysis. The testing tool consists of six phases, namely, database creation, database population, construction of testindex, compilation and link, execution and result reporting, and final cleanup. The prototype provides more than 140 test items at 90 programs.

  • PDF

Development of a GML 3.0 Encoding System Using Mapping Rules (매핑 규칙을 활용한 GML 3.0 엔코딩 시스템의 개발)

  • Lee, Yong-Soo;Kim, Dong-O;Son, Hoon-Soo;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.1 s.9
    • /
    • pp.27-38
    • /
    • 2003
  • Recently, because of the extensive use of geographic information in the various fields, the requirement for the easy circulation and utilization of the various geographic information among the individuals, organizations, societies and countries is raised. In order to support the interoperability of the heterogeneous geographic information in the various fields, OGC(Open GIS Consortium) proposed the GML(Geography Markup Language) specification that defines the XML encoding rule about the heterogeneous geographic information. In addition, ISO/TC 211 adopted the GML specification to make it as the international standard. Therefore, in this paper we first analyzed the GML 3.0 specification in detail that can support the interoperability of the heterogeneous geographic information. And then we suggested and applied the mapping rule that define the encoding method to improve the encoding process easily and efficiently. Finally we designed and implemented the GML 3.0 encoding system using the mapping rule to encode the geographic information that was constructed in spatial databases into the GML 3.0 document. Especially, we used ZEUS as a spatial database system to test our encoding system in this paper.

  • PDF

Dynamic Monitoring for Security Management based on State Transition (상태 전이에 의한 보안 관리 동적 모니터링)

  • Jang, Hui-Jin;Kim, Sang-Uk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1468-1475
    • /
    • 1999
  • 컴퓨터망 보안을 위해서는 취약점의 빠른 발견과 그에 따르는 신속한 조치가 요구된다. 이를 위해 컴퓨터망 여러 곳에서 사용자가 원하는 보안 정보를 수집, 분석하고 수집된 보안 정보들을 효과적으로 보여주는 통합적인 보안 관리를 제공하는 모니터링 방식이 필요하다. 본 논문에서는 보안 관리를 위한 동적 모니터링 형식 모델을 제시한다. 동적 모니터링은 상태 전이에 의한 시스템 상태, 사용자와의 상호작용, 시각 및 모니터링 객체의 동적 활성화를 이용하여 컴퓨터망 통합 보안 관리를 제공한다. 계속적으로 변하는 보안 정보, 컴퓨터망 관리자의 관심점과 모니터링 레벨의 변화를 즉각적으로 반영함으로써 관리자에게 컴퓨터망 관리의 정확성, 효율성 그리고 편의성을 제공한다. 모니터링 시스템을 형식적으로 모델링하여 여러 모니터링 응용프로그램의 개발이 가능한 모니터링 플랫폼으로 발전시킬 수 있다. Abstract It is highly required to quickly detect the vulnerability of a computer network system and an appropriate action toward it should be followed as soon as possible for its security. It leads us to the need of a monitoring schema that can provide an integrated security management with carefully selected and analysed data through the computer network for its users. This paper presents a formal model of dynamic monitoring for security management. It provides the comprehensive security management using continuously changing security information, user interactions and dynamic activation of visual and monitoring objects. It enables system security officers to manage computer systems accurately, efficiently and conveniently by reflecting the state transition and the transformation of concerns and a monitoring level of system security officers immediately. This model can be used as the basis of a monitoring platform.

Design and Implementation of an Adaptive Hypermedia Learning System based on Leamer Behavioral Model (학습자 행동모델기반의 적응적 하이퍼미디어 학습 시스템 설계 및 구현)

  • Kim, Young-Kyun;Kim, Young-Ji;Mun, Hyeon-Jeong;Woo, Yang-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.757-766
    • /
    • 2009
  • This study presents an adaptive hypermedia learning system which can provide individual learning environment using a learner behavioral model. This system proposes a LBML which can manage learners' learning behavioral information by tracking down such information real-time. The system consists of a collecting system of learning behavioral information and an adaptive learning support system. The collecting system of learning behavioral information uses Web 2.0 technologies and collects learners' learning behavioral information real-time based on a SCORM CMI data model. The collected information is stored as LBML instances of individual learners based on a LBML schema. With the adaptive learning support system, a rule-based learning supporting module and an interactive learning supporting module are developed by analysing LBML instances.

  • PDF

A Study of Knowledge Creating Organizational Memory (지식 창조적 조직메모리에 관한 연구)

  • 장재경
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.3
    • /
    • pp.133-150
    • /
    • 1998
  • For the purpose of new‘organizational knowledge centric knowledge management’, this paper proposes the knowledge creating organizational memory which shows the knowledge creation in organization according to the dialectical circulation between the domain knowledge and the task knowledge, based on the Yin Yang theory. This paper defines two kinds of organizational knowledge such as the domain knowledge and task knowledge and designs them in the pursuit of its lifecycle. Knowledge creating organizational memory is designed to three knowledge components that circulate through the domain knowledge and the task knowledge according to the object-oriented methodology. Organizational knowledge is designed into the graphical structure of ( i ) knowledge ( ⅱ ) relation between knowledge objects and ( ⅲ ) degree of relation, which receive the legacy of organizational knowledge such as data schema, process model and knowledge base. This design of organizational knowledge can be applied to CBR(Case Based Reasoning), one of knowledge mining tools to create new organizational knowledge.

  • PDF

An RDF Ontology Access Control Model based on Relational Database (관계형 데이타베이스 기반의 RDF 온톨로지 접근 제어 모델)

  • Jeong, Dong-Won
    • Journal of KIISE:Databases
    • /
    • v.35 no.2
    • /
    • pp.155-168
    • /
    • 2008
  • This paper proposes a relational security model-based RDF Web ontology access control model. The Semantic Web is recognized as a next generation Web and RDF is a Web ontology description language to realize the Semantic Web. Much effort has been on the RDF and most research has been focused on the editor, storage, and inference engine. However, little attention has been given to the security issue, which is one of the most important requirements for information systems. Even though several researches on the RDF ontology security have been proposed, they have overhead to load all relevant data to memory and neglect the situation that most ontology storages are being developed based on relational database. This paper proposes a novel RDF Web ontology security model based on relational database to resolve the issues. The proposed security model provides high practicality and usability, and also we can easily make it stable owing to the stability of the relational database security model.

An Assignment Method of Multidimensional Type Inheritance Indexes for XML Query Processing (XML 질의처리를 위한 다차원 타입상속 색인구조의 할당기법)

  • Lee, Jong-Hak
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2009
  • This paper presents an assignment method of the multidimensional type inheritance indexes (MD-TIXs) to support the processing of XML queries in XML databases. MD-TIX uses a multidimensional index structure for efficiently supporting nested predicates that involve both nested element and type inheritance hierarchies. In this paper, we have analyzed the strategy of the query processing by using the MD-TIXs, and presented an assignment method of the MD-TIXs in the framework of complex queries, containing conjunctions of nested predicates, each one involving an Xpath having target types or domain types substitution. We first consider MD-TIX operations caused by updating of XML data-bases, and the use of the MD-TIXs in the case of a query containing a single nested predicate. And then, we consider the assignments of the MD-TIXs in the framework of more general queries containing nested predicates over overlapping paths that have common subpaths.

  • PDF