• Title/Summary/Keyword: Graph Labeling

Search Result 73, Processing Time 0.02 seconds

An Efficient RDF Query Validation for Access Authorization in Subsumption Inference (포함관계 추론에서 접근 권한에 대한 효율적 RDF 질의 유효성 검증)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.6
    • /
    • pp.422-433
    • /
    • 2009
  • As an effort to secure Semantic Web, in this paper, we introduce an RDF access authorization model based on an ontology hierarchy and an RDF triple pattern. In addition, we apply the authorization model to RDF query validation for approved access authorizations. A subscribed SPARQL or RQL query, which has RDF triple patterns, can be denied or granted according to the corresponding access authorizations which have an RDF triple pattern. In order to efficiently perform the query validation process, we first analyze some primary authorization conflict conditions under RDF subsumption inference, and then we introduce an efficient query validation algorithm using the conflict conditions and Dewey graph labeling technique. Through experiments, we also show that the proposed validation algorithm provides a reasonable validation time and when data and authorizations increase it has scalability.

Are there network differences between the ipsilateral and contralateral hemispheres of pain in patients with episodic migraine without aura?

  • Junseok Jang;Sungyeong Ryu;Dong Ah Lee;Kang Min Park
    • Annals of Clinical Neurophysiology
    • /
    • v.25 no.2
    • /
    • pp.93-102
    • /
    • 2023
  • Background: We aimed to identify any differences in the structural covariance network based on structural volume and those in the functional network based on cerebral blood flow between the ipsilateral and contralateral hemispheres of pain in patients with episodic migraine without aura. Methods: We prospectively enrolled 27 patients with migraine without aura, all of whom had unilateral migraine pain. We defined the ipsilateral hemisphere as the side of migraine pain. We measured structural volumes on three-dimensional T1-weighted images and cerebral blood flow using arterial spin labeling magnetic resonance imaging. We then analyzed the structural covariance network based on structural volume and the functional network based on cerebral blood flow using graph theory. Results: There were no significant differences in structural volume or cerebral blood flow between the ipsilateral and contralateral hemispheres. However, there were significant differences between the hemispheres in the structural covariance network and the functional network. In the structural covariance network, the betweenness centrality of the thalamus was lower in the ipsilateral hemisphere than in the contralateral hemisphere. In the functional network, the betweenness centrality of the anterior cingulate and paracingulate gyrus was lower in the ipsilateral hemisphere than in the contralateral hemisphere, while that of the opercular part of the inferior frontal gyrus was higher in the former hemisphere. Conclusions: The present findings indicate that there are significant differences in the structural covariance network and the functional network between the ipsilateral and contralateral hemispheres of pain in patients with episodic migraine without aura.

Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document (RDF 웹 문서의 부분적인 정보 은닉과 관련한 접근 권한 충돌 문제의 분석)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.49-63
    • /
    • 2008
  • RDF is the base ontology model which is used in Semantic Web defined by W3C. OWL expands the RDF base model by providing various vocabularies for defining much more ontology relationships. Recently Jain and Farkas have suggested an RDF access control model based on RDF triple. Their research point is to introduce an authorization conflict problem by RDF inference which must be considered in RDF ontology data. Due to the problem, we cannot adopt XML access control model for RDF, although RDF is represented by XML. However, Jain and Farkas did not define the authorization propagation over the RDF upper/lower ontology concepts when an RDF authorization is specified. The reason why the authorization specification should be defined clearly is that finally, the authorizatin conflict is the problem between the authorization propagation in specifying an authorization and the authorization propagation in inferencing authorizations. In this article, first we define an RDF access authorization specification based on RDF triple in detail. Next, based on the definition, we analyze the authoriztion conflict problem by RDF inference in detail. Next, we briefly introduce a method which can quickly find an authorization conflict by using graph labeling techniques. This method is especially related with the subsumption relationship based inference. Finally, we present a comparison analysis with Jain and Farkas' study, and some experimental results showing the efficiency of the suggested conflict detection method.