• Title/Summary/Keyword: Set ID

Search Result 90, Processing Time 0.031 seconds

Shredding XML Documents into Relations using Structural Redundancy (구조적 중복을 사용한 XML 문서의 릴레이션으로의 분할저장)

  • Kim Jaehoon;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.177-192
    • /
    • 2005
  • In this paper, we introduce a structural redundancy method. It reduces the query processing cost incurred when reconfiguring an XML document from divided XML data in shredding XML documents into relations. The fundamental idea is that query performance can be enhanced by analyzing query patterns and replicating data essential for the query performance. For the practical and effective structural redundancy, we analyzed three types of ID, VALUE, and SUBTREE replication. In addition, if given XML data and queries are very large and complex, it can be very difficult to search optimal redundancy set. Therefore, a heuristic search method is introduced in this paper. Finally, XML query processing cost arising by employing the structural redundancy, and the efficiency of proposed search method arc analyzed experimentally It is manifest that XML read query is performed more quick]y but XML update query is performed more slowly due to the additional update consistency cost for replicas. However, experimental results showed that in-place ID replication is useful even in having excessive update cost. It was also observed that multiple-place SUBTREE replication can enhance read query performance remarkably if only update cost is not excessive.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

A New Decision Tree Algorithm Based on Rough Set and Entity Relationship (러프셋 이론과 개체 관계 비교를 통한 의사결정나무 구성)

  • Han, Sang-Wook;Kim, Jae-Yearn
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.2
    • /
    • pp.183-190
    • /
    • 2007
  • We present a new decision tree classification algorithm using rough set theory that can induce classification rules, the construction of which is based on core attributes and relationship between objects. Although decision trees have been widely used in machine learning and artificial intelligence, little research has focused on improving classification quality. We propose a new decision tree construction algorithm that can be simplified and provides an improved classification quality. We also compare the new algorithm with the ID3 algorithm in terms of the number of rules.

All Regular Elements in HypG(2)

  • Puninagool, Wattapong;Leeratanavalee, Sorasak
    • Kyungpook Mathematical Journal
    • /
    • v.51 no.2
    • /
    • pp.139-143
    • /
    • 2011
  • In this paper we consider mappings ${\sigma}$ which map the binary operation symbol f to the term ${\sigma}$(f) which do not necessarily preserve the arities. We call these mappings generalized hypersubstitutions. Any generalized hypersubstitution ${\sigma}$ can be extended to a mapping $\hat{\sigma}$ on the set of all terms of type ${\tau}$ = (2). We de ne a binary operation on the set $Hyp_G$(2) of all generalized hypersubstitutions of type ${\tau}$ = (2) by using this extension The set $Hyp_G$(2) together with the identity generalized hypersubstitution ${\sigma}_{id}$ which maps f to the term f($x_1,x_2$) forms a monoid. We determine all regular elements of this monoid.

HTTP based remote monitoring and control system using JAVA (HTTP 기반의 자바를 이용한 원격 감시 및 제어 시스템)

  • Yi Kyoung-Woong;Choi Han-Soo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.9
    • /
    • pp.847-854
    • /
    • 2004
  • In this paper, It is studied to control and to monitor the remote system state using HTTP(Hyper Text Transfer Protocol) object communication. The remote control system is controlled by using a web browser or a application program. This system is organized by three different part depending on functionality-server part, client part, controller part. The java technology is used to composite the server part and the client part and C language is used for a controller. The server part is waiting for the request of client part and then the request is reached, the server part saves client data to the database and send a command set to the client part. The administrator can control the remote system just using a web browser. Remote part is worked by timer that is activated per 1 second. It gets the measurement data of the controller part, and then send the request to the server part and get a command set in the command repository of server part using the client ID. After interpreting the command set, the client part transfers the command set to the controller part. Controller part can be activated by the client part. If send command is transmitted by the client part, it sends sensor monitoring data to the client part and command set is transmitted then setting up the value of the controlled system.

Sensitivity Analysis of Decision Tree's Learning Effectiveness in Boolean Query Reformulation (불리언 질의 재구성에서 의사결정나무의 학습 성능 감도 분석)

  • 윤정미;김남호;권영식
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.4
    • /
    • pp.141-149
    • /
    • 1998
  • One of the difficulties in using the current Boolean-based information retrieval systems is that it is hard for a user, especially a novice, to formulate an effective Boolean query. One solution to this problem is to let the system formulate a query for a user from his relevance feedback documents in this research, an intelligent query reformulation mechanism based on ID3 is proposed and the sensitivity of its retrieval effectiveness, i.e., recall, precision, and E-measure, to various input settings is analyzed. The parameters in the input settings is the number of relevant documents. Experiments conducted on the test set of Medlars revealed that the effectiveness of the proposed system is in fact sensitive to the number of the initial relevant documents. The case with two or more initial relevant documents outperformed the case with one initial relevant document with statistical significances. It is our conclusion that formulation of an effective query in the proposed system requires at least two relevant documents in its initial input set.

