• Title/Summary/Keyword: Inheritance Hierarchy

Search Result 49, Processing Time 0.023 seconds

Large Scale Manufacturing System Modeling Tools Based on Object-oriented

  • Lee, Yang-Kyu;Park, Sung-Joo
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.769-781
    • /
    • 1999
  • Manufacturing systems are usually large, complex, and concurrent in nature that makes it difficult to model and simulate the behavior in advance. The paper proposes an approach, called OPNets, for modeling and validating manufacturing systems. The approach is based on object-oriented high-level Petri nets in which modeling components of Petri net are constructed into object hierarchy. The objects communicate with each other by passing messages. To enhance the reusability and maintainability, a system are developed by object hierarchy. Inheritance among object hierarchy is also supported in OPNets. The modeling scheme of OPNets tries to resolve the complexity problems of Petri net.

  • PDF

A Study on the Living Environment Organization System in Traditional Village - In the case of the Sugok-dong in the Imha Dam Flooded Area - (전통마을 생활환경 구성체계와 주생활 특성에 관한 연구 - 임하댐 수몰지역의 수곡동을 대상으로 -)

  • 정준현
    • Journal of the Korean housing association
    • /
    • v.1 no.1
    • /
    • pp.65-76
    • /
    • 1990
  • Sugok Villiage. of the prospective flooded villiages for building Im Ha Dam, is selected as the studied place. Primarily, the purpose of this study is invested, recerded about traditional living environment, and then searched to find out possibilites on the context of the inheritance of analyzing about life contents and space. The result of this study are as follows:1) In composition of living environment, thinking view on confucianism and living view on folk beliefs are considered as important element2) Hierarchy of life environment is appeared of above and below space.(focused on JONG KA) and inner and outer space(boarded on pine forest) on the other hand according to living territory life environment can be divided into five territories.3) Confucian ideas, social status, folk beliefs and economics has been affected about formation of individual life. Accordingly, I believe that true inheritance of traditional culture was, through preserving mental contents as well as physical contents, possible.

  • PDF

Extended GTRBAC Model for Access Control Enforcement in Ubiquitous Environments (유비쿼티스 환경의 접근제어를 위한 확장된 GTRBAC 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.45-54
    • /
    • 2005
  • The existing access control models have the demerits that do not provide the limit function of using resources by time constraint, the restricted inheritance function as a superior role in role hierarchy, the delicate delegation policy and the limit function of using resources by the location information about a user for the access control in ubiquitous environment. This paper proposes an Extended-GTRBAC model is suited to the access control in ubiquitous environment by applying to sub-role concept of GTRBAC model that the application of resources can be restricted by the period and time and PBDM and considering the location information about a user on temporal constraint. The proposal model can restrict the inheritance of permission in role hierarchy by using sub-role, provide the delicate delegation policy such as user-to-user delegation, role to role delegation, multi-level delegation. multi-step delegation, and apply diverse and delicate access control policy which is suited the characteristic of ubiquitous environment by considering the location information about a user on temporal constraint.

  • PDF

The Object-Oriented Class Hierarchy Structure Design Method using the Rapid Prototyping Techniques (래피드 프로토토입핑 기법을 사용한 객체 지향 클래스 계층 구조 설계 방법)

  • Heo, Kwae-Bum;Choi, Young-Eun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.86-96
    • /
    • 1998
  • The class hierarchy structure in an object-oriented design model is effective to the software reusabilily and lhe design of complex syslem. This paper suggests lhe objecl-orienled class hierarchy structure design melhod using lhe rapid prololyping lechniques. In this method, relationship recognition and similarity are estimated by the new class classification in object modeling level. Then lhe estimation of aUribute and method in class is needed. Each design module such as class hierarchy struclure which is generaled wilh inleractive and repealed work consisls of reference relationship, inheritance relationship and composite relationship. These information are slored in lhe table to maintenance lhe program and implementation, the class relationship is represented with graph and the node class is iconized. This method is effective in reslructuring of class hierarchy are reusing of design information, because of addition of new class and deletion with ease. The efficiency of syslem analysis, design and implementation is enhanced by converting into prololype system and real system.

