• Title/Summary/Keyword: FileSystem

Search Result 2,288, Processing Time 0.03 seconds

Skeleton Code Generation for Transforming an XML Document with DTD using Metadata Interface (메타데이터 인터페이스를 이용한 DTD 기반 XML 문서 변환기의 골격 원시 코드 생성)

  • Choe Gui-Ja;Nam Young-Kwang
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.549-556
    • /
    • 2006
  • In this paper, we propose a system for generating skeleton programs for directly transforming an XML document to another document, whose structure is defined in the target DTD with GUI environment. With the generated code, the users can easily update or insert their own codes into the program so that they can convert the document as the way that they want and can be connected with other classes or library files. Since most of the currently available code generation systems or methods for transforming XML documents use XSLT or XQuery, it is very difficult or impossible for users to manipulate the source code for further updates or refinements. As the generated code in this paper reveals the code along the XPaths of the target DTD, the result code is quite readable. The code generating procedure is simple; once the user maps the related elements represented as trees in the GUI interface, the source document is transformed into the target document and its corresponding Java source program is generated, where DTD is given or extracted from XML documents automatically by parsing it. The mapping is classified 1:1, 1:N, and N:1, according to the structure and semantics of elements of the DTD. The functions for changing the structure of elements designated by the user are amalgamated into the metadata interface. A real world example of transforming articles written in XML file into a bibliographical XML document is shown with the transformed result and its code.

SPECTROPHOTOMETRIC ANALYSIS ON THE SEALING EFFECT OF ULTRASONIC OBTURATION OF THE ROOT CANAL (초음파(超音波) 근관충진법(根管充眞法)의 폐쇄효과(閉鎖效果)에 관(關)한 분광광도계(分光光度界) 측정(測定))

  • Kim, Yang-Lag
    • Restorative Dentistry and Endodontics
    • /
    • v.15 no.2
    • /
    • pp.46-57
    • /
    • 1990
  • The purpose of this study was to spectrophotometrically investigate the sealing effect of the ultrasonic canal obturation with softened gutta-percha utilizing an endosonic plugger by means of ultrasonic vibrations and heat. The 120 extracted human central and lateral incisors with single root were randomly selected, and the root canals were instrumented up to size #60 file by conventional method. The prepared canals were obtruated with gutta-percha by lateral condensation method, McSpadden technique and ultrasonic condensation method, with or without sealer. All specimens were immersed in 2% methylene blue in an incubator at $37^{\circ}C$ for 10 days. The teeth were then dissolved in 5ml of 60% nitric acid solution and the dye present within the root canal system was returned to solution. The leakage of dye was quantitatively measured via spectrophotometric method. The obtained data statistically evaluated usint two-way ANOVA and Student's t-test. The results were as follows : No statistically significant difference in leakage was observed between the lateral condensation method and ultrasonic condensation method, with and without sealer. When sealer was used or not, McSpadden technique showed significantly greater leakage than lateral or ultrasonic condensation method. Statistical analysis of the data indicated that the canals obturated in conjunction with sealer demonstrated less dye leakage than the canals obturated without sealer(p<0.01), except McSpadden technique. The ultrasonic condensation method appeared comparable sealing ability to the lateral condensation method.

  • PDF

Urban Flood Simulation Considering Buildings Resistance Coefficient Based on GIS: Focused on Samcheok City (건물 저항계수에 따른 GIS기반의 밀집 시가지 침수모의 -삼척시가지를 중심으로-)

  • Ji, Juong-Hwan;Kang, Sang-Hyeok
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.2
    • /
    • pp.211-220
    • /
    • 2010
  • The objective of this paper presents the application of an "integrated urban flood modeling-runoff model, urban flood model and sewer system model-" in a highly urbanized area of Samcheok where is seriously inundated in 2002 and 2003. For this, we demonstrate how couple a 1-D hydrodynamic model of the river, a 2-D hydrodynamic model of the overland (surface) flow, and a sewer network model including each boundary conditions. In order to make data file for the model, topographic information like elevation and share rate of buildings are directly extracted from DEM or topographical source data without data exchange to avoid uncertainty errors. Furthermore, the research is to assess the impacts of Manning n and buildings influences to inundated depth by changing its share ratio from 10 % to 30 % in low-land urban area. As a results, we found out that the urban inundated depth was decreased by Manning n but increased by buildings ratio. The calculated results of inundation was similar with observed one in 2002 and 2003 flooding. Furthermore, the area was also inundated under not riverbank break case in 2002 flooding.