  • PDF

Hard calibration of a structured light for the Euclidian reconstruction (3차원 복원을 위한 구조적 조명 보정방법)

  • 신동조;양성우;김재희
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.183-186
    • /
    • 2003
  • A vision sensor should be calibrated prior to infer a Euclidian shape reconstruction. A point to point calibration. also referred to as a hard calibration, estimates calibration parameters by means of a set of 3D to 2D point pairs. We proposed a new method for determining a set of 3D to 2D pairs for the structured light hard calibration. It is simply determined based on epipolar geometry between camera image plane and projector plane, and a projector calibrating grid pattern. The projector calibration is divided two stages; world 3D data acquisition Stage and corresponding 2D data acquisition stage. After 3D data points are derived using cross ratio, corresponding 2D point in the projector plane can be determined by the fundamental matrix and horizontal grid ID of a projector calibrating pattern. Euclidian reconstruction can be achieved by linear triangulation. and experimental results from simulation are presented.

  • PDF

A Generalized Least Square Method using Dead Zone (불감대를 사용한 최소자승법의 일반화)

  • 이하정;최종호
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.37 no.10
    • /
    • pp.727-732
    • /
    • 1988
  • In this paper, a parameter estimation method of linear systems with bounded output disturbances is studied. The bound of the disturbances is assumed to known Weighting factors are proposed to modify LS(Least Square) algorithm in the parameter estimation method. The conditions of weighting factors are given so that the estimation method has good convergence properties. This condition is more relaxed form than other known conditions. The compensation term in the estimation equations is represented by a function of the output prediction error and this function should lie in a specified region on x-y plane to satisfy these conditions of weighting factors. A set of weighting factor is selected and an algorithm is proposed using this set of weighting factor. The proposed algorithm is compared with another existing algorithm by simulation and its performance in parameter estimation id discussed.

  • PDF

A Multicenter Survey on the Current Status of Pediatric Blood Cultures in Korea (소아 대상 혈액배양검사 현황 파악을 위한 국내 다기관 설문조사)

  • Lee, Young Joon;Lee, Ji Young;Kong, Seom Kim;Yeon, Gyu Min;Hong, Yoo Rha;Oh, Chi Eun
    • Pediatric Infection and Vaccine
    • /
    • v.25 no.1
    • /
    • pp.17-25
    • /
    • 2018
  • Purpose: Blood culture is an essential diagnostic tool and requires clear indications, proper techniques, and quality control. We aimed to investigate whether blood cultures in children are appropriate for indications, are performed correctly, and receive proper quality control. Methods: We conducted an online survey targeting pediatric infectious diseases (ID) specialists working in general hospitals and neonatologists (Neo) working at hospitals operating a neonatal intensive care unit in Korea. Results: Approximately 81.1% (30/37) of pediatric ID specialists and 72.2% (52/72) of Neo responded to the survey. Some of the respondents (33.3% of ID and 59.6% of Neo) performed blood culture as a regular test irrespective of the indication. Approximately 40% of ID and 65.4% of Neo ordered only one set of blood culture in patients suspected with bacteremia. The most commonly used disinfectant for skin preparation was povidone-iodine, while the skin preparation method varied by institution. Approximately two-thirds of the institutions were monitoring the blood culture contamination rate, whereas relatively few provided staff with feedback on that rate. In addition, less than half of the institutions were providing regular staff training on blood culture (40% of ID and 28.8% of Neo). Conclusions: The indication and methods of blood culture for children varied according to institution, and few hospitals exert effort in improving the quality of blood culture. Institutions have to strive constantly toward improvement of blood culture quality and evidence-based recommendations for pediatric blood cultures should be standardized.

Gait Recognition Using Multiple Feature detection (다중 특징점 검출을 이용한 보행인식)

  • Cho, Woon;Kim, Dong-Hyeon;Paik, Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.6
    • /
    • pp.84-92
    • /
    • 2007
  • The gait recognition is presented for human identification from a sequence of noisy silhouettes segmented from video by capturing at a distance. The proposed gait recognition algorithm gives better performance than the baseline algorithm because of segmentation of the object by using multiple modules; i) motion detection, ii) object region detection, iii) head detection, and iv) active shape models, which solve the baseline algorithm#s problems to make background, to remove shadow, and to be better recognition rates. For the experiment, we used the HumanID Gait Challenge data set, which is the largest gait benchmarking data set with 122 objects, For realistic simulation we use various values for the following parameters; i) viewpoint, ii) shoe, iii) surface, iv) carrying condition, and v) time.