• Title/Summary/Keyword: Issue-Tree

Search Result 175, Processing Time 0.024 seconds

A Change Detection Technique Supporting Nested Blank Nodes of RDF Documents (내포된 공노드를 포함하는 RDF 문서의 변경 탐지 기법)

  • Lee, Dong-Hee;Im, Dong-Hyuk;Kim, Hyoung-Joo
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.518-527
    • /
    • 2007
  • It is an important issue to find out the difference between RDF documents, because RDF documents are changed frequently. When RDF documents contain blank nodes, we need a matching technique for blank nodes in the change detection. Blank nodes have a nested form and they are used in most RDF documents. A RDF document can be modeled as a graph and it will contain many subtrees. We can consider a change detection problem as a minimum cost tree matching problem. In this paper, we propose a change detection technique for RDF documents using the labeling scheme for blank nodes. We also propose a method for improving the efficiency of general triple matching, which used predicate grouping and partitioning. In experiments, we showed that our approach was more accurate and faster than the previous approaches.

An Energy Effective Protocol for Clustering Ad Hoc Network

  • Lee, Kang-Whan;Chen, Yun
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.117-121
    • /
    • 2008
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Therefore, the energy consumption is important in the routing design, otherwise cluster schemes are efficient in energy conserving. For the above reasons, an Energy conserving Context aware Clustering algorithm (ECC) is proposed to establish the network clustering structure, and a routing algorithm is introduced to choose the Optimal Energy Routing Protocol (OERP) path in this paper. Because in ad hoc network, the topology, nodes residual energy and energy consuming rate are dynamic changing. The network system should react continuously and rapidly to the changing conditions, and make corresponding action according different conditions. So we use the context aware computing to actualize the cluster head node, the routing path choosing. In this paper, we consider a novel routing protocol using the cluster schemes to find the optimal energy routing path based on a special topology structure of Resilient Ontology Multicasting Routing Protocol (RODMRP). The RODMRP is one of the hierarchical ad hoc network structure which combines the advantage of the tree based and the mesh based network. This scheme divides the nodes in different level found on the node energy condition, and the clustering is established based on the levels. This protocol considered the residual energy of the nodes and the total consuming energy ratio on the routing path to get the energy efficiently routing. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission. Also, by using the context aware computing, according to the condition and the rules defined, the sensor nodes could adjust their behaviors correspondingly to improve the network routing.

Parallel Spatial Join Method Using Efficient Spatial Relation Partition In Distributed Spatial Database Systems (분산 공간 DBMS에서의 효율적인 공간 릴레이션 분할 기법을 이용한 병렬 공간 죠인 기법)

  • Ko, Ju-Il;Lee, Hwan-Jae;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.4 no.1 s.7
    • /
    • pp.39-46
    • /
    • 2002
  • In distributed spatial database systems, users nay issue a query that joins two relations stored at different sites. The sheer volume and complexity of spatial data bring out expensive CPU and I/O costs during the spatial join processing. This paper shows a new spatial join method which joins two spatial relation in a parallel way. Firstly, the initial join operation is divided into two distinct ones by partitioning one of two participating relations based on the region. This two join operations are assigned to each sites and executed simultaneously. Finally, each intermediate result sets from the two join operations are merged to an ultimate result set. This method reduces the number of spatial objects participating in the spatial operations. It also reduces the scope and the number of scanning spatial indices. And it does not materialize the temporary results by implementing the join algebra operators using the iterator. The performance test shows that this join method can lead to efficient use in terms of buffer and disk by narrowing down the joining region and decreasing the number of spatial objects.

  • PDF

A Study for Removing Road Shields from Mobile Mapping System of the Laser Data using RTF Filtering Techniques (RTF 필터링을 이용한 모바일매핑시스템 레이저 데이터의 도로 장애물 제거에 관한 연구)

  • Song, Hyun-Kun;Kang, Byoung-Ju;Lee, Sung-Hun;Choi, Yun-Soo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.1
    • /
    • pp.3-12
    • /
    • 2012
  • It is a global trend to give attention to generating precise 3D navigation maps since eco-friendly vehicles have become a critical issue due to environmental protection and depletion of fossil fuels. To date, Mobile Mapping System (MMS) has been a efficient method to acquire the data for generating the 3D navigation maps. To achieve this goal so far in the Mobile Mapping System using the data acquisition method has been proposed to be most effective. For this study the basic RTF filter algorithm was applied to modify to fit MMS quantitative analysis derived floor 99.71%, 99.95% of the highly non-producers to maintain accuracy and high-precision 3D road could create DEM. In addition, the roads that exist within the cars, roadside tree, road cars, such as the median strips have been removed to shields it takes to get results effectively, and effective in practical applications and can be expected to improve operational efficiency is considered.