Study on the Korean Public Libraries under the period of the Japanese Rule (일제하의 공공도서관에 관한 연구)

  • Kim Po Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.6
    • /
    • pp.137-163
    • /
    • 1979
  • The Purpose of this study is analyzed that (l) How the public Libraries under the Japanese Rule since the end of the Yi-Dynasty were recepted and generated by the people and (2) How they were organiged and managed. (3) Also it examined that how they affected the development of the libraries of today. 1. The following are the analyzed results: Three types of the public Libraries under the Japanese Rule for a period of 36 years engaged busily in colonization were Private's Public Libraries, Local Self-Government's Libraries and the Central Governmental Libraries, and were in order established. 2. They were eatablished by individuals, Confucian School Foundation, Young Men's Clubs, School Associations, Korean brethren residing abroad, or The Press Centering around the Local Self-Governments and the Japanese Government-General. 3. In 1932 of the period of the Japanese Rule, the number of Libraies gained the summit and reached 80 Libraries. The Public Libraries including the Central Governmental Libraries remained in existence until the end of the War had been kept up the functions of the Libraries, but the Private Libraries operated by the Koreans were very small and poor. As a result, most of them were closed up and some Libraries transferred their controls to the public. Until the end of the war, only a little over 10 Private Libraries were Kept up. From the aspects of it's organization system, the most of their libraries replaced their chief librarians with non-professional county-headmen or Local supporters. From the aspect of collections, they wate mainly consists of Japanese books for the proper quidance of the public thought based on the ideology of Japanese Rule to Korea and on the industrial promotion rather than books about Koreanology or Western books. At that time, the Library users were with the jobless men and students as the central figures. And the next ranking by the social position of readers was children, farmers, merchants, industrialists, public servants, miscellaneous and educators. Their reading tendencies laid stress on linguistics and literature, physical sciences and medicine, While the reading trend of military sciences and medicine, while the reading trend of military sciences and engineering were very inactive. This was because the Japanese Government-General had not kept the military collections on file. Besides, they were reluctant to make Korean's learn the professional knowledge and so the main reference materials of technology not provited. Most of the Libraries put practiced in circulation services were very important circulation in withinder of the reading room rather than in outside of the Library building. On the other hand, their circulation services has above came with many limitations. As stated above, the public Libraries' managements and activitives under the period of Japanese Rule were the way and means to achive the colonial and imperialistic purpose of the Japanese Empire.

  • PDF

Code Generation for Integrity Constraint Check in Objectivity/C++ (Objectivity/C++에서 무결성 제약조건 확인을 위한 코드 생성)

  • Kim, In-Tae;Kim, Gi-Chang;Yu, Sang-Bong;Cha, Sang-Gyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.416-425
    • /
    • 1999
  • 복잡한 무결성 제약 조건을 효율적으로 확인하기 위해 제약 조건들을 룰 베이스(rule base)에 저장하고 별도의 룰 관리 시스템과 제약 조건 관리 시스템을 통해 제약 조건을 확인하는 기법이 많은 연구자들에 의해 연구되고 발표되었다. 그러나 제약 조건 관리 시스템이 실행시간에 응용 프로그램을 항상 모니터링하고 있다가 데이타의 수정이 요청될 때마다 개입하여 프로세스를 중단시키고 관련 제약 조건을 확인하는 기존의 방법들은 처리 시간의 지연을 피할 수 없다. 본 논문은 컴파일 시간에 제약 조건 확인 코드를 응용 프로그램에 미리 삽입할 것을 제안한다. 응용 프로그램 자체 내에 제약 조건 확인 코드가 삽입되기 때문에 실행 시간에 다른 시스템의 제어를 받지 않고 직접 제약 조건의 확인 및 데이타베이스의 접근이 가능해져서 처리 시간의 지연을 피할 수 있을 것이다. 이를 위해 어떤 구문이 제약 조건의 확인을 유발하는 지를 추적하였고, 컴파일러가 그러한 구문을 어떻게 전처리 과정에서 검색하는지 그리고 그러한 구문마다 어떻게 해당 제약 조건 확인 코드를 삽입할 수 있는 지를 객체지향1) 데이타베이스 언어인 Objectivity/C++에 대해 gcc의 YACC 코드를 변경함으로써 보여 주었다.Abstract To cope with the complexity of handling integrity constraints, numerous researchers have suggested to use a rule-based system, where integrity constraints are expressed as rules and stored in a rule base. A rule manager and an integrity constraint manager cooperate to check the integrity constraints efficiently. In this approach, however, the integrity constraint manager has to monitor the activity of an application program constantly to catch any database operation. For each database operation, it has to check relevant rules with the help of the rule manager, resulting in considerable delays in database access. We propose to insert the constraints checking code in the application program directly at compile time. With constraints checking code inserted, the application program can check integrity constraints by itself without the intervention of the integrity constraint manager. We investigate what kind of statements require the checking of constraints, show how the compiler can detect those statements, and show how constraints checking code can be inserted into the program, by modifying the GCC YACC file for Objectivity/C++, an object-oriented database programming language.