  • PDF

Permission Inheritance Expression with Role Hierarchy of RBAC (역할기반 접근통제에서 역할 계층에 따른 접근권한 상속의 표현)

  • Lee, Sang-Ha;Jo, In-Jun;Cheon, Eun-Hong;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2125-2134
    • /
    • 2000
  • RBAC(Role Based Access Control) has the advantage that reflects the real world because it presents a basic access control model based on user's role in organizations or governments. But in RBAC model, the privileges of the senior roles in these hierarchies are inherited from those of the junior roles, so RBAC model has the privileges problem that he senior are given more privileges than they need. That is, it tends to infringe the Principle of Least Privilege. On the other hand, if we give some excessive constraints on the RBAC model without scrupulous care, it may be meaningless property of role hierarchies. Furthermore, such complicated constraints make it more difficult to mange resources and roles in huge enterprise environments. The purpose of this paper is to solve the problems of role hierarchies such as inefficient role managements and abuse of privileges by using newly presented the backward tag pointer path expression in the inheritance of privileges.

  • PDF

Clustering Characteristics and Class Hierarchy Generation in Object-Oriented Development (객체지향개발에서의 속성 클러스터링과 클래스 계층구조생성)

  • Lee Gun Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1443-1450
    • /
    • 2004
  • The clustering characteristics for a number of classes, and defining the inheritance relations between the classes is a difficult and complex problem in an early stage of object oriented software development. We discuss a traditional iterative approach for the reuse of the existing classes in a library and an integrated approach to creating a number of new classes presented in this study. This paper formulates a character-istic clustering problem for zero-one integer programming and presents a network solution method with illustrative examples and the basic rules to define the inheritance relations between the classes. The network solution method for a characteristic clustering problem is based on a distance parameter between every pair of objects with characteristics. We apply the approach to a real problem taken from industry.

Genetical and Physiological Mechanisms of Adult Diapause in Insects

  • Kim, Yong-Gyun
    • Korean journal of applied entomology
    • /
    • v.34 no.1
    • /
    • pp.20-32
    • /
    • 1995
  • Adult diapause in insects is characterized by suppression of reproductive development. It is induced by environmental cues such as photoperiod, temperature, food availability, and other conditions Diapause-inducing environment is recognized and analyzed by the brain of the insects. The interpreted information is conveyed via endocrine system to target tissues such as ovaries, fat body, and other tissues. From this signal hierarchy of a brain-endocrine-target tissue axis, several factors are involved to express a diapause trait in a quantitative mode, even though the insects show a binomial phenotye between being in diapause or not. Recent works estimated that the number of the factors is relatively small by a series of crossing trials between high and low diapause lines. Heritability of the diapause is quite high (ca. 70%) in some species. Epistasis, sex-linkage, pleiotropism, and other nongenetic components also affect diapause inheritance. Most physiological studies have been focused on control mechanisms of the juvenile hormone (JH) synthesis in corpora allata (CA) because JH level in hemolymph of teneral adults is critical to decide a later developmental mode. Allatostatin, an antagonizer of JH synthesis, has been believed to be a potent brain message to CA for adult diapause induction.

  • PDF

A Study on Data Modeling Techniques for Control Requirements of SPICE Reference Model (SPICE 참조모델 요구사항을 지원하는 데이터 모델링 기법에 관한 연구)

  • Chung Kyu-Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.1-6
    • /
    • 2004
  • there needs a new Geographic information system development Technology of the abstraction, encapsulation, modulation and hierarchy using Graphic representation of object modeling Technique. The method is based on composite object of Graphic data with the hierarchy concepts and abstraction of Graphic information in order to improve data abstraction of the graphic data file and described concept of multiple inheritance and classification that supports a wide variety of graphic class such as mesh unit, layer. segment and so on. in simple case of software development using SPICE model and object modeling techniques. this thesis suggested object representation of Graphic data which can reduce software development life cycle and the cost of software maintenance.

  • PDF

Role Graph Security Management Model based on Lattice (격자기반 역할그래프 보안 관리 모델)

  • Choi, Eun-Bok;Park, Ju-Gi;Kim, Jae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.109-121
    • /
    • 2006
  • In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.

  • PDF

A Study of the Interface between Korean Sentence Parsing and Lexical Information (한국어 문장분석과 어휘정보의 연결에 관한 연구)

  • 최병진
    • Language and Information
    • /
    • v.4 no.2
    • /
    • pp.55-68
    • /
    • 2000
  • The efficiency and stability of an NLP system depends crucially on how is lexicon is orga- nized . Then lexicon ought to encode linguistic generalizations and exceptions thereof. Nowadays many computational linguists tend to construct such lexical information in an inheritance hierarchy DATR is good for this purpose In this research I will construct a DATR-lexicon in order to parse sentences in Korean using QPATR is implemented on the basis of a unification based grammar developed in Dusseldorf. In this paper I want to show the interface between a syntactic parser(QPATR) and DTAR-formalism representing lexical information. The QPATR parse can extract the lexical information from the DATR lexicon which is organised hierarchically.

  • PDF