• Title/Summary/Keyword: Versions Management

Search Result 121, Processing Time 0.028 seconds

Version Management System of Hierarchy Interface System for CAD Database (CAD 데이터 베이스를 위한 HIS에서의 버전 관리 시스템)

  • Ahn, Syung-Og;Park, Dong-Won
    • The Journal of Engineering Research
    • /
    • v.2 no.1
    • /
    • pp.23-30
    • /
    • 1997
  • For a effective management and easy tool integration of CAD database, Hierarchy interface System(HIS) was designed and GROCO(Graph Representation fOr Complex Objects) Model was presented in another my paper[10]. Hierarchy Interface System which is composed of two subsystems of a configurator and a converter is designed for the interface between a conventional database management system and CAD tools. In this paper, Version Management System is presented for supporting effective operations of HIS using GROCO model. Version Management System supports efficiently CAD database charaters having a hierarchical structure of composite objects. In Version Management System, A design evolves in discrete states through mutation and derivation for going phases of design giving rise to multiple versions. Operations and rules are provided transition between their different states. and for controlling update propagation and preventing version proliferation. Version Modeling Graph is proposed for dealing with versioning at the instance and type levels.

  • PDF

Concurrent Engineering System for an Automation of Wiring Harness Design (전장 설계 자동화를 위한 동시공학 시스템)

  • 이수홍;최두선
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.4 no.2
    • /
    • pp.32-49
    • /
    • 1996
  • An approach to providing computational support for concurrent design is discussed in the context of an automobile wiring harness design problem. Key issues include the development of an architecture that supports collaboration among specialists, the development of hierarchical representations that capture different characteristics of the design, and decomposition of tasks to achieve a tradeoff between efficiency and robustness of the system. We present an architecture in which the main design tasks are supported by agents-asynchronous and semi-autonomous modules that automate routine design tasks and provide specialized interfaces for working on particular aspects of the design. The agent communication and coordination mechanisms permit members of an engineering team to work concurrently, at different levels of detail and of different versions of the design. The design is represented hierarchically, with detailed models maintained by the participating agents. In conjunction with the architecture and design representations, issues pertaining to the exchange of information among different views of the design, management of dependencies and constraints, and propagation of design changes are discussed.

  • PDF

A Bio-database Management System for the Monitoring and Automatic FTP of Public Databases

  • Tae, Hong-Seok;Han, Jeong-Min;Ahn, Bu-Young;Park, Kie-Jung
    • Genomics & Informatics
    • /
    • v.6 no.2
    • /
    • pp.95-97
    • /
    • 2008
  • Many bioinformatics sites have managed local bio-databases, including major databases such as GenBank and PIR with update load. We have developed several programs to monitor the update status of these databases and to FTP them automatically. These programs can be used for maintaining local bio-databases as recent versions and providing up-to-date databases through FTP sites. Currently, the program serves major bio-databases and will extend to accommodate many more bio-databases.

An empirical study of the effectiveness of spatial navigation system - Focus on large-scale web sites - (공간 지식을 적용한 항해 시스템에 관한 연구 - 대규모 웹 사이트를 중심으로 -)

  • Suh, Jin-Won;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.11 no.2
    • /
    • pp.79-98
    • /
    • 2001
  • As the average size of web sites gets larger, users tend to experience more severe problems while navigating through the sites. In order to alleviate the navigation-related problems, this paper proposes two new navigation systems based on the spatial metaphor to the navigation in the real world. Prototypes of the two system, Complete Route Navigation(CRN) and Complete Survey Navigation(CSN), were developed and applied to four versions of test bed web sites, which were then used in an experiment to test the effectiveness of the two navigation systems. Results from the experiment indicate that the two systems are indeed effective in aiding users to navigate in a large scale web site, and have more positive impacts when provided together. This paper ends with the limits of the study results and their implications to the development of large-scale web sites.

  • PDF

The Intertemporal Enforcement Strategies of Copyright Protection : An Analysis of Information Goods in the Presence of File-Sharing Networks

  • Kim, Jong-Woon
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.1-15
    • /
    • 2009
  • The paper analyzes a copyright owning firm's incentive to enforce its copyright in the presence of file-sharing networks. I devise a two-period model where a copyright owner sells two different versions of a creator's information good, and show that the firm's overall profits are enhanced by a strategy of differential inter-temporal enforcement of the copyright protection, compared to strategies of no enforcement or full enforcement in both periods. If the firm enforces no copyright protection in the first period, the low-valuation consumers may make and consume copies that are imperfect substitutes for the original information good. If there is a significant increase in the willingness-to-pay of some low-valuation consumers after they experience the information good, the firm can extract the increased consumer surplus by enforcing a positive level of copyright protection in the second period. Social welfare, however, is maximized in the case of no enforcement.

