• Title/Summary/Keyword: Hierarchical Control Structure

Search Result 198, Processing Time 0.027 seconds

Access Control of XML Documents using Predictable Flags (예측성 플래그를 이용한 XML 문서의 접근통제 기법)

  • Son, Tae-Yong;Lee, Jong-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.3
    • /
    • pp.321-332
    • /
    • 2014
  • In this paper we propose a new notion of predictable flags type of authorization for controlling access to XML documents. By using predictable flags, we are able to efficiently detect conflicts between existing authorizations and new authorizations to be added. XML documents have an element-composition hierarchical structure in that a higher level element consists of multiple lower level sub-elements. Many XML documents systems have used the notion of implicit authorization that grants authorizations to an element and the all descendants to avoid the overhead caused by explicitly storing all authorization for each element. When we grant an authorization on an element in the XML documents, the implicit authorization method is inefficient in determining the conflicts since it needs to examine all authorizations on the descendants of that element. In contrast, our mechanism using predictable flags has the advantage of detecting the conflicts immediately at the element where an explicit authorization is to be granted.

A Study on the Design of Content Addressable and Reentrant Memory(CARM) (Content Addressable and Reentrant Memory (CARM)의 설계에 관한 연구)

  • 이준수;백인천;박상봉;박노경;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.1
    • /
    • pp.46-56
    • /
    • 1991
  • In this paper, 16word X 8bit Content Addressable and Reentrant Memory(CARM) is described. This device has 4 operation modes(read, write, match, reentrant). The read and write operation of CARM is like that of static RAM, CARM has the reentrant mode operation where the on chip garbage collection is accomplished conditionally. Thus function can be used for high speed matching unit of dynamic data flow computer. And CARM also can encode matching address sequentially according to therir priority. CARM consists of 8 blocks(CAM cell, Sequential Address Encoder(S.A.E). Reentrant operation. Read/Write control circuit, Data/Mask Register, Sense Amplifier, Encoder. Decoder). Designed DARM can be used in data flow computer, pattern, inspection, table look-up, image processing. The simulation is performed using the QUICKSIM logic simulator and Pspice circuit simulator. Having hierarchical structure, the layout was done using the 3{\;}\mu\textrm{m} n well CMOS technology of the ETRI design rule.

  • PDF

Implementation of Bi-directional Broadcasting System Using Interaction Channel (대화 채널을 이용한 양방향 방송 시스템의 구현)

  • Jeong Jong-Myeon;Choi Jin Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1002-1011
    • /
    • 2005
  • In this paper. we design and implement a bi-directional broadcasting system, so called return channel server, to allow users to participate in a broadcasting program by using a hi-directional interaction channel. To provide user participation in a program and reflect the user's opinions or responses in real time, the return channel server can be viewed as consisting of four major functional modules: a control module, network interface module, DBMS module, and real-time content authoring module. To construct a return channel server that has a service independent architecture, we designed a return channel server to include the hierarchical structure. The presented return channel server consists of two parts: an RCSAE(return channel server application environment) and RCSA(return channel server application). An RCSA is composed of an execution code and a parameter for executing the execution code. RCSA defines the procedures for providing a specific broadcasting program using the return channel server. On the other hand, an RCSAE provides the environment for the execution of RCSAS. By adopting RCSAE and RCSA, we construct the return channel server that has a service-independent architecture which are shown by the test.

Design and Performance Analysis of Exclusive-OR Based FEC Coding System for Error Resilient SVC Video Transmission (오류 강인 SVC 비디오 전송을 위한 Exclusive-OR 기반의 FEC 부호화 시스템 설계 및 성능 분석)

  • Lee, Hong-Rae;Jung, Tae-Jun;Shim, Sang-Woo;Kim, Jin-Soo;Seo, Kwang-Deok
    • Journal of Broadcast Engineering
    • /
    • v.18 no.6
    • /
    • pp.872-883
    • /
    • 2013
  • In this paper, we design and analyze performance of Exclusive-OR based FEC (Forward error correction) system to deploy SVC video transmission service over packet-loss prone IP network. In the designed system, we adopt standard compliant Exclusive-OR based FEC scheme and apply it to be appropriate to the hierarchical layer structure of SVC video. To verify the performance of the designed Exclusive-OR based FEC system for SVC video transmission, we employ NIST-NET based transport simulator. By the SVC video transmission using the NIST-NET based simulator, we confirm the error resilient transmission performance of the designed Exclusive-OR based FEC system.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

User-interface Considerations for the Main Button Layout of the Tactical Computer for Korea Army (한국군 전술컴퓨터의 인간공학적 메인버튼 설계)

