• Title/Summary/Keyword: Description Scheme

Search Result 219, Processing Time 0.022 seconds

Study Service Ontology Design Scheme Using UML and OCL (UML 및 OCL을 이용한 서비스 온톨로지 설계 방안에 관한 연구)

  • Lee Yun-Su;Chung In-Jeoung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.627-636
    • /
    • 2005
  • The Intelligent Web Service is proposed for the purpose of automatic discovery, invocation, composition, inter-operation, execution monitoring and recovery web service through the Semantic Web and the Agent technology. To accomplish this Intelligent Web Service, the Ontology is a necessity for reasoning and processing the knowledge by the computer. However, creating service ontology, for the intelligent web service, has two problems not only consuming a lot of time and cost depended on heuristic of service developer, but also being hard to be mapping completely between service and service ontology. Moreover, the markup language to describe the service ontology is currently hard to be learned by the service developer In a short time. This paper proposes the efficient way of designing and creating the service ontology using MDA methodology. This proposed solution reuses the creating model in terms of desiEninE and constructing Web Service Model using UML based on MDA. After converting the Platform-Independent Web Service Model to the dependent model of OWL-S which is a Service Ontology description language, it converts to OWL-S Service Ontology using XMI. This proposed solution has profits, oneis able to be easily constructed the Service Ontology by Service Developers, the other is enable to be created the both service and Service Ontology from one model. Moreover, it can be effective to reduce the time and cost as creating Service Ontology automatically from a model, and calmly dealt with a change of outer environment like as the platform change. This paper cites an instance for the validity of designing Web Service model and creating the Service Ontology, and validates whether the created Service Ontology is valid or not.

The extension of the IDEA Methodology for a multilevel secure schema design (다단계 보안 스키마 설계를 위한 IDEA 방법론의 확장)

  • Kim, Jung-Jong;Park, Woon-Jae;Sim, Gab-Sig
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.879-890
    • /
    • 2000
  • Designing a multilevel database application is a complex process, and the entities and their associated security levels must be represented using an appropriate model unambiguously. It is also important to capture the semantics of a multilevel databse application as accurate and complete as possible. Owing to the focus of the IDEA Methodology for designing the non-secure database applications on the data-intensive systems, the Object Model describes the static structure of the objects in an application and their relationships. That is, the Object Model in the IDEA Methodology is an extended Entity-Relationship model giving a static description of objects. The IDEA Methodology has not been developed the multilevel secure database applications, but by using an existing methodology we could take advantage of the various techniques that have already been developed for that methodology. That is, this way is easier to design the multilevel secure schema than to develop a new model from scratch. This paper adds the security features 새? Object Model in the IDEA Methodology, and presents the transformation from this model to a multilevel secure object oriented schema. This schema will be the preliminary work which can be the general scheme for the automatic mapping to the various commercial multilevel secure database management system such as Informix-Online/Secure, Trusted ORACLE, and Sybase Secure SQL Server.

  • PDF

Personalized EPG Application using Automatic User Preference Learning Method (사용자 선호도 자동 학습 방법을 이용한 개인용 전자 프로그램 가이드 어플리케이션 개발)

  • Lim Jeongyeon;Jeong Hyun;Kim Munchurl;Kang Sanggil;Kang Kyeongok
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.305-321
    • /
    • 2004
  • With the advent of the digital broadcasting, the audiences can access a large number of TV programs and their information through the multiple channels on various media devices. The access to a large number of TV programs can support a user for many chances with which he/she can sort and select the best one of them. However, the information overload on the user inevitably requires much effort with a lot of patience for finding his/her favorite programs. Therefore, it is useful to provide the persona1ized broadcasting service which assists the user to automatically find his/her favorite programs. As the growing requirements of the TV personalization, we introduce our automatic user preference learning algorithm which 1) analyzes a user's usage history on TV program contents: 2) extracts the user's watching pattern depending on a specific time and day and shows our automatic TV program recommendation system using MPEG-7 MDS (Multimedia Description Scheme: ISO/IEC 15938-5) and 3) automatically calculates the user's preference. For our experimental results, we have used TV audiences' watching history with the ages, genders and viewing times obtained from AC Nielson Korea. From our experimental results, we observed that our proposed algorithm of the automatic user preference learning algorithm based on the Bayesian network can effectively learn the user's preferences accordingly during the course of TV watching periods.

