• Title/Summary/Keyword: Evolve

Search Result 709, Processing Time 0.027 seconds

Discovering and Maintaining Semantic Mappings between XML Schemas and Ontologies

  • An, Yuan;Borgida, Alex;Mylopoulos, John
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.1
    • /
    • pp.44-73
    • /
    • 2008
  • There is general agreement that the problem of data semantics has to be addressed for XML data to become machine-processable. This problem can be tackled by defining a semantic mapping between an XML schema and an ontology. Unfortunately, creating such mappings is a tedious, time-consuming, and error-prone task. To alleviate this problem, we present a solution that heuristically discovers semantic mappings between XML schemas and ontologies. The solution takes as input an initial set of simple correspondences between element attributes in an XML schema and class attributes in an ontology, and then generates a set of mapping formulas. Once such a mapping is created, it is important and necessary to maintain the consistency of the mapping when the associated XML schema and ontology evolve. In this paper, we first offer a mapping formalism to represent semantic mappings. Second, we present our heuristic mapping discovery algorithm. Third, we show through an empirical study that considerable effort can be saved when discovering complex mappings by using our prototype tool. Finally, we propose a mapping maintenance plan dealing with schema evolution. Our study provides a set of effective solutions for building sustainable semantic integration systems for XML data.

Dynamic Channel Allocation Considering the Interference Range in Multi-cell Downlink Systems (다중 셀 하향링크 시스템에서 간섭 영역을 고려한 동적 채널 할당)

  • Lee, Neung-Hyung;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.179-187
    • /
    • 2007
  • As wireless networks evolve to orthogonal frequency division multiple access(OFDMA) systems, inter-cell interference control becomes a critical issue in radio resource management. The allocation of the same channels in neighbor cells cause inter-cell interference, so the channel allocation needs to be taken carefully to lower the inter-cell interference. In distributed channel allocation, each cell independently tries to allocate channels that suffer low interference level. In this paper, under the assumption of static users, we introduce the concept of interference range and use it in designing our two algorithms; basic and combined. The basic algorithm performs interference range detection and determines whether to use the considered channel, while the combined algorithm checks the channel quality in addition to detecting the interference range. The two algorithms dynamically perform channel allocation with low complexity and show good throughput and fairness performance.

Replicative Senescence in Cellular Aging and Oxidative Stress (세포 노화에 있어서 복제 세네센스 현상과 산화적 스트레스의 영향)

  • 박영철
    • Toxicological Research
    • /
    • v.19 no.3
    • /
    • pp.161-172
    • /
    • 2003
  • Explanted mammalian cells perform a limited number of cell division in vitro and than are arrested in a state known as replicative senescence. Such cells are irreversibly blocked, mostly in the G1 phase of cell cycle, and are no longer sensitive to growth factor stimulation. Thus replicative senescence is defined as a permanent and irreversible loss of replicative potential of cells. For this characteristic, replicative senescence seems to evolve to protect mammalian organism from cancer. However, senescence also contributes to aging. It seems to decrease with age of the cell donor and, as a form of cell senescence, is thought to underlie the aging process. Extensive evidence supports the idea that progressive telomere loss contributes to the phenomenon of cell senescence. Telomeres are repetitive structures of the sequence (TTAGGG)n at the ends of linear chromosomes. It has been shown that the average length of telomere repeats in human somatic cells decreases by 30∼200 bp with each cell division. It is generally believed that when telomeres reach a critical length, a signal is activated to initiate the senescent program. This has given rise to the hypothesis that telomeres act as mitotic clocks to regulate lifespan. One proposes that cumulative oxidative stress, mainly reactive oxygen species generated from mitochondria, may mainly cause telomere shortening, accelerating aging. Here, the biological importance and mechanism of replicative senescence were briefly reviewed. Also it was summarized that how oxidative stress affects replicative senescence and telomere shortening.

Consideration of Launch and Recovery Systems for Operation of Underwater Robot from Manned Platform (유인플랫폼에서의 수중로봇 운용을 위한 진수 및 회수 체계 고찰)

  • Lee, Ki-Young
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.2
    • /
    • pp.141-149
    • /
    • 2016
  • In this technical note, the issues and challenges for the launch and recovery systems (LARS) and related techniques for the operation of an underwater robot from a manned platform are considered. Various types of LARS fitted to specific manned platforms, surface or sub-surface, are surveyed and categorized. The current UUV launch and recovery systems from surface ships and submarines utilize time consuming processes. As underwater robot technologies evolve and their roles are defined, safe and effective launch and recovery methods should be developed capable of reliable and efficient operations, particularly at a high sea state. To improve the existing underwater robot capabilities, LARS technology maturation is required in the near term, leading to the ability to incorporate autonomous LARS for an underwater robot on a manned platform. In the near term, particular emphasis should be placed on UUV LARS, which are surface ship based, with submarine based systems in the long term. Furthermore, for a dedicated LARS ship, independent of the existing host ship type, particular emphasis should be given to fully utilizing the capabilities of underwater robots.