An Action Information Management Method for Creating Adaptive NPC (적응형 NPC를 생성하는 행동 정보 관리 기법)

  • Kim, Na-Ra;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.8 no.1
    • /
    • pp.103-113
    • /
    • 2008
  • Although people have had more opportunities to enjoy various types of game, most of players have felt less satisfaction with the games. This is the reason that since most Non-player Characters (NPCs) are simple and uniform, they have some limitations for competing with a variety of players. Thus, technologies for creating intelligent NPCs that can compete with each player at a similar level are required. In this paper, we present an action information management method for creating adaptive NPCs based on the algorithm for calculating their action efficiency. This algorithm is useful to the adaptation method for saving and controlling player-appropriate action. In our method, adaptive NPCs observe the actions of players and collect the relationship data between status and action. The efficiency value of the action data is calculated and data of similar status are grouped, and finally stored at the action database. The game system of NPC updates the action database and stores diverse actions. Then, NPC selects action with high efficiency value. We have tested our algorithm on an action game. A random test subject performed a one-on-one game against an adaptive NPC in real-time. As a result, the action dispositions of both the subject and NPC are analyzed in a log file to determine whether or not the disposition of the subject is similar to that of the NPC. The statistics of the diverse test results shows that NPCs become adaptive to players with error rate within less than 6%.

  • PDF

Determination of Baicalin and Baicalein Contents in Scutellaria baicalensis by NIRS (근적외선분광분석기를 이용한 황금(Scutellaria baicalensis)의 baicalin 및 baicalein 함량 분석)

  • Kim, Hyo-Jae;Kim, Se-Young;Lee, Young-Sang;Kim, Yong-Ho
    • Korean Journal of Plant Resources
    • /
    • v.27 no.4
    • /
    • pp.286-292
    • /
    • 2014
  • Near infrared reflectance spectroscopy (NIRS) is a rapid and accurate analytical method for determining the composition of agricultural products and feeds. This study was conducted to measure baicalin, baicalein, and wogonin contents in Scutellaria baicalensis by using NIRS system. Total 63 samples previously were analyzed by HPLC, which showed baicalin, baicalein, and wogonin contents ranging 4.56 to 13.59%, 0.28 to 5.54%, and 0.50 to 1.63% with an average of 9.66%, 2.09% and 0.52%, respectively. Each sample was scanned by NIRS and calculated for calibration and validation equation. A calibration equation calculated by modified partial least squares(MPLS) regression technique was developed in which the coefficient of determination for baicalin, baicalein, and wogonin content was 0.958, 0.944, and 0.709, respectively. Each calibration equation was applied to validation set that was performed with the remaining samples not included in the calibration set, which showed high positive correlation both in baicalin and baicalein content file. In case of wogonin, the prediction model was needed more accuracy because of low $R^2$ value in validation set. These results demonstrate that the developed NIRS equation can be practically used as a rapid screening method for quantification of baicalin and baicalein contents in Scutellaria baicalensis.