Natural Spread Pattern of Damaged Area by Pine Wilt Disease Using Geostatistical Analysis (공간통계학적 방법에 의한 소나무 재선충 피해의 자연적 확산유형분석)

  • Son, Min-Ho;Lee, Woo-Kyun;Lee, Seung-Ho;Cho, Hyun-Kook;Lee, Jun-Hak
    • Journal of Korean Society of Forest Science
    • /
    • v.95 no.3
    • /
    • pp.240-249
    • /
    • 2006
  • Recently, dispersion of damaged forest by pine wilt disease has been regarded as a serious social issue. Damages by pine wilt disease have been spreaded by natural area expansion of the vectors in the damaged area, while the national wide damage spread has induced by human-involved carrying infected trees out of damaged area. In this study, damaged trees were detected and located on the digital map by aerial photograph and terrestrial surveys. The spatial distribution pattern of damaged trees, and the relationship of spatial distribution of damaged trees and some geomorphological factors were geostatistically analysed. Finally, we maked natural spread pattern map of pine wilt disease using geostatistical CART(Classification and Regression Trees) model. This study verified that geostatistical analysis and CART model are useful tools for understanding spatial distribution and natural spread pattern of pine wilt diseases.

An Empirical Study on the Quality Reliability of the Start-up performance of the Fixed Wing Aircraft at low temperature (고정익 항공기 저온 시동 성능의 품질 신뢰성 향상에 관한 실증적 연구)

  • Kim, DW;Jeong, SH
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.1
    • /
    • pp.169-188
    • /
    • 2018
  • Purpose: The purpose of this study is to analyze low-temperature starting performance of the light attacker and to search and improve the aircraft system including battery and Battery Charge and Control Unit(BCCU). Methods: In order to improve the starting up performance of the light attacker at low-temp, various deficiency cause were derived and analyzed using Fault Tree Analysis method. As a result, it was confirmed there were drawbacks in the charging and discharging mechanism of the battery. The inactivation of the battery's electrolyte at low-temp and the premature termination of the battery charge were the main cause. After long error and trial, we improved these problems by improving performance of battery and optimizing the charging algorithm of BCCU. Results: It was confirmed that the problems of starting up failures were solved through the combined performance test of the battery and BCCU, the ground test using the aircraft system and the operation test conducted by Korea Airforce operating unit for 3 months in winter. Conclusion: This study showed that the improvement of quality reliability was achieved and thus the start-up performance issue of the light attacker has been resolved at low temperature. And it is expected that the design methodologies of temperature-affected electrical system of aircraft will contribute to the development of the aircraft industry in the future.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

Meeting Minutes Summarization using Two-step Sentence Extraction (2단계 문장 추출 방법을 이용한 회의록 요약)

  • Lee, Jae-Kul;Park, Seong-Bae;Lee, Sang-Jo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.741-747
    • /
    • 2010
  • These days many meeting minutes of various organizations are publicly available and the interest in these documents by people is increasing. However, it is time-consuming and tedious to read and understand whole documents even if the documents can be accessed easily. In addition, what most people want from meeting minutes is to catch the main issues of the meeting and understand its contexts rather than to know whole discussions of the meetings. This paper proposes a novel method for summarizing documents considering the characteristics of the meeting minutes. It first extracts the sentences which are addressing the main issues. For each issues expressed in the extracted sentences, the sentences related with the issue are then extracted in the next step. Then, by transforming the extracted sentences into a tree-structure form, the results of the proposed method can be understood better than existing methods. In the experiments, the proposed method shows remarkable improvement in performance and this result implies that the proposed method is plausible for summarizing meeting minutes.

A Beacon Scheduling for Mesh Topology in Wireless Sensor Networks (무선 센서 네트워크에서 메쉬 토폴로지를 위한 비컨 스케줄링)

  • Kim, Min-Jeong;Shim, Jun-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.49-58
    • /
    • 2010
  • The wireless sensor network technology becomes one of core technologies to make it possible to implement various e-business applications. Energy efficiency is an important issue in wireless sensor networks. IEEE 802.15.4, a representative international standard for wireless sensor networks, provides the beacon enabled mode for energy-efficient communication. However, the beacons may conflict each other when the network is of multi-hop topology such as mesh or cluster-tree topology with beacon-enabled mode. The beacon conflict causes the failure of synchronization between sensor nodes, and affects other nodes in the network in that unsynchronized nodes cannot participate in communication. In this paper, we suggest an energy-efficient beacon scheduling for the wireless sensor networks. Nodes can save their energy duringperiod and prevent beacon conflict using beacon scheduling. We implement the scheduling using QualNet, and evaluate the performance under mesh topology networks. It turns out that the proposed scheduling may improve the energy efficiency in the networks.

Study of child abuse families using logistic regression models (로지스틱회귀모형을 활용한 아동학대 가족의 연구)

  • Min, Dae Kee;Choi, Mi Kyung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.5
    • /
    • pp.1327-1336
    • /
    • 2016
  • Most cases of child abuse in South Korea are caused by parents in the family home. Currently, these types of incidents are growing. Child abuse creates irreparable damage to a child's development and its effects are prolonged. This damage can create a maladjusted adolescent and adult criminal acts. Because of this damage and the long lasting effects on a person and society as a whole, special attention needs to be paid to this pressing issue. South Korea's rapidly changing social environment has created a variety of new family forms including dual-income families and single-parent families. With the current economic downturn and accompanying employment instability, many families exist in uneasy financial and emotional states. The children in these stressful family environments are the most vulnerable and live in risk of experiencing physical or psychological abuse from their parents. In the context of significant and often difficult social changes, this study identifies the characteristics of child abuse based on family status and parental mental health.