  • Baek, Seung-Chang;Jung, Eui-S.;Park, Sung-Joon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.28 no.4
    • /
    • pp.147-154
    • /
    • 2009
  • The tactical computer is currently being developed and installed in armored vehicles and tanks for reinforcement. With the tactical computer, Korea Army will be able to grasp the deployment status of our forces, enemy, and obstacles under varying situations. Furthermore, it makes the exchange of command and tactical intelligence possible. Recent studies showed that the task performance is greatly affected by the user interface. The U.S. Army is now conducting user-centered evaluation tests based on C2 (Command & Control) to develop tactical intelligence machinery and tools. This study aims to classify and regroup subordinate menu functions according to the user-centered task performance for the Korea Army's tactical computer. Also, the research suggests an ergonomically sound layout and size of main touch buttons by considering human factors guidelines for button design. To achieve this goal, eight hierarchical subordinate menu functions are initially drawn through clustering analysis and then each group of menu functions was renamed. Based on the suggested menu structure, new location and size of the buttons were tested in terms of response time, number of error, and subjective preference by comparing them to existing ones. The result showed that the best performance was obtained when the number of buttons or functions was eight to conduct tactical missions. Also, the improved button size and location were suggested through the experiment. It was found in addition that the location and size of the buttons had interactions regarding the user's preference.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Deriving Criteria Weights for Acute Care Hospital Accreditation in South Korea: Using Analytic Hierarchy Process (급성기병원 인증기준의 가중치 도출: 계층적 분석법을 활용하여)

  • Hwa Yeong Oh;Hyeon-Jeong Lee;Minsu Ock;In Ho Kim;Ho Yeol Jang;Ji-Eun Choi
    • Quality Improvement in Health Care
    • /
    • v.30 no.1
    • /
    • pp.33-43
    • /
    • 2024
  • Purpose:The acute hospital accreditation program launched in South Korea has shown positive effects on safety culture and quality of care. However, relative weights have not yet been investigated for accreditation criteria with a hierarchical structure. This study aimed to derive the relative weights of acute-care hospital accreditation criteria. Methods: We conducted an online survey using the analytic hierarchy process (AHP) technique to assess the validity, importance, and urgency of acute hospital accreditation criteria. The AHP online survey link was distributed in November 2022 after obtaining informed consent from 10 experts in hospital accreditation. Results: 'Basic value system' ranked highest, while 'patient care system' ranked second in terms of validity, importance, and urgency. 'Performance management system' had the lowest validity and urgency, while 'organizational management system' carried the lowest importance. Within the 'patient care system' domain, 'surgery and anesthesia sedation management' scored highest in validity and importance, and 'patient care' scored highest in urgency. 'Care delivery system and evaluation' received the lowest scores for all three aspects. In the 'organizational management system' domain, infection control ranked highest in terms of validity, importance, and urgency. The lowest validity was observed for 'management and organizational operation' and the lowest importance and urgency were noted for 'human resource management'. Conclusion: The weights for validity, importance, and urgency, as shown in each domain and chapter, and the number of measurable elements included, are largely inconsistent. This study will contribute to the development of the structure and scientific improvement of accreditation standards.

Analysis of the Influence of Human Nature Factors, Mental Health Factors and Fatigue on Occupational Stress among Hospital Administrative Staff Using a Structural Equation Model (구조방정식모형을 이용한 병원행정직의 인성, 정신건강 및 피로가 직무스트레스에 미치는 영향 분석)

  • Bae, Sang-Yun;Kim, Seung-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.221-229
    • /
    • 2015
  • This study was performed to determine the occupational stress and its association with human nature factors, mental health factors and fatigue among some hospital administrative staff. The survey was administered to 189 staff in Jeonbuk area from June 1st to July 31th, 2014. The level of occupational stress was positively correlated with human nature, mental health and fatigue. The results of hierarchical multiple regression analysis show the following. The occupational stress of respondents turned out to be significantly higher in following groups: a group of female, a group that chance locus of control is higher, a group that external locus of control is lower, a group of the lower self-esteem, a group of higher situational fatigue, a group of higher psycho-social stress, and a group of higher depression. Their explanatory power was 60.4%. With the analysis of covariance structure, we could confirm relationship among the four factors such as human nature, mental health, fatigue and occupational stress. Also, the analysis showed that human nature factors were more influential on the occupational stress than mental health factors and fatigue.

Student-Centeredness of the Modality of Science Teaching Based on Discourse language Code (담화 언어 코드로 본 과학 수업 양태의 학생 중심성)

  • Maeng, Seung-Ho;Kim, Chan-Jong
    • Journal of The Korean Association For Science Education
    • /
    • v.29 no.1
    • /
    • pp.116-136
    • /
    • 2009
  • Since there are differences in the content, structure and functions of interpersonal communication during the practice of school science classes, it needs to articulate the difference of the modality of pedagogical practice in order to understand science teaching in detail. These characteristics of science teaching can be investigated by further insightful analysis on language in the science classroom. In this study, classroom discourse language codes using Bernstein's code theory were analyzed in the case of a middle school science class on the unit of minerals. The discourse language code was identified by the value of classification, which revealed power relations to the contexts of discourse and participants of discourse. It was also identified by the value of framing, which showed hierarchical relation between teacher and students as discourse subjects, and discursive control on the initiative of discourse. The results addressed that six types of discourse language codes were constructed and that those language codes reflected diverse modalities of science teaching from student-centered instruction to teacher-centered instruction in relation to classroom discourse. The modality of science teaching according to the transition tendencies of discourse language code showed dynamic variations of 'controlled student-centeredness inducing teaching' - 'positional student-centeredness permissive teaching' - 'controlled students' participation permissive teaching' - 'controlled student-centeredness facilitative teaching' - 'student-centeredness enhancing teaching'. In addition, results released that discursively and hierarchically weak control of discourse is necessary for enhancing student-centeredness of science teaching. Moreover, teaching practice enhancing student-centeredness can be accomplished by the harmony of a teacher's perception of discourse language code and his/her orientation to constructivist teaching and student-centered teaching.