An APK Overwrite Scheme for Preventing Modification of Android Applications (안드로이드 앱 변조 방지를 위한 APK 덮어쓰기 기법)

  • Choi, Byungha;Shim, HyungJoon;Lee, ChanHee;Cho, Sangwook;Cho, Seong-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.309-316
    • /
    • 2014
  • It is easy to reverse engineer an Android app package file(APK) and get its decompiled source code. Therefore, attackers obtains economic benefits by illegally using the decompiled source code, or modifies an app by inserting malware. To address these problems in Android, we propose an APK overwrite scheme that protects apps against illegal modification of themselves by using a new anti-reverse engineering technique. In this paper, the targets are the apps which have been written by any programmer. For a target app (original app), server system (1) makes a copy of a target app, (2) encrypts the target app, (3) creates a stub app by replacing the DEX (Dalvik Executable) of the copied version with our stub DEX, and then (4) distributes the stub app as well as the encrypted target app to users of smartphones. The users downloads both the encrypted target app and the corresponding stub app. Whenever the stub app is executed on smartphones, the stub app and our launcher app decrypt the encrypted target app, overwrite the stub app with the decrypted target one, and executes the decrypted one. Every time the target app ends its execution, the decrypted app is deleted. To verify the feasibility of the proposed scheme, experimentation with several popular apps are carried out. The results of the experiment demonstrate that our scheme is effective for preventing reverse engineering and tampering of Android apps.

The Role of Geographic Information System and Its Functional Intergration Strategy in the Conventional Transportation Planning Process (전통교통계획과정에 있어서 GIS의 역할 및 기능적 통합방안에 관한 연구)

  • Choi, Kee-Choo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.1 no.1 s.1
    • /
    • pp.127-140
    • /
    • 1993
  • The purpose of this paper is to examine the possible benefits of combining transportation planning models with geographic information systems (GIS) in the hope that intergrating these systems can alleviate the inherent problems of transportation planning models such as user unfriendliness, labor intensiveness, and theoretical limitations. Specially, this paper focuses on the issue of incompatiblity between GIS and the conventional transportation planning models in dealing with network topologies. Resolving this conflict in topologies is a conerstone for eliminating the user-unfriendliness and labor-intensiveness issues. This paper presents the development of an algorithm that converts GIS topology into transportation network topology. The FORTRAN-based topology conversion algorithm generates transportation networks from the GIS cartographic file and establishes a communication charmel between the two systems.

  • PDF

COMPARISON OF APICAL SEALING EFFICACIES USING DIFFERENT PLUGGING DEPTH IN CONTINUOUS WAVE OF OBTURATION TECHNIQUE (Continuous wave of obturation technique에서 플러거의 다양한 적용 깊이에 따른 근단부 폐쇄효율 비교)

  • Lee, Sang-Jin;Park, Jeong-Kil;Hur, Bock;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.32 no.6
    • /
    • pp.491-497
    • /
    • 2007
  • The purpose of this study was to compare apical sealing ability of continuous wave canal filling technique according to various heat source plugging depths. Eighty one extracted human premolars with straight root were cleaned and shaped to size 35 using .06 taper rotary NiTi file. After cleansing and shaping, the teeth were divided into 5 groups following the heat source probing depths from the apex; 3, 4, 5, 6 and 7 mm. All specimens were filled using E&Q plus with #35/.06 tapered gutta-percha cone. The positive control teeth were not filled. All teeth were coated with nail varnish except the apical 1 mm around the apical foramen. Negative control teeth were completely sealed include the apical foramen. All specimens were immersed in 1% methylene blue solution for 72 hours. Then the specimens were sectioned horizontally at 1, 2 and 3 mm from the root apex. Each sectioned surface was photographed using a digital camera attached to the stereomicroscope at $12.5{\times}2.5$ fold magnification. All points at 1, 2 and 3 mm were summed as final score of one specimen. Statistical analysis of the collected data was performed. Under the condition of this study. there was no significant difference between the heat source plugging depths of 3, 4, 5, 6 and 7 mm in apical sealing ability. All of apical heat source plugging depth from 3 to 7 mm including Buchanan's protocol -from 5 to 7 mm- seems to be acceptable in clinical application.