• Title/Summary/Keyword: Qualifiers

Search Result 18, Processing Time 0.017 seconds

A Cyber-Microcosm Ontology for Efficient Process of Procedural Parts in the Virtual World (가상세계에서 절차적 부분의 효율적 처리를 위한 Cyber-Microcosm Ontology)

  • Noh, Sun-Mi;Park, Jong-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.564-569
    • /
    • 2004
  • Most existing ontologies are suited for static knowledge, so they lack capability of representing procedural knowledge which is essential for an agent's action control or inference in the virtual world. Also they are not prepared to describe objects beyond their fixed ranges of domains as designed. In this paper we propose cyber-microcosm ontology (CMO) which augments procedural aspects and expressive power for multiple forms rather than fixed form as in conventional ontologies. The resulting ontology will provide an enhanced knowledge structure to capture procedural aspects of agents' actions and to facilitate their associated inferencing. The procedural aspects of the CMO are designed based on action frame formed according to diverse elements. They are elaborated in terms of various qualifiers and quantifiers to reflect statistical natures over time and instances.

  • PDF

A Study on Added-Term Relationship of Thesaurus (시소러스의 부가관계에 관한 연구)

  • 한상길
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.2
    • /
    • pp.119-138
    • /
    • 2000
  • The purpose of this study is to present solutions to expanding added-term relations which will fit new information retrieval environment. This report reviews standards for ISO 2788 and ANSI/NISO Z 39.19, and compares and analyzes 20 thesaurus added-term relations currently used to find out problems and limitations. Based on findings of the study, this report suggests how to expand thesaurus added-term relations to accomodate changes in information retrieval environment. In order to solve those problems, this report presents solutions to expanding added-term relationships as follows: First, definition was separated from scope note and scope note is categorized by type. Second, principles for the use of qualifiers are presented. Third, principles for expanding of descriptor term information are presented.

  • PDF

A Study on the Design of an Elevator Driving Control Circuit Using SFC Language (SFC언어를 이용한 Elevator 운전 제어회로 설계에 관한 연구)

  • Lee Sang-mun;Kim Min-Chan;Kwak Gun-Pyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1260-1268
    • /
    • 2005
  • Ladder Diagram(LD) is the most extensively used among PLC standard language for the design of control system. But LD has the disadvantages for data processing and maintenance. On the other hand, the Sequential Function Chart(SFC) graphic language is very powerful for describing the sequential logic control algorithm. SFC is based on flow chart, so control flow understanding is very easy and divergence can possible improving its ability. In this paper, we propose the efficient management elevator system using the action qualifiers and choice divergence. From the result, we confirm the SFC language reduced program memory capacity and processing time is faster than LD language.

A Design and Implemention of an Article Union Cataloging System Based on Metadata (메타데이터 기반 학술지 논문 종합 목록 시스템 설계 및 구현)

  • 최한석
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.57-76
    • /
    • 2001
  • As the rapid develoment of internet and information technology, the traditional library has been altered to the digital content service based on the world wide web. This paper proposes a design and implementation of an Artcle Union Catalog System(AUCS) based on metadata. The metadata set for the AUCS consists of twelve Dublin Core elements and one holdings element. The qualifiers of the proposed metadata elements are also represented. The AUCS system has an online cooperated cataloging system using the web interface or the 239.50 protocol, an union cataloging management system, and an integrated information retrieved system service. The integrated search and retrieval service of the AUCS displays not only the summary and detailed bibliographic information, but also the abstract, the table of contents, the digital content, and the copylfax service.

  • PDF

A Study of the Behaviours in Searching Full-Text Databases- Subject Specialists vs. Professional Searchers - (전문데이터베이스의 탐색특성에 관한 연구 - 주제전문가와 탐색전문가 -)

  • Lee Eung-Bong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.30 no.2
    • /
    • pp.51-86
    • /
    • 1996
  • The primary purpose of this study is to verify the difference of behavioural characteristics between the subject specialists and professional searchers in searching full-text databases. The major findings and conclusions from this study are summarized as follows. Analyses of Search questions(the degree of understanding with search questions, the degree of difficulty in selecting terms, and the degree of expectation of search results), search processes(the number of search terms used, the number of Boolean operators and qualifiers used, the number of documents browsed and the search time(the connecting time, time to spend per one output document, time to spend per one relevant output document) and search results(the searching efficiency(the number of relevant documents, the ,recall ratio and the precision ratio), the search cost(the total search cost. the search cost per one output document and the search cost per one relevant output document) and the degree of satisfaction with search results) are significantly different between the subject specialists and professional searchers in searching full-text databases.

