• Title/Summary/Keyword: Hierarchical Order

Search Result 1,220, Processing Time 0.025 seconds

Hierarchical Specification and Verification of Requirements using An Object-Oriented Petri Net (객체지향 페트리 넷을 이용한 계층적인 요구사항의 명세 및 검증)

  • Hong, Jang-Eui;Yoon, Il-Cheol;Bae, Doo-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.157-167
    • /
    • 2000
  • As the requirements of a software system become large and complex, it causes some problems such that requirements specification using formal methods becomes larger in its size and less understandable. In order to solve such problems, the concepts of modularity and object are adopted to specify the requirements. In addition, top-down and compositional approach to handle such requirements are also adopted. In our paper, we suggest an object-oriented Petri net, called HOONet, to hierarchically specify and verify the complex requirements by incorporating the concepts of modularity, object, abstraction and refinement into a formal method. Our HOONet method supports the incremental specification and verification of partially described or not yet fully analyzed requirements. We also show the applicability of our method by modeling and verifying the requirements of a reactor safety control system.

  • PDF

Improvement of Energy Efficiency of LEACH Protocol for Wireless Sensor Networks (무선센서 네트워크를 위한 LEACH 프로토콜의 에너지 효율 향상 방안)

  • Lee, Sang-Hoon;Suk, Jung-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2B
    • /
    • pp.76-81
    • /
    • 2008
  • LEACH (Low Energy Adaptive Clustering Hierarchy) has been proposed as a routing protocol with a hierarchical structure, in order to achieve the energy efficiency that is of primary importance in the wireless sensor networks. A wireless sensor network adopting LEACH is composed of a few clusters, each of which consists of member nodes that sense the data, and head nodes that deliver the collected data from member nodes to a sink node that is connected to a backbone network. A head node in a cluster allocates TDMA slots to its member nodes without taking into account whether they have data to transmit or not, thus resulting in inefficiency of energy usage of head node that remains in active mode during the entire round time. This motivates us to propose a scheme to improve the energy efficiency of LEACH, by assigning TDMA slots only to those member nodes who have data to send. As a result, the head node can remain sleep during the period of no data transmission from member nodes, leading to the substantial energy saving. By using the ns-2 simulator, we evaluate the performance of the proposed scheme in comparison with the original LEACH. Experimental results validate our scheme, showing a better performance than original LEACH in terms of the number of outliving nodes and the quantity of energy consumption as time evolves.

A Study for Implementation of HMIPv6 in all-IP WDM-PON (All-IP WDM-PON 액세스 네트워크에서 HMIP 실현 연구)

  • Lee, Sung-Keun;Lim, Tae-Hyong;Seo, Kyung-Rin;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.243-252
    • /
    • 2008
  • In this paper, we propose the next-generation broadband wireless access network architecture, which is based on the wavelength division multiplexing-passive optical network(WDM-PON), and efficient mobility management scheme to support quality-of-service(QoS) of multimedia services in the next-generation wireless network. By adapting WDM-PON technology to wireless access network, the proposed scheme can realize broadband wireless access network. In addition, We utilize newly proposed local channels between optical network units(ONUs) or subnets in order to support the fast and efficient local data and handoff data transmission. We evaluate the performance of the proposed scheme in terms of handoff delay and packet loss thru computer simulation. Thru various computer simulation results, we verified the superior performance of the proposed scheme by comparing with the results of other schemes.

New Scheme for Smoker Detection (흡연자 검출을 위한 새로운 방법)

  • Lee, Jong-seok;Lee, Hyun-jae;Lee, Dong-kyu;Oh, Seoung-jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1120-1131
    • /
    • 2016
  • In this paper, we propose a smoker recognition algorithm, detecting smokers in a video sequence in order to prevent fire accidents. We use description-based method in hierarchical approaches to recognize smoker's activity, the algorithm consists of background subtraction, object detection, event search, event judgement. Background subtraction generates slow-motion and fast-motion foreground image from input image using Gaussian mixture model with two different learning-rate. Then, it extracts object locations in the slow-motion image using chain-rule based contour detection. For each object, face is detected by using Haar-like feature and smoke is detected by reflecting frequency and direction of smoke in fast-motion foreground. Hand movements are detected by motion estimation. The algorithm examines the features in a certain interval and infers that whether the object is a smoker. It robustly can detect a smoker among different objects while achieving real-time performance.

Automated Classification Scheme Generation using Product Attribute Information (상품 속성정보를 이용한 분류체계 자동생성)

  • Jang, Du-Seok;Chun, Jong-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.14D no.5
    • /
    • pp.491-500
    • /
    • 2007
  • In order to classify and manage on-line trading goods, the product classification scheme must be maintained. In most systems for handling product information, the classification scheme is managed manually by experts, which in general incurs a lot of time and cost. Effective management of classification system becomes more important as rapid development of industry expedites diversity and convergence of goods and services. There have been many researches on developing classification scheme, and continuing in this line of research, this paper proposes a new method for automatic generation of product classification scheme. Our main idea starts from the concept that a product is a set of attributes, and we propose a novel algorithm for automatically creating hierarchical classification scheme by utilizing inclusive relationships between products. We then prove the effectiveness of proposed algorithm by conducting an experiment.