The temperature and density distribution of molecular gas in a galaxy undergoing strong ram pressure: a case study of NGC 4402

  • Lee, Bumhyun;Chung, Aeree
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.77.2-77.2
    • /
    • 2015
  • Galaxies are known to evolve passively in the cluster environment. Indeed, much evidence for HI stripping has been found in cluster galaxies to date, which is likely to be connected to their low star formation rate. What is still puzzling however, is that the molecular gas, which is believed to be more directly related to star formation, shows no significant difference in its fraction between the cluster population and the field galaxies. Therefore, HI stripping alone does not seem to be enough to fully understand how galaxies become passive in galaxy clusters. Intriguingly, our recent high resolution CO study of a subsample of Virgo spirals which are undergoing strong ICM pressure has revealed a highly disturbed molecular gas morphology and kinematics. The morphological and kinematical peculiarities in their CO data have many properties in common with those of HI gas in the sample, indicating that strong ICM pressure in fact can have impacts on dense gas deep inside of a galaxy. This implies that it is the molecular gas conditions rather than the molecular gas stripping which is more responsible for quenching of star formation in cluster galaxies. In this study, using multi transitions of 12CO and 13CO, we investigate the density and temperature distributions of CO gas of a Virgo spiral galaxy, NGC 4402 to probe the physical and chemical properties of molecular gas and their relations to star formation activities.

  • PDF

East Asian Maritime Security: Naval Power vs. Normative Power (동아시아 해양안보 : 해군력인가 해양법인가?)

  • Koo, Min-Gyo
    • Strategy21
    • /
    • s.40
    • /
    • pp.115-130
    • /
    • 2016
  • The security environment surrounding the East Asian seas is rapidly changing due to the naval arms race among coastal states. The arms race is likely to worsen the security dilemma of the countries involved, thus increasing the chances for armed conflicts. It is too early to tell how the contemporary naval arms race in the region will evolve. But, for sure, the level of uncertainty is increasingly becoming high and intense. At the same time, there is emerging a legal warfare or lawfare among the rival countries. In particular, the United States and China have been involved in a serious debate about the nature and scope of the right of innocent passage and freedom of navigation in other countries' maritime zones. In collaboration with its regional allies, the United States has also put normative pressures on China with its excessive claims in the South China Sea. The latest arbitral tribunal case between the Philippines and China illustrates the point. With both arms race and normative competition in play, the future of East Asian maritime security will remain very complex and uncertain.

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

An Exploratory Study of Cloud Service Level Agreements - State of the Art Review

  • Saravanan, K.;Rajaram, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.843-871
    • /
    • 2015
  • Cloud computing evolve as a cost effective business model for IT companies to focus on their core business without perturbing on infrastructure related issues. Hence, major IT firms and Small & Medium Enterprises (SME) are adopting cloud services on rental basis from cloud providers. Cloud Service level agreements (SLA) act as a key liaison between consumers and providers on renting Anything as a Service (AaaS). Design of such an agreement must aim for greater profit to providers as well as assured availability of services to consumers. However in reality, cloud SLA is not satisfying the parties involved because of its inherent complex nature and issues. Also currently most of the agreements are unilateral to favour the provider. This study focuses on comprehensive, 360-degree survey on different aspects of the cloud service agreements. We detailed the life cycle of SLA based on negotiation, different types of SLA, current standards, languages & characteristics, metrics and issues involved in it. This study will help the cloud actors to understand and evaluate the agreements and to make firm decision on negotiation. The need for standardized, bilateral, semantic SLA has also been proposed.

Design of Multi-Level Abnormal Detection System Suitable for Time-Series Data (시계열 데이터에 적합한 다단계 비정상 탐지 시스템 설계)

  • Chae, Moon-Chang;Lim, Hyeok;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.1-7
    • /
    • 2016
  • As new information and communication technologies evolve, security threats are also becoming increasingly intelligent and advanced. In this paper, we analyze the time series data continuously entered through a series of periods from the network device or lightweight IoT (Internet of Things) devices by using the statistical technique and propose a system to detect abnormal behaviors of the device or abnormality based on the analysis results. The proposed system performs the first level abnormal detection by using previously entered data set, thereafter performs the second level anomaly detection according to the trust bound configured by using stored time series data based on time attribute or group attribute. Multi-level analysis is able to improve reliability and to reduce false positives as well through a variety of decision data set.

Study of the Change of Business Competence as the Evolution of Digital Ecosystem (디지털생태계의 진화와 사업역량 변화에 관한 연구)

  • Lee, Kae Soo;Yoon, Heon-Deok
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.9
    • /
    • pp.1105-1117
    • /
    • 2015
  • During the last decade, the business infrastructure has become digital with increased interconnections among products, processes, and services. Across many firms spanning different industries and sectors, digital technologies are fundanmentally transforming business stratiges, business processes, firm capabilities, productes and services, and key interfirm relationships in extended business networks. With the emergence of smartphones, the paradigm of the ICT industry is rapidly changing as the line between global and local markets are being blurred. In the changing global environment, although some game companies are accelerating the improvement of their global competitiveness and cases of successes of venture enterprises by developing biosimilar technology are being discovered, majority of ICT companies are focusing on limited marketing activities to get subcontracts or projects from large companies. Thus the aim of this study is to find out how digital ecosystems evolve and how business models and strategies have changed of individual companies according to the evolution of the digital ecosystems.