A Phenomenological Study on the Meaning of Economic Life of Marriage Immigrant Women (결혼이주여성의 경제생활 의미에 관한 현상학적 연구)

  • Lee, Hyoung-Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.149-157
    • /
    • 2013
  • The purpose of this study is to listen to vivid story on economic life of marriage immigrant women using phenomenological study out of qualitative study methods, and to analyze the meaning of dynamicity of experiences through in-depth interviews. The research question is "What is the meaning of economic life that marriage immigrant women experience?" From the research, 67 meaningful statements were abstracted and 15 core meanings were organized. The 15 core meanings were categorized as 5 theme categories such as 'Tough Life', 'Unstable Income such as Children Education Expense and Insurance Premium', 'Search for Changes in Life Style for Adaptation', 'Pursuit of Economic Stability through Employment', 'Expectation of Supports and Return to Married Woman's Parents' Home.' The researcher made structural description through first person speaker for the application of hermeneutical writing. In other words, the meaning of economic life of marriage immigrant women in Korea is 'difficult coping process to family-oriented culture pursuing changes in life style to adapt themselves to difficult reality.' Various undertones of practice were proposed through those statements such as policy to expand opportunities to receive an old-age pension by applying 'Joint Scheme for Couples' (Virtual Name) to People's pension for stable economic life of marriage immigrant women in old age.

Local Prominent Directional Pattern for Gender Recognition of Facial Photographs and Sketches (Local Prominent Directional Pattern을 이용한 얼굴 사진과 스케치 영상 성별인식 방법)

  • Makhmudkhujaev, Farkhod;Chae, Oksam
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.91-104
    • /
    • 2019
  • In this paper, we present a novel local descriptor, Local Prominent Directional Pattern (LPDP), to represent the description of facial images for gender recognition purpose. To achieve a clearly discriminative representation of local shape, presented method encodes a target pixel with the prominent directional variations in local structure from an analysis of statistics encompassed in the histogram of such directional variations. Use of the statistical information comes from the observation that a local neighboring region, having an edge going through it, demonstrate similar gradient directions, and hence, the prominent accumulations, accumulated from such gradient directions provide a solid base to represent the shape of that local structure. Unlike the sole use of gradient direction of a target pixel in existing methods, our coding scheme selects prominent edge directions accumulated from more samples (e.g., surrounding neighboring pixels), which, in turn, minimizes the effect of noise by suppressing the noisy accumulations of single or fewer samples. In this way, the presented encoding strategy provides the more discriminative shape of local structures while ensuring robustness to subtle changes such as local noise. We conduct extensive experiments on gender recognition datasets containing a wide range of challenges such as illumination, expression, age, and pose variations as well as sketch images, and observe the better performance of LPDP descriptor against existing local descriptors.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

A study on the variations of water temperature and sonar performance using the empirical orthogonal function scheme in the East Sea of Korea (동해에서 경험직교함수 기법을 이용한 수온과 소나성능 변화 연구)

  • Young-Nam Na;Changbong Cho;Su-Uk Son;Jooyoung Hahn
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • For measuring the performance of passive sonars, we usually consider the maximum Detection Range (DR) under the environment and system parameters in operation. In shallow water, where sound waves inevitably interacts with sea surface or bottom, detection generally maintains up to the maximum range. In deep water, however, sound waves may not interact with sea surface or/and bottom, and thus there may exist shadow zones where sound waves can hardly reach. In this situation, DR alone may not completely define the performance of each sonar. For complete description of sonar performance, we employ the concept 'Robustness Of Detection (ROD)'. In the coastal region of the East Sea, the spatial variations of water masses have close relations with DR and ROD, where the two parameters show reverse spatial variations in general. The spatial and temporal analysis of the temperature by employing the Empirical Orthogonal Function (EOF) shows that the 1-st mode represents typical pattern of seasonal variation and the 2-nd mode represents strength variations of mixed layers and currents. The two modes are estimated to explain about 92 % of the variations. Assuming two types of targets located at the depths of 5 m (shallow) and 100 m (deep), the passive sonar performance (DR) gives high negative correlations (about -0.9) with the first two modes. Most of temporal variations of temperature occur from the surface up to 200 m in the water column so that when we assume a target at 100 m, we can expect detection performance of little seasonal variations with passive sonars below 100 m.