  • PDF

An Investigation on the Properties of the Argumentation for Students' Performing Geometric Tasks in Middle School-Based on the Type of the Rebuttal of Verheij (중학교 학생들의 기하 과제 해결을 위한 논증 활동의 특징 탐색 - Verheij의 반박 유형을 중심으로 -)

  • Hwang, Hye Jeang;Hong, Sung Gi
    • Journal of Educational Research in Mathematics
    • /
    • v.27 no.4
    • /
    • pp.701-725
    • /
    • 2017
  • Students need to have opportunities to share their ideas with peers by taking part in the conversation voluntarily that is, by persuading others and reflecting the consequences. Recognizing the importance of this point, this study intended to examine students' argumentation occurring in the process of performing tasks in the math classroom. Also, it tried to explore the types of the argument that students used in the classroom and the reason why they employed them with a focus on 'rebuttal', which is one of the six elements of the argument scheme such as claim, data, warrent, backing, qualifiers, and rebuttal. The analysis of argumentation is based on the five argumentation schemes suggested by Verheij(2005). The experimental class was conducted twice a week with four participants who are third grade middle school students. In the argumentation class students were promoted to address two different kinds of geometrical tasks. After the second session of class, the researcher conducted the semi-structured interview. Accordingly, this study contributes to the existing research by making students to have concrete and active argumentation while obtaining the sound understanding of the argumentation.

Exploratory Measuring the Welfare State Change (복지국가의 변화 측정을 위한 새로운 시도)

  • Kim, Kyo-Seong;Kim, Seong-Wook
    • Korean Journal of Social Welfare
    • /
    • v.62 no.1
    • /
    • pp.5-30
    • /
    • 2010
  • This paper offers an alternative approach to measure the welfare state change by using fuzzy-set methodology. The fuzzy-set method is particularly useful for assessing change across a limited number of cases, and that it can help to translate interval fuzzy membership scores into verbal qualifiers. Applying the measurement of welfare state change, four sets(accessibility, generosity, activation, state's care responsibility) in two dimensions(old and new social risks) have been identified, which reflect theoretical importance. The analysis sets out fuzzy membership scores for 12 OECD countries in the 16 possible welfare state ideal types. This paper found that each country has its own strategies to deal with the changes, however, the changes are not dramatic or a qualitative one. This does not mean that there are no changes, but that are no paradigm shifts or path breaking in the welfare state changes.

  • PDF

Hierarchy in Signed Networks

  • Jamal Maktoubian
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.111-118
    • /
    • 2024
  • The concept of social stratification and hierarchy among human dates back to the origin of human race. Presently, the growing reputation of social networks has given us with an opportunity to analyze these well-studied phenomena over different networks at different scales. Generally, a social network could be defined as a collection of actors and their interactions. In this work, we concern ourselves with a particular type of social networks, known as trust networks. In this type of networks, there is an explicit show of trust (positive interaction) or distrust (negative interaction) among the actors. In other words, an actor can designate others as friends or foes. Trust networks are typically modeled as signed networks. A signed network is a directed graph in which the edges carry an edge weight of +1 (indicating trust) or -1 (indicating distrust). Examples of signed networks include the Slashdot Zoo network, the Epinions network and the Wikipedia adminship election network. In a social network, actors tend to connect with each other on the basis of their perceived social hierarchy. The emergence of such a hierarchy within a social community shows the manner in which authority manifests in the community. In the case of signed networks, the concept of social hierarchy can be interpreted as the emergence of a tree-like structure comprising of actors in a top-down fashion in the order of their ranks, describing a specific parent-child relationship, viz. child trusts parent. However, owing to the presence of positive as well as negative interactions in signed networks, deriving such "trust hierarchies" is a non-trivial challenge. We argue that traditional notions (of unsigned networks) are insufficient to derive hierarchies that are latent within signed networks In order to build hierarchies in signed networks, we look at two interpretations of trust namely presence of trust (or "good") and lack of distrust (or "not bad"). In order to develop a hierarchy signifying both trust and distrust effectively, the above interpretations are combined together for calculating the overall trustworthiness (termed as deserve) of actors. The actors are then arranged in a hierarchical fashion based on these aggregate deserve values, according to the following hypothesis: actor v is assigned as a child of actor u if: (i) v trusts u, and (ii) u has a higher deserve value than v. We describe this hypothesis with additional qualifiers in this thesis.