  • PDF

Performance Evaluation of Conflict Detection Schemes for Concurrent Temporal Tranactions (시간지원 크랙잭션을 위한 충돌 검출 기법의 성능평가)

  • 구경이;하봉옥;김유성
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.1
    • /
    • pp.80-80
    • /
    • 1999
  • As Temporal DataBase Systems(TDBSs) manages both the historical versions and the current version of each data item, a temporal transaction may access more data records than atransaction in traditional database systems. Hence, the concurrency control subsystem of temporaldatabase management system should be able to correctly and efficiently detect actual conflicts amongconcurrent temporal transactions while the cost of detecting conflicts is maintained in low levelwithout detecting false conflicts which cause severe degradation of system throughput.In this paper, Two-Level Conflict Detection(TLCD) scheme is proposed for efficient conflictdetection between concurrent temporal transactions in TDBs. In the proposed TLCD scheme, sincechecking conflict between concurrent temporal transactions is performed at two levels, i, e., logicallevel and physical level, conflicts between concurrent temporal transactions are efficiently and correctlydetected,Furthermore, we also evaluate the performance of the proposed TLCD scheme with those oftraditional conflict detection schemes, logical-level conflict detection scheme and physical-level conflictdetection scheme by simulation approach, The result of the simulation study shows that the proposedTLCD scheme outperforms the previous conflict detection schemes with respect to the averageresponse time.

A two-phase model for usability evaluation of software user interfaces

  • Lim, Chee-Hwan;Park, Kyung-S.
    • Proceedings of the ESK Conference
    • /
    • 1997.10a
    • /
    • pp.313-319
    • /
    • 1997
  • There is currently a focus on usability of interactive computer software. Previous research in software ergonomics has indicated the importance of evaluating the usability of software user interfaces. Software developers, interface designers or human foctors engineers often confront the task of comparative evaluation among systems, versions or interface designs. This study presents a structured model for comparative evaluation of user interface designs using usability criteria and measures. The proposed model consists of twomain phases : the prescreening phase ad the evaluation phase. The first phase involves expert judgment-based approach with qualitative criteria. The prescreening phase uses absolute measurement analytic hierarchy process to filter possible altermative interfaces to a reasonable subset. The second phase involves user-based approach such as usability testing, with quantitative criteria. The objective of the evaluation phase is to evaluate a subset of altermatives using objective measures. A set of criteria and measures for evaluating the usability of computer software designs is presented. The proposed model provides practitioners with a structured approach to select the best interface based on usability criteria and measures.

  • PDF

A Comparison of Three Theories of Firm Boundaries (기업경계에 관한 세 이론의 비교)

  • Chung, Hoe-Sang
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.3
    • /
    • pp.87-99
    • /
    • 2021
  • Purpose - In this study, I attempt to clarify three theories of firm boundaries (vertical integration): the principal-agent theory, transaction cost theory, and property rights theory. Although these theories have been widely cited and much discussed, it has been found that understanding the commonalities and distinctions of these seemingly familiar theories is difficult. Design/methodology/approach - I present the three theories about the decisions that firms make concerning their boundaries. Then, I compare elemental versions of the theories of the firm. Findings - Comparing the ingredients of the elemental property rights and principal-agent theories shows that they provide a unified account of the costs and benefits of vertical integration. However, the property rights theory in no sense formalizes the transaction cost theory. Research implications or Originality - Clarifying the three theories of the firm can help to construct empirical models and interpret its results.

A Pragmatic Framework for Predicting Change Prone Files Using Machine Learning Techniques with Java-based Software

  • Loveleen Kaur;Ashutosh Mishra
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.457-496
    • /
    • 2020
  • This study aims to extensively analyze the performance of various Machine Learning (ML) techniques for predicting version to version change-proneness of source code Java files. 17 object-oriented metrics have been utilized in this work for predicting change-prone files using 31 ML techniques and the framework proposed has been implemented on various consecutive releases of two Java-based software projects available as plug-ins. 10-fold and inter-release validation methods have been employed to validate the models and statistical tests provide supplementary information regarding the reliability and significance of the results. The results of experiments conducted in this article indicate that the ML techniques perform differently under the different validation settings. The results also confirm the proficiency of the selected ML techniques in lieu of developing change-proneness prediction models which could aid the software engineers in the initial stages of software development for classifying change-prone Java files of a software, in turn aiding in the trend estimation of change-proneness over future versions.

Low Overhead System Monitoring Based on SNMP for Embedded Systems (임베디드 시스템들을 위한 SNMP 기반의 저부하 시스템 모니터링)

  • Kim Tae-Su;Kim Dong-Uk;Kim Yong-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.1-9
    • /
    • 2006
  • SNMP is a standard protocol for management of networking devices. Nowadays, most computer systems have capability to act as SNMP agents. In this paper, we developed a low overhead version of SNMP library for embedded systems, and implemented a monitoring software based on the library for a large number of target systems. The monitoring system consists of a monitoring server, SNMP agents, and client programs. The monitoring server collects status information from SNMP agents running on the monitoring targets, and sends summary information to client programs. We implemented two versions of clients, Java based standalone program and Web based program.