Blockchain-Based Access Control Audit System for Next Generation Learning Management (차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템)

  • Chun, Ji Young;Noh, Geontae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.351-356
    • /
    • 2020
  • With the spread of COVID-19 infections, the need for next-generation learning management system for undact education is rapidly increasing, and the Ministry of Education is planning future education through the establishment of fourth-generation NEIS. If the fourth-generation NEIS System is well utilized, there are advantages such as providing personalized education services and activating the use of educational data, but a solution to the illegal access problem in an access control environment where strict authorization is difficult due to various user rights. In this paper, we propose a blockchain-based access control audit system for next-generation learning management. Sensitive personal information is encrypted and stored using the proposed system, and when the auditor performs an audit later, a secret key for decryption is issued to ensure auditing. In addition, in order to prevent modification and deletion of stored log information, log information was stored in the blockchain to ensure stability. In this paper, a hierarchical ID-based encryption and a private blockchain are used so that higher-level institutions such as the Ministry of Education can hierarchically manage the access rights of each institution.

Database Interface System with Dialog (대화를 통한 데이타베이스 인터페이스 시스템)

  • Woo, Yo-Seop;Kang, Seok-Hoon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.417-428
    • /
    • 1996
  • In this paper, a database interface system with natural language dialogue is designed and implemented. The system is made up of language analysis, context processing, dialogue processing and DB processing unit. The method for classifying and processing an undefined word in language analysis is proposed. It reduces the dictionary size, which gives difficulties in DB Interface. And the current DB Interfaces dealt with an input utterance independently. But the system in this paper provides a user with the interface environment in which he or she can have a continuous conversation with the system and retrieve DB information. Thus in this paper, speech acts which include user's inattentions well as propositional contents are defined, and user action hierarchical model for library DB retrieval is constructed. And the system uses the defined knowledge to recognize-user's plan, effectively understanding and managing the ongoing dialogue. And the system is implemented in the domain of library database in order to prove the proposed methods in this paper.

  • PDF

Superhydrophobic nano-hair mimicking for water strider leg using CF4 plasma treatment on the 2-D and 3-D PTFE patterned surfaces

  • Shin, Bong-Su;Moon, Myoung-Woon;Kim, Ho-Young;Lee, Kwang-Ryeol
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.365-365
    • /
    • 2010
  • Similar to the superhydrophobic surfaces of lotus leaf, water strider leg is attributed to hierarchical structure of micro pillar and nano-hair coated with low surface energy materials, by which water strider can run and even jump on the water surface. In order to mimick its leg, many effort, especially, on the fabrication of nanohairs has been made using several methods such as a capillarity-driven molding and lithography using poly(urethane acrylate)(PUA). However most of those effort was not so effective to create the similar structure due to its difficulty in the fabrication of nanoscale hairy structures with hydrophobic surface. In this study, we have selected a low surface energy polymeric material of polytetrafluoroethylene (PTFE, or Teflon) assisted with surface modification of CF4 plasma treatment followed by hydrophobic surface coating with pre-cursor of hexamethyldisiloxane (HMDSO) using a plasma enhanced chemical vapor deposition (PE-CVD). It was found that the plasma energy and duration of CF4 treatment on PTFE polymer could control the aspect ratio of nano-hairy structure, which varying with high aspect ratio of more than 20 to 1, or height of over 1000nm but width of 50nm in average. The water contact angle on pristine PTFE surface was measured as approximately $115^{\circ}$. With nanostructures by CF4 plasma treatment and hydrophobic coating of HMDSO film, we made a superhydrophobic nano-hair structure with the wetting angle of over $160^{\circ}C$. This novel fabrication method of nanohairy structures has been applied not only on 2-D flat substrate but also on 3-D substrates like wire and cylinder, which is similarly mimicked the water strider's leg.

  • PDF

Materialized XML View XML View File Update according to the Deletion of Relational Databases (실체화된 XML 뷰 관계형 데이터베이스의 삭제에 따른 XML 뷰 파일의 갱신)

  • Gim, Mi-Su;Ra, Young-Gook
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.99-116
    • /
    • 2009
  • For the mapping of two dimensional table structures of relational databases to the hierarchical XML documents, we apply the foreign key relationships of relational databases. In other words, the primary key of another table referenced by a foreign key of one tuple is mapped to the parent of the foreign key. Then XML hierarchies with order are expressed. In addition, the XML view file generated by the foreign key mappings shows side effects in the case of the relational database update for the satisfaction of referential integrity constraint in the foreign key. Thus, by inferring the foreign key roles at the generation of XML hierarchies, we can anticipate where the side effects occur in the hierarchies. We keep the XML view files up-to-date by reflecting the side effects to the XML files at the update of the underlying relational databases.

  • PDF

Determinants of North Korean Refugees' Trust in South Korea Health Service (북한이탈주민의 한국의료서비스 신뢰에 대한 결정요인)

  • Um, Tae-Rim;Min, Ha-Ju;Lee, Tae-Ho;Lee, Eun-Joo;Jin, Ki-Nam
    • Health Policy and Management
    • /
    • v.28 no.1
    • /
    • pp.70-76
    • /
    • 2018
  • Background: The purpose of this study was to investigate the determinants of North Korean refugees' trust in South Korea health service. Methods: This study surveyed 168 North Korean refugees aged 19 and over living in Seoul, Gyeonggi, Incheon, and Gangwon. The collected data were analyzed by frequency analysis, t-test, analysis of variance, and hierarchical regression analysis to analyze the effect on the trust of refugees. Results: The difference analysis showed statistically significant difference according to duration of residence and employment status. The determinants of North Korean refugees' trust in South Korea health services were duration of residence, basic communication skills, health communication skills, and experience of health service. Conclusion: In order to increase the trust of North Korean defectors in South Korea medical services, it is necessary to resolve communication problems and improve the satisfaction of health services. For this, the interpreter service should be activated. And specific education should be given to the North Korean refugees about the health care system and the utilization methods of health service in Korea.