A Design and Implementation of Multimedia Retrieval System based on MAF(Multimedia Application File Format) (MAF(Multimedia Application File Format) 기반 멀티미디어 검색 시스템의 설계 및 구현)

  • Gang Young-Mo;Park Joo-Hyoun;Bang Hyung-Gin;Nang Jong-Ho;Kim Hyung-Chul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.574-584
    • /
    • 2006
  • Recently, ISO/IEC 23000 (also known as 'MPEG-A') has proposed a new file format called 'MAF(Multimedia Application File Format)[1]' which provides a capability of integrating/storing the widely-used compression standards for audio and video and the metadata in MPEG-7 form into a single file format. However, it is still very hard to verify the usefulness of MPEG-A in the real applications because there is still no real system that fully implements this standard. In this thesis, a design and implementation of a multimedia retrieval system based on MPEG-A standard on PC and mobile device is presented. Furthermore, an extension of MPEG-A for describing the metadata for video is also proposed. It is selected and defined as a subset of MPEG-7 MDS[4] and TV-anytime[5] for video that is useful and manageable in the mobile environments. In order to design the multimedia retrieval system based on MPEG-A, we define the system requirements in terms of portability, extensibility, compatibility, adaptability, efficiency. Based on these requirements, we design the system which composed of 3 layers: Application Layer, Middleware Layer, Platform Layer. The proposed system consists of two sub-parts, client-part and server-part. The client-part consists of MAF authoring tool, MAP player tool and MAF searching tool which allow users to create, play and search the MAF files, respectively. The server-part is composed of modules to store and manage the MAF files and metadata extracted from MAF files. We show the usefulness of the proposed system by implementing the client system both on MS-Windows platform on desk-top computer and WIPI platform on mobile phone, and validate whether it to satisfy all the system requirements. The proposed system can be used to verify the specification in the MPEG-A, and to proves the usefulness of MPEG-A in the real application.

Analysis of Mistakes in Photosynthesis Unit in Biology II Textbooks and Survey of Biology Teachers' Recognition on them (생물 II 교과서 광합성 단원의 오류 분석 및 생물 교사의 오류 인지 조사)

  • Park, Hae-Kyung;Yoon, Ki-Soon;Kwon, Duck-Kee
    • Journal of Science Education
    • /
    • v.32 no.1
    • /
    • pp.33-46
    • /
    • 2008
  • The purpose of this study was to know whether or not any wrongful description or simple errors were in photosynthesis unit of Biology II textbook under 7th national curriculum and if so, to know whether or not high school teachers recognized and corrected properly the mistakes. The mistakes in photosynthesis unit of text books were determined by the comparison with several reference books and through examination by three plant physiologists in 8 different Biology II textbooks. After the mistakes were analysed, the survey using contents of textbook containing the mistakes was conducted on high school teachers teaching Biology II. As a result, 48 mistakes were determined in 13 subjects. As many as four mistakes were found even in one subject in a certain textbook and a same mistake was found repeatedly in several textbooks. The survey result showed that the teachers who pointed exactly the mistakes out corrected properly, however, the percentage of these ones out of 35 teachers replied to survey was less than 50%. The ratios of correction out of total number of responses were high in question #6 (43%), #4-3 (40%), and #1-2 (32%) which were containing a simple mistake in graph, a wrong word and a wrong picture, respectively. But, no one pointed out and made correction in question #5-1 and #5-2 which were containing Z scheme of light reaction without the legend of vertical axis that should be explained as electron energy or standard reduction potential. The result indicates the possibility that the mistakes in photosynthesis unit of Biology II textbook can be corrected and teached properly by teachers may be low. In order to reduce the possibility that students may have misconceptions about photosynthesis, the list of print's errors should be provided to the teachers and/or the training program and/or workshop for in-service high school biology teachers was recommended.